scholarly journals Case: Dronebuster; Handling Non-compliance to ITAR

2021 ◽  
pp. 263-270
Author(s):  
Wim Nieboer ◽  
Dik van Manen

AbstractThis chapter analyses the unauthorized transfer of a Dronebuster for testing in a fictitious European NATO member state (EUMS). As the Dronebuster had been purchased in the US, it remained subject to US export control regulations, and, prior authorization was warranted. As there had been no requests for prior authorization, this transfer is considered non-compliant behaviour. Using the Problem-Oriented Policing framework, we investigate the underlying causes and conditions. We argue that a coordinated operation of a mix of hard- and soft controls is the optimal response to prevent such behaviour.

2012 ◽  
Vol 3 (2) ◽  
pp. 261-263
Author(s):  
Alexander Weiss

Case C-255/09 Commission v PortugalThe Portuguese Republic has failed to fulfil its obligations under Article 49 EC (Article 56 TFEU) by making no provision for reimbursement of non-hospital medical care provided in another Member State which does not involve the use of major and costly equipment exhaustively listed in the national legislation, other than in the circumstances specified in Regulation (EEC) No 1408/71 […] or, to the extent that Decree-Law No 177/92 allows reimbursement in respect of such care, by making such reimbursement subject to prior authorization (official headnote).


Perceptions ◽  
2018 ◽  
Vol 4 (2) ◽  
pp. 5
Author(s):  
Julius Nathan Fortaleza Klinger

The purpose of this paper is to explore the question of whether or not early nineteenth-century lawmakers saw the Missouri Compromise of 1820 as a true solution to the question of slavery in the United States, or if it was simply a stopgap solution. The information used to conduct this research paper comes in the form of a collation of primary and secondary sources. My findings indicate that the debate over Missouri's statehood was in fact about slavery in the US, and that the underlying causes of the Civil War were already quite prevalent four whole decades before the conflict broke out.


2021 ◽  
Author(s):  
Stefan Lukowski ◽  
Michael Onken

Abstract Metal cleaning has the potential to make or break heat treat processes. However, many heat treat companies are struggling with common cleaning challenges, including residual contaminations leading to insufficient hardening/nitriding/brazing results; surface stains on the finished products; inconsistent cleaning process as well as high cleaning costs due to high consumption of cleaning agent. In addition, burned oil can cause increased maintenance costs of the equipment and contaminate the facilities. The decision for a cleaning agent or sustainable cleaning technology has become more and more important under the aspect of current legislative efforts by the Environmental Protection Agency (EPA) in the US. This paper discusses the underlying causes behind these challenges and explains key factors fundamental to ensuring high-quality metal cleaning in terms of consistency, reliability and sustainability. Furthermore, it will introduce legally compliant, state-of-the-art cleaning capabilities such as closed vacuum cleaning technology with solvent, also known as airless system, the combined (two-step-) process of solvent and water in one machine; as well as a simple one-process step with two solvent based media. The theoretical principles will be further illustrated through a joint study with HEMO GmbH (HEMO), a manufacturer of cleaning machines, on cleaning trials based on different metals and contaminations.


2009 ◽  
pp. 1583-1590
Author(s):  
Ruth Woodfield

In the late 1970s, women’s progress and participation in the more traditional scientific and technical fields, such as physics and engineering, was slow, prompting many feminist commentators to conclude that these areas had developed a nearunshakeable masculine bias. Although clearly rooted in the domains of science and technology, the advent of the computer was initially seen to challenge this perspective. It was a novel kind of artefact, a machine that was the subject of its own newly created field: “computer science” (Poster, 1990, p. 147). The fact that it was not quite subsumed within either of its parent realms led commentators to argue that computer science was also somewhat ambiguously positioned in relation to their identity as masculine. As such, it was claimed that its future trajectory as equally masculine could not be assumed, and the field of computing might offer fewer obstacles and more opportunities for women than they had experienced before. Early predictions of how women’s role in relation to information technology would develop were consequently often highly optimistic in tone. Computing was hailed as “sex-blind and colour-blind” (Williams, Cited in Griffths 1988, p. 145; see also Zientara, 1987) in support of a belief that women would freely enter the educational field, and subsequently the profession, as the 1980s advanced. During this decade, however, it became increasingly difficult to deny that this optimism was misplaced. The numbers of females undertaking undergraduate courses in the computer sciences stabilised at just over a fifth of each cohort through the 1980s and 1990s, and they were less likely to take them in the more prestigious or researchbased universities (Woodfield, 2000). Tracy Camp’s landmark article “The Incredible Shrinking Pipeline” (1997), using data up to 1994, plotted the fall-off of women in computer science between one educational level and the next in the US. It noted that “a critical point” was the drop-off before bachelor-level study—critical because the loss of women was dramatic, but also because a degree in computer science is often seen as one of the best preparatory qualifications for working within a professional IT role1. The main aim of this article is to examine how the situation has developed since 1994, and within the UK context. It will also consider its potential underlying causes, and possible routes to improvement.


Author(s):  
Ruth Woodfield

In the late 1970s, women’s progress and participation in the more traditional scientific and technical fields, such as physics and engineering, was slow, prompting many feminist commentators to conclude that these areas had developed a near-unshakeable masculine bias. Although clearly rooted in the domains of science and technology, the advent of the computer was initially seen to challenge this perspective. It was a novel kind of artefact, a machine that was the subject of its own newly created field: “computer science” (Poster, 1990, p. 147). The fact that it was not quite subsumed within either of its parent realms led commentators to argue that computer science was also somewhat ambiguously positioned in relation to their identity as masculine. As such, it was claimed that its future trajectory as equally masculine could not be assumed, and the field of computing might offer fewer obstacles and more opportunities for women than they had experienced before. Early predictions of how women’s role in relation to information technology would develop were consequently often highly optimistic in tone. Computing was hailed as “sex-blind and colour-blind” (Williams, Cited in Griffths 1988, p. 145; see also Zientara, 1987) in support of a belief that women would freely enter the educational field, and subsequently the profession, as the 1980s advanced. During this decade, however, it became increasingly difficult to deny that this optimism was misplaced. The numbers of females undertaking undergraduate courses in the computer sciences stabilised at just over a fifth of each cohort through the 1980s and 1990s, and they were less likely to take them in the more prestigious or research-based universities (Woodfield, 2000). Tracy Camp’s landmark article “The Incredible Shrinking Pipeline” (1997), using data up to 1994, plotted the fall-off of women in computer science between one educational level and the next in the US. It noted that “a critical point” was the drop-off before bachelor-level study—critical because the loss of women was dramatic, but also because a degree in computer science is often seen as one of the best preparatory qualifications for working within a professional IT role1. The main aim of this article is to examine how the situation has developed since 1994, and within the UK context. It will also consider its potential underlying causes, and possible routes to improvement.


1987 ◽  
Vol 33 (1) ◽  
pp. 31-52 ◽  
Author(s):  
John E. Eck ◽  
William Spelman

Current police practice is dominated by two, competing strategies—“community policing” and “crime control policing.” Both are limited: they each apply a standard set of police tactics to a wide variety of differing circumstances; they focus on incidents, rather than the underlying problems which cause these incidents. Recently, two police departments have developed an alternative. Through “problem-oriented policing,” officers focus on these underlying causes. They collect information from numerous sources, and enlist the support of a wide variety of public and private agencies and individuals in their attempts to solve problems. Case studies in these departments show that use of the problem-oriented approach can substantially reduce crime and fear. In the long run, problem-oriented policing will require changes in management structure, the role of the police in the community and the city bureaucracy, and the limits of police authority.


2008 ◽  
Vol 34 (4) ◽  
pp. 735-753 ◽  
Author(s):  
VALENTINE M. MOGHADAM ◽  
DILEK ELVEREN

AbstractIn October 2005, UNESCO’s General Conference adopted the Convention on the Protection of the Diversity of Cultural Contents and Artistic Expressions. The intense debates around the Convention, the defeat of the US position, and the compromises reached illustrate the shifting nature of global politics and the importance of the ‘culture question’ in global governance, but also confirm a hierarchy in the mandates of intergovernmental organisations. In this article we describe the making of this particular international convention, what we define as the ‘liberal’ versus the ‘culturalist’ positions among UNESCO’s member-state delegations, and the relevance of world polity and world-systems theories with respect to the international order. The article draws on our observations, a close reading of relevant UNESCO documents, and interviews with UNESCO officials and delegates.


2019 ◽  
Vol 22 (4) ◽  
pp. 579-599
Author(s):  
Cindy Whang

ABSTRACT On 13 August 2018, US President Donald Trump signed a legislation called the ‘Export Controls Act of 2018’ (ECA) that is important for reinvigorating the export control regime in the USA. This paper argues that contents of the ECA will not only impact the USA but also the way that the ECA is structured will potentially have a long-lasting influence on international export control regimes and the role that export controls play in international trade. International export control regimes were established post-World War II as a trade measure to pursue common strategic and national security goals among allied countries. Due to the sensitive nature of national security issues, international export control agreements were structured as non-binding agreements that heavily relied on the consensus of participating countries in formulating export control lists that the participating countries could then adopt in their domestic regulations. The cohesiveness of the global export control regimes has been based on the cornerstones of the consensus-building and list-based standards. The USA established its export control regimes to complement these international export control regimes and has been a strong proponent of requesting countries to adopt the international export control lists into domestic regulations. With the passage of the ECA, the infusion of economic policy considerations such as maintaining the USA’s technological leadership through adding a category of emerging and foundational technology has changed the long-standing export control narrative. Through the changes made to the US ECA, the scope of national security subject to export control regimes has expanded from being focused on military-oriented goods and technology into one that now includes commercial technology. While the changes made through the ECA serve to protect the USA’s technological interests, the statute could also undermine important elements of the global export control regime that the international community has established in the past seventy years post-World War II.


2003 ◽  
Vol 5 ◽  
pp. 357-394
Author(s):  
Thomas C Fischer

The fourteenth amendment to the US Constitution, adopted in 1868, provides in relevant part: ‘All persons born or naturalised in the United States … are citizens of the United States and of the State wherein they reside.’ A similar passage in the Treaty of European Union (TEU or Maastricht), Article 8 (now Article 17(1)), declared: ‘Citizenship of the Union is hereby established. Every person holding the nationality of a Member State shall be a citizen of the Union.’


Sign in / Sign up

Export Citation Format

Share Document