The Limits of Mutual Trust in Europe's Area of Freedom, Security and Justice: From Automatic Inter-State Cooperation to the Slow Emergence of the Individual

2012 ◽  
Vol 31 (1) ◽  
pp. 319-372 ◽  
Author(s):  
V. Mitsilegas
Author(s):  
Shlomi Dinar

Freshwater’s transboundary nature (in the form of rivers, lakes, and underground aquifers) means that it ties countries (or riparians) in a web of interdependence. Combined with water scarcity and increased water variability, and the sheer necessity of water for survival and national development, these interdependencies may often lead to conflict. While such conflict is rarely violent in nature, political conflict over water is quite common as states diverge over how to share water or whether to develop a joint river for hydropower, say, or to use the water for agriculture. For the same reasons that water may be a source of conflict, it is also a source of cooperation. In fact, if the number of documented international agreements over shared water resources is any indication, then water’s cooperative history is a rich one. As the most important and accepted tools for formalizing inter-state cooperation, treaties have become the focus of research and analysis. While treaties do not necessarily guarantee cooperation, they do provide states with a platform for dealing with conflict as well as the means to create benefits for sustained cooperation. This also suggests that the way treaties are designed—in other words, what mechanisms and instruments are included in the agreement—is likewise relevant to analyzing conflict and cooperation.


2021 ◽  
Vol 1 (1) ◽  
pp. 0-0

This study qualitatively analyzes interactional coping strategies used to managed technostress in the post-adoption stage of information technology implementation at a French legal firm. The nine strategies are participatory, collaborative, conflict resolution, bureaucratic coping (adaptation), perceived contribution to exchange, loyalty, affect, professional respect, and mutual trust. A critical perspective was applied to a longitudinal study of the intervention process. First, a problem with task distribution at the individual level affected the efficacy of perceived contribution strategies to exchange and professional enhancement. Second, a lack of creative interaction between group level colleagues undermined strategies of collaboration, mutual aid and assistance, participatory adaptation, and mutual trust. Third, a lack of digitalization commitment at the organizational level negatively affected conflict resolution and bureaucratic adjustment. Finally, an absence of loyalty and affect strategies was evident.


Author(s):  
Robert Christoph Stendel

Moral damages under international investment law have been extensively addressed in the literature. Notoriously, arbitral tribunals have subjected any claim for moral damages to a requirement unknown to general international law, that is exceptional circumstances. This practice is widely criticised in the field mainly due to the seeming inconsistency with general international law. This article challenges this view by arguing that a deviation from general international law does not – in and of itself – suffice to discard the tribunals’ approach. This argument is based on the insight that general international law only deals with inter-State responsibility and is, thus, open to deviations from general international law in case of State responsibility vis-à-vis the individual. On that basis, the article explores possible legal bases for exceptional circumstances in international law. While it discards the idea that such a requirement for awarding moral damages is implicit in prior inter-State cases, the article rather argues that the arbitral practice witnesses the emergence of a new rule of customary international law applicable to the responsibility of a State vis-à-vis the individual. Thereby, the article seeks to contribute to the wider debate on the content and contours of State responsibility for claims of the individual.


2021 ◽  
Vol 40 (1) ◽  
pp. 575-589
Author(s):  
B. Manickavasagam ◽  
B. Amutha ◽  
M. Revathi ◽  
N. Karthick ◽  
K. Sree Kumar ◽  
...  

Wireless Sensor Node (WSN) helps to track inpatient and remote patient (home/working) health information. Mishandling of the electronic system, patient behaviour and environmental changes which are all lead to incorrect data generation while using WSN for medical purposes. It leads to a false alarm being raised, network resource wastage, a false node priority level and low reliability. We have introduced the Mutual Trust Model (MTM) for Wireless Body Area Network (WBAN) with the help of Fog-Node (FN) to address these issues and to ensure the trustworthiness of the information acquired. In this, First-Hand Trust Method calculates the confidence value of the individual sensor node. Then, with neighbor node support, the Stigmercy Trust Method (STM) is implemented to reinforce the trust source node. Ultimately, the individual patient’s confidence value for the MTM model is determined. With the assistance of the wireless-mininet network emulator and the RYU controller, the network environment model implement, and the results have been obtained. MTM predicts the confidence level of the collected data significantly and produces an accuracy of 92.3 percentage to prevent the emergency band from being used dispensable.


Author(s):  
Vladimir Anatolievich Kotelnikov ◽  
Dmitriy Valerievich Stepanenkov

On the basis of the system approach, the specifics of various concepts to the definition of the phenomenon of cyberterrorism are revealed. The conclusion that modern cyberterrorism aimed at threatening international and state security is one of the effective levers for achieving political goals on the world stage is argued. Modern cyberterrorism in its scale, technical capabilities and consequences can be put in line with traditional terrorism and organized crime with full confidence. Through comprehensive analysis, topical problems of countering computer terrorism in modern society have been identified. Priority forms of inter-State cooperation have been justified, as well as the necessary measures aimed at improving the effectiveness of the fight against cyberterrorism have been identified.


Sign in / Sign up

Export Citation Format

Share Document