We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Chapter 7 begins with the reaction that followed from Price and Paine’s defence of the colonial cause. They agreed with the colonists that to live in dependence on the arbitrary will of someone else is what it means to be a slave, and consequently agreed that the colonists must have a natural right to free themselves from their servitude, if necessary by force. This was the moment when a large number of pro-imperial spokesmen came forward to claim that the colonists and their supporters were failing to understand what it means to speak of possessing or losing one’s liberty. They objected that we are not rendered unfree if we are merely subject to someone else’s will; we are only rendered unfree if we are restrained from acting in some particular way. Generally this definition of liberty has been seen as an invention of the late eighteenth century. But as this chapter shows, it arose out of a long tradition of legal and political argument that originated with Hobbes, Pufendorf and their followers. We already find it present in England in the early eighteenth century, and the pro-imperialist writers now brought it to the forefront of debate.
Chapter 4 examines the body of Whig propaganda in which the government was congratulated for having succeeded in establishing a free civil society within a free state. A large number of Anglican writers joined the spokesmen for the government in arguing that Britain had by now established a constitution that made her the envy of Europe. Everyone was now equally subject to the law; the law alone ruled, with no incursions of arbitrary power; and the law was at last being expertly administered, without any corruption or incompetence. As a result, the life, liberty and property of every subject was now fully secure, including the property that (as Locke had said) everyone may be said to possess in their own person. No one is any longer condemned to live in a state of subjection to the mere will and power of anyone else. The consequence is said to be a civil society in which everyone can hope to find their own pathway to prosperity and happiness. The chapter concludes with an examination of Whig celebrations of urban life as the best setting in which to lead a flourishing and happy life.
The conclusion reviews Schopenhauer’s conception of politics as the management of human strife. For Schopenhauer, politics was both indispensable and insufficient: rational political coordination can prevent society from descending into a chaos of mutual aggression, but because rationality itself is limited and metaphysically subordinate, it cannot redeem a fundamentally broken world. Schopenhauer’s attitudes – a sincere sensitivity to human and animal suffering, an uncompromising commitment to frank philosophizing, but also a fearful antidemocratic and anti-emancipatory view of society – place him outside the major ideologies of the modern age, such as liberalism, libertarianism, progressivism, and conservatism.
Variable sharing is a fundamental property in the static analysis of logic programs, since it is instrumental for ensuring correctness and increasing precision while inferring many useful program properties. Such properties include modes, determinacy, non-failure, cost, etc. This has motivated significant work on developing abstract domains to improve the precision and performance of sharing analyses. Much of this work has centered around the family of set-sharing domains, because of the high precision they offer. However, this comes at a price: their scalability to a wide set of realistic programs remains challenging and this hinders their wider adoption. In this work, rather than defining new sharing abstract domains, we focus instead on developing techniques which can be incorporated in the analyzers to address aspects that are known to affect the efficiency of these domains, such as the number of variables, without affecting precision. These techniques are inspired in others used in the context of compiler optimizations, such as expression reassociation and variable trimming. We present several such techniques and provide an extensive experimental evaluation of over 1100 program modules taken from both production code and classical benchmarks. This includes the Spectector cache analyzer, the s(CASP) system, the libraries of the Ciao system, the LPdoc documenter, the PLAI analyzer itself, etc. The experimental results are quite encouraging: we have obtained significant speedups, and, more importantly, the number of modules that require a timeout was cut in half. As a result, many more programs can be analyzed precisely in reasonable times.
Chapter 4 presents a review of the ISO 18000-63 protocol, including data encoding and modulation, and aspects of the transponder memory structure, security, and privacy, and presents real examples of reader–transponder transactions.
The chapter assesses whether the enforcement of extraterritorial sanctions through asset freezes is consistent with customary and treaty rules of international monetary law. After defining key concepts and describing the main characteristics of asset freezes, a definition of such measures through the lenses of international monetary law is provided. The research then moves, first, to discuss whether the imposition of asset freezes to enforce extraterritorial sanctions regimes can be deemed an exercise of internal or external monetary sovereignty and, second, whether unilateral (extraterritorial) sanctions can be considered to amount to exchange restrictions legitimately introduced for security reasons for the purposes of the Articles of Agreement of the International Monetary Fund (IMF). The chapter concludes with a critical assessment of the IMF legal regime on unilateral (extraterritorial) sanctions.
This chapter explains the performance of the Centro Democrático in Colombia and its concurrent success at the national level and underachievement at the subnational level. It argues that this disparity is linked to two interrelated variables: the security cleavage along which the Centro Democrático has developed its partisan identity, and the party’s weak subnational partisan structures. Security issues mobilize voters on the national level, but are too broad to be relevant in local elections.
US legislators show a remarkable variation in how many bills and resolutions they sponsor and cosponsor to support Taiwan. I argue that legislators’ perception of China and their partisan identity play a crucial role in shaping their support for Taiwan. To test my hypotheses, I conducted a quantitative analysis of all Taiwan-specific bills and resolutions introduced from the 110th to 116th House of Representatives. The results indicate that legislators who view China as a security threat to the US or a non-democracy and a human rights violator exhibit a higher level of support for Taiwan. However, seeing China as an economic challenger has the least significant effect. Furthermore, although there is a general consensus that Taiwan is a bipartisan issue in Congress, my research demonstrates that Republicans display a greater level of interest in supporting Taiwan compared to Democrats.
On the cusp of the First World War, the global transition from coal to oil as the predominant energy source for technological, military, and industrial purposes markedly augmented the strategic value of oil, a prominence it retained for subsequent decades. In reaction, the British government, which possessed a 51 per cent stake in the Anglo-Persian Oil Company, sanctioned a significant expansion of the industry within its sphere of indirect influence. As petroleum demand escalated during the conflict, this enlargement necessitated the prioritisation of workforce allocation and maintenance, essential for producing petroleum in its varied forms. In response, a novel labour recruitment policy was instituted in collaboration with the British Indian Raj, extending the scope of recruitment beyond the borders of Iran through the Persian Gulf. As the war intensified, the strategic significance of Iran – highlighted by its extensive oil reserves and the proximity of its oil fields and refinery to the Mesopotamian front – transformed it from a marginal theatre of war into a pivotal military operations centre, thereby rendering it a sustained zone of conflict. This shift profoundly affected the operations and security of the Iranian oil industry and markedly influenced the working and living conditions of the labour force throughout the duration of the war.
This chapter describes the conceptual and analytical premises used in the book’s country case studies. It uses the transition studies’ multilevel perspective as a starting point to begin exploring the diverse ways in which security and defense can be connected to sustainability transitions. It starts by discussing the landscape concept and how it ties into security. The chapter then moves onto outlining policy coherence at the regime level and ends with conceptualizing security in the transition processes of niche expansion and regime decline.
Chapter 7 deals with the violence unfolding at the local level and with the cobreros’ extrajudicial forms of mobilization in tandem with legal actions. Here the story of legal action merges with one of extrajudicial actions such as fugitivity and more violent action and shows how judicial and extrajudicial actions were entangled with each other. Cosme’s letters from Madrid also provided legitimacy to the cobreros’ extrajudicial actions by directly informing the community that the king’s edicts favored their freedom. Factoring into the escalating threat of violence and political conflict on the ground was the broader Atlantic context of revolution in Saint Domingue and war with the British during the 1790s. Imperial designs in this period seem to conflict with colonial ones in a triangulation of conflict that included the cobreros’ actions.
I introduce the topic, theme, central argument of the study, and its setting in Gulf petro-monarchies. I discuss the relevant scholarly literature, especially as it concerns ways in which religion (and specifically, Islam) has been used by political actors to advance particular interests. I provide a detailed elaboration of the argument and its various parts, as well as the method of analysis and justification for the choice of cases. I then discuss the context and cases in greater detail, with attention to key features of the historical development of the petro-monarchies from their pre-oil contact with the British imperial power, the arrival of oil companies, the importation of labor, the definition of borders and emergence of “modern” states. I illustrate noteworthy structural peculiarities of each of the four states. Finally, I outline the architecture of the manuscript, with an overview of each chapter.
This chapter introduces the topic of the book, namely the interconnections between zero-carbon energy transitions and security, and why this topic is of importance. It creates a setting for the following chapters by explaining the status of the energy transition in Europe, and introducing the academic fields the book draws from: sustainability transition studies, security studies, and studies of policy coherence and integration. The chapter also describes the research methods used and a brief background to the country cases, followed by a summary of the contents of the book.
Science can only tell us a part of what we need to know about the risks of climate change. We also need to make judgements about politics, technology, and international security. To tell truth to power, we need to bring these fields of knowledge together.
In this chapter, we are interested in how AI may enhance our well-being – or do the opposite. A defintion of well-being and promotion of core vlaues will be discussed. It will then survey AI technologies and assess whether they enhance or diminish human well-being, using the different meanings of well-being
The EU’s policies in the field of technology broadly defined are increasingly marked by a concern over strategic autonomy, and Europe’s place in the world. Regulatory interventions are framed in terms of “digital sovereignty,” with the Commission seeking to ensure that external dependencies are reduced with the aim of increasing the EU’s resilience to geopolitical instability and external shocks. Using the case study of semiconductors, the chips that power modern electronic devices, this article explores how technology policy in the EU sits at the economy–security nexus, in which economic goals and security goals are interdependent and inseparable. Focusing on the life cycle of the semiconductor supply chain from the control over natural resources through to the cybersecurity requirements placed on the finished products, this article demonstrates the increasing security logic embedded within a burgeoning industrial technology policy.
This chapter considers the process by which an intelligence transfer of power took place in British India. This event ran parallel to, but was conducted in a very different manner and resulted in quite different outcomes from, the political decolonisation of South Asia. The chapter examines plans hatched by the British Security and Secret Intelligence Services to maintain an intelligence foothold in the subcontinent and unpicks how such schemes fostered a bitter and protracted struggle for bureaucratic power and influence between MI5 and MI6. It probes debates held at the highest levels within the British government over whether covert action should be undertaken in independent India, by whom, and to what purpose. It interrogates the efficacy of Indian agency in negotiating the security challenges confronted by an under-resourced post-colonial state, and that counterparts in the West (and the Eastern bloc) saw as a valuable Cold War prize.
Economic forces play a major role in the outbreak and perpetuation of violence, but they also hold the key for positive change. Using a non-technical and accessible style, The Peace Formula attacks a series of misconceptions about how economics has been used to foster peace. In place of these misconceptions, this book draws on rich historical anecdotes and cutting-edge academic evidence to outline the 'peace formula' – a set of key policies that are crucial ingredients for curbing armed conflict and achieving transition to lasting peace and prosperity. These policies include providing jobs (work), democratic participation (voice), and guaranteeing the security and basic functions of the state (warranties). Investigating specific political institutions and economic policies, this book provides the first easily accessible synthesis of this work and explains how 'smart idealism' can help us get the incentives of our leaders right. The stakes could hardly be higher.
The concluding chapter wraps up the various arguments and pieces of evidence presented in this book in favor of our peace formula. Overall, the first take-home message to be highlighted is the need for smart idealism – as neither the cold-hearted egotist nor the naïve idealist will be able to curb conflict. Secondly, it is again stressed which concrete policies are key to making a difference, creating a synthesis of the various points of the previous chapters. In particular, we emphasize the key role of a democratic voice, security warranties, promoting productive work, fostering trust and reconciliation, accelerating a well-managed green energy transition and stepping up international coordination across a variety of issues. The final point is that since we are all affected by conflict, we should all be part of the solution. It turns out that several studies have found that pressure from the public opinion matters, both in the implementation of policies and in preventing atrocities. There is a job to be done, so let us work together to make a change.
As shown in this chapter, state capacity and security warranties are further key factors in the peace formula. In particular, besides certain institutional features, the overall strength of the state is a major determinant of political stability, as illustrated by examples and recent research on Iraq, Somalia, Niger and the origins of the Mafia in southern Italy. Drawing on cutting-edge studies, it is argued that being feared (by extremist groups) may be more important than being loved (by the population at large). In order to win the hearts and minds of the population, it is essential that first public safety is guaranteed and that basic services are delivered efficiently. This is easier said than done. It is shown that when foreign military aid aims at capacity building, it often backfires. In contrast, UN peacekeeping troops have been demonstrated to play a key role. We end this chapter by emphasizing the several domestic factors that can help the building of lasting state capacity, with a special emphasis on well-designed welfare programs such as Franklin D. Roosevelt’s New Deal.