| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996384408703316 |
|
|
Titolo |
By the King. A declaration. James R [[electronic resource] ] : Whereas by our former declaration of the 28th day of February last, we did for the reasons therein mentioned, publish and declare, that all persons should be at liberty, by way of loane to pay into our treasury, . |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Dublin, : Printed for alderman James Malone printer to the King's most excellent Majesty; and are to be sold at his shop in Skinner-Row., [1690] |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Altri autori (Persone) |
|
James, King of England, <1633-1701.> |
|
|
|
|
|
|
Soggetti |
|
Finance, Public - Ireland |
Ireland History War of 1689-1691 Early works to 1800 |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from caption title and opening lines of text. |
"Given at our court at Dublin Castle the 9th day of June 1690." |
Raising the interest on loans of copper money. Cf. Steele. |
Arms 189. |
Reproduction of original in the British Library. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910502999403321 |
|
|
Autore |
Clarke Michael |
|
|
Titolo |
The Palgrave Handbook of National Security |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing AG, , 2021 |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (421 pages) |
|
|
|
|
|
|
Altri autori (Persone) |
|
HenschkeAdam |
SussexMatthew |
LegrandTim |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Intro -- Contents -- Notes on Contributors -- List of Figures -- 1 National Security: Theories, Actors, Issues -- Part I Theories -- 2 Understanding National Security: The Promises and Pitfalls of International Relations Theory -- The National Security Landscape: Changing Definitions, Themes and Processes -- Statehood, Securitisation and National Security -- National Interests -- Sovereignty and International Law -- Power, Influence and International Order -- Making National Security Policy in an Age of Globalisation and Shifting Power: Balancing Risk and Resilience -- Theories of International Relations and National Security Choices -- Realist Approaches -- Liberal Approaches -- Constructivist Approaches -- From Theory to Practice: Case Studies on Major National Security Issues -- The Global War on Terror -- Climate Change -- Shifts in Global Order: The Rise of China and the Relative Decline of the United States -- Conclusions -- 3 National Security and Public Policy: Exceptionalism Versus Accountability -- What Is Public Policy? -- A Brief History of Public Policy -- Public Policy in Liberal Democracies -- National Security and Public Policy in Liberal Democracy -- Methodological Challenges of National Security Evaluation -- Exceptionalized Policy-Making in Liberal Democracies -- Scrutiny, Accountability and Exceptionalism -- Exempting National Security from Public Policy |
|
|
|
|
|
|
|
|
|
Imperatives -- The Expanding Remit of National Security Policy -- National Security and the Shadow of Illiberalism -- Conclusions -- 4 Ethics and National Security: A Case for Reasons in Decision-Making -- Introduction -- The Problem: Ethics and National Security -- On Ethics, National Security and Liberal Democracies -- Ethics -- Nations and States16 -- Security -- An Open Question: Pluralism Versus Anything Goes33 -- A Dynamic Space. |
Where To? A Guide for Ethical Decision Making in National Security -- Part II Actors -- 5 Nothing to Fear but Fear Itself: The National Security Policy of the United States -- Free Security -- What Are We Afraid Of? Issues and Debates in Twenty-First-Century U.S. National Security -- Traditional Threats: Peer Competitors -- Nontraditional Threats: Terrorism, Rogue, and Failed States -- Technological Threats: Nuclear, Cyber!, Killer Robots -- Nuclear Weapons States, 1988 and 2018 -- Imagined Threats: Unknown Unknowns -- Structure and Insecurity -- Conclusions -- 6 Chinese National Security: New Agendas and Emerging Challenges -- The End of the Cold War and Emerging Security Challenges -- National Security: Emerging Challenges -- Reconceptualizing Security: New Structures -- Conclusion -- 7 Russia's National Security Posture -- The Roots of Russian Conduct -- Understanding Russian National Security Policy -- Constructivist Approaches -- Neoliberal Approaches -- Realist Approaches -- Power and Weakness: Enablers and Constraints -- Military Power -- Information Operations and Hybrid Warfare Capabilities -- Energy: Encouraging Vulnerable Over-Dependencies -- Institutional Underdevelopment, Sub-regional Weakness, and Political Vulnerability -- Conclusions -- 8 Between Aspiration and Reality: Evolution of Japanese National Security Policy -- Background: Basic Elements of Japan's National Security Policy -- A Framework Challenged: Japan's Security Policy in Post-Cold War and Post-9/11 Years -- Japan Transformed? Changes Made Under the Second Abe Cabinet (December 2012-Present) -- Conclusion: A Glass Ceiling for Japan's National Security Policy -- 9 India's National Security Challenges and the State Response -- A Gradual Evolution in Indian National Security Policy -- India's Relationship with Pakistan -- Sino-Indian Tensions -- Left Wing Extremism. |
State Responses to LWE -- Insurgency in the Northeast -- Indian Responses to Insurgencies in the Northeast -- Terrorism in Punjab -- Terrorism in Jammu and Kashmir -- Conclusion -- 10 Turkey: The Security Policy of a 'Lonely' State -- Introduction: With a Neighbourhood like Turkey's, Who Needs Enemies? -- Turkey, Existentially: Who Are Turks and What Is Turkey?1 -- The Inter-War Years: Security Policy Foundations16 -- The Security Policy of the Pre-AKP Republic: The Cold War Years -- Turkish Security Policy, the End of the Cold War and the Rise of the AKP -- The Kurdish Issue, Again -- The KRG -- Conclusion: Turkey's Loneliness -- 11 Securing Iran in the Internet age -- Security in the Founding Moments of the Islamic Republic -- Key Events and Issues -- Iranian Regime Security and the Internet: A Double-Edged Sword -- Conclusions -- 12 Brazil: In Search of a Security Space -- Introduction -- From Independence to Globalization: The Pathway Toward Autonomy -- Re-democratization: From Great Power to Middle Power -- An Exhausted Democracy: Back to Pre-autonomy Days? -- Conclusion -- Part III Issues -- 13 Nuclear Weapons and National Security: From the Cold War to the "Second Nuclear Age" and Beyond -- The Evolution of Nuclear Politics: Between MAD and "Nuclear Abstinence" -- Nuclear Weapons and the Cold War: Toward MAD -- Nuclear Non-Proliferation Treaty: An Imperfect Nuclear Abstinence? -- The Post-Cold War Nuclear |
|
|
|
|
|
|
|
|
Interregnum and the "Second Nuclear Age" -- Nuclear Postures of Major Powers -- United States -- Russia -- China -- Nuclear Flashpoints -- Nuclear Instability on the Korean Peninsula -- The South Asian Nuclear Triangle -- Testing Transatlantic Cohesion: Russian Adventurism in Ukraine and the Baltics -- Conclusions -- 14 Maritime Security: Problems and Prospects for National Security Policymakers -- Introduction. |
Situating 'Maritime Security' -- Protecting National (Maritime) Security-The Navies -- Contemporary National Security Threats: The Maritime Sphere -- National Security and Non-Traditional Maritime Security Threats -- Safeguarding National Security: Addressing Non-Traditional Maritime Security Threats -- Defending National Security? the Rise of Non-State Actors -- Conclusion -- 15 Intelligence and National Security: The National Security Problematique -- Approaches to the Intelligence Cycle -- Direction -- Planning -- Collection and Collation -- Analysis and Processing -- Evaluation -- Dissemination -- Intelligence Gaps and Failures -- Politicisation of Intelligence -- Conclusion -- 16 Machine Learning, Mass Surveillance, and National Security: Data, Efficacy, and Meaningful Human Control -- Introduction -- Machine Learning for Mass Surveillance -- Facial Recognition / Smart Surveillance Cameras -- Voice Recognition -- Attack Prediction -- Financial Fraud -- Propaganda on Social Media -- Societal Implications of the Training Data -- The Source -- Dual Use -- Legitimacy -- Security -- Labeling -- Biases of the Past -- Disparate Impact -- The Effectiveness of ML for Mass Surveillance -- Not Enough Data -- Precision vs Recall -- Past vs. Future -- Meaningful Human Control over ML for Mass Surveillance -- Veto Power -- Explainability -- Moral Machines -- Conclusion -- 17 Information as an Evolving National Security Concern -- Introduction -- Terrorist Exploitation of Social Media -- Foreign Influence Operations -- Oligopologisation of Epistemic Power -- National Security and State Responsibility: What is at Stake? -- Index. |
|
|
|
|
|
| |