468 resultados para Irish Statute Book
Resumo:
We present an analysis of the Northern Irish bog oak record presented in Turney et al. (2005) for the last 4500 years. The record is compared with a compiled peatland water table record from the same region and palaeohydrological data from northern England and mid-latitude Europe. It is apparent that there is no consistent relationship between the population frequency of Irish bog oaks and the palaeohydrological reconstructions, illustrating that the record is not reflecting wetness changes in peatlands. We suggest that the bog oaks should be scrutinised on a within-site and a site-by-site basis to assess the spatial coherency of the shifts in tree populations and the synchronicity of phases of germination and dying off (GDO). Further work is needed to critically examine the controls on the establishment and demise of bog oaks on Irish peatlands before these data can be used as a palaeoclimate proxy. Only then can they be used to test solar forcing of Holocene climate change.
Resumo:
Charting the enduring export appeal of policing models from (Northern) Ireland, this article sheds some light on the processes by which policing models are communicated and actively promoted to the global policing environment. The authors demonstrate how the transplantation of the Irish colonial model (ICM) represents an early example of the globalization of policing. The legacy of counterinsurgency expertise embedded within the ICM remains a historical constant and is a key factor in relation to the increasing commodification of the contemporary Northern Irish policing model, a model that successfully blends counterterrorism experience with a template for democratic policing reform. By juxtaposing these models, the authors provide a conceptual framework through which to assess the contemporary substance of policing transfer. The authors conclude by suggesting that the seductiveness of these policing models is largely attributable to lessons in counterinsurgency and notions of "Ireland as the solution" to a host of complex security scenarios.