We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The legally binding unilateral application of norms holds potential for abuse. Nonetheless, self-judgment is alive and kicking. Self-judgment language commonly features in treaties and states frequently invoke their authority to ‘self-judge’ sensitive issues, such as matters related to national security, before international judicial bodies. In many of these cases, the controversy whether a norm has a self-judgment quality or not has been decisive for the outcome of the dispute. Yet, the meaning and consequences of self-judgment remain contested.
This article develops self-judgment as the authoritative application of international legal norms by states. It posits that steps towards the judicialization of self-judgment by judicial bodies have given rise to state efforts to preserve unfettered discretion. Notably, states have responded to attempts by judicial bodies to gain authority over the application of self-judgment by drafting provisions more explicitly. This dynamic continues to make self-judgment a site of judicialization and pushback. The only way to understand the meaning, limitations and development of self-judgment is by studying this process. Doing so conceptually refines self-judgment and allows for more meaningful references to the notion in practice.
This article examines shifts towards onshoring pharmaceutical manufacturing, a response to the vulnerabilities exposed by the COVID-19 pandemic in global supply chains. It delves into how globalization, public policy, and geopolitical tensions have shaped pharmaceutical markets, compelling nations to seek solutions that ensure reliable medicine access and reduce dependency on foreign supplies. The study highlights disparities in regulatory oversight and geographic concentration of production, which contribute to frequent shortages, particularly of generic medicines. The pandemic intensified these issues, prompting increased state interventions and heightening concerns over geopolitical risks. As a result, onshoring efforts, often encapsulated in local content measures, have expanded, and are now driven by both economic motives and imperatives of national security and public health.
This chapter introduces the concept and practice of security in international relations. It explores the dilemmas faced by states, individuals and the global community by first looking at contemporary crises and disagreements about security; second, examining how security has been differently defined and focused; and third, surveying how different theoretical approaches have understood and analysed security.
The GATT security exceptions were practically in hibernation until recently. The recent WTO disputes panel activity concerning such exceptions is characterized by a standard of review that places the accent on ‘when’ action should be taken and not so much on ‘what’ action should be taken. We see two problems with this construction. First, the ‘when’ might be a function of privileged information that those possessing it might be unwilling to divulge in a transparent manner. Second, national security is an amorphous concept, and unless we disaggregate it, it is impossible to pronounce the appropriateness of measures adopted to pursue the underlying objective. In turn, the absence of disaggregation could lead to false positives and negatives, as the same action could be pursuing essential security or providing protection to domestic players.
Most US lawsuits involving Chinese companies are initiated by or against their customers, employees, or business counterparts. However, on occasion, Chinese investors may go to court against a US government entity to resolve a dispute. As US–China relations continue to deteriorate, Chinese companies are increasingly caught in the crossfire of the geopolitical rivalry. Being suspected as agents for the Chinese state, China-headquartered multinational companies, especially those with ties to the Chinese government, have expressed growing frustration over what they perceive as unfair treatment by the US government. This chapter examines the legal reactions of Chinese companies to perceived official bias in the United States in the context of intensifying geopolitical tensions.
Litigation is a complex matter, calling for more sophisticated inquiries than what can be measured by a binary variable, namely, whether or not a Chinese company had experienced US lawsuits. This dichotomy glosses over crucial aspects of Chinese companies’ interactions with the US adjudicatory system. For instance, while prominent Chinese companies such as Huawei have litigated hundreds of lawsuits in the United States, most others were involved in no more than a few cases. However, the coding in Chapter 4 grouped them together in terms of US litigation experience. In fact, those that litigate infrequently may have more in common with Chinese companies that have managed to avoid US lawsuits altogether than prominent repeat players. To unveil important information lost from collecting and coding the data as a binary variable and to ameliorate possible biases in survey data concerning sensitive topics, this chapter explores a hand-collected objective dataset: federal lawsuits involving Chinese companies. It also presents three detailed case studies to demonstrate how Chinese companies with direct investments in the United States navigate the complex host-state legal system. These case studies (i.e., Lenovo, Huawei, and Fuyao Glass) will revisit the hypotheses and findings of prior chapters.
This chapter examines security and Australian foreign policy during 2016–2020 using two strands. It shows that Australia confronted both the ‘high politics’ issues that are the stuff of traditional foreign policy, as well as the unconventional security challenges to which Australia had to adapt. We begin by considering Australia’s conventional security politics, and the three consistent strands in Australia’s security thinking: how Australia fits into a world of super powers and the balancing act it must conduct to do so; relatedly, its alliance with the Unitd States; and Australia’s role in multilateral organisations. We then assess the so-called ‘unconventional’ security issues and their impact on Australian national security. Our analysis reveals that Australia’s responses to unconventional threats were increasingly conventional and relied on domestic tools to solve international problems. Some new threats seemed to bring international tools, like the military, to bear on domestic problems. Moreover, we demonstrate that the security environment was increasingly defined by the ‘grey zone’ – acts that reside between war and peace and take on unconventional forms.
Along the path of datafication, the probability of cyberattacks against critical infrastructure increases as well. The weaponization of 5G networks has brought about further challenges to international economic legal order. Major geopolitical players have adopted comprehensive security measures at home and have also strengthened cooperation with geopolitical allies to protect and enhance the resilience of ICT ecosystems. In this regard, the more recent iterations of international trade agreements are equipped with “modernized” security exceptions to ensure that the exceptions to international trade rules are aligned with the policy needs of the data-driven economy. Innovative exception clauses have been incorporated into FTAs to reconcile conflicts between (digital) trade and (cyber) security, which, overall, grant a dramatically expansive scope and excessively unfettered discretion to states when it comes to “national security.” Questions as to what constitutes “critical infrastructure” and how it should be designated, however, require due process mechanisms to constrain discretionary abuse. Chapter 2 contends that a consensus concerning the scope of “critical infrastructure” would be politically and economically valuable to filter out overgeneralizations of national security claims.
Why does diplomacy exist? How does it contribute to a country’s national interest? How critical is it to national security? The answers to these questions are important as much for people in government as for those on the outside. A country’s diplomatic service is the steward of its national interests abroad. International civil servants, who work on the staff of multilateral organizations like the United Nations and the European Union, are supposed to serve global or regional interests. Both bilateral and multilateral diplomats manage and participate in the daily conduct of international relations. In carrying out their duties, they work within a diplomacy architecture–systems that have been established at the national and global levels. Before we discuss these systems, we need to understand how diplomacy relates to other key terms and concepts, such as national interest, national security and foreign policy.
This article engages in a comparative analysis of espionage law in the UK and Australia to determine whether the laws in each country are effective and appropriate. It finds that, while the espionage laws in both countries are largely capable of effectively addressing modern espionage, this has come at the expense of appropriateness – specifically, aspects of the laws in both jurisdictions are complex, uncertain and overly broad, and defences and other safeguards for legitimate conduct have limitations. The article argues that, while the effectiveness of espionage (and other national security) laws is an important consideration, this must be balanced with appropriateness to ensure that core rule of law values and legal principles are not undermined.
Times are changing as our global ecosystem for commercializing innovation helps bring new technologies to market, networks grow, and interconnections and transactions become more complex around standards, all to enable vast opportunities to improve the human condition, to further competition, and to improve broad access. The policies that governments use to structure their legal systems for intellectual property, especially patents, as well as for competition—or antitrust—continue to have myriad powerful impacts and raise intense debates over challenging questions. This chapter explores a representative set of debates about policy approaches to patents, to elucidate particular ideas to bear in mind about how adopting a private law, property rights-based approach to patents enables them to better operate as tools for facilitating the commercialization of new technologies in ways that best promote the goals of increasing access while fostering competition and security for a diverse and inclusive society.
The media and US foreign policy elites paint a pessimistic picture of China’s behavior and the likelihood of major conflicts. However, they fail to capture the curious variation in China’s coercive behavior, which is much more nuanced than simplistic predictions that war is imminent. For one, despite the countless forecasts of major wars involving China over the past decade, China has not fought a war since the 1988 Sino-Vietnamese maritime skirmish. Instead, China utilizes a full spectrum of coercive tools, ranging from diplomatic and economic sanctions to gray-zone measures and military coercion. This book examines when, why, and how China attempts to coerce states over threats to its national security. I propose a new cost-balancing theory to explain China’s coercion decisions, while discussing the broader implications for international relations in the concluding chapter. I show that instead of coercing all states and prioritizing military coercion, China is a cautious actor that balances the benefits and costs of coercion. The book identifies the centrality of reputation for resolve and economic cost in driving whether China coerces or not.
The National Security Act 2023 replaces the Official Secrets Acts 1911, 1920 and 1939, updating, rationalising, and expanding the various offences which they contained and introducing new rules aimed at the same broad end of countering the threat posed to the UK by the efforts of hostile states and their proxies. It therefore represents a legislative confirmation of the ongoing pivot back to ‘state threats’ rather than terrorism as the focus of the national security enterprise in the UK, though now informed by the experience of counter-terrorism law since 2000. This paper assesses the main changes made by the 2023 Act, including in the context of threats to the democratic process, actual and potential, which have been identified in recent years. The argument offered is that the focus of the 2023 Act – encompassing threats to democracy only where they rise to the level of threats to national security – is undermined by the absence of a more thoroughgoing project to protect the democratic process more generally against foreign interference.
This book provides new insights into the opportunities, risks, and unintended consequences for the American economy, legacy industries, global multinational corporations, and financial institutions having pledged to transition to a net-zero carbon economy. It places specific emphasis on 'systems analysis', as well as the unprecedented pace needed for our sustainability transition. It examines the implications of organizations purchasing voluntary carbon credits which are not regulated, insured, and often not scientifically validated. It scrutinises how financial markets are driving corporate sustainability while at the same time conservative policymakers seek to ban Environmental Social Governance investments. Golden discusses national security as well as the growing rural-urban divide, seemingly widened by major automotive manufacturers looking to move towards zero-emission electric vehicles. Using empirical evidence to chart the effect of our sustainability transition on the government, the military, and corporations, this book is an invaluable resource for researchers, graduate students, policymakers, and industry professionals.
The complexity of supply chains means that it is difficult to tell where national security arguments begin and end. That may weaken some of the traditional arguments for free trade for the same reasons that we accept the difficulty of rational economic calculation in a socialist society. National security arguments for protectionism may not remain restricted to very small and manageable segments of the economy. Liberals and cosmopolitans will need to pay greater heed to these problems. This essay also considers why complex supply chains may create problems for a carbon tax and for the notion of corporate social responsibility.
The chapter discusses cybersecurity from the perspective of human rights protection. It first identifies adopting border measures as one approach to fulfilling a state’s duty to protect its citizens against human rights violations caused by cybercrimes. It then examines the tension between these FDI restrictive border measures and states’ investment protection and promotion obligations under IIAs. The analysis demonstrates a limitation in the current international law framework in which invoking the concept of national security remains the only means for states to address cyberthreats, which involves the risk of an accelerating shift to protectionism.
The chapter gives a detailed account of Chinese cybersecurity policy as an example of a state-oriented model of internet governance. After describing China’s early attitudes towards cyberspace, it analyses in detail its cybersecurity policy under the Xi Jinping administration, and how its concept of ‘cyber sovereignty’ differs from Western countries’ approaches to cyberspace. It also examines China’s efforts to export the Chinese model of cyber laws and regulations based on the concept of cyber sovereignty to non-liberal countries. It also analyses how the country is actively involved in the formation of international rules for cybersecurity in order to spread this concept.
Chapter 5 focuses on cases in which States have restricted the activities of individuals or communities due to concerns about religiously motivated harm. Firstly, it explores cases concerning sexual relations with minors, corporal punishment of children, compulsory vaccination refusal, and ceremonial use of illegal substances. These are the kinds of cases one would expect fall into the outermost circle in the loose concentric circles model, where there is weakest forum internum relevance and strongest countervailing factors and, thus a very low degree of forum internum protection. This chapter seeks to demonstrate that the ECtHR’s approach in such cases is as expected. Secondly, through an analysis of cases concerning allegations of threats to national security, challenges to rights and freedoms of members, and transgressions of health and safety laws, this chapter also aims to show that where the ECtHR considers the harm in question is not substantiated, or State actions are disproportionate, the ECtHR can, and does, give greater weight to forum internum relevance than to countervailing factors, and offer a higher degree of protection.
This chapter offers an analysis of the challenges for governments and the private sector in cybersecurity governance from a systemic perspective. It first identifies the challenges that the liberal international order, characterised by political liberalism, economic openness, and international cooperation, has faced in the area of cybersecurity governance. It also observes that there have so far been no successful global efforts to harmonise rules or create a unified regime. This chapter then emphasises how the private sector’s essential role as innovators possessing technological expertise is unique to cybergovernance and explains how the interplay of different actors, both public and private, has practical meaning for states and actors.