Border Mythogenesis

dc.contributor.authorNsiangani, Kibavuidi
dc.contributor.authorPius Mulaba Lumpungu
dc.contributor.authorHolenu Mangenda
dc.date.accessioned2025-12-13T15:11:01Z
dc.date.issued2023-12-27
dc.description.abstractColonial borders are not only lines on maps. They are jurisdictions that distribute protection, movement, land access, and political voice. When state capacity is uneven and historical literacy is thin, border disputes become ignitable through narrative operations that convert ambiguity into mobilizable certainty, often accelerating coercion or proxy violence. This paper models that ignition pathway as Border Mythogenesis (BM): a codeable set of claim motifs (restoration, priority, othering, delegitimation, and security laundering) that predictably intensify under specific conditions. To remain consistent with prior work, we treat these motifs as a domain expression of the Entitlement Cascade and its allied selection dynamics (ISM/PDI): when beneficiary systems face accountability stress or perceived loss of dominance, they frequently deploy portable entitlement scripts (priority claims, credit seizure, universalization, and victim inversion). We refer to this operational motif family as Colonial Entitlement Rhetoric (CER), not as a separate theory but as a measurable surface form of the same cascade logic across border disputes and privilege‑defense contexts. CER does not replace material drivers such as resources, security fragmentation, or elite rent capture. It functions as an accelerant that lowers moral cost and raises mobilisation capacity, and it becomes most visible under credible weakness signals. Methodologically, we provide preregisterable codebooks, low‑tech replication protocols using public sources (official speeches, parliamentary records, broadcaster transcripts, archived newspapers), and a worked empirical pilot template with falsification conditions. The paper closes with circuit‑breaker recommendations for heritage institutions, educators, and civic actors that increase epistemic thickness, expand non‑violent pathways for boundary settlement, and reduce the conversion of narrative spikes into coercion.
dc.description.provenanceSubmitted by Kibavuidi Nsiangani (k.nsiangani@cena.institute) on 2025-12-13T15:11:01Z No. of bitstreams: 2 Border Mythogenesis: 447273 bytes, checksum: 7e09787b4d98d4e7af94e51816e24cef (MD5) license_rdf: 905 bytes, checksum: 2f656a26de8af8c32aaacd5e2a33538c (MD5)en
dc.description.provenanceMade available in DSpace on 2025-12-13T15:11:01Z (GMT). No. of bitstreams: 2 Border Mythogenesis: 447273 bytes, checksum: 7e09787b4d98d4e7af94e51816e24cef (MD5) license_rdf: 905 bytes, checksum: 2f656a26de8af8c32aaacd5e2a33538c (MD5) Previous issue date: 2023-12-27en
dc.identifier.citationBorder Mythogenesis. (2023). USK Journal of Political Science and Epistemology, 27(1). https://doi.org/10.65439/276q5079. https://publications.cema-usk.press/index.php/politicalscience/en/article/view/21
dc.identifier.urihttps://africarxiv.ubuntunet.net/handle/1/10635
dc.language.isoen_US
dc.publisherUSK Journal of Political Science and Epistemology
dc.relation.ispartofseries27; 1
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United Statesen
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/
dc.titleBorder Mythogenesis
dc.title.alternativeColonial Borders as Risk Surfaces, Narrative Weapons, and Proxy Conflict Triggers in Pan‑African Futures (1884–2023)
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Border Mythogenesis
Size:
436.79 KB
Format:
Adobe Portable Document Format
Description:
Colonial borders are not only lines on maps. They are jurisdictions that distribute protection, movement, land access, and political voice. When state capacity is uneven and historical literacy is thin, border disputes become ignitable through narrative operations that convert ambiguity into mobilizable certainty, often accelerating coercion or proxy violence. This paper models that ignition pathway as Border Mythogenesis (BM): a codeable set of claim motifs (restoration, priority, othering, delegitimation, and security laundering) that predictably intensify under specific conditions. To remain consistent with prior work, we treat these motifs as a domain expression of the Entitlement Cascade and its allied selection dynamics (ISM/PDI): when beneficiary systems face accountability stress or perceived loss of dominance, they frequently deploy portable entitlement scripts (priority claims, credit seizure, universalization, and victim inversion). We refer to this operational motif family as Colonial Entitlement Rhetoric (CER), not as a separate theory but as a measurable surface form of the same cascade logic across border disputes and privilege‑defense contexts. CER does not replace material drivers such as resources, security fragmentation, or elite rent capture. It functions as an accelerant that lowers moral cost and raises mobilisation capacity, and it becomes most visible under credible weakness signals. Methodologically, we provide preregisterable codebooks, low‑tech replication protocols using public sources (official speeches, parliamentary records, broadcaster transcripts, archived newspapers), and a worked empirical pilot template with falsification conditions. The paper closes with circuit‑breaker recommendations for heritage institutions, educators, and civic actors that increase epistemic thickness, expand non‑violent pathways for boundary settlement, and reduce the conversion of narrative spikes into coercion.

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.22 KB
Format:
Item-specific license agreed to upon submission
Description:

Collections