Neoliberal policies of the 1980-90s in Mexico have triggered the explosion of violence caused by Drug Trafficking Organisations and that is, to this day, still present.
One of the best ways of developing your essay writing ability is to see how other students respond to similar questions. Reading other students’ essays can provide interesting insights and broaden your understanding of what is possible when answering a question.
The Kunarac case represented the international community’s willingness to recognise women’s vulnerability to mass atrocities.
The media gives the impression that asylum seekers are a threat to the welfare state. However, the reality is that the state is a threat to asylum seekers.
Suicide terrorism can only be found in an interactive triangular framework involving organisation, individual and society.
The dominant discourse surrounding female suicide bombers is discursive and reductive. It silences the diversity of motivations associated with female participation.
Russian foreign policy is largely influenced by Putin’s desire to remain in power and the need to contain domestic restructurings through securing domestic support.
The interplay of attitudes and economics within a context of poverty is presented as an explanation as to why females are almost exclusively the victims of infanticide.
Preemptive self-defence was cited by Rwanda and Uganda during the two Congolese Wars, presenting some significant questions for international law.
Disassociation with the feminist label despite agreeing with feminist objectives is primarily influenced by a misunderstanding of feminism, and not negative stereotypes.
Reconciliation is more meaningful when viewed as a transformative process which favours a restorative notion of justice, rather than as merely another word for impunity.
Arab nationalism & Islamism, intertwined from birth, grew out of a shared anti-Western identity but the contents & meanings of this rejection are fundamentally different.
Existing law governing jus ad bellum does not satisfactorily address the unique characteristics of cyber attacks.