Listing 1 - 10 of 73 | << page >> |
Sort by
|
Choose an application
In The Responsibility to Protect: The Promise of Stopping Mass Atrocities in Our Time, Jared Genser and Irwin Cotler provide a comprehensive overview on how this contemporary principle of international law has developed and analyze how best to apply it to current and future humanitarian crises. The "responsibility to protect" is a doctrine unanimously adopted by the UN World Summit in 2005, which says that all states have an obligation to protect their own citizens from mass atrocities, which includes genocide, war crimes, crimes against humanity, and ethnic cleansing. Its adoption and application has generated a passionate debate in law schools, professional organizations, media and within the U.N. system. To present a full picture of where the doctrine now stands and where it could go in the future, editors Jared Genser and Irwin Cotler have assembled a global team of authors with diverse backgrounds and differing viewpoints, including Edward Luck, the UN Secretary-General's Special Advisor on the Responsibility to Protect. Genser and Cotler balance the pro-RtoP chapters with more skeptical arguments from agency staff and scholars with long experience in addressing mass atrocities. Framed by a Preface from Desmond Tutu and Vaclav Havel and a Conclusion from Gareth Evans, these in-depth and authoritative analyses move beyond theory to demonstrate how RtoP has worked on the ground and should work if applied to other crises. The global focus of this book, as well as its detailed application of the principle in case studies make it uniquely useful to staff at international organizations and NGOs considering use of the principle in a given circumstance, to scholars providing advice to governments, and to students seeking guidance on this still-expanding subject.
Humanitarian intervention --- Atrocities --- Genocide --- Prevention --- Humanitarian intervention. --- Cruelty --- War crimes --- Intervention (International law) --- Prevention. --- Intervention (International law)Prevention. --- Military atrocities --- Atrocities - Prevention --- Genocide - Prevention
Choose an application
"Explains Responsibility to Protect (R2P), a new international norm to protect the peoples of the world. With real-world examples, current events analysis, and assessments from personal experience, shows how R2P is better equipped to end mass atrocity crimes than is "the right to intervene" or other "humanitarian intervention" doctrines"--Provided by publisher.
Polemology --- Atrocities --- Genocide --- Responsibility to protect (International law) --- Prevention --- GENOCIDE -- 341.61 --- PREVENTION -- 341.61 --- ATROCITIES -- 341.61 --- Prevention. --- Responsibility to protect (International law). --- International law --- Military atrocities --- Cruelty --- War crimes --- Atrocities - Prevention --- Genocide - Prevention
Choose an application
Criminology. Victimology --- Transnational crime --- Criminalité internationale --- Prevention --- International cooperation --- Prévention --- Coopération internationale --- Transnational crime. --- International cooperation. --- Transnational crime.Prevention --- Criminalité internationale --- Prévention --- Coopération internationale --- Multinational crime --- Transborder crime --- Prevention&delete& --- Crime
Choose an application
Bioviolence is the hostile infliction of disease: our most fundamental terror. Traitors to humanity could inflict vast tolls making everyone potentially vulnerable. Bioviolence is the most realistic way for humanity's traitors to raze the pillars of modern civilization. Too little is being done to prevent bioviolence. While bio-offenders are becoming more focused and organized, prevention policies are vague, gap-ridden, and unsupervised. No other threat presents such severe danger yet such a failure of leadership to reduce risks. The strategy for preventing bioviolence requires a broad international commitment to promote bioscience while understanding its inherent and unavoidable dangers. Bioviolence threats shrink our planet into an interdependent neighborhood. This book explores how global governance should evolve to address challenges of advancing science and technology.
Bioterrorism --- Bioterrorism. --- Biomedical Research. --- International Cooperation. --- Public Health. --- Public Policy. --- Prevention. --- prevention & control. --- legislation & jurisprudence. --- Public Policy.Prevention. --- Public health. --- Public policy. --- Bio-terrorism --- Biological terrorism --- Terrorism --- Law and legislation --- Social Sciences --- Political Science
Choose an application
This book examines whether interrogational torture is effective in obtaining valuable information and at what cost in terms of torture’s brutality and frequency. Interrogational torture’s effectiveness is a necessary condition for its justification by utilitarian proponents. This book tackles this age-old question head on in a new way, employing mathematical game theory – but reserving the math for the appendices. The book draws on historical accounts, previously secret CIA documents in the war on terrorism, and the proposals advanced by torture proponents to build a game theoretic model of interrogational torture. Illustrating the model outcomes with narratives from Pinochet’s Chile to Algeria to the use of enhanced interrogation techniques against Al Qaeda operatives at CIA black sites, the book compares the results of the model with proponent benchmarks on information reliability, torture frequency, and torture severity. These benchmarks both predict what should emerge from the model according to the proponent’s own logic as well as constitute the necessary conditions for the justification of the proponent ideal. The results of the model violate the necessary conditions for justifying the practice – interrogational torture fails to reliably generate valuable information but will be both more frequent and more brutal than proponents expect and are willing to accept. Having shown that interrogational torture is ineffective, the book then demonstrates just why and how it fails. A Postscript compares the benchmarks and the game theoretic model’s predictions to the findings of the 2014 Senate Intelligence Committee report on the CIA interrogation program.
TORTURE --- QUESTIONING --- MILITARY INTERROGATION --- Torture --- Questioning --- Military interrogation --- Terrorism --- Crime prevention --- Crime --- Prevention of crime --- Public safety --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Interrogation --- Socratic method --- Catechetics --- Teaching --- Cruelty --- Punishment --- Extraordinary rendition --- Prevention --- Government policy
Choose an application
China's problem with terrorism has historically been considered an outgrowth of Beijing's efforts to integrate the Xinjiang Uyghur Autonomous Region into the People's Republic of China. Since the end of the Cold War, however, this internal dynamic has converged with an evolving external environment, stimulating the development of linkages between Uyghur separatism and terrorism and broader terrorist movements in Central Asia, South Asia and the Middle East. This book brings together some of the leading experts on Chinese terrorism, offering the first systematic, scholarly assessment of the country's approaches to this threat. Four areas of investigation are looked at: the scope and nature of terrorism in China and its connection with developments in other regions; the development of legislative measures to combat terrorism; the institutional evolution of China's counter-terrorism bureaucracy; and Beijing's counter-terrorism cooperation with international partners.
TERRORISM--CHINA --- TERRORISM--CHINA--PREVENTION --- S06/0280 --- S08/0620 --- S25/0655 --- China: Politics and government--State security and intelligence --- China: Law and legislation--Criminal: since 1949 --- Xinjiang--Relations with China --- Terrorism --- Prevention. --- Terrorisme --- Prévention.
Choose an application
The recent surge in piracy attacks off the coast of Somalia has triggered an international response which is unprecedented in terms of the number of actors involved. The International Response to Somali Piracy presents a comprehensive treatment of the international response to Somali piracy, exploring current initiatives to counter the piracy threat, both operationally and legally. Moreover, the book analyzes the regional and broader international context within which these initiatives are taken, and identifies the challenges and opportunities for international cooperation on fighting piracy at sea. This volume brings together experts from a great variety of different backgrounds and disciplines.
PIRACY--SOMALIA --- PIRACY--SOMALIA--PREVENTION --- Maritime terrorism --- Piracy --- Hijacking of ships --- World politics --- Ships --- Maritime piracy --- Offenses against public safety --- Terrorism --- Prevention. --- Hijacking
Choose an application
The vast size and highly unregulated nature of the world's waterways have. made the maritime environment an increasingly attractive theater for. perpetrators of transnational violence. Piracy and sea-borne terrorism have. been on the rise since 2000. While the United States has spearheaded several. important initiatives to improve maritime security, the author urges. policymakers to consider four additional measures to safeguard the world's. oceans.
Maritime terrorism -- Prevention. --- Merchant marine -- Security measures -- United States. --- Piracy -- Prevention. --- Security, International. --- Shipping -- Security measures. --- Terrorism -- Prevention. --- Unified operations (Military science) -- United States. --- Merchant marine --- Security, International --- Shipping --- Maritime terrorism --- Terrorism --- Piracy --- Unified operations (Military science) --- Military & Naval Science --- Law, Politics & Government --- Navigation --- Security measures --- Prevention --- Security measures. --- Prevention. --- Joint operations (Military science) --- Unified commands (Military science) --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Collective security --- International security --- Mercantile marine --- Unified operations (Military science)Security measures --- Military art and science --- Strategy --- Tactics --- International relations --- Disarmament --- International organization --- Peace --- Marine service --- Merchant marine - Security measures - United States --- Shipping - Security measures --- Maritime terrorism - Prevention --- Terrorism - Prevention --- Piracy - Prevention --- Unified operations (Military science) - United States
Choose an application
One of the world's foremost authorities on the subject, Professor Pape has created the first comprehensive database of every suicide terrorist attack in the world from 1980 until today. Professor Pape uses this unprecedented research to debunk widely held misconceptions about the nature of suicide terrorism and provide a new lens that makes sense of the threat we face. In this wide-ranging analysis, Professor Pape offers the essential tools to forecast when some groups are likely to resort to suicide terrorism, and when they are not. He also provides the first comprehensive demographic profile of modern suicide terrorist attackers. With data from more than 460 such attackers - including the names of 333 - we now know that these individuals are not mainly poor, desperate criminals or uneducated religious fanatics but are often well-educated, middle-class political activists.
Terrorism --- Terrorists --- Terrorisme --- Terroristes --- Psychological aspects. --- Suicidal behavior. --- Prevention. --- Aspect psychologique --- Comportement suicidaire --- Prévention --- Psychological aspects --- Suicidal behavior --- Prevention --- #SBIB:053.AANKOOP --- #SBIB:327.5H20 --- #SBIB:327.5H21 --- #SBIB:324H72 --- Vredesonderzoek: algemeen --- Vrede – oorlog, oorlogssituaties --- Politieke verandering: conflictlijnen, nationalisme/federalisme --- #SBIB:324H72Vredesonderzoek: algemeen --- Prévention --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Criminals --- Terrorism - Psychological aspects --- Terrorists - Suicidal behavior --- Terrorism - Prevention
Choose an application
In this powerfully argued book, Ian Shapiro shows that the idea of containment offers the best hope for protecting Americans and their democracy into the future. His bold vision for American security in the post-September 11 world is reminiscent of George Kennan's historic "Long Telegram," in which the containment strategy that won the Cold War was first developed. The Bush Doctrine of preemptive war and unilateral action has been marked by incompetence--missed opportunities to capture Osama bin Laden, failures of postwar planning for Iraq, and lack of an exit strategy. But Shapiro contends that the problems run deeper. He explains how the Bush Doctrine departs from the best traditions of American national-security policy and accepted international norms, and renders Americans and democratic values less safe. He debunks the belief that containment is obsolete. Terror networks might be elusive, but the enabling states that make them dangerous can be contained. Shapiro defends containment against charges of appeasement, arguing that force against a direct threat will be needed. He outlines new approaches to intelligence, finance, allies, diplomacy, and international institutions. He explains why containment is the best alternative to a misguided agenda that naively assumes democratic regime change is possible from the barrel of an American gun. President Bush has defined the War on Terror as the decisive ideological struggle of our time. Shapiro shows what a self-defeating mistake that is. He sets out a viable alternative that offers real security to Americans, reclaims America's international stature, and promotes democracy around the world.
Terrorism --- National security --- 854 Terrorisme --- 820 Internationale betrekkingen --- 876 Veiligheidspolitiek --- Prevention --- Government policy --- History --- 876 VeiligheidspolitiekPrevention
Listing 1 - 10 of 73 | << page >> |
Sort by
|