• No results found

Public narratives as symbolic resources for gender and development: a case study of women and community radio in South Sudan

N/A
N/A
Protected

Academic year: 2020

Share "Public narratives as symbolic resources for gender and development: a case study of women and community radio in South Sudan"

Copied!
318
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Table 1: Summary of research questions
Table 2: International gender and development goals
Table 2. Starting with gender equality and women’s empowerment broadly, they go
Table 4: Theoretical and operational lenses currently used to examine local cultural context in the gender and development literature
+7

References

Related documents

Upon determination that the user is likely to forget a task or item, e.g., due to change in routine, an alert is provided to

Species studied Secretory ducts in pith or primary xylem Vessels Percent- age of scalari- form perfora- tions Number of bars Opposite vessel- ray pitting Scalari- form vessel-

The study expects that the price of cassava tubers per tonne, access to market information and good road network exert positive effects on the percentage of cassava output

Western Yellow-breasted Chat ( Icteria virens auricollis) territories as defined by observations of males singing and perching and home ranges as determined by radio-tracking

Task 1.2 : Commanders and Supervisors must ensure their web servers and web applications hosting controlled unclassified information (CUI) within a DoD DMZ require DoD approved

Na Tabela 4 encontram-se ainda identificados vários indicado- res da actividade em que os anestesiologistas estão envol- vidos, como por exemplo, a percentagem de consultas de

Here we illustrate how to estimate nonparametric bounds on the risk difference function over time, which accounts for possible unmeasured confounding as well as selection bias due

Again, depending on the use case, a network slice delivering this connectivity service can be configured with different network functions to enable higher levels of security,