![]() |
![]() |
Your cart is empty |
||
Showing 1 - 3 of 3 matches in All Departments
An increasingly popular view holds that institutions-in particular, the rule of law-are the keys to unlocking the developing world's full growth potential. But what exactly does this mean? Which legal institutions matter and why? How can policymakers use this knowledge to promote growth? In The Law-Growth Nexus, Kenneth Dam brings five decades of experience as a legal scholar and policymaker to bear upon these questions. After reviewing the burgeoning literature on legal institutions and economic development, Dam unpacks the ""rule of law"" concept. Successive chapters analyze enforcement, contracts, and property rights the three concepts that collectively define rule of law and examine their roles in the real estate and financial sectors. Dam uses an extended analysis of China to assess the importance of the rule of law. This case study illustrates several of the book's central themes, including the difficulty of building a strong, independent judiciary and firstclass financial sector. The stark fact is that many parts of what we call the developing world have stopped developing, while other regions have seen a slowdown in once-promising growth. Could new or better legal institutions help jumpstart these economies? In exploring this question, The Law-Growth Nexus goes beyond regression results to examine the underlying mechanisms through which the law, the judiciary, and the legal profession influence the economy. The result is essential reading for analysts and policymakers facing the challenges of legal and economic reform.
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic. Table of Contents Front Matter Synopsis 1 Overview, Findings, and Recommendations Part I: Framing and Basic Technology 2 Technical and Operational Considerations in Cyberattack and Cyberexploitation Part II: Mission and Institutional Perspectives 3 A Military Perspective on Cyberattack 4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation 5 Perspectives on Cyberattack Outside National Security 6 Decision Making and Oversight Part III: Intellectual Tools for Understanding and Thinking About Cyberattack 7 Legal and Ethical Perspectives on Cyberattack 8 Insights from Related Areas 9 Speculations on the Dynamics of Cyberconflict 10 Alternative Futures Appendixes Appendix A: Biographies of Committee Members and Staff Appendix B: Meeting Participants and Other Contributors Appendix C: Illustrative Criminal Cyberattacks Appendix D: Views on the Use of Force in Cyberspace Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions
Economic news once confined to the business pages of the newspapers
now receives headline coverage, whether it involves protests in
Seattle or sweatshops in Asia. As attention is increasingly focused
on economic policy, it becomes even more important for
noneconomists to be able to make sense of these stories. Is the
Asian economy sinking or rising? What effects will a single
European currency have on the US economy? Kenneth W. Dam's "The
Rules of the Global Game" provides, in clear and practical
language, a framework to help readers understand and answer such
questions. Dam takes us beyond the headlines and inside the
decision-making process as it is populated by lobbyists, special
interest groups, trade associations, and public relations firms.
While some economists and thinkers have idealized plans for US
international economic policy, Dam, currently the deputy secretary
of the treasury, manages to merge this idealism with a
consideration of what it means to govern at the intersection of
competing groups with competing claims.
|
![]() ![]() You may like...
Wild About You - A 60-Day Devotional For…
John Eldredge, Stasi Eldredge
Hardcover
|