LEADER 05267nam 2200505 450 001 9910823638703321 005 20230810001333.0 024 7 $a10.1163/9789004300750 035 $a(CKB)3710000000951481 035 $a(MiAaPQ)EBC4750779 035 $a(OCoLC)965731397 035 $a(nllekb)BRILL9789004300750 035 $a(EXLCZ)993710000000951481 100 $a20170831h20172017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aBoat refugees and migrants at sea $ea comprehensive approach : integrating maritime security with human rights /$fedited by Violeta Moreno-Lax, Efthymios Papastavridis 210 1$aLeiden, [The Netherlands] ;$aBoston, [Massachusetts] :$cBrill Nijhoff,$d2017. 210 4$d©2017 215 $a1 online resource (481 pages) $cillustrations 225 1 $aInternational Refugee Law Series,$x2213-3836 ;$vVolume 7 311 $a90-04-30074-0 311 $a90-04-30075-9 320 $aIncludes bibliographical references and index. 327 $tPreliminary Material /$rVioleta Moreno-Lax and Efthymios Papastavridis -- $tIntroduction: Tracing the Bases of an Integrated Paradigm for Maritime Security and Human Rights at Sea /$rVioleta Moreno-Lax and Efthymios Papastavridis -- $tSetting the Scene: Refugees, Asylum Seekers, and Migrants at Sea ? the Need for a Long-term, Protection-Centred Vision /$rGuy S. Goodwin-Gill -- $tA Maritime Security Framework for the Legal Dimensions of Irregular Migration by Sea /$rNatalie Klein -- $tThe Perfect Storm: Sovereignty Games and the Law and Politics of Boat Migration /$rThomas Gammeltoft-Hansen -- $tWho is the ?Boat Migrant?? Challenging the Anonymity of Death by Border-Sea /$rTamara Last -- $tThe Migrant Smuggling Protocol and the Need for a Multi-faceted Approach: Inter-sectionality and Multi-actor Cooperation /$rJean-Pierre Gauci and Patricia Mallia -- $tBoat Migrants as the Victims of Human Trafficking: Exploring Key Obligations through a Human Rights Based Approach /$rTom Obokata -- $tTransnational Crime and the Rule of Law at Sea: Responses to Maritime Migration and Piracy Compared /$rDouglas Guilfoyle -- $tInterception of Migrant Boats at Sea /$rJasmine Coppens -- $tThe Duty to Assist Persons in Distress: An Alternative Source of Protection against the Return of Migrants and Asylum Seekers to the High Seas? /$rLisa-Marie Komp -- $tAccess to Asylum at Sea? Non-refoulement and a Comprehensive Approach to Extraterritorial Human Rights Obligations /$rMariagiulia Giuffré -- $tResponses to ?Boat Migration?: A Global Perspective ? US Practices /$rNiels Frenzen -- $tThe (Un-)sustainability of Australia?s Offshore Processing and Settlement Policy /$rClaire Higgins -- $tLeave and Let Die: The EU Banopticon Approach to Migrants at Sea /$rMarie-Laure Basilien-Gainche -- $tInto Africa: ?Boat People? in Sub-Saharan Africa /$rCristiano D?Orsi , Sergio Carciotto and Corey R. Johnson -- $tThe EU External Borders Policy and Frontex-Coordinated Operations at Sea: Who is in Charge? Reflections on Responsibility for Wrongful Acts /$rMaïté Fernandez -- $tAn Examination of the Comprehensive Plan of Action as a Response to Mass Influx of ?Boat People?: Lessons Learnt for a Comprehensive Approach to Migration by Sea /$rMeltem Ineli-Ciger -- $tConclusion: Closing Remarks: The Present and Future of ?Boat Refugees? and Migrants at Sea /$rAnja Klug -- $tSelect Bibliography /$rVioleta Moreno-Lax and Efthymios Papastavridis -- $tIndex /$rVioleta Moreno-Lax and Efthymios Papastavridis. 330 $aThis book aims to address ?boat migration? with a holistic approach. The different chapters consider the multiple facets of the phenomenon and the complex challenges they pose, bringing together knowledge from several disciplines and regions of the world within a single collection. Together, they provide an integrated picture of transnational movements of people by sea with a view to making a decisive contribution to our understanding of current trends and future perspectives and their treatment from legal-doctrinal, legal-theoretical, and non-legal angles. The final goal is to unpack the tension that exists between security concerns and individual rights in this context and identify tools and strategies to adequately manage its various components, garnering an inter-regional / multi-disciplinary dialogue, including input from international law, law of the sea, maritime security, migration and refugee studies, and human rights, to address the position of ?migrants at sea? thoroughly. 410 0$aInternational refugee law series ;$vVolume 7. 606 $aRefugees$xLegal status, laws, etc 606 $aBoat people$xLegal status, laws, etc 610 $a"Maritime refugees" "Unauthorized immigration" 615 0$aRefugees$xLegal status, laws, etc. 615 0$aBoat people$xLegal status, laws, etc. 676 $a341.4/86 702 $aMoreno Lax$b Violeta 702 $aPapastavridis$b Efthymios 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910823638703321 996 $aBoat refugees and migrants at sea$91739855 997 $aUNINA LEADER 04410nam 22008535 450 001 9910580293203321 005 20251225213440.0 010 $a3-031-09357-7 024 7 $a10.1007/978-3-031-09357-9 035 $a(CKB)5680000000055757 035 $a(MiAaPQ)EBC7025298 035 $a(Au-PeEL)EBL7025298 035 $a(OCoLC)1334889338 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/87725 035 $a(PPN)269152059 035 $a(oapen)doab87725 035 $a(DE-He213)978-3-031-09357-9 035 $a(EXLCZ)995680000000055757 100 $a20220629d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity in Computer and Information Sciences $eSecond International Symposium, EuroCybersec 2021, Nice, France, October 25?26, 2021, Revised Selected Papers /$fedited by Erol Gelenbe, Marija Jankovic, Dionysios Kehagias, Anna Marton, Andras Vilmos 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (145 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1596 311 1 $a3-031-09356-9 327 $aAI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results -- Application of a Human-Centric Approach in Security by Design for IoT Architecture Development -- An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction -- Correlation-based Anomaly Detection for the CAN Bus -- Botnet Attack Detection with Incremental Online Learning -- Optimizing Energy Usage for an Electric Drone -- T-RAID: TEE-based Remote Attestation for IoT Devices -- Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints -- Energy, QoS and Security Aware Services at the Edge -- Mitigating the Massive Access Problem in the IoT. 330 $aThis open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1596 606 $aData protection 606 $aApplication software 606 $aComputer networks 606 $aSoftware engineering 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aCoding theory 606 $aInformation theory 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 606 $aSoftware Engineering 606 $aLegal Aspects of Computing 606 $aCoding and Information Theory 615 0$aData protection. 615 0$aApplication software. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aLegal Aspects of Computing. 615 24$aCoding and Information Theory. 676 $a005.8 700 $aGelenbe$b Erol$f1945-$025267 701 $aJankovic?$b Marija$00 701 $aKehagias$b Dionysios$01255087 701 $aMarton$b Anna$01255088 701 $aVilmos$b Andras$01255089 712 12$aInternational Symposium on Security in Computer and Information Sciences. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910580293203321 997 $aUNINA