Nation-States, Labor Immigration, and Migrant Rights

Author(s):  
Martin Ruhs

This chapter examines the potential interrelationships between migrant rights and national policies for admitting migrant workers. It explains how we can expect high-income countries to regulate the rights of migrant workers as part of their labor immigration policies. It develops a basic approach that conceptualizes the design of labor immigration policy in high-income countries as a process that involves “choice under constraints.” It shows that nation-states decide on how to regulate the number, selection, and rights of migrant workers admitted in order to achieve a core set of four interrelated and sometimes competing policy goals: economic efficiency, distribution, national identity and social cohesion, and national security and public order. Although their importance and specific interpretations vary across countries, and over time, the chapter argues that each of these objectives constitutes a fundamental policy consideration that policymakers can and do purposefully pursue in all countries.

Author(s):  
Timothy Doyle ◽  
Dennis Rumley

Indo-Pacific constructions within nation-states change over time. We contend that under President Obama, the US largely imagined the Indo-Pacific as a super-region or ‘non-space’; a neo-liberal ‘mare nullius’. During this earlier period, the US promoted the free flow of trade and security arrangements across this non-space, articulating a particularly non-differentiated version of globalization, a sea beyond territorialization (at least rhetorically). Under President Trump this has changed significantly: the region has shifted beyond the exclusive realm of the free market and towards a neo-mercantilist state with its first (and perhaps only) priority being economic and national security for the US. We posit that the Indo-Pacific has been refashioned as a definitive alliance, rather than Obama’s fluid zone, or ‘non-region’. In Trump’s Indo-Pacific, lesser states have been designated as either being ‘in’ or ‘out’ of this US-centred alliance—battle and trading lines are now more clearly visible.


2000 ◽  
Vol 151 (12) ◽  
pp. 480-483 ◽  
Author(s):  
Pekka Patosaari

Mandated by the Swiss Forestry Agency, a group of internationally recognised experts drew up a sustainability assessment of Swiss forest policy. In this paper, the author, himself a member of the expert panel, presents the main results of this study. The strong protection regime of forests, for instance, is seen as one of the strengths of Swiss forest policy, whereas the lack of economic efficiency as well as the lack of clear policy goals with corresponding evaluation criteria have been identified as areas of concern.


Author(s):  
Sir Richard Dearlove

This article discusses the changing perceptions on national security and civic anxiety. During the Cold War and its aftermath, security was rather a simple and straightforward issue. The countries knew their enemies, where they are and the threats they presented. On the event that, the enemies's secrets were unknown, probing techniques were employed to determine the weaknesses of the enemy. This formulaic situation which seeped through in to the twenty-first century left little room for innovation. In fact, in some countries, security maintained at the Cold War levels despite criticisms that new and emerging national security threats should be addressed at a new level. Of the powerful nations, America maintained the role of a world policeman and adapted its national security priorities according to its perception of a new series of strategic threats; however these new security strategies were without a sense of urgency. However, the perception of global threats and national security radically changed in the event of the 9/11 attack. The sleeping national security priorities of America came to a full force which affected the national security priorities of other nations as well. In the twenty-first globalized world, no conflict remains a regional clash. The reverberations of the Russian military action in Georgia, the Israeli intervention in Gaza, and the results of the attacks in Mumbai resonates loudly and rapidly through the wider international security system. While today, nations continue to seek new methods for addressing new security threats, the paradox of the national security policy is that nation-states have lost their exclusive grip of their own security at a time when the private citizens are assailed by increased fears for their own security and demand a more enhanced safety from the state. Nation-states have been much safer from large-scale violence, however there exists a strong sense of anxiety about the lack of security in the face of multiplicity of threats. Nations have been largely dependent on international coordinated action to achieve their important national security objectives. National policies and security theory lack precision. In addition, the internationalization of national security has eroded the distinction between domestic and foreign security. These blurring lines suggest that the understanding of national security is still at the height of transformations.


2020 ◽  
Vol 17 (3-4) ◽  
pp. 353-362
Author(s):  
Marieke Wyckaert

This paper explores takeover bids in Europe in times of the COVID-19 pandemic. The search for a balance between maintaining the open market as a European achievement and the protection of national security and public order is not a new phenomenon. This search is not easy with the future FDI Regulation and will raise additional questions.The FDI Regulation became very concrete thanks to the COVID-19 pandemic: At the beginning of the crisis, the Commission presented a Communication setting out guidelines for FDI to be applied prior to the regulation.


Author(s):  
Katherine Polin ◽  
Maxim Hjortland ◽  
Anna Maresso ◽  
Ewout van Ginneken ◽  
Reinhard Busse ◽  
...  

2017 ◽  
Vol 10 (3) ◽  
pp. 259-280 ◽  
Author(s):  
Martina Francesca Ferracane ◽  
Hosuk Lee-Makiyama

Purpose This paper aims to investigate China’s policy on digital trade with the objective to highlight the rationales behind such policy. Design/methodology/approach China’s policy on digital trade is assessed by analysing the main regulations imposed in the country in the period from 1985 to 2016 that have an impact on digital trade. Findings It was found that there are more than 70 measures imposed today that have a negative impact on digital trade. The measures are diverse and can be justified with several policy objectives, namely, industrial policy, public order and national security, and these support China’s fiscal and state-owned enterprise structure. Originality/value This paper analyses China’s policy on digital trade from a new perspective and provides insights on the rationales behind this policy.


Author(s):  
Christopher J. Fuller

This concluding chapter examines the legacy of the CIA's drone war on U.S. counterterrorism, wider U.S. national security policy, and the conduct of America's rivals—both nation-states and terrorist groups. It contemplates the nature of technological progress, judging that innovations always introduce potential threats and opportunities in equal measure. Furthermore, while it is almost inevitable that terrorist groups will exploit drone technology for heinous ends, the technology also offers wider commercial and civilian society opportunities, just as previous transformative technologies, first developed for the purpose of taking lives, eventually came to transform them in positive ways. The use of drones to neutralize terrorists is best understood as the embodiment of America's long-term counterterrorism goal made possible by advancements in both technology and the willingness of the U.S. government to authorize the CIA in undertaking lethal counterterrorist actions.


Connectivity ◽  
2021 ◽  
Vol 149 (1) ◽  
Author(s):  
M. R. Semenchuk ◽  

At the present stage of development, the geographic information system (GIS) technology can be applied in many areas, including national security. Geospatial data create new opportunities for resolving vital issues, among which are detection and immediate response to threats and dangers, as well as for making effective management decisions on preventive security development. Previously, GIS has been a technology used by a small group of geospatial data analysts with limited access to up-to-date data. Nowadays, the ArcGIS software is a geospatial platform, which provides capabilities to the civil security sector of countries striving for sustainable development, public order and emergency prevention. ArcGIS maps and applications can help governments to create space for interagency cooperation in national security and other fields, where geospatial data is an administrative and decision-making instrument. The article describes the advantages of the ArcGIS software, including its extensions and add-ons, the best practices of applying GIS technology for the purposes of public order enforcement, potential offense detection and public event security. In addition, ArcGIS is used to access the existing data and integrate it into a common geographic context - a web map ensuring the interoperability of data and a better understanding of how to take security measures and make objects clearly visible. The GIS application analysis has shown that public order enforcement through the utilization of geospatial data implies the detection of dangers, threats and vulnerabilities, interagency cooperation thanks to shared situational awareness across multiple groups for daily operations, and action coordination with the use of the latest technologies and public information. At this point, the ArcGIS software makes it easier to take national security and pubic order measures from any device, at any time and place.


2021 ◽  
Vol 6 ◽  
Author(s):  
David Gilbert ◽  
Georgina Heydon

Nation states increasingly apply electronic surveillance techniques to combat serious and organised crime after broadening and deepening their national security agendas. Covertly obtained recordings from telephone interception and listening devices of conversations related to suspected criminal activity in Languages Other Than English (LOTE) frequently contain jargon and/or code words. Community translators and interpreters are routinely called upon to transcribe intercepted conversations into English for evidentiary purposes. This paper examines the language capabilities of community translators and interpreters undertaking this work for law enforcement agencies in the Australian state of Victoria. Using data collected during the observation of public court trials, this paper presents a detailed analysis of Vietnamese-to-English translated transcripts submitted as evidence by the Prosecution in drug-related criminal cases. The data analysis reveals that translated transcripts presented for use as evidence in drug-related trials contain frequent and significant errors. However, these discrepancies are difficult to detect in the complex environment of a court trial without the expert skills of an independent discourse analyst fluent in both languages involved. As a result, trials tend to proceed without the reliability of the translated transcript being adequately tested.


Author(s):  
Mariano-Florentino Cuéllar ◽  
Jerry L. Mashaw

The economic analysis of regulation is a broad topic, with implications for environmental protection, communications and technology policy, public health, immigration, national security, and other areas affecting risk and welfare in society. This chapter covers only a portion of the relevant ground, focusing on the following essential topics: First, what do we mean by “economic analysis” and what do we mean by “regulation”? Second, why has this topic become an important one, not only the United States, but in most advanced democracies? Third, why is economic analysis and regulation a contested, even contentious, aspect of modern regulatory activity? Finally, and most important, how is economic analysis structured into regulatory decision-making, and how might existing arrangements evolve over time?


Sign in / Sign up

Export Citation Format

Share Document