Bedolla, L. G., 2014. How an Intersectional Approach Can Help to Transform the University. Politics & Gender. 10(3), pp. 447-455.
doi: 10.1017/S1743923X14000270.
Beyler, C., 2004. Female Suicide Bombers: an update. International Institute for Counter-Terro rism. Available at:<http://www.ict.org.il/Articles...> [Accessed on 19 November 2014].
Bloom, M., 2005. Terror’s Stealth Weapon: women. Los Angeles Times Online. [Online] November 29. Available at:< http://articles.latimes.com/20...> [Accessed on 17 November 2014].
Brittain, V., 2013.How the ‘war on terror’ in England became a war on women and children. [online] Al Jazeera. Available at:<http://www.aljazeera.com/indep...> [Accessed 20 April 2014]Bush, L., 2001. Text: Laura Bush on Taliban Oppression of Women. [online] The Washington Post, Available at:<http://www.washingtonpost.com/...>. [Accessed 20 April 2014].
Cohn, C. and Enloe, C., 2003. A Conversation with Cynthia Enloe: Feminists Look at Masculinity and the Men Who Wage War. Signs: Journal of Women in Culture and Society, 28(4), pp. 1187-1207. doi: 10.1086/368326.
Crenshaw, K., 1991. Mapping the Margins: Intersectionality, Identity Politics, and Violence Against Women of Color. Stanford Law Review,43(1), pp.1241-1266. doi:10.2307/1229039.
Davis, K., 2008. Intersectionality as Buzzword: a sociology of science perspective on what makes a feminist theory successful. Feminist Theory, 9(1), pp. 67-85. doi:10.1177/1464700108086364
McRobie, H., 2013. From the war on terror to austerity: a lost decade for women and human rights. [online] Open Democracy. Available at:<http://www.opendemocracy.
Sjoberg, L. and Gentry, C.E., eds., 2007. Mothers, Monsters and Whores: Women’s Violence in Global Politics. London: Zed Books.114Sjoberg, L. and Gentry, C.E., 2011. Women, Gender and Terrorism. Athens, Georgia: University of Georgia Press.
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.