Genuinely broad in scope, each handbook in this series provides a complete state-of-the-field overview of a major sub-discipline within language study, law, education and psychological science research.
Genuinely broad in scope, each handbook in this series provides a complete state-of-the-field overview of a major sub-discipline within language study, law, education and psychological science research.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter addresses the issue of legality of ‘secondary sanctions’ from the viewpoint of international investment law. The theoretical situation considered is that of a foreign investor, having made an investment in the US, being subjected to penalties or restrictions under a US secondary sanctions regime, based on its conduct of certain transactions with a targeted country or entity, even though such business activities have no US jurisdictional ‘nexus’. The chapter first attempts at identifying the potentially relevant substantive standards of investment protection, including the prohibition of expropriation without compensation and the ‘fair and equitable treatment’ standard. The likelihood of a successful invocation of these standards by the claimant in an investor–State arbitration claim is discussed. In that process, it is considered inter alia whether the deterrent effect of secondary sanctions may per se amount to a violation of an investment protection instrument. The chapter then turns to the assessment of the possible defences that the respondent State may put forward in order to seek to escape its liability for the possible breach of a standard of bilateral investment treaties, notably defences relating to ‘security exceptions’ provisions in treaties and allegations as to the ‘illegality’ of the investment.
China has long been a major target of primary sanctions and more recently of secondary sanctions. Like many other states, China has begun to explore legal efforts to resist US secondary sanctions, for instance by adopting a blocking statute. Unfortunately, it appears that these legal efforts, like those of many other states, cannot make much difference in practice, although they are not meaningless. However, China is different from many other states in that it has the potential to economically or technically overtake the US. Due to its ever-growing economic power, together with its legal efforts, China is expected to be able to neutralise US secondary sanctions in the future. Going forward, China, despite its growing power, is expected to maintain its basic policy of opposing unilateral sanctions and is unlikely to impose secondary sanctions to achieve its foreign policy aims. It will continue to emphasise the principles of sovereignty equality and non-intervention in internal affairs.
This chapter considers whether and to what extent secondary sanctions that contravene commitments under trade and investment agreements may be justifiable under security and general exceptions. It analyses the jurisprudence of various international courts and tribunals on the matter, while focusing on the text of General Agreement on Tariffs and Trade (GATT) Articles XX and XXI (which many international economic agreements replicate or adjust). For non-self-judging security exceptions, it concludes, justifiability hinges on the design of sanctions, their targeting of ‘military’ products or services, and the demonstrability of an essential security risk for the sanctioning party. Secondary sanctions might also be justifiable under general exceptions, which feature finer legal criteria to permit measures that pursue legitimate objectives while controlling their abusive application. The chapter considers the enforcement-related exception of GATT Article XX(d), as well as the public morals exception of GATT Article XX(a), which was invoked to justify sanctions in United States – Tariff Measures on Certain Goods from China. As with other measures at the intersection between economic relations and security, the assessment of secondary sanctions under these exceptions becomes particularly challenging in light of their usual objective: restricting trade or investment vis-à-vis specified states, on the basis not of impersonal objectives but of a state’s perception of its essential security interests.
This volume provides a unique perspective on an emerging area of scholarship and legislative concern: the law, policy, and regulation of human-robot interaction (HRI). The increasing intelligence and human-likeness of social robots points to a challenging future for determining appropriate laws, policies, and regulations related to the design and use of AI robots. Japan, China, South Korea, and the US, along with the European Union, Australia and other countries are beginning to determine how to regulate AI-enabled robots, which concerns not only the law, but also issues of public policy and dilemmas of applied ethics affected by our personal interactions with social robots. The volume's interdisciplinary approach dissects both the specificities of multiple jurisdictions and the moral and legal challenges posed by human-like robots. As robots become more like us, so too will HRI raise issues triggered by human interactions with other people.
Human behavior in cyber space is extremely complex. Change is the only constant as technologies and social contexts evolve rapidly. This leads to new behaviors in cybersecurity, Facebook use, smartphone habits, social networking, and many more. Scientific research in this area is becoming an established field and has already generated a broad range of social impacts. Alongside the four key elements (users, technologies, activities, and effects), the text covers cyber law, business, health, governance, education, and many other fields. Written by international scholars from a wide range of disciplines, this handbook brings all these aspects together in a clear, user-friendly format. After introducing the history and development of the field, each chapter synthesizes the most recent advances in key topics, highlights leading scholars and their major achievements, and identifies core future directions. It is the ideal overview of the field for researchers, scholars, and students alike.
Conversation Analysis (CA) is one of the predominant methods for the detailed study of human social interaction. Bringing together thirty-four chapters written by a team of world-renowned experts, this Handbook represents the first comprehensive overview of conversation-analytic methods. Topics include how to collect, manage, and transcribe data; how to explore data in search of possible phenomena; how to form and develop collections of phenomena; how to use different types of evidence to analyze data; how to code and quantify interaction; and how to apply, publish, and communicate findings to those who stand to benefit from them. Each method is introduced clearly and systematically, and examples of CA in different languages and cultures are included, to show how it can be applied in multiple settings. Comprehensive yet accessible, it is essential reading for researchers and advanced students in disciplines such as Linguistics, Sociology, Anthropology, Communication and Psychology.
This chapter provides an overview of methods for data collection in Conversation Analysis and practical advice on collecting interactional data. We touch on several recurrent issues that researchers encounter in the process. These issues include accessing data; the use of existing data (including user-uploaded, like YouTube); navigating gatekeepers in accessing a setting; building trust with members of a setting; building ethnographic understanding of activities under examination; obtaining ethical approvals; protecting privacy of participants; methods and materials for informed consent (including with populations with diminished capacities); devising a recording schedule; deciding when/how often to record; selecting the right quantity and type of recording equipment; considerations of spatial and audio environments; the use of alternative technologies for recording; recording mediated interactions; procedures and check-lists for before recording; positioning and framing the camera; when to press record and when to press stop; navigating the presence of the researcher-recorder on site; and gathering supplementary documentation from the setting.
This chapter discusses best practices for conducting a conversation-analytic (CA) investigation into (discourse) particles (or discourse markers). Particles are ubiquitous in talk-in-interaction, making them an attractive research target. CA research into particles aims to elucidate their interactional deployment in the language under study and, more generally, to develop a deeper understanding of the infrastructure of social interaction. The chapter discusses conceptual underpinnings of the CA approach to analyzing particles: first, its orientation to social action; second, its emphasis on positionality (including the particle’s position in a turn, a sequence, a repair segment, and a conversation as a unit); and, third, its use of particular evidentiary procedures (such as the ‘next-turn proof procedure,’ positional deployment, distributional evidence, and deviant cases). The application of these principles is illustrated with two case studies: a semasiological study of the Russian particle nu and an onomasiological study of how courses of action are launched via so and oh prefaced turns. The chapter shows that, while fraught with challenges, a study of particles can lead to important and unexpected findings about social interaction.
This chapter describes and empirically illustrates an approach to analyzing categorial phenomena in talk-in-interaction, grounded in the distinctive conversation analytic practice of building and analyzing collections. We begin by outlining a core set of observations made by Harvey Sacks in implementing a shift from conventional social scientific treatments of categories (e.g., gender, race, sexuality, age) as analysts’ resources, to instead examining them as members’ resources. That is, instead of using categories to study the social world, Sacks’ approach introduced resources for seeing how participants in social interactions use and self-administer categories. We then present an analysis of a collection of openings of interactions from ordinary conversational and institutional settings, considering some ways in which participants explicitly and tacitly use and manage categories in the initial moments of these interactions. Using this analysis as an exemplar, we address a set of challenges and critiques associated with conversation analytic research on categories. We thereby describe how CA can provide an empirically rigorous means of examining the ‘mutually constitutive’ relationship between categories and other ‘generic’ interactional structures and practices – and thus for analyzing the situated (re)production of categories, from the most mundane to those most strongly associated with distributions of power and privilege.
The growing interest in Conversation Analysis (CA) from the wider academic world, and the use of CA in contexts beyond academia, is largely due to the effective communication of CA findings. This chapter focuses on how to effectively communicate CA findings to non-CA professionals, such as healthcare professionals, academics, teachers, the police, politicians, and beyond. When training professionals in CA findings, careful considerations need to be made to make our findings welcome, whilst at the same time preserving the detail and nuances of human interaction. Decisions about the selection and length of representative extracts, together with decisions about the central messages being conveyed, require careful consideration. Challenges and tensions can arise when making these decisions including, managing the issue of (a) the professionals’ expertise, (b) avoiding negative self- and other evaluations, (c) how to present the data without getting lost in the detail; and (d) addressing concerns about generalizability and quantification. This chapter will address these possible tensions and offer guidance and practical solutions regarding the decisions that are made to effectively train non-CA professionals.
What happens to submissions to a journal such as Research on Language and Social Interaction which publishes close, technically sophisticated analysis of interaction? What do its editors look for? We begin by explaining why submission might be desk-rejected: it might be simply unsuitable in topic or methodology for the journal, or it might be that it is somehow not quite up to standard. Methodologically sound work on a topic of interest to the EM/CA community will pass the first hurdle and be sent out for review by knowledgeable peers. Reviewers will report on the strength of the argument, the relation of the work to what is already known, and the quality of the analysis. Most papers at this stage will receive an encouraging invitation to revise and resubmit according to the reviewers’ comments and the editors’ recommendations. The revision, to pass the next stage, should be accompanied by a closely written, collegially written commentary on what the authors have done with the reviewers’ comments. The editors will scrutinize the revision and the covering letter very carefully; if all is well, then, with one last round of very minor tidying up, all is set for publication.
Conversation analysts in a range of disciplines have pointed to a relationship between Ethnomethodology and Conversation Analysis. However, full descriptions of key elements of this relationship, and illustrations of how it matters in practical terms, are scarce. We specify ways in which the concerns and sensibility of Ethnomethodology (EM) can translate into the practice of Conversation Analysis (CA). Employing an EM sensibility involves attending to five major features of social interaction: how members of society co-produce social order, achieve social organization in their everyday lives, deploy concrete practices or methods of talk and embodied conduct, use commonsense knowledge, and operate in real-time, actual social interaction with its temporal dimensions. In specifying these features, our aim is to be descriptive, rather than prescriptive. Our goal is to appreciate how EM’s view of social phenomena—as actual, lived in real time, and member-produced—is fundamental to CA, and how EM’s theoretical insights and studies of commonsense and practice-assembled social events profoundly paved the way for CA. While integrating this EM backdrop, CA advanced the systematic analysis of concerted, real-time conduct-in-interaction. A concluding section of the chapter provides an illustration drawn from an internal medicine clinic, and involves doctor-patient interaction.
Making collections of conversational/interactional phenomena is a cornerstone of CA’s methodology. Our aim in CA research is to identify the practices through which speakers of a natural language conduct action in inter-action, the practices that enable speakers to engage in conduct that is meaningful to one another (the accountability-as-intelligibility of social conduct). The practices for talk-in-interaction are recurrent phenomena; they are to be found in recurrent patterns of talk – in recurrent sequential positions or environments, in recurrent sequence patterns, and in recurrent features of turn design such as linguistic format including morphosyntactic constructions. Whilst recurrence may not by itself be a sufficient condition for determining that an object or pattern constitutes a practice, it is a necessary condition. It is necessary to show that an object, pattern etc. works in a particular way systematically – and ‘systematically’ requires recurrence. Thus, the identification, the discovery or uncovering of practices in talk-in-interaction rests on building collections of cases of a phenomenon in order to find whether it is systematically associated with some recurrent pattern. In this chapter I describe the history of one such collection assembled by Gail Jefferson, a collection of apologies that served as the basis for several analyses and publications.
The investigation of singular practices and actions is the bedrock of Conversation Analysis (CA), yet it is not the only approach that CA research can take. This chapter poses a series of analytic questions designed to guide the analyst’s attention towards a complementary mode of analysis, one which takes as its object of study not a singular practice but rather a system of practices, alternative solutions to a recurrent problem of social organization. While this approach has been employed to greatest effect in research on generic organizations of interaction, the analytic techniques are themselves generic and applicable across domains of action. Rather than select a practice or action and ask what forms it can take or what environments it can inhabit, conversation analysts can instead select a problem, an exigency of social interaction, and ask how participants solve it. Alternative practices and actions naturally cluster around the organizational problems to which they serve as possible solutions, and it is this endogenous organization that CA research aims to document. The chapter sketches out and illustrates a range of analytic techniques that conversation analysts have employed in past research and can employ again to discover and investigate organizations of practice.