Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
2101779 Ergebnisse
Sortierung:
In: Interventions
This book is about how distinctions are drawn between civilians and combatants in modern warfare and how the legal principle of distinction depends on the technical means through which combatants make themselves visibly distinguishable from civilians. The author demonstrates that technologies of visualisation have always been part of the operation of the principle of distinction, arguing that the military uniform sustained the legal categories of civilian and combatant and actively set the boundaries of permissible and prohibited targeting, and so legal and illegal killing. Drawing upon insights from the theory of legal materiality, visual studies, critical fashion studies, and a dozen of military manuals he shows that far from being passive objects of regulation, these technologies help to draw the boundaries of the legitimate target. With its attention to the co-productive relationship between law, technologies of visualisation and legitimation of violence, this book will be relevant to a large community of researchers in international law, international relations, critical military studies, contemporary counterinsurgency operations and the sociology of law.
In: Dokumente, (KOM)2001 743 endg
World Affairs Online
"Serial no. 109-133." ; Shipping list no.: 2007-0218-P. ; Distributed to some depository libraries in microfiche. ; Mode of access: Internet.
BASE
"Serial no. 106-77." ; Shipping list no.: 2000-0182-P. ; Distributed to some depository libraries in microfiche. ; Includes bibliographical references (p. 94). ; Microfiche. ; Mode of access: Internet.
BASE
In: Journal of European public policy, Band 18, Heft 3, S. 443-461
ISSN: 1466-4429
Intro -- Preface -- Table of Contents -- List of Contributors -- 1. Introduction -- I. About Professor Jonathan Fitchen and his Work -- II. About this Collection -- III. Thanks -- PART I: THE EVOLVING NATURE AND SCOPE OF PRIVATE INTERNATIONAL LAW -- 2. Private International Law and Pluralism -- I. Introduction -- II. Private International Law as a Product of Pluralism -- III. The Pluralism of Private International Law -- IV. Pluralism as a Product of Private International Law -- V. Conclusions -- 3. The Private International Law of Mediated Settlement Agreements -- Tribute -- I. Introduction -- II. What are Mediated Settlement Agreements? -- III. Enforcement -- IV. Conclusion -- 4. Vulnerability and Private International Law: Mapping a Normative Approach Towards Asymmetrical Substantive Equality -- I. Introduction -- II. Vulnerability: Mapping the Concept and the Parties in Private International Law -- III. Vulnerability and the Theory and Techniques of Private International Law -- IV. Vulnerability in Private International Law: Recognition Through Asymmetrical Substantive Equality -- V. Conclusion -- 5. Private International Law as the Final Frontier for Feminist Scholarship? -- I. Introductory Remarks -- II. Family Life -- III. Economic Life: Corporate Governance -- IV. Conclusions: Private International Law and the Taxonomy of Feminist Legal Thought -- PART II: CIVIL AND COMMERCIAL MATTERS IN PRIVATE INTERNATIONAL LAW -- 6. Damage -- I. Introduction -- II. Conception -- III. Ontogenesis -- IV. Conclusion -- 7. Cryptocurrency Transfers in Distributed Ledger Technology-Based Systems and their Characterisation in Conflict of Laws -- I. Introduction -- II. Cryptocurrencies and their Transfers in Distributed Ledger Technology-Based Systems.
In: Jeune Afrique l'intelligent: hebdomadaire politique et économique international ; édition internationale, Heft 2198, S. 50
ISSN: 0021-6089
In: Jeune Afrique l'intelligent: hebdomadaire politique et économique international ; édition internationale, Heft 2197, S. 43-44
ISSN: 0021-6089
In: Review of international studies: RIS, Band 26, Heft 2, S. 233-251
ISSN: 0260-2105
World Affairs Online
This article examines the United Kingdom's Anti-terrorism, Crime and Security Act 2001 and the Australian Security Intelligence Organisation Legislation Amendment (Terrorism) Act 2002 (Cth) from an international human rights law perspective. It argues that both pieces of legislation raise serious concerns in relation to international legal obligations under the European Convention on Human Rights and the International Covenant on Civil and Political Rights. Both international treaties allow for 'derogation from certain provisions in times of 'public emergency. While the United Kingdom has officially derogated from some of its treaty obligations, Australia has yet to submit a similar notification. This article argues, however, that the United Kingdom's derogation is unlawful. Likewise, current circumstances in Australia would not permit lawful derogation from the ICCPR.
BASE
This article examines the United Kingdom's Anti-terrorism, Crime and Security Act 2001 and the Australian Security Intelligence Organisation Legislation Amendment (Terrorism) Act 2002 (Cth) from an international human rights law perspective. It argues that both pieces of legislation raise serious concerns in relation to international legal obligations under the European Convention on Human Rights and the International Covenant on Civil and Political Rights. Both international treaties allow for 'derogation from certain provisions in times of 'public emergency. While the United Kingdom has officially derogated from some of its treaty obligations, Australia has yet to submit a similar notification. This article argues, however, that the United Kingdom's derogation is unlawful. Likewise, current circumstances in Australia would not permit lawful derogation from the ICCPR.
BASE
In: Polish political science yearbook, Band 52, Heft 3, S. 165-179
Due to the rapid development of technology after the Second World War, the way of conducting conflict has changed significantly. One of the branches of the armaments industry that has developed the most is space technology and related to it ballistic missiles. Undoubtedly, possession by international entity ballistic missile technology, especially in connection with weapons of mass destruction, increases the importance and role of this entity on the international arena. Therefore, the proliferation of this technology or ready-made missile systems has a significant impact on regional and international security. Therefore, in order to explain this phenomenon, the first part of the article describes the role of ballistic missiles for international security. In the second part, author describes varied ways how international actor, such a state or organization may come into possession of ballistic missiles and also the methods used to stop or limit proliferation i.e. counter-proliferation methods. The last part of this article describes the ways how selected examples states such us Egypt, People's Republic of China, Israel, India, North Korea, Iraq and South Africa have come into possession of ballistic missile technology. In connection with the above, it will be possible to show what proliferation of this kind of technology looked like and may look like in practice.