Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Projecting Power
Search
Search
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Tilly 1985
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Special pages
Page information
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Double-Edged Protection=== ---- '''Summary''' *In this section, Tilly discusses the contrasting perceptions of the term "protection." He highlights two distinct connotations associated with protection: one being comforting and the other ominous. Upon defining these connotations, Tilly discusses the various nuances encompassing perception. The passage can be broken down into the following categories: ---- '''Comforting vs. Ominous Tone''': Tilly distinguishes between the comforting aspect of protection, symbolizing safety and security provided by a powerful entity, and the ominous tone, representing coercive practices where individuals are forced to pay tribute to avoid harm. '''Degree of Coercion''': The difference between the two perceptions lies in the degree of coercion involved. While some forms of protection are based on mutual benefit and trust, others involve explicit threats and extortion to extract payments. '''Dependence on Threat Perception''': The interpretation of "protection" is heavily influenced by the perceived reality and external nature of the threat. Individuals may comply with demands for protection based on their assessment of the risks involved. '''Power Dynamics''': Tilly highlights the power dynamics at play in situations of protection, where individuals may feel compelled to pay for security even if it involves coercion, reflecting a complex interplay between security and exploitation.
Summary:
Please note that all contributions to Projecting Power may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Projecting Power:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Toggle limited content width