The following paper will firstly introduce the arguments for the Positivist approach to research, which focuses on quantitative methods, and for the Interpretist approach, which focuses on qualitative methods. The second part will apply these approaches to the issue of torture and in doing so will identify and discuss the limitations of applying only one theory or approach to research.
Fifteen years after its first official promulgation, the human security paradigm requires analysis and evaluation, particularly in respect to its implications for the politics of international food aid.
The technocratic turn may sideline politics in a way that ignores the tensions between actors, individuals, and structures of power that are vital to making the science both work and available to those who need it most.
In order to better communicate with the rest of the world regardless of their religious affiliations and establish a stable identity, Turkey should focus on institutionalizing its public diplomacy attempts and should soften its anger-driven rhetorical style.
Scholars outside of law and computer science must investigate virtual environments, since the application of State law to a virtual environment has proven to be ineffective.
This essays discusses the ways in which four prevalent different definitions or spheres of sovereignty, have challenged the traditional notions of sovereignty since the early 1990s. These are; domestic sovereignty, interdependence sovereignty, international legal sovereignty and Westphalia sovereignty.
The strength and spread of cultural interactions between different governments and different people’s will reduce the likelihood of war between nations. As globalization takes its seat as the world’s ruling party, the international system will become a single yet vibrant meeting place.
It’s widely agreed that the Third World Debt crisis began in Mexico in 1982 sparking a chain reaction across Latin America, Africa and Eastern Europe. Domestic factors such as capital flight and corruption played a part but the main cause can be traced to the US and the rise of interest rates in 1979.
This paper will argue that Germany and Italy had little in common but common enemies and more significantly the shared aim of both wanting to assert themselves as revisionist powers of the interwar period. Thus, their alliance was one of convenience in that both powers were aware that they needed an ally within Europe as a means of achieving their ambitious and aggressive foreign policies.
The typical approaches to warfare, force, offence, defence and deterrence, do not necessarily cross over into cyber conflicts, be they for cyber warfare or countering cyber-terrorism. The world of network interactions changes the rules of the game, where the attackers can more easily remain anonymous, and the targets can be anything that is on an open network.
Before you download your free e-book, please consider donating to support open access publishing.
E-IR is an independent non-profit publisher run by an all volunteer team. Your donations allow us to invest in new open access titles and pay our bandwidth bills to ensure we keep our existing titles free to view. Any amount, in any currency, is appreciated. Many thanks!
Donations are voluntary and not required to download the e-book - your link to download is below.