Browse Results

Showing 25,676 through 25,700 of 36,744 results

Security in Computer and Information Sciences: Second International Symposium, EuroCybersec 2021, Nice, France, October 25–26, 2021, Revised Selected Papers (Communications in Computer and Information Science #1596)

by Erol Gelenbe Marija Jankovic Dionysios Kehagias Anna Marton Andras Vilmos

This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021.The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures.This is an open access book.

Security in Mexico: Implications for U. S. Policy Options

by Agnes Gereben Schaefer Benjamin Bahney K. Jack Riley

The security situation in Mexico has deteriorated in recent years. To help inform debate on the future of U.S.-Mexico relations, this study examined a set of U.S. policy options and potential policy priorities that hold promise for Mexico's security.

Security in Post-Conflict Africa: The Role of Nonstate Policing (Advances in Police Theory and Practice Series)

by Bruce Baker

Professor Bakers research, gathered through interviews, observations, and focus groups, examines the complex types of law enforcement and crime prevention systems that have developed during times of political and social instability. He explores the concept of nonstate policing, explains why it dominates African security provision, describes the services provided, measures the levels of local support, and discusses issues of accountability.

Security in Post-Conflict Africa: The Role of Nonstate Policing (Advances in Police Theory and Practice)

by Bruce Baker

Policing is undergoing rapid change in Africa as a result of democratization, the commercialization of security, conflicts that disrupt policing services, and peace negotiations among former adversaries. These factors combined with the inability of Africa‘s state police to provide adequate protection have resulted in the continuing popularity of va

Security in an Interconnected World: A Strategic Vision for Defence Policy (Research for Policy)

by Huub Dijstelbloem Ernst Hirsch Ballin Peter De Goede

This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is shifting, the cooperation within NATO and the EU is under pressure and the Dutch armed forces are gasping for breath. What is the task of Dutch security and the defence policy? There have been growing calls in the last few years to end the devastating cuts in the defence budget and to invest more in security. The acute threats and conflicts in which the Netherlands are involved have served as a wake-up call. The shooting down of Flight MH17 over Ukraine, the streams of refugees from Syria and other countries, the conflict with Da’esh in Syria and Iraq, and terrorist threats reveal how events in many of the world’s flash-points have a direct or indirect impact on the Netherlands. Conflicts in other countries have a spill-over effect in The Netherlands. This is illustrated by tensions between population groups and the clashes over the Gülen schools after the failed putsch in Turkey on 15 July 2016 and over the constitutional referendum in that country. How do we ensure that any additional funds are not divided amongst the branches of the armed forces without any sense of strategic direction? What should a future-proof security policy that plots the course of defence policy entail? What strategic analyses should lie behind the political choices that are made? This book answers these questions and offers a comprehensive framework addressing among other things human security, national security and flow security.

Security in the 21st Century: The United Nations, Afghanistan and Iraq

by Alex Conte

This exceptional volume examines international security issues by way of case studies of the conflicts in Afghanistan and Iraq. Each of these raises significant issues concerning the use of force between states and the role of the United Nations in maintaining international peace and security. Alex Conte examines international terrorism and the intervention in Afghanistan, including the controversial policy of pre-emptive strikes in the war on terror, and discusses the role adopted by the United Nations in the political and economic reconstruction of states subjected to conflict. Analyzing events in Iraq since 1990, he assesses the legality of the current war and leads to an examination of the role of the UN in maintaining peace and security and possible options for reform and accountability. The study will be a valuable guide for all those keen to understand the use of international law and the United Nations in the first two major conflicts of the 21st century and their implications for the future role of the United Nations.

Security in the Global Commons and Beyond (Advanced Sciences and Technologies for Security Applications)

by J. Martín Ramírez Bartolomé Bauzá-Abril

This book deals with two areas: Global Commons and Security: inextricably melted together and more relevant than ever in a world which is ever globalized and… with an incognita looming on the horizon: the effects of the Coronavirus pandemic upon the International Relations and globalization. Global Commons have always been relevant. It was Mahan who argued that the first and most obvious light in which the sea presents itself from the political and social point of view, is that of a great highway; or better, perhaps, of a wide common… Nowadays, this view has been further developed and, in addition to the unique legal implications that the Global Commons introduce, they are viewed, more and more intently, as a common pool of resources. Or perhaps, not that common… Resources, the key word! Which has to be always supplemented by two key words: access and security. And still, another one: data, the cyberspace contribution to the equation.

Security v. Liberty: Conflicts Between National Security and Civil Liberties in American History

by Daniel Farber

In the weeks following 9/11, the Bush administration launched the Patriot Act, rejected key provisions of the Geneva Convention, and inaugurated a sweeping electronic surveillance program for intelligence purposes―all in the name of protecting national security. But the current administration is hardly unique in pursuing such measures. <p><p>In Security v. Liberty, Daniel Farber leads a group of prominent historians and legal experts in exploring the varied ways in which threats to national security have affected civil liberties throughout American history. Has the government's response to such threats led to a gradual loss of freedoms once taken for granted, or has the nation learned how to restore civil liberties after threats subside and how to put protections in place for the future? Security v. Liberty focuses on periods of national emergency in the twentieth century―from World War I through the Vietnam War―to explore how past episodes might bear upon today's dilemma. <p><p>Distinguished historian Alan Brinkley shows that during World War I the government targeted vulnerable groups―including socialists, anarchists, and labor leaders―not because of a real threat to the nation, but because it was politically expedient to scapegoat unpopular groups. Nonetheless, within ten years the Supreme Court had rolled back the most egregious of the World War I restrictions on civil liberties. <p><p>Legal scholar John Yoo argues for the legitimacy of the Bush administration's War on Terror policies―such as the detainment and trials of suspected al Qaeda members―by citing historical precedent in the Roosevelt administration's prosecution of World War II. Yoo contends that, compared to Roosevelt's sweeping use of executive orders, Bush has exercised relative restraint in curtailing civil liberties. <p><p>Law professor Geoffrey Stone describes how J. Edgar Hoover used domestic surveillance to harass anti-war protestors and civil rights groups throughout the 1960s and early 1970s. Congress later enacted legislation to prevent a recurrence of the Hoover era excesses, but Stone notes that the Bush administration has argued for the right to circumvent some of these restrictions in its campaign against terrorism. Historian <p><p>Jan Ellen Lewis looks at early U.S. history to show how an individual's civil liberties often depended on the extent to which he or she fit the definition of "American" as the country's borders expanded. <p><p>Legal experts Paul Schwartz and Ronald Lee examine the national security implications of rapid advances in information technology, which is increasingly driven by a highly globalized private sector, rather than by the U.S. government. <p><p>Security v. Liberty shows that civil liberties are a not an immutable right, but the historically shifting result of a continuous struggle that has extended over two centuries. This important new volume provides a penetrating historical and legal analysis of the trade-offs between security and liberty that have shaped our national history―trade-offs that we confront with renewed urgency in a post-9/11 world.

Security, Privacy and Trust in the IoT Environment

by Zaigham Mahmood

The Internet of Things (IoT) is a network of devices and smart things that provides a pervasive environment in which people can interact with both the cyber and physical worlds. As the number and variety of connected objects continue to grow and the devices themselves become smarter, users’ expectations in terms of adaptive and self-governing digital environments are also on the rise. Although, this connectivity and the resultant smarter living is highly attractive to general public and profitable for the industry, there are also inherent concerns. The most challenging of these refer to the privacy and security of data, user trust of the digital systems, and relevant authentication mechanisms. These aspects call for novel network architectures and middleware platforms based on new communication technologies; as well as the adoption of novel context-aware management approaches and more efficient tools and devices.In this context, this book explores central issues of privacy, security and trust with regard to the IoT environments, as well as technical solutions to help address them. The main topics covered include:• Basic concepts, principles and related technologies• Security/privacy of data, and trust issues• Mechanisms for security, privacy, trust and authentication• Success indicators, performance metrics and future directions.This reference text is aimed at supporting a number of potential audiences, including• Network Specialists, Hardware Engineers and Security Experts • Students, Researchers, Academics and Practitioners.

Security, Reconstruction, and Reconciliation: When the Wars End

by Muna Ndulo

This key text brings together a team of leading contributors to address the complex issues of security reconciliation and reconstruction in post conflict societies. Security, Reconstruction and Reconciliation is organized into four main sections: the social, political, and economic dimensions of conflict the impact of conflict on women and children reconstruction and past human rights violations disarmament, demobilization, reintegration, post-war reconstruction and the building of a capable state and the role of the international community in the peace process. The chapters offer a detailed and succinct exposition of the challenges facing post conflict societies by articulating the vision of a new society. With a foreword by Francis Deng, the UN Secretary General’s Special Representative on Internally Displaced Persons, the authors discuss the issues in the context of possible solutions and lessons learnt in the field. This new book is a valuable resource for researchers, policy makers and students in the fields of conflict resolution, security studies, law and development.

Security, Rights and Law: The Israeli High Court of Justice and Israeli Settlements in the Occupied West Bank (Comparative Constitutionalism in Muslim Majority States)

by Rouba Al-Salem

This book examines how the Israeli High Court of Justice (HCJ) has interpreted and applied international law principles in adjudicating petitions filed by Palestinians. The research focuses on HCJ judgments that have been rendered since the outbreak of the Second Intifada (2000) in relation to petitions challenging the legality of measures implemented by various Israeli governments and military authorities for the professed need of enhancing the security of Israeli settlements and settlers in the occupied West Bank. It discusses to what extent the HCJ provides a venue for an effective domestic remedy for alleged violations of the Palestinians’ internationally protected rights. It further analyses the judgments of the Court seeking to demonstrate why it appears to show a preference for invoking principles of Israeli administrative and constitutional law, thereby promoting the domestic rather than international Rule of Law. Although the jurisprudence of the HCJ has often been hailed as that of an ‘activist’ court, the analysis of petitions adjudicated by the Court between 2000 and 2014 illustrates why its approach is ill-suited to a situation of prolonged military occupation. Finally, the book evaluates what impact the Court’s adjudication, reasoning and interpretation has on the normative coherence of the international law of belligerent occupation.

Security: An Introduction

by Philip P. Purpura

Today, threats to the security of an organization can come from a variety of sources ― from outside espionage to disgruntled employees and internet risks to utility failure. Reflecting the diverse and specialized nature of the security industry, Security: An Introduction provides an up-to-date treatment of a topic that has become increasingly complex as more vulnerabilities arise. <p><p> Philip P. Purpura, recently selected by Security Magazine as one of the Top 25 Most Influential People in the Security Industry, shares his 30-plus years of professional experience in the industry to provide basic theory and real-world methodologies that security practitioners can apply to scenarios they encounter. <p> Utilizing real-world examples, each chapter begins with learning objectives and a list of key terms and ends with discussion questions, role-playing exercises, and links to relevant websites. The book offers readers a foundation for understanding and implementing best practices for security to more effectively protect people, assets, and organizations.

Security: An Introduction

by Philip P. Purpura

Today, threats to the security of an organization can come from a variety of sources- from outside espionage to disgruntled employees and internet risks to utility failure. Reflecting the diverse and specialized nature of the security industry, Security: An Introduction provides an up-to-date treatment of a topic that has become increasingly comple

Sedation at the End-of-life: An Interdisciplinary Approach

by Paulina Taboada

The book's main contribution is its interdisciplinary approach to the issue of sedation at the end-of-life. Because it occurs at the end of life, palliative sedation raises a number of important ethical and legal questions, including whether it is a covert form of euthanasia and for what purposes it may legally be used. Many of the book chapters address the first question and almost all deal with a specific form of the second: whether palliative sedation should be used for those experiencing "existential suffering"? This raises the question of what existential suffering is, a topic that is also discussed in the book. The different chapters address these issues from the perspectives of the relevant disciplines: Palliative Medicine, Bioethics, Law and Theology. Hence, helpful accounts of the clinical and historical background for this issue are provided and the importance of drawing accurate ethical and legal distinctions is stressed throughout the whole book. So the volume represents a valuable contribution to the emerging literature on this topic and should be helpful across a broad spectrum of readers: philosophers, theologians and physicians.

Sedition and the Advocacy of Violence: Free Speech and Counter-Terrorism

by Sarah Sorial

This book employs the theoretical framework of ‘speech act theory’ to analyse current legislative frameworks and cases pertaining to sedition or the advocacy of violence and the issue of freedom of speech. An analysis of the relation between speech and action offers a promising way of clarifying confusion over the contested status of speech, which advocates violence as a political strategy. This account reflects an understanding of philosophical issues about both the nature of freedom and speech and how these issues can be applied to concrete legal problems. This approach will shed new light on the problems of the sedition laws and how they might be remedied by providing a conceptual account of the nature of speech and its relation to action. On the basis of J.L Austin’s account of verdictive and exercitive speech acts, it is argued that while all speech acts are ‘conduct’ in a narrow sense, not all of them have the power to produce effects. This philosophical account will have legal consequences for how we classify speech acts deemed to be dangerous, or to cause harm. It also suggests that because speech can evoke or constitute action or conduct in certain circumstances, modern versions of sedition laws might in principle be defensible, but not in their current form. On the basis of this account, it is argued that the harms caused or constituted by speech can be located in the authority of the speaker. Sedition and Violence Against the State: Free Speech and Counter-Terrorism will be of interest to students and scholars of philosophy of law and legal theory.

Sedition: Macaulay to Modi

by Rijul Singh Uppal

The liberal use of the sedition law in recent years, mainly by state governments intolerant of dissenting opinion, has provoked justified controversy. After some prominent individuals fell afoul of the law, activists, journalists, lawyers, and jurists took up cudgels on behalf of the victims, and demanded that the law be scrapped, as it belongs to the colonial era. The Supreme Court of India, in May 2022, admitted a host of petitions challenging the law as upheld in Kedar Nath Singh vs Union of India, 1961.The author believes that the fundamental right to free speech is a non-negotiable right in a democratic country, but the law is relevant for countering threats to national security and sovereignty. Examining the trajectory of the sedition law from its introduction by the British colonial power and its subsequent rejection by the Constituent Assembly of India, the author observes that the statute had to be hastily restored by the Provisional Parliament to cope with the challenges posed by communal rioting in many parts of the country, several years after independence. As such, it is pertinent in times of crisis. The current law undeniably needs safeguards against political misuse, but deserves a place on the statute.Print edition not for sale in South Asia (India, Sri Lanka, Nepal, Bangladesh, Pakistan and Bhutan)

Seduction Game: I-Team 7 (I-Team)

by Pamela Clare

Fans of Suzanne Brockmann, Maya Banks, Christy Reece, Julie Ann Walker and Cindy Gerard will adore Pamela Clare's expertly plotted romantic suspense series, which sets the pages alight with sizzling chemistry. For tension, thrills, romance and passion take a spin with the I-Team.CIA Officer Nick Andris wants revenge. His last mission failed after a Georgian arms smuggler killed his lover. He's been tailing a woman for three weeks hoping she will lead him to his target. But there's a problem with the intel. Holly Elise Bradshaw is nothing more than an entertainment writer with a love for sex and designer clothes. Clearly someone at Langley made a mistake...When Holly finds herself in trouble, the only weapons at her disposal are her brains and her body. But they won't be enough to handle the man who's following her. He's going to turn her world upside-down.Sexy. Thrilling. Unputdownable. Take a wildly romantic ride with Pamela Clare's I-Team: Extreme Exposure, Hard Evidence, Unlawful Contact, Naked Edge, Breaking Point, Striking Distance, Seduction Game.

See Justice Done: The Problem of Law in the African American Literary Tradition (Margaret Walker Alexander Series in African American Studies)

by Christopher Michael Brown

In See Justice Done: The Problem of Law in the African American Literary Tradition, author Christopher Michael Brown argues that African American literature has profound and deliberate legal roots. Tracing this throughline from the eighteenth century to the present, Brown demonstrates that engaging with legal culture in its many forms—including its conventions, paradoxes, and contradictions—is paramount to understanding Black writing.Brown begins by examining petitions submitted by free and enslaved Blacks to colonial and early republic legislatures. A virtually unexplored archive, these petitions aimed to demonstrate the autonomy and competence of their authors. Brown also examines early slave autobiographies such as Olaudah Equiano’s Interesting Narrative and Mary Prince’s History, which were both written in the form of legal petitions. These works invoke scenes of Black competence and of Black madness, repeatedly and simultaneously.Early Black writings reflect how a Black Atlantic world, organized by slavery, refused to acknowledge Black competence. By including scenes of Black madness, these narratives critique the violence of the law and predict the failure of future legal counterparts, such as Plessy v. Ferguson, to remedy injustice. Later chapters examine the works of more contemporary writers, such as Sutton E. Griggs, George Schuyler, Toni Morrison, and Edward P. Jones, and explore varied topics from American exceptionalism to the legal trope of "colorblindness." In chronicling these interactions with jurisprudential logics, See Justice Done reveals the tensions between US law and Black experiences of both its possibilities and its perils.

Seed Activism: Patent Politics and Litigation in the Global South (Food, Health, and the Environment)

by Karine E. Peschard

How lawsuits around intellectual property in Brazil and India are impacting the patentability of plants and seeds, farmers&’ rights, and the public interest.Over the past decade, legal challenges have arisen in the Global South over patents on genetically modified crops. In this ethnographic study, Karine E. Peschard explores the effects of these disputes on people&’s lives, while uncovering the role of power—material, institutional, and discursive—in shaping laws and legal systems. The expansion of corporate intellectual property (IP), she shows, negatively impacts farmers&’ rights and, by extension, the right to food, since small farms produce the bulk of food for domestic consumption. Peschard sees emerging a new legal common sense concerning the patentability of plant-related inventions, as well as a balance among IP, farmers&’ rights, and the public interest.Peschard examines the strengthening of IP regimes for plant varieties, the consolidation of the global biotech industry, the erosion of agrobiodiversity, and farmers&’ dispossession. She shows how litigants question the legality of patents and private IP systems implemented by Monsanto for royalties on three genetically modified crop varieties, Roundup Ready soybean in Brazil and Bt cotton and Bt eggplant in India. Peschard argues that these private IP systems have rendered moot domestic legislation on plant variety protection and farmers&’ rights. This unprecedented level of corporate concentration in such a vital sector raises concerns over the erosion of agricultural biodiversity, farmers&’ rights and livelihoods, food security, and, ultimately, the merits of extending IP rights to higher life forms such as plants.

Seeds

by Annabel Soutar

Part courtroom drama and part social satire, Seeds presents an intelligent portrait of farming and scientific communities in conflict and at the same time penetrates the complex science of genetically modified crops. The play documents the 2004 Supreme Court of Canada showdown between Saskatchewan farmer Percy Schmeiser and biotech multinational Monsanto Inc., a David-and-Goliath struggle that cast Schmeiser as the small-farmer underdog fighting the unscrupulous major corporation. Monsanto accused him of growing their genetically patented Round-up Ready canola seeds on his property without paying the licensing fee they require. Through a suspenseful labyrinth of legal conflicts regarding patent rights, scientific showdowns about GM food and property clashes between farmers and the biotechnology industry, Seeds asks the essential question: "Can you patent a living thing?" Or as Schmeiser famously asked, "Who owns life?"A most interesting aspect of the play is the ambiguity around the hero Percy Schmeiser. Is he a victim or an opportunist and self-publicist? Certainly, he's no innocent; as he keeps telling us, he's an experienced politician, in fact an ex-mayor. He's a believer who knows how to frame his beliefs to advantage. He can be grand and he can be petty - and as such he is antihero as much as hero.Named the top play of the decade by Rover Arts in its review of English theatre in Montreal between 2000 and 2010, Seeds takes us back to the seminal moment when a single farmer stood up to international agribusiness and almost won.Cast of 4 women and 3 men.

Seeds of Resistance: The Fight to Save Our Food Supply

by David Talbot Mark Schapiro

Sun. Soil. Water. Seed. These are the primordial ingredients for the most essential activity of all on earth: growing food. All of these elements are being changed dramatically under the pressures of corporate consolidation of the food chain, which has been accelerating just as climate change is profoundly altering the conditions for growing food. In the midst of this global crisis, the fate of our food has slipped into a handful of the world’s largest companies. Food Chained will bring home what this corporate stranglehold is doing to our daily diet, from the explosion of genetically modified foods to the rapid disappearance of plant varieties to the elimination of independent farmers who have long been the bedrock of our food supply.Food Chained will touch many nerves for readers, including concerns about climate change, chronic drought in essential farm states like California, the persistence of the junk food culture, the proliferation of GMOs, and the alarming domination of the seed market and our very life cycle by global giants like Monsanto.But not all is bleak when it comes to the future of our food supply. Food Chained will also present hopeful stories about farmers, consumer groups, and government agencies around the world that are resisting the tightening corporate squeeze on our food chain.

Seeing the Light

by Wanda Teays

Seeing the Light: Exploring Ethics Through Movies is an engaging and innovative approach to the study of philosophy and the development of moral reasoning skills. Features broad coverage of topics in ethics and moral reasoningOffers an innovative and imaginative approach to showing relevance of movies for ethical reflectionDraws on a diverse selection of popular movies, foreign films, and documentaries to illustrate ethical dilemmas and character development on the big screen that has application to our livesPresents coverage of major ethical theories ranging from Ethical Egoism and Cultural Relativism to Utilitarianism, Kantian Ethics, Rawls' Justice Theory, Aristotle's Virtue Ethics, and Feminist Ethics Demonstrates how film is a powerful vehicle for sharpening skills in analysis and moral reasoningIncludes accompanying website

Seeing the Light: The Case for Nuclear Power in the 21st Century

by Graham Scott L. Montgomery Thomas Jr.

Nuclear power is not an option for the future but an absolute necessity. Global threats of climate change and lethal air pollution, killing millions each year, make it clear that nuclear and renewable energy must work together, as non-carbon sources of energy. Fortunately, a new era of growth in this energy source is underway in developing nations, though not yet in the West. Seeing the Light is the first book to clarify these realities and discuss their implications for coming decades. Readers will learn how, why, and where the new nuclear era is happening, what new technologies are involved, and what this means for preventing the proliferation of weapons. This book is the best work available for becoming fully informed about this key subject, for students, the general public, and anyone interested in the future of energy production, and, thus, the future of humanity on planet Earth.

Seek and Hide: The Tangled History of the Right to Privacy

by Amy Gajda

&“This brilliant and thought-provoking book shows how America&’s well-known emphasis on freedom of the press has long been balanced by a deep legal tradition that protects an individual&’s right to privacy. Amy Gajda shows how battles over the right to privacy are nothing new, but they are particularly relevant in this era of digital media and social networks.&”—Walter Isaacson, author of Steve JobsAn urgent book for today's privacy wars: the surprising history of the fitful development of the right to privacy—and its battle against the public&’s right to know.The battle between an individual&’s right to privacy and the public&’s right to know has been fought for centuries. The founders demanded privacy for all the wrong press-quashing reasons. Supreme Court jus­tice Louis Brandeis famously promoted First Amend­ment freedoms but argued strongly for privacy too; and presidents from Thomas Jefferson through Don­ald Trump confidently hid behind privacy despite intense public interest in their lives. Today privacy seems simultaneously under siege and surging. And that&’s doubly dangerous, as legal expert Amy Gajda argues. Too little privacy can mean extraordinary profits and power for people who deal in and publish soul-crushing secrets. Too much means the famous and infamous can cloak themselves in secrecy. Seek and Hide carries us from the very start, when privacy concepts first entered American law and society, to now, when the law al­lows a Silicon Valley titan to destroy a media site like Gawker out of spite. Muckraker Upton Sinclair, like Nellie Bly before him, pushed the envelope of privacy and propriety and then became a privacy advocate when journalists used the same techniques against him. By the early 2000s we were on our way to today&’s full-blown crisis in the digital age, worrying that smartphones, webcams, basement publishers, and the forever internet had erased the right to privacy completely. Should everyone have privacy in their personal lives? Can privacy exist in a public place? Is there a right to be forgotten even in the United States? Is it too late to get control of data privacy? This fascinat­ing and necessary book shows us how the answers may not be what you expect, or hope, how technol­ogy makes these issues more complicated than ever before, and how we can learn from the mistakes of the past as we try to balance privacy and First Amend­ment freedoms in a modern age.

Seeking Accountability for the Unlawful Use of Force

by Leila Nadya Sadat

Despite the conclusion of the International Military Tribunal at Nuremberg that aggression is the 'supreme international crime', armed conflict remains a frequent and ubiquitous feature of international life, leaving millions of victims in its wake.<P><P> This collection of original chapters by leading and emerging scholars from all around the world evaluates historic and current examples of the use of force and the context of crimes of aggression. As we approach the 75th anniversary of the Nuremberg War Crimes Tribunal, Seeking Accountability for the Unlawful Use of Force examines the many systems and accountability frameworks which have developed since the Second World War. By suggesting new avenues for enhancing accountability structures already in place as well as proposing new frameworks needed, this volume will begin a movement to establish the mechanisms needed to charge those responsible for the unlawful use of force.<P> Provides a critical evaluation and innovative re-imagining of the accountability tools desperately needed to address aggression and the unlawful use of force.<P> This book is particularly timely given the various issues around the world.<P> Offers a collection of original chapters written by a diverse group of leading and emerging scholars with different and unique perspectives on this topic,

Refine Search

Showing 25,676 through 25,700 of 36,744 results