LEADER 03080oam 2200709I 450 001 9910452502303321 005 20200520144314.0 010 $a0-203-14240-3 010 $a1-283-88542-5 010 $a1-136-49825-7 024 7 $a10.4324/9780203142400 035 $a(CKB)2550000000710311 035 $a(EBL)1099116 035 $a(OCoLC)823389199 035 $a(SSID)ssj0000810823 035 $a(PQKBManifestationID)11502182 035 $a(PQKBTitleCode)TC0000810823 035 $a(PQKBWorkID)10833490 035 $a(PQKB)10464373 035 $a(MiAaPQ)EBC1099116 035 $a(Au-PeEL)EBL1099116 035 $a(CaPaEBR)ebr10638918 035 $a(CaONFJC)MIL419792 035 $a(OCoLC)822993836 035 $a(EXLCZ)992550000000710311 100 $a20180706e20111922 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe economics of unemployment /$fJ.A. Hobson 210 1$aAbingdon, Oxon ;$aNew York :$cRoutledge,$d2011. 215 $a1 online resource (158 p.) 225 1 $aRoutledge revivals 225 0$aRoutledge revivals 300 $a"First published in 1922 by George Allen & Unwin Ltd"--T.p. verso. 311 $a0-415-69639-9 311 $a0-415-69613-5 320 $aIncludes bibliographical references. 327 $aFront Cover; The Economics of Unemoloyment; Copyright Page; Preface; Contents; Chapter I. A Limited Market; Chapter II. The Failure of Consumption; Chapter III. The Balance of Spending and Saving; Chapter IV. The Psychology of Trade Fluctuations; Chapter V. Surplus Income the Cause of Fluctuations; Chapter VI. Wage Reduction as Remedy for Depression; Chapter VII. Credit as a Factor in Fluctuations; Chapter VIII. The Douglas Theory; Chapter IX. Replies to Criticism; Chapter X. A Summary; Appendix 330 $aFirst published in 1922, Hobson's study of the depression and resulting unemployment in the aftermath of the First World War is a far-sighted analysis which looks beyond the consequences of the war itself, at the root economic causes of the crisis. Dealing with issues such as the failure of consumption, trade fluctuations, the balance of spending and saving, and spiralling credit as factors which lay at the root of the depression, Hobson's study is a document of considerable economic, social and historical value, which still has much to teach the modern reader, whether interested lay 410 0$aRoutledge Revivals 606 $aConsumption (Economics) 606 $aEconomic history 606 $aUnemployed 606 $aIncome 608 $aElectronic books. 615 0$aConsumption (Economics) 615 0$aEconomic history. 615 0$aUnemployed. 615 0$aIncome. 676 $a331.13/7 676 $a331.137 700 $aHobson$b J. A$g(John Atkinson),$f1858-1940.,$0865671 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910452502303321 996 $aThe economics of unemployment$92131679 997 $aUNINA LEADER 04568nam 2200553 450 001 9910746595003321 005 20231010153508.0 010 $a1-03-530154-7 035 $a(MiAaPQ)EBC30752265 035 $a(Au-PeEL)EBL30752265 035 $a(CKB)28284168900041 035 $a(NjHacI)9928284168900041 035 $a(UtOrBLW)eep9781035301546 035 $a(EXLCZ)9928284168900041 100 $a20231010d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aBuilding an International Cybersecurity Regime $eMultistakeholder Diplomacy /$fIan Johnstone, Arun Sukumar, and Joel Trachtman, editors 205 $aFirst edition. 210 1$aNorthampton :$cEdward Elgar Publishing,$d2023. 215 $a1 online resource (282 pages) 225 0 $aElgar International Law and Technology Series 300 $aIncludes index. 311 08$aPrint version: Johnstone, Ian Building an International Cybersecurity Regime Cheltenham : Edward Elgar Publishing Limited,c2023 320 $aIncludes bibliographical references and index. 327 $aFront Matter -- Copyright -- Contents -- Contributors -- PART I Introduction -- 1. Building cybersecurity through multistakeholder diplomacy: Politics, processes, and prospects -- PART II Thematic issues -- 2. The geopolitics of multistakeholder cyber diplomacy: A comparative analysis -- 3. Multistakeholder characteristics of past and ongoing cybersecurity norms processes -- 4. Developing multistakeholder structures for cybersecurity norms: Learning from experience -- 5. Implementing cybersecurity norms: The design of international institutions -- PART III Country perspectives -- 6. U.S. multistakeholder engagement in cyber stability issues -- 7. Russia's participation in multistakeholder diplomacy for cybersecurity norms -- 8. Rethinking Chinese multistakeholder governance of cybersecurity -- 9. India's "passive" multistakeholder cyber diplomacy -- 10. Brazil and multistakeholder diplomacy for the Internet: Past achievements, current challenges and the road ahead -- 11. Taking stock of Estonia's multistakeholder cyber diplomacy -- PART IV Conclusion -- 12. The way ahead for multistakeholder cyber diplomacy -- Index. 330 $a"Providing a much-needed study on cybersecurity regime building, this comprehensive book is a detailed analysis of cybersecurity norm-making processes and country positions, through the lens of multi-stakeholder diplomacy. Multi-disciplinary and multi-national scholars and practitioners use insights drawn from high-level discussion groups to provide a rigorous analysis of how major cyber powers view multi-stakeholder diplomacy. Looking at how past cybersecurity initiatives and multi-stakeholder negotiations in other fields illuminate its dynamics, this book will help put states' approaches towards multi-stakeholder cyber diplomacy into perspective, and frame the role of private actors in cybersecurity regime building. Evaluating the most promising institutional arrangements and mechanisms for implementing cybersecurity, this book combines top-down analyses relevant to the design of international cybersecurity regimes with bottom-up case studies, tracing the approaches of important states towards multi-stakeholder participation in cyber diplomacy. With a wealth of policy-relevant findings, this book will be welcomed by practitioners and scholars of international law, international organisation and international cybersecurity as well as multi-stakeholder governance and multilateral regimes. Policymakers and diplomats involved in international cybersecurity processes will also benefit from its cutting-edge comparative analysis of the approaches of key cyber powers"--$cProvided by publisher. 410 0$aElgar International Law and Technology Series 606 $aComputer security$xLaw and legislation 606 $aCyber intelligence (Computer security) 606 $aInternet$xLaw and legislation 615 0$aComputer security$xLaw and legislation. 615 0$aCyber intelligence (Computer security) 615 0$aInternet$xLaw and legislation. 676 $a005.8026 702 $aJohnstone$b Ian 702 $aSukumar$b Arun 702 $aTrachtman$b Joel 712 02$aEdward Elgar Publishing, 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910746595003321 996 $aBuilding an International Cybersecurity Regime$93572796 997 $aUNINA