Wonach suchen Sie?

Wonach suchen Sie?

The Example of Rwanda’s Multi-layered Justice Mechanisms. Justice Mechanisms and the Question of Legitimacy

Transitional Justice
FriEnt
Drawing on the example of Rwanda’s multi-layered justice mechanisms the model of legitimacy are referenced to various internal and external actors who seek to (de)legitimate transitional justice institutions, and to what this entails for the legitimacy of these mechanisms in general.

Legitimacy, this contribution argues, plays a key role in connecting transitional justice mechanisms to sustainable peace, and strengthening people’s perceptions of legitimacy should be of concern to all those involved in these institutions. Here, it is important to take an empirical, people-based approach to legitimacy, with regard for its dynamic quality. This approach should focus on all three dimensions of legitimacy: the input into transitional justice mechanisms, the popular adherence to the demos that sets them up, and their output. In addition, legitimacy requires an explicit deliberation by means of justificatory discourse, and the involvement of all stakeholders. Drawing on the example of Rwanda’s multi-layered justice mechanisms this model then draws attention through the processes through which various internal and external actors can seek to (de)legitimate transitional justice institutions, and what this entails for the legitimacy of these mechanisms in general.

The Example of Rwanda’s Multi-layered Justice Mechanisms. Justice Mechanisms and the Question of Legitimacy
Größe: 239KB
Dateityp: PDF
Autor*innen
Barbara Oomen

Verwandte Artikel

FES
Misereor

Geopolitics, Militarisation, and the “Global South”

Discussing security and a quest for peace at FriEnt’s public dialogue
FES
Misereor
Discussing security and a quest for peace at FriEnt’s public dialogue
FES
FriEnt
Public Debate in Berlin with experts from Brazil, Germany, and India
FES
Friedensförderung
Warum die WPS-Agenda jetzt priorisiert werden muss
IDOS
Friedenspolitik
How to integrate peace and security in one approach