![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > International law > Public international law > General
Annexed to GA Resolution 56/83 of 2001, the International Law Commission's Articles on Responsibility for Internationally Wrongful Acts put the international law of responsibility on a sound footing. As Special Rapporteur for the second reading, James Crawford helped steer it to a successful conclusion. With this book, he provides a detailed analysis of the general law of international responsibility and the place of state responsibility in particular within that framework. It serves as a companion to The International Law Commission's Articles on State Responsibility: Introduction, Text and Commentaries (Cambridge University Press, 2002) and is essential reading for scholars and practitioners concerned with issues of international responsibility, whether they arise in interstate relations, in the context of arbitration or litigation, or in bringing international claims.
As governmental and non-governmental operations become progressively supported by vast automated systems and electronic data flows, attacks of government information infrastructure, operations and processes pose a serious threat to economic and military interests. In 2007 Estonia suffered a month long cyber assault to its digital infrastructure, described in cyberspace as 'Web War I'. In 2010, a worm-Stuxnet-was identified as supervisory control and data acquisition systems at Iran's uranium enrichment plant, presumably in an attempt to set back Iran's nuclear programme. The dependence upon telecommunications and information infrastructures puts at risk Critical National Infrastructure, and is now at the core of national security interests. This book takes a detailed look at these new theatres of war and considers their relation to international law on the use of force. Except in cases of self-defence or with the authorisation of a Security Council Resolution, the use of force is prohibited under the UN charter and customary international law. However, the law of jus ad bellum was developed in a pre-digital era where current technological capabilities could not be conceived. Jackson Maogoto asks whether the law on the use of force is able to deal with legal disputes likely to arise from modern warfare. Key queries include how one defines an armed attack in an age of anti-satellite weaponry, whether the destruction of a State's vital digital eco-system or the "blinding" of military communication satellites constitutes a threat, and how one delimits the threshold that would enliven the right of self-defence or retaliatory action. The book argues that while technology has leapt ahead, the legal framework has failed to adapt, rendering States unable to legally defend themselves effectively. The book will be of great interest and use to researchers and students of international law, the law of armed conflict, Information Technology and the law, and counter-terrorism.
By juxtaposing European and American concepts of autonomy in the law as they are applied to families, capital punishment and criminal trials, authors reveal the common values that justify all legal systems. This book sheds new light on the fundamental purpose of law by examining how European and American lawyers, judges, and citizens actually apply and should apply legal autonomy to litigation, legislation, and the law itself.
Developing CDM Projects in the Western Balkans: Legal and Technical Issues Compared, arises from the professional practical experience gained by an interdisciplinary team of legal and technical experts acting in the framework of the environmental bilateral cooperation performed by the Italian Ministry for the Environment, Land and Sea in the Western Balkan countries, through the "Task Force for Central and Eastern Europe". The added value of the book consists in the fact that it jointly presents the real professional experience gained by a multi sectoral team of lawyers, economists, engineers and other technical experts, working in synergy with a shared vision. This volume will be useful not only to those specifically interested in the Western Balkan area, but represents a broader example of lessons learned in the development of CDM projects. Therefore, it may have a broad market among Government officials and legal-economic-technical professionals dealing with climate change issues as well as academics developing scientific research in this field.
One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy. The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer, technology assessment and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.
Capturing the Change: Universalising Tendencies in Legal Interpretation Joanna Jemielniak and Przemys aw Mik aszewicz International and supranational integration on the European continent, as well as the harmonisation of the rules of international trade and the accompanying dev- opment and global popularity of the resolution of commercial disputes through arbitration, constantly exerts a considerable in uence on modern legal systems. The sources of each of these phenomena are different, and their action is dissimilar. Each can be described as reaching either from the top to the bottom, through the direct involvement of interested States and consequently affecting their internal legal s- tems (international and supranational integration; harmonisation of trade regulations through public international law instruments), or bottom-up, as a result of activity by private parties, leading to the achievement of uniform practices and standards (ar- tration, lex mercatoria). Nonetheless, they both enrich national legal cultures and contribute to transgressing the limits of national (local) particularisms in creating, interpreting and applying the law. The aim of this book is to demonstrate how these processes have in uenced the interpretation of law, how they have shaped the methods and techniques of the interpretation and with what consequences for the outcomes of the interpretative procedures. In assessing the extent of this in uence, due regard must be paid to the fact that the interpretation of law is not, in principle, directly determined by the provisions of law itself.
The fight against terrorism is receiving increased awareness due to recent wor- wide large-scale terrorist acts, and only since then has some attention been directed specifically to victims of terrorism. Existing legal instruments of international b- ies like the European Union, the Council of Europe and the United Nations c- cerning victims of terrorism are relatively abstract or include victims of terrorism under the broader heading of victims of crime in general. In addition, policies and legislation relating to victims of crime or victims of terrorism vary widely on the domestic level. Against this background, the European Union commissioned a project that should aim to develop more extensive standards for the aid and ass- tance of victims of terrorism at the European level. This study provides the basis from which more extensive standards could be derived. The study focuses parti- larly on developing standards in the field of continuing assistance, access to justice, administration of justice and compensation to victims of terrorism. A novel feature of the approach is that also the possible utility of restorative justice approaches is examined. An important question to address was whether there is a real need to adopt s- cific standards for victims of terrorism, thereby implying that their needs might differ from victims of ordinary crime.
The international community created the Special Court for Sierra Leone to prosecute those who bore the greatest responsibility for crimes committed during the country's devastating civil war. In this book Tim Kelsall examines some of the challenges posed by the fact that the Court operated in a largely unfamiliar culture, in which the way local people thought about rights, agency and truth-telling sometimes differed radically from the way international lawyers think about these things. By applying an anthro-political perspective to the trials, he unveils a variety of ethical, epistemological, jurisprudential and procedural problems, arguing that although touted as a promising hybrid, the Court failed in crucial ways to adapt to the local culture concerned. Culture matters, and international justice requires a more dialogical, multicultural approach.
This book approaches the question of whether or not the court procedure at the International Criminal Court (ICC) can be regarded as fair from two angles: First, does the ICC provide a fair trial according to the accepted standards of international human rights law? Secondly, is it substantively fair so as to establish the legitimacy of the court on a sound footing? Practitioners and academics are increasingly conscious of the need for an approach to evidence which spans civil law and common law traditions, national and international law. This is what this monograph does, in meticulous detail, for the law of confrontation and disclosure.
New directives in the European Union forced the national governments to release new laws on the collection and recycling of electronic waste. Producers of electrical/electronic equipment are now required to fulfill several tasks on an administrational level, such as registration and regular declarations, as well as ensure take back and recycling operationally. The national laws and requirements strongly differ from country to country and created a lot of confusion in the past. In this book, consultants from 26 EU member states give a clear and structured recipe how this complicated procedure can be done in the corresponding country. This makes the book being an essential tool for the electrics industry, in particular for international companies.
This volume presents research on current trends in chemical regulations - a fa- growing, complex, and increasingly internationalized field. The book grew out from a multidisciplinary research project entitled 'Regulating Chemical Risks in the Baltic Sea Area: Science, Politics, and the Media', led by Michael Gilek at Soedertoern University, Sweden. This research project involved scholars and experts from natural as well as social sciences, based at Soedertoern University, Swedish Royal Institute of Technology (KTH), Karolinska Institutet, and Umea University. The project group organized a multidisciplinary research conference on chemical risk regulations, held in Stockholm, August 15-17, 2007. Most of the contributions published in this book were, in draft form, first presented at this conference. The conference, like the ensuing edited volume, expanded the geographical focus beyond the Baltic Sea area to include wider European, and to some extent also global trends. Many thanks to all project colleagues and conference participants! We are very grateful for the generous financial support received from The Foundation for Baltic and East European Studies (OEstersjoestiftelsen), The Swedish Research Council Formas, and from Soedertoern University. Without this support the present book would not have been possible. Special thanks to all of our fellow contributors, all of whom have submitted to- cal papers based on high-quality research. Many thanks also to Tobias Evers, who assisted us with technical editing. Finally, we are grateful for the professionalism shown by our editors at Springer.
Gives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and importantly, on processes leading up to these strategy documents. The peculiarities of the Swiss political system, which influence the way cyber-security can be designed and practiced in Switzerland are considered, as well as the bigger, global influences and driving factors that shaped the Swiss approach to cyber-security. It shows that throughout the years, the most important influence on the Swiss policy-approach was the international level, or rather the developments of a cyber-security policy in other states. Even though many of the basic ideas about information-sharing and public-private partnerships were influenced by (amongst others) the US approach to critical infrastructure protection, the peculiarities of the Swiss political system has led to a particular "Swiss solution", which is based on the federalist structures and subsidiary principles, characterized by stability and resilience to external shocks in the form of cyber-incidents. Cybersecurity in Switzerland will be a stimulating read for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers. It contains not only specific material on an interesting case, but also a wealth of background information on different variations of cyber-security, as well as on information-sharing and public-private partnerships.
Kate Parlett's study of the individual in the international legal system examines the way in which individuals have come to have a certain status in international law, from the first treaties conferring rights and capacities on individuals through to the present day. The analysis cuts across fields including human rights law, international investment law, international claims processes, humanitarian law and international criminal law in order to draw conclusions about structural change in the international legal system. By engaging with much new literature on non-state actors in international law, she seeks to dispel myths about state-centrism and the direction in which the international legal system continues to evolve.
This volume offers a unique reflection on the historic and contemporary influence of the New Approaches to International Law (NAIL) movement within the context of Europe and America. In particular, the contributions focus on the intellectual product of NAIL's founder, David Kennedy, in relation to three legal streams: human rights, legal history, and the law of war. On the one hand, the volume is valuable reading for a broad audience interested in the current challenges facing global governance, and how critical studies might contribute to innovative intellectual and practice-oriented developments in international law. On the other hand, stemming from a 2010 seminar in Madrid that brought together scholars to discuss David Kennedy's scholarship over the last three decades, the contributions here are a testament to the community and ideas of the NAIL tradition. The volume includes scholars from a wide field of legal interests and backgrounds.
Today, privacy is one of the most hotly debated topics worldwide. The book aims to balance the development of personal rights in a country that has historically valued collective rights over those of the individual. The protection of privacy is not an issue that has been emphasised during the rapid development of economic laws in China. However, the accompanying development of greater government-based regulation of these laws' implementation has led to greater invasions of personal privacy. This study attempts to provide a way forward for China to address the ever-increasing concerns about the protection of privacy and puts forward a legislative model for protection. This is achieved after a thorough analysis of the threats to privacy protection in China, a critical evaluation of the level of current privacy protection in China, and an analysis of the privacy laws in a series of developed nations based on common law and civil law.
At the heart of this book, a question: what to make of the creeping competences of the EU and of the role the European Court of Justice plays in this respect? Taking the implied powers doctrine as its starting point, the hypothesis is that it shows what is ultimately at stake in the concept of legal competence: the problem of creation in law, or the relationship between constituent and constituted power. By rethinking this relationship, a new conceptual framework to make sense of creeping competences is designed. For this, the work of Maurice Merleau-Ponty is used. Tracing back the philosophical roots of creation, legal constitution is understood as constitution in passivity. This leads to a whole new interpretation of the relationship between law and politics, rule following, authority, competences and European integration. From this perspective specific chapters in the case law of the European Court of Justice are reread and the logic behind the competence creep is unmasked. new back cover copy: Europe's constitutional journey has not been a smooth one, and a better division and definition of competence in the European Union is a key issue that needs to be addressed. How can the division of competence be made more transparent? Does there need to be a reorganization of competence? How can it be ensured that the redefined division of competence will not lead to a creeping expansion of the competence of the Union or to encroachment upon the exclusive areas of competence of the Member States and, where there is provision, regions? And how can it be ensured that the European dynamic does not come to a halt? Indeed, has the creeping expansion of the competence of the Union already come to a halt? These are the questions this book explores. The Passivity of Law: Competence and Constitution in the European Court of Justice opens with a legal account of competence creep, including the role that the European Court of Justice plays in it and a sketch of the present division of competences and the main principles regulating it. It then discusses the relationship between constituent power and constituted or constitutional power from the viewpoint of the history of constitutional history before offering an alternative theory of their relationship, known as "chiastic theory," which is based on the philosophical investigations of Merleau-Ponty. It details how chiastic theory can be used to make sense of the Court's role in the competence creep in general and the doctrine of implied powers in particular, and it utilizes several case studies concerning competences to sustain this claim. Aimed at researchers and practitioners in Philosophy, Phenomenology, Political Science, the Social Sciences and numerous fields of law, this monograph is a seminal work in the evolving theory and practice of EU law.
This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.
This book seeks to enrich and refine global administrative law and EU administrative law analytical tools by examining their manifold relations. Its aim is to begin to explore the complex reality of the interactions between EU administrative law and global administrative law, to provide a preliminary map of such legal and institutional reality, and to review it. The book is the first attempt to analyze a dense area of new legal issues. The first part of the book contains core elements of a general theory of the relationships between global and EU administrative law: comparative inquiries, exchanges of legal principles, and developing linkages. The second part is devoted to special regulatory regimes, in which global and European law coexist, though not always peacefully. Several sectors are considered: cultural heritage, medicines, climate change, antitrust, accounting and auditing, banking supervision, and public procurement.
This study focuses on territorial autonomy, which is often used in different conflict-resolution and minority situations. Four typical elements are identified on the basis of the historical example of the Memel Territory and the so-called Memel case of the PCIJ; distribution of powers, participation through elections and referendums, executive power of territorial autonomy, and international relations. These elements are used for a comparative analysis of the constitutional law that regulates the position of six currently existing special jurisdictions, the Aland Islands in Finalnd, Scotland in the United Kingdom, Puerto Rico in the United States of America, Hong Kong in China, Aceh in Indonesia and Zanzibar in Tanzania. The current sub-state entities examined can be arranged in relation to Memel in a manner that indicates that Hong Kong and the Aland conform to the typical territorial autonomy, while Puerto Rico and Aceh should probably not be understood as territorial autonomies proper. At the same time, the territorial autonomies can be distinguished from federally organized sub-state entities.
This book seeks to fill a gap in the existing literature by examining the role of African States in the development and establishment of the regime of the deep seabed beyond national jurisdiction (the Area) and the concept of the Common Heritage of Mankind.
The Caucasus region, situated on a natural isthmus between the Black Sea and the Caspian Sea, has long been a border zone and a melting pot for a diverse range of cultures and peoples. As the intersection between Europe and Asia, and also - tween Russia and the Ottoman and Persian Empires, it has featured in the strategic plans of numerous great powers over the centuries. Given its abundance of natural resources, the ready-made raw material transport routes to Europe and its enduring position on the edge of Russia, nothing has changed to the present day. The tremendous development opportunities of the Caucasian region are being tarnished by unresolved territorial conflicts that put a continual and regionally balanced growth, sustained democratisation and long-term stability at risk. These conflicts, which all erupted with the dissolution of the Soviet Union, include the separatist movements in Abkhazia, Chechnya, Nagorno-Karabakh and South - setia. The war over South Ossetia, which erupted between Russia and Georgia in August 2008, spelt out the explosive potential still inherent in these conflicts.
Gabrielle Simm's critical re-evaluation of sex between international personnel and local people examines the zero tolerance policy on sexual exploitation and abuse and its international legal framework. Whereas most preceding studies of the issue have focused exclusively on military peacekeepers, Sex in Peace Operations also covers the private military contractors and humanitarian NGO workers who play increasingly important roles in peace operations. Informed by socio-legal studies, Simm uses three case studies (Bosnia, West Africa and the Democratic Republic of the Congo) to illustrate the extent of the problem and demonstrate that the problems of impunity for sexual crimes are not just a failure of political will but the result of the structural weaknesses of international law in addressing non-state actors. Combining the insights of feminist critique with a regulatory approach to international law, her conclusions will interest scholars of international law, peace and conflict studies, gender and sexuality, and development.
Space activities are one particularly visible area, where Europe can shape its identity. This publication investigates the effect space activities have already had on building a European "spirit" (e.g. through European missions or European astronauts). It also looks into the effects that activities labelled "national" have on the emergence of a European identity. Based on this analysis, the book's intention is to identify creative ways and means for how to further use space for shaping the European identity. For this purpose the focus is not only on policy analysis but also on expertise from the fields of cultural science and the arts in order to tap their creative potential and also their theoretical approaches to the topic. Selecting this theme provides ESPI with another opportunity to develop its trans-disciplinary approach.
1.1 Cash Flow, Risk, Agency, Information, Investments The first volume dealt with the management of: cash flow (and the exchange of goods and services); risk; agency relationships; and information. The firm m- ages these aspects by legal tools and practices in the context of all commercial transactions. The second volume discussed investments. As voluntary contracts belong to the most important legal tools available to the firm, the second volume provided an - troduction to the general legal aspects of generic investment contracts and p- ment obligations. This volume discusses funding transactions, exit, and a particular category of decisions raising existential questions (business acquisitions). Transactions which can be regarded as funding transactions from the perspective of a firm raising the funding can be regarded as investment transactions from the perspective of an - vestor that provides the funding. Although the perspective chosen in this volume is that of a firm raising funding, this volume will simultaneously provide infor- tion about the legal aspects of many investment transactions. 1.2 Funding, Exit, Acquisitions Funding transactions are obviously an important way to manage cash flow. All - vestments will have to be funded in some way or another. The firm's funding mix will also influence risk in many ways. Funding. The most important way to raise funding is through retained profits and by using existing assets more efficiently. The firm can also borrow money from a bank, or issue debt, equity, or mezzanine securities to a small group of - vestors.
PREMIERE PARTIE TEXTES FONDAMENTAUX ET INFORMATIONS DE CARACTERE GENERAL CHAPITRE I. TEXTES FONDAMENTAUX A. RATIFICATIO~S 3 B. RESERVES ET DECLARATIONS2 3 France 3 Suisse 7 C. DECLARATIONS D' ACCEPTATION DE LA COMPETENCE DE LA COMMIS SION EUROPEENNE DES DROITS DE L'HOMME E~ MATIERE DE RE- QUETES INDIVIDUELLES (Article 25 de la Convention) II Pays-Bas II Suisse II Royaume-Uni 13 D. DECLARATIONS D'ACCEPTATION DE LA JURIDICTION OBLIGATO IRE DE LA COUR EUROPEENNE DES DROITS DE L'HOMME (Article 46 de la Convention) 17 France 17 Islande 19 Pays-Bas 19 Suisse 19 Royaume-Uni 21 E. DEROGATIONS (Article 15 de la Convention) 25 Turquie 25 F. AMENDEME~TS AU REGLEMENT DE LA COUR EUROPEENNE DES DROITS DE L'HOMME 31 G. AMENDEMENTS AU REGLEMENT INTERIEUR DE LA COMMISSION EUROPEENNE DES DROITS DE L'HOMME 35 ANNEXES - Etat des ratifications, declarations et reserves au 31 decembre 1974 74 - Etat des depots des ratifications au 31 decembre 1974 76 VIII TABLE OF CONTENTS CHAPTER II. THE EUROPEAN COMMISSION OF HUMAN RIGHTS A. COMPOSITION B. BIOGRAPHICAL NOTES C. PROCEEDINGS D. SECRETARIAT CHAPTER III. THE EUROPEAN COURT OF HUMAN RIGHTS A. COMPOSITION 94 B. BIOGRAPHICAL NOTES 94 C. SESSIONS AND HEARINGS 8 9 D. REGISTRY OF THE COURT 8 9 CHAPTER IV. PRINCIPAL DEVELOPMENTS IN THE COUNCIL OF EUROPE CONCERNING THE PROTECTION OF HUMAN RIGHTS A. CHRONOLOGICAL LIST OF EVENTS 102 B. WORK OF THE COUNCIL OF EUROPE IN THE FIELD OF HUMAN RIGHTS 106 I. Consultative Assembly 106 2. |
You may like...
Macroevolution - Explanation…
Emanuele Serrelli, Nathalie Gontier
Hardcover
R4,104
Discovery Miles 41 040
Brazilian Estuaries - A Benthic…
Paulo Da Cunha Lana, Angelo Fraga Bernardino
Hardcover
R2,665
Discovery Miles 26 650
Degree Theory in Analysis and…
Irene Fonseca, Wilfrid Gangbo
Hardcover
R4,288
Discovery Miles 42 880
Spoil to Soil: Mine Site Rehabilitation…
N.S. Bolan, M. B. Kirkham, …
Paperback
R1,588
Discovery Miles 15 880
|