CYBERSPACE REGULATION: CESURISTS AND TRADITIONALISTS
…very concept of sovereignty as we know it. This paper examines the arguments of those who advocate a regulation of cyberspace on the edges of state sovereignty or within a…
…very concept of sovereignty as we know it. This paper examines the arguments of those who advocate a regulation of cyberspace on the edges of state sovereignty or within a…
The rights of migrants represent a challenge for States, because their guarantee evidences the permanent tension between the sovereignty of the States and the protection of human rights in the…
…configuration, there are more limitations and robust integration costs due to variables such as sovereignty, politics, economy, and security. Based on the above, it should be mentioned that the reduction…
…challenges posed by transnational terrorism. In this context of growing insecurity, nations are urged to cooperate with different actors to protect their sovereignty and strengthen human security. Is the contemporary…
…concluded that the European intelligence community welcomes different intelligence cultures within it and focuses its activities on diffuse cooperation that faces the limits of national sovereignty, interoperability deficits, and difficulties…
The First World War and the decades of turmoil thereafter, namely the 1930s, the Second World War and, later, the Cold War, are historical moments relevant to prove that one…
The aim of this article is to study the “Responsibility to Protect”, its evolution since 2000 and what can be expected for its future. Concurrently, the paper takes into account…
Stefania Capogna…
This article seeks to understand how the relationship between China and Russia, the two most influential members in the creation and action of the Shanghai Cooperation Organization, influenced the organization’s…