In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. "Nothing to Hide" makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy.
and accessible introduction to the driving principles of public choice. In this, the first
systematic look at the implications of social choice for legal doctrine, Farber and Frickey
carefully review both the empirical and theoretical literature about interest group influence and provide a nonmathematical introduction to formal models of legislative action. Ideal for course use, this volume offers a balanced and perceptive analysis and critique of an approach which, within limits, can illuminate the dynamics of government decision-making.
“Law and Public Choice is a most valuable contribution to the burgeoning literature. It
should be of great interest to lawyers, political scientists, and all others interested in issues at the intersection of government and law.”—Cass R. Sunstein, University of Chicago Law
Offering a more accessible alternative to casebooks and historical commentaries, Law Among Nations explains issues of international law by tracing the field's development and stressing key principles and processes.
This comprehensive text eliminates the need for multiple books by combining discussions of theory and state practice with excerpts from landmark cases. Renowned for its rigorous approach and clear explanations, Law Among Nations remains the gold standard for undergraduate introductions to international law.
Trace the development of International Law through key principles and processes.
Illustrate important issues and theories using excerpts from landmark cases.
Business and Human Rights: From Principles to Practice is the first comprehensive and interdisciplinary textbook that addresses these issues. It examines the regulatory framework that grounds the business and human rights debate and highlights the business and legal challenges faced by companies and stakeholders in improving respect for human rights, exploring such topics as:
the regulatory framework that grounds the business and human rights debate
challenges faced by companies and stakeholders in improving human rights
industry-specific human rights standards
current mechanisms to hold corporations to account
future challenges for business and human rights
With supporting case studies throughout, this text provides an overview of current themes in the field and guidance on practical implementation, demonstrating that a thorough understanding of the human rights challenges faced by business is now vital in any business context.
In Cheating Welfare, Kaaryn S. Gustafson endeavors to clear up these gray areas by providing insights into the history, social construction, and lived experience of welfare. She shows why cheating is all but inevitable—not because poor people are immoral, but because ordinary individuals navigating complex systems of rules are likely to become entangled despite their best efforts. Through an examination of the construction of the crime we know as welfare fraud, which she bases on in-depth interviews with welfare recipients in Northern California, Gustafson challenges readers to question their assumptions about welfare policies, welfare recipients, and crime control in the United States.
After the Paris Attacks brings together leading scholars and journalists to respond to this tragedy and to debate how we can reach a safer and saner future. In this timely book, experts from fields such as law, political science, and philosophy grapple with the vital challenges of balancing security, justice, and tolerance, and offer astute and penetrating insights into how the world can best respond to these challenges.
Readers may explore international rules in the areas of jurisdiction of States in cyberspace, responsibility of States for cyber activities, human rights in the cyber world, permissible responses to cyber attacks, and more. Other topics addressed include the rules of engagement in cyber warfare, suppression of cyber crimes, permissible limits of cyber espionage, and suppression of cyber-related terrorism. Chapters feature explanations of case law from various jurisdictions, against the background of real-life cyber-related incidents across the globe. Written by an internationally recognized practitioner in the field, the book objectively guides readers through on-going debates on cyber-related issues against the background of international law.
This book is very accessibly written and is an enlightening read. It will appeal to a wide audience, from international lawyers to students of international law, military strategists, law enforcement officers, policy makers and the lay person.
"This is simply the best analysis of contemporary federalism currently available. It is comprehensive in its coverage, thorough in its analysis, and persuasive in its conclusions. Every student of federalism, from novice to expert, will find benefit from this volume.†? Professor G Alan Tarr, Rutgers University
"Wading through the thicket of the multiple forms that the federal idea has taken in the contemporary world, this remarkably comprehensive treatise backed by case law fills a long-awaited gap in the literature on comparative federalism. It combines a mastery of the literature on federal theory with a critical understanding of how it plays out in practice. Outstanding in the breadth of its scope, this magisterial survey will serve as a work of reference for generations of scholars who seek to understand how federalism works in developed as well as developing countries.†? Professor Balveer Arora, Jawaharlal Nehru University New Delhi
"This book is an extraordinarily handy work of reference on the diverse federal-type systems of the world. It handles both shared principles and differences of perspective, structure or practice with confidence and ease. It will become a standard work for scholars and practitioners working in the field.†? Professor Cheryl Saunders, The University of Melbourne
"This is a remarkable book – for its sheer breadth of scope, combining detail of practice with analysis of federal principles, and for its fresh look at federalism. With great erudition, drawing on world scholarship and the practice of federalism across the globe, Palermo and Kössler magnificently traverse from the ancient roots of federalism to the contemporary debates on ethno-cultural dimensions and participatory democracy. The book sets a new benchmark for the study of comparative federalism, providing new insights that are bound to influence practice in an era where federal arrangements are expected to deliver answers to key governance and societal challenges.†? Professor Nico Steytler, University of the Western Cape
- The European Court of Human Rights and the UK Supreme Court
- Human rights law
- EU membership
- International law in the UK Constitution
Key Facts Key Casesis the essential series for anyone studying law at LLB, postgraduate and conversion courses. The series provides the simplest and most effective way to absorb and retain all of the material essential for passing your exams. Each chapter includes:
diagrams at the start of chapters to summarise key points
structured headings and numbered points to allow for clear recall of the essential points
charts and tables to break down more complex information
Chapters are also supported by a Key Cases section which provides the simplest and most effective way to absorb and memorise essential cases needed for exam success.
Essential and leading cases are explained
The style, layout and explanations are user friendly
Cases are broken down into key components by use of a clear system of symbols for quick and easy visual recognition
The Pledge was written in 1892 by Francis Bellamy. Francis was cousin to Edward Bellamy, author of an international bestseller in 1888 that launched the nationalism movement. Edward's book was translated into every major language, including German. Francis and Edward were both self-proclaimed socialists in the Nationalism movement and they promoted "military socialism."
The Bellamys wanted government to take over all schools. When the government granted their wish, the government's schools imposed segregation by law and taught racism as official policy. Government schools also forced robotic chanting to flags. All of that behavior even outlasted German National Socialism (or "Nazism", although German National Socialists did not call themselves "Nazis", they called themselves "Socialists" and "National Socialists").
In addition to the notorious salute, American socialists also bear some blame for the notorious symbol used by the National Socialist German Workers Party on its flag. Edward Bellamy worked with the Theosophical Society, another socialist group, and during that time the Theosophical Society used the symbol adopted later by German National Socialists.
The symbol is commonly called a swastika, although German socialists called it a "Hakenkreuz" (hooked cross). Despite being an ancient symbol, the swastika was altered for use as overlapping S-letters for "socialism." It was turned 45 degrees from the horizontal and was oriented in the "S"-letter's direction to highlight the overlapping "S" letters for "socialists."
Similar alphabetic symbolism was used in the SS division (two "S" letters for "Schutzstaffel") and similar symbolism is still visible today, and everyday, on the streets as VW emblems (two "V" letters, or a "V" and a "W" letter conjoined, for "Volkswagen").
As part of the anti-libertarian practice, people were persecuted for refusing to perform the straight-armed salute and mechanical chanting to the national flag. That happened at the same time in the USA and in Germany. The Pledge's early right-armed salute was not an ancient Roman salute.
The ancient Roman salute is a myth. Professor Rex Curry showed that the "ancient Roman salute" myth came from the Pledge.
Take the Pledge not to Pledge. Stop kissing the government's butt every morning. Remove the pledge from the flag. Remove flags from schools. Remove schools from government. For more information visit the site that archives the work of the nation's leading authority on the Pledge of Allegiance: the historian Dr. Rex Curry.
This book provides, for the first time, detailed commentary on legislative drafting with a specific focus on the Commonwealth, covering: the ethics of legislative drafting, teaching, training and retention of drafters, the role of legislative drafting in good governance, keeping the statute book up-to-date, drafting by more than words: the use of graphics, labels and formulae in legislation; and the particular challenges of drafting for small states. It constitutes a key reference for legislative drafters, parliamentary counsel and professionals involved in this field in the Commonwealth and beyond.
This book was based on a special issue of Commonwealth Law Bulletin.
Each chapter uncovers the policymaking aspects of judicial process by investigating the current state of the law, the extent of court involvement in policy change, the responses of other governmental entities and outside actors, and the factors which influenced the degree of implementation and impact of the relevant court decisions. Throughout the book, Howard and Steigerwalt examine and analyze the literature on judicial policy-making as well as evaluate existing measures of judicial ideology, judicial activism, court and legal policy formation, policy change and policy impact. This unique text offers new insights and areas to research in this important field of American politics.
As progenitor of a system bequeathed to its colonies and after centuries of leadership in developing the core principles, policies and precedents that subsequently shaped its development, the contribution of England & Wales, the originating jurisdiction, is first described and analysed in detail. This is achieved in the seven chapters comprising Parts 1 and 2. These broadly sketch the parameters and role of ‘charity’ – seen as a mix of public and private interests - then address the law’s role in protecting, policing, adjusting and supporting charity. This provides the critical dimensions for the comparative analysis of experience in the common law nations that constitutes the main part of the book.
Part 3, in 5 chapters, provides an analysis of the legal functions as they apply to type of need and thereby give effect to social policy in Singapore, Australia, New Zealand, Canada and the United States of America. Part 4 concludes with three chapters that appraise political influence as a factor in aligning charity law with social policy to create a facilitative environment for appropriate charitable activity. Attention is given to the central role of the regulator, contemporary charity law frameworks and definitional boundaries.
To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile.
The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.