Abstract
Crimes such as terrorism pose some of the biggest postmodern challenges faced by criminal justice systems worldwide. How systems react and prevent such crime raises numerous legal, political and strategic issues i.e. cross-jurisdictional collaboration, policing and the erosion of civil liberties such as privacy. In this article, taking inspiration from criminological theory, two criminal justice challenges that are posed by terrorism are explored from the United Kingdom’s perspective: the international definition of terrorism including the factors that impede a common definition from being established and the domestic response to define, prevent and prosecute this crime. The aim of, and originality in, this article is to explore the criminal justice challenge facing the United Kingdom in balancing complex and competing interests when effectively responding to terror crime.
References
Abeyratne, R. 2011. “The Beijing Convention of 2010 on the Suppression of Unlawful Acts Relating to International Civil Aviation – an Interpretative Study.” Journal of Transportation Security 4: 131, https://doi.org/10.1007/s12198-011-0062-7.Suche in Google Scholar
Al-Lami, M. 2009. Studies of Radicalisation: State of the Field Report. London: Department of Politics and International Relations: University of London.Suche in Google Scholar
Amnesty International. “Encryption: A Matter of Human Rights.” POL40/3682/2016.Suche in Google Scholar
Archick, K., J. Rollins, and S. Woehrel. 2005. Islamist Extremism in Europe. Washington DC: Congressional Research Service.Suche in Google Scholar
Ashworth, A. 1977. “Excluding Evidence as Protecting Rights.” Criminal Law Review 3: 723–35.Suche in Google Scholar
Al-Lami, M., and B. O’Loughlin. 2009. Jihadist Try to Make Friends on Facebook. London: Guardian.Suche in Google Scholar
Baker, K., J. Mitchell, and B. Tindall. 2007. Combating Islamic Terrorism in Europe. Washington DC: American Diplomacy.Suche in Google Scholar
Bass, G. J. 2000. Stay the Hand of Vengeance: The Politics of War Crimes Tribunals. Princeton: Princeton University Press.10.1515/9781400851713Suche in Google Scholar
Benjamin, D., and S. Simon. 2002. The Age of Sacred Terror. New York: Random House.Suche in Google Scholar
Benjamin, W. 2001. Critical Constellations (Key Contemporary Thinkers). UK: Polity Press.Suche in Google Scholar
Bhui, K., N. Warfa, and E. Jones. 2014. “Is Violent Radicalisation Associated with Poverty, Migration, Poor Self-Reported Health and Common Mental Disorders?” PloS One 9 (3): 1–10.10.1371/journal.pone.0090718Suche in Google Scholar
Biersteker, T. J., and S. Eckert. 2000. Targeted Financial Sanctions: A Manual for Design and Implementation. USA: Thomas J. Watson Jr. Institute for International Studies.Suche in Google Scholar
Bigo, D., L. Bonelli, E-P. Guittet, F. Ragazzi, and Preventing and countering youth radicalisation in the EU. 2014. Directorate General for Internal Policies, Policy Department C: Citizens’ Rights and Constitutional Affairs, Civil Liberties, Justice and Home Affairs. Brussels: European Union.Suche in Google Scholar
Bizina, M., and D. H. Gray. 2014. “Radicalization of Youth as a Growing Concern for Counter-terrorism Policy.” Global Security Studies 5 (1): 72–9.Suche in Google Scholar
Brandon, B. 2004. “Terrorism, Human Rights and the Rule of Law: 120 Years of the UK’s Legal Response to Terrorism.” Criminal Law Review: 981–97.Suche in Google Scholar
Briggs, R. 2010. “Community Engagement for Counterterrorism: Lessons from the United Kingdom.” International Affairs 86 (4): 971–81, https://doi.org/10.1111/j.1468-2346.2010.00923.x.Suche in Google Scholar
Brodeur, J. P. 2002. “Undercover Policing in Canada: Wanting What is Wrong.” Crime, Law and Social Change 18 (10–12): 105–306. In: Loftus, B. and Goold, B. Covert Surveillance and the invisibilities of Policing. Criminology and Criminal Justice. 2012, 12: 275.10.1007/BF00230627Suche in Google Scholar
Bull, R., and B. R. Clifford. 1984. “Ear-witness Voice Recognition Accuracy.” In Eyewitness Testimony: Psychological Perspectives, edited by G. L. Wells, and E. F. Loftus, 92–123. Cambridge: Cambridge University Press.Suche in Google Scholar
Carr, S., E. Piasecki, G. Tully, and T. J. Wilson. 2016. “Opening the Scientific Expert’s Black Box: “Critical Trust” as a Reformative Principle in Criminal Evidence.” Journal of Criminal Law 80 (5): 364–86, https://doi.org/10.1177/0022018316669220.Suche in Google Scholar
Carrabine, E., P. Cox, P. Fussey, D. Hobbs, N. South, D. Thiel, and J. Turton. 2014. Criminology: A Sociological Introduction, 3rd ed. London: Routledge.10.4324/9780203082492Suche in Google Scholar
Chesney, R. M., and J. L. Goldsmith. 2010. “Terrorism and the Convergence of Criminal and Military Detention Models.” Stanford Law Review 60 (4): 1079.Suche in Google Scholar
Christmann, K. 2012. Preventing Religious Radicalisation and Violent Extremism: A Systematic Review of the Research Evidence. Huddersfield: Youth Justice Board for England and Wales Report and the University of Huddersfield.Suche in Google Scholar
Clifford, B. R. 1980. “Voice Identification by Human Listeners: On Earwitness Reliability.” Law and Human Behavior 4: 373–94, https://doi.org/10.1007/bf01040628.Suche in Google Scholar
Commons Library briefing. UK Parliament. 2017. “Counter-Terrorism and Security Act 2015 (Amendment) Bill 2016–17”.Suche in Google Scholar
Council of Europe. Council Framework Decision of 13 June 2002 on Amending Framework Decision 2002/475/JHA on Combatting Terrorism. Aberdeen: Official Journal of the European Communities. 2008/919/JHA.Suche in Google Scholar
Council of Europe. Council Framework Decision of 28 November 2008 on Amending Framework Decision 2002/475/JHA on Combatting Terrorism. Aberdeen: Official Journal of the European Communities. 2008/475/JHA.Suche in Google Scholar
Covert Surveillance and Property Interference. 2010. Revised Codes of Practice, 7. London: HMSO.Suche in Google Scholar
Davis, J. 2016. “Equality of Arms: Complying with International Human Rights Law in Cases against Alleged Terrorists.” Journal of Conflict and Security Law 21 (1): 69–89, https://doi.org/10.1093/jcsl/krv020.Suche in Google Scholar
Duff, A., L. Farmer, S. Marshall, and V. Tadros. 2007. The Trial on Trial Volume 3: Towards a Normative Theory of Criminal Trial. Oxford: Hart Publishing.Suche in Google Scholar
Daniels, R., P. Macklem, and K. Roach. 2001. The Security of Freedom: Essays on Canada’s Anti-terrorism Bill. Canada: University of Toronto Press.10.3138/9781442682337Suche in Google Scholar
Deflem, M., ed. 2004. Terrorism and Counter-terrorism: Criminological Perspectives. Amsterdam: Elsevier.10.1108/S1521-6136(2004)5Suche in Google Scholar
Draft Investigatory Powers Bill. 2015. Publications. UK: HMSO.Suche in Google Scholar
Evidence (General). “The Eleventh Report of the Criminal Law Revision Committee.” Cmnd 4991.Suche in Google Scholar
Ericson, R. 1994. “The Royal Commission on Criminal Justice Surveillance.” In Criminal Justice in Crisis, edited by M. McConville, and L. Bridges, 113–40. UK: Edward Elgar.Suche in Google Scholar
Ericsson, R. V., and K. D. Haggerty. 1997. Policing the Risk Society, 52–4. UK: OUP, and Barnard-Wills, D. and Wells, H. Surveillance, technology and the everyday. Criminology and Criminal Justice. 2012, 12: 227.10.3138/9781442678590Suche in Google Scholar
Evidence (General). “The Eleventh Report of the Criminal Law Revision Committee.” Cmnd 4991.Suche in Google Scholar
Ferrell, J. 2007. “Cultural Criminology.” In Blackwell Encyclopaedia of Sociology, edited by G. Ritzer UK: Blackwell Publishing. Blackwell Reference Online, https://doi.org/10.1002/9781405165518.wbeosc171.Suche in Google Scholar
Ferrell, J., and C. R. Sanders, eds. 1995. Cultural Criminology. Boston: Northeastern.Suche in Google Scholar
Ferrell, J., K. Hayward, W. Morrison, and M. Presdee, eds. 2004. Cultural Criminology Unleashed. London: Cavendish/Glasshouse.Suche in Google Scholar
Foucault, M. 1979. Discipline and Punish, the Birth of the Prison. New York: Vintage Books.Suche in Google Scholar
Foucault, M. 2003. “Power/Knowledge.” In Philosophies of Social Science: The Classic and Contemporary Readings, edited by G. Delanty, and P. Strydom UK: Open University Press, https://doi.org/10.4324/9780203380437-12.Suche in Google Scholar
Gateau, C., and P. Faron. 2015. Fight against Terrorism on the Internet: France Strengthens its Legal Arsenal. London: Global Media Communications Watch.Suche in Google Scholar
Genser, J., and B. S. Ugarte. 2014. The United Nations Security Council in the Age of Human Rights, 200. Cambridge: Cambridge University Press.10.1017/CBO9781139626972Suche in Google Scholar
Goldsmith, L. J., and N. Katyal, Op-eds. 2007. The op Terrorists’ Court. New York: N. Y. Times.Suche in Google Scholar
Gragera, J. P., and D. S. Pascual. 2014. “A Phenomenological Analysis of Terrorism and Organized Crime from a Comparative Criminological Perspective.” Journal of Law and Criminal Justice 2 (2): 113–31, https://doi.org/10.15640/jlcj.v2n2a7.Suche in Google Scholar
Guiora, A. N., and J. T. Parry. 2008. “Light at the End of the Pipeline: Choosing a Forum for Suspected Terrorists.” University of Pennsylvania Law Review Online 156 (1): 24.Suche in Google Scholar
Hamm, M. 2004. “The USA Patriot Act and the Politics of Fear, chapter 24.” In Cultural Criminology Unleashed, edited by J. Ferrell, K. Hayward, W. Morrison, and M. Presdee, 293. UK: OUP.Suche in Google Scholar
Hayward, K., and J. Young 2007. “Cultural Criminology.” In The Oxford Handbook of Criminology, edited by M.Maguire, R. Morgan, and R. Reiner, 102–21. Oxford: OUP.10.1093/obo/9780195396607-0003Suche in Google Scholar
Hehir, A., N. Kuhrt, and A. Mumford, eds. 2011. International Law, Security and Ethics: Policy Challenges in the Post-9/11 World. New York: Routledge.Suche in Google Scholar
Hill, M. 2018. Report of the Independent Reviewer of Terrorism Legislation, on the Operation of the Terrorism Acts 2000 and 2006, the Terrorism Prevention and Investigation Measures Act 2011, and the Terrorist Asset Freezing Etc. Act 2010. UK: HMSO.Suche in Google Scholar
Home Office. 2009. Statistics on Terrorism Arrests and Outcomes Great Britain September 11, 2001 to March 31, 2008. London: Home Office. 04/09.Suche in Google Scholar
Home Office. 2010. “Statistics on Terrorism Arrests.” [ONLINE] Available at https://www.gov.uk/government/statistics/statistics-on-terrorism-arrests.Suche in Google Scholar
Home Office Statistical bulletin 32/19. Individuals Referred to and Supported through the Prevent Programme, England and Wales. UK: HMSO. April 2018 to March 2019.Suche in Google Scholar
Honderich, T. 2002. After the Terror. Edinburgh: Edinburgh University Press.10.1515/9780585443652Suche in Google Scholar
Horgan, J. 2008. “From Profiles to Pathways and Roots to Routes: Perspectives from Psychology on Radicalization into Terrorism.” The Annals of the American Academy of Political and Social Science 618: 1, https://doi.org/10.1177/0002716208317539.Suche in Google Scholar
Horgan, J. 2009. “Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements.” In Criminology: A Sociological Introduction, 3rd ed., edited by E. Carrabine, P. Cox , P. Fussey, D. Hobbs, N. South, D. Thiel, and J. Turton. London: Routledge.Suche in Google Scholar
House of Commons Written Statement 287 (HCWS287). 2015. “Witness Statement by the Secretary of State for the Home Department (Mrs Theresa May)”.Suche in Google Scholar
Humanitarian Law Project v Ashcroft (HLP). “309 F. Supp.2d 1185, 1200.” (C.D. Cal. 2004).Suche in Google Scholar
Jackson, J., and S. Doran. 1995. Judge without Jury: Diplock Trials in the Adversary System. United Kingdom: Clarendon Press.10.1093/oso/9780198258896.001.0001Suche in Google Scholar
Jenkins, B. 2000. “Terrorism.” In Encyclopaedia of Sociology, edited by E. Borgatta, and R. Montgomery. New York: Macmillan.10.1080/02684528808431937Suche in Google Scholar
Judgment of the Nuremberg Military Tribunal. 1947. “American Journal of International Law 41/172”.10.2307/2193873Suche in Google Scholar
Law Commission. 2011. “Expert Evidence in Criminal Proceedings in England and Wales.” Law Com No 325.Suche in Google Scholar
Law Commission. 2009. “The Admissibility of Expert Evidence in Criminal Proceedings in England and Wales: A New Approach to the Determination of Evidentiary Reliability.” Law Com No 190.Suche in Google Scholar
Law Commission. 2011. “Expert Evidence in Criminal Proceedings in England and Wales.” Law Com. Report No. 325 (Date accessed January 20, 2015).Suche in Google Scholar
Law Commission. 2009. “The Admissibility of Expert Evidence in Criminal Proceedings in England and Wales: A New Approach to the Determination of Evidentiary Reliability.” Law Com. Consultation Paper No. 190.Suche in Google Scholar
Law Com. Report No. 325 (2011).Suche in Google Scholar
Law Com. Consultation Paper No. 190 (2009).Suche in Google Scholar
Liberty. 2010. Liberty’s Response to Lord Carlile’s Review of the Definition of Terrorism. London: Liberty.Suche in Google Scholar
Liberty. 2010. Terrorism Pre-charge Detention Comparative Law Study. London: Liberty.Suche in Google Scholar
Lyon, D. 2001. Surveillance Society: Monitoring Everyday Life. Philadelphia: Open University Press.Suche in Google Scholar
Marx, G. 1988. Undercover: Police Surveillance in America. USA: California University press.10.1525/9780520910041Suche in Google Scholar
MacDonald, L. 2011. Review of Counter-terrorism and Security Powers. London: HMSO.Suche in Google Scholar
Manningham-Buller, E. 2005. “The International Terrorist Threat and the Dilemmas Countering it, Security Service MI5”.Suche in Google Scholar
McIntyre, T. J. 2016. “Judicial Oversight of Surveillance: The Case of Ireland in Comparative Perspective.” In Judges as Guardians of Constitutionalism and Human Rights, edited by M. Scheinin, H. Krunke, and M. Aksenova, 136. USA: Edward Elgar Publishing.10.4337/9781785365867.00014Suche in Google Scholar
Mclaughlin, E. 2006. “Terrorism.” In Sage Dictionary of Criminology, 2nd ed., edited by E. Mclaughlin, and J. Muncie. London: Sage. In Carrabine, E. et al. (2014). Criminology: A Sociological Introduction. 3rd Edition. London: Routledge.Suche in Google Scholar
Murray, C. R. G. 2016. “Nudging or Fudging? the UK Courts’ Counterterrorism Jurisprudence since 9/11.” Journal of Conflict and Security Law 21 (1): 91–113, https://doi.org/10.1093/jcsl/krv021.Suche in Google Scholar
Mythen, G., and S. Walklate. 2006. “Criminology and Terrorism: Which Thesis? Risk Society or Governmentality.” British Journal of Criminology 46: 379–98, https://doi.org/10.1093/bjc/azi074.Suche in Google Scholar
O’Malley, P. 2008. “Experiments in Risk and Criminal Justice.” Theoretical Criminology 12 (4): 452–69, https://doi.org/10.1177/1362480608097152.Suche in Google Scholar
Operation of police powers under the Terrorism Act 2000 and subsequent legislation. Arrests, Outcomes, and Stop and Search, Great Britain, Year Ending December 2019. Statistical Bulletin. UK: HMSO.Suche in Google Scholar
Park, A., C. Bryson, E. Clery, J. Curtice, and M. Phillips, eds. 2013. British Social Attitudes: The 30th Report. London: NatCen Social Research.10.4135/9781446268292Suche in Google Scholar
Paisley, I. 1991. Reasonable Doubt: Case for the U. D. R. Four. Ireland: The Mercier Press Ltd.Suche in Google Scholar
Payne, T. 1791. The Rights of Man. USA: Dover Thrift. Abridged version published in 1999.Suche in Google Scholar
Perera, A. R. 2020. In the Research Handbook on International Law and Terrorism. Draft Comprehensive Convention on International Terrorism, chapter 9, 152–62. UK: Edward Elgar Publishing.Suche in Google Scholar
Philippon, A. C., J. Cherryman, A. Vrij, and R. Bull. 2008. “Why Is My Voice So Easily Recognized in Identity Parades? Influence of First Impressions on Voice Identification.” Psychiatry, Psychology and Law 15: 70–7, https://doi.org/10.1080/13218710701873999.Suche in Google Scholar
Picinali, F. 2015. “The Threshold Lies in the Method: Instructing Jurors about Reasoning beyond Reasonable Doubt.” The International Journal of Evidence & Proof 19 (3): 139–53, https://doi.org/10.1177/1365712715571511.Suche in Google Scholar
Precht, T. 2007. “Home Grown Terrorism and Islamist Radicalization in Europe.” Research funded by the Danish Ministry of Justice.Suche in Google Scholar
Privy Council Review of Intercept as Evidence: Report to the Prime Minister and the Home Secretary Cm 7324. London, 2008.Suche in Google Scholar
Quenivet, N. 2006. “You Are the Weakest Link and We Will Help You! the Comprehensive Strategy of the United Nations to Fight Terrorism.” Journal of Conflict and Security Law 11/317. In White, N. (2011). Terrorism, Security and International Law, https://doi.org/10.1093/jcsl/krl020.Suche in Google Scholar
Reinares, F. 2009. “Jihadist Radicalization and the 2004 Madrid Bombing Network.” CTC Sentinel, Combating Terror Centre, United States Military Academy 2 (11).Suche in Google Scholar
Sageman, M. 2004. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.10.9783/9780812206791Suche in Google Scholar
Saul, B. 2006. Defining Terrorism in International Law. Oxford: Oxford University Press.Suche in Google Scholar
Saul, B. 2014. Research Handbook on International Law and Terrorism. Cheltenham: Edward Elgar Publishing Ltd.10.4337/9780857938817Suche in Google Scholar
Schmid, A. P. 2020. “Discussion 1 – Revisiting the Wicked Problem of Defining Terrorism.” In Contemporary Voices, 1 (Terrorism: Its Past, Present & Future Study – A Special Issue to Commemorate CSTPV at 25), 3–11. London: Routledge.10.15664/jtr.1601Suche in Google Scholar
Schmitt, G. 2010. Safety, Liberty, and Islamist Terrorism: American and European Approaches to Domestic Counterterrorism. USA: AEI Press.Suche in Google Scholar
Schwebel, S. M. 2011. Justice in International Law: Further Selected Writings, 125–6. Cambridge: Cambridge University Press.10.1017/CBO9780511793912Suche in Google Scholar
Sharpe, C. 2002. “Covert Surveillance and the Use of Informants.” In The Handbook of Criminal Justice Process, edited by M. McConville, and G. Wilson. Oxford: OUP.Suche in Google Scholar
Silke, A. 2008. “Research on Terrorism: A Review of the Impact of 9/11 and the Global War on Terrorism.” In Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, edited by H. Chen, E. Reid, J. Sinai, A. Silke, and B. Ganor. New York: Springer. In Carrabine, E. et al. (2014). Criminology: A Sociological Introduction. 3rd Edition. London: Routledge.10.1007/978-0-387-71613-8_2Suche in Google Scholar
Singh, C. 2013. Quis Custodiet Ipsos Custodies? Should Justice Beware: A Review of Voice Identification Evidence in Light of Advances in Biometric Voice Identification Technology, Vol. 11, 1–28. USA: De Gruyter.10.1515/ice-2014-0009Suche in Google Scholar
Singh, C. 2020. “Prosecuting Terrorism: Secret Courts, Evidence and Special Advocates. The Panoply of Challenges Facing Criminal Justice, the United Kingdom Perspective.” Current Issues in Criminal Justice. 33(3), 1–27. https://doi.org/10.1080/10345329.2020.1850166.Suche in Google Scholar
Special Advocates Further Memorandum to the Joint Committee on Human Rights on the Justice and Security Bill.” 2013.Suche in Google Scholar
Stanford, B. 2017. “The Complexities of Contemporary Terrorism Trials Laid Bare.” Criminal Law & Justice Weekly 181 (33). Internet.Suche in Google Scholar
Tadros, V. 2008. “Crime and Security.” Modern Law Review 71. 940: 967–8.10.1111/j.1468-2230.2008.00730.xSuche in Google Scholar
Thayer, J. B. 1898. A Preliminary Treatise on Evidence at the Common Law. Boston: Little, Brown and Company.10.2307/781035Suche in Google Scholar
The Belfast Agreement/The Good Friday Agreement. (1998).Suche in Google Scholar
The Guardian Newspaper. 2013. “MPs Told to Repay £500,000 Profits from Publicly Funded Homes.”.Suche in Google Scholar
The Guardian Newspaper. 2016. “Tim Cook Says Apple’s Refusal to Unlock iPhone for FBI Is a ’civil Liberties’ Issue.”.Suche in Google Scholar
The Guardian. 2015. “UK Forces Kill British Isis Fighters in Targeted Drone Strike on Syrian City.”.Suche in Google Scholar
The Guardian. 2017. “UK ’has Stripped 150 Jihadists and Criminals of Citizenship.”.Suche in Google Scholar
The Guardian. “UK Forces Kill British Isis Fighters in Targeted Drone Strike on Syrian City.”.Suche in Google Scholar
UK Parliament. 2017. “Justice and Security Green Paper Report.UNSC S/Res/2462(2019)”.Suche in Google Scholar
United Nations Counter-Terrorism Committee Executive Directorate (CTED)”.Suche in Google Scholar
United Nations Office on Drugs and Crime (UNDOC). 2012. The Use of the Internet for Terrorist Purposes. Vienna: United Nations.Suche in Google Scholar
UN Security Council Resolution 2178. 2014. “On Foreign Terrorist Fighters.”.Suche in Google Scholar
UN Security Council Resolution 2396. 2017. “On Foreign Terrorist Fighters (Returnees and U.N. General Assembly Resolution on Measures to Prevent International Terrorism.” International Legal Materials 12 (1), January 1973.10.1017/S0020782900056291Suche in Google Scholar
United Nations Security Council. 2004. “Resolution 1566 (2004).”.Suche in Google Scholar
United Nations. 2016. Global Implementation Survey of Security Council Resolution 1373 (2001). Geneva: United Nations.Suche in Google Scholar
van Duyne, P., M. Jager, K. von Lampe, and J. Newell, eds. 2004. Threats and Phantoms of Organised Crime, Corruption and Terrorism: Critical European Perspectives, 51–84. Nijmegen, Netherlands: Wolf Legal Publishers.Suche in Google Scholar
Vladeck, S. I., and ‘The Case against National Security Court’. 2009. “Articles in Law Reviews and Other Academic Journals.” Paper 298. Originally published in the Willamette Law Review, 505–26.Suche in Google Scholar
Wade, H. W. R. 1980. The Hamlyn Lectures: Constitutional Fundamentals, 55. London: Stevens and Sons.Suche in Google Scholar
Walker, C. 2008. “Know Thine Enemy as Thyself: Discerning Friend from Foe under Anti-terrorism Laws.” Melbourne Law Review 32: 275.Suche in Google Scholar
Walker, C. 2009. “Prosecuting Terrorism: The Old Bailey versus Belmarsh.” Amicus Curiae (79): 21–5.10.14296/ac.v2009i79.1207Suche in Google Scholar
Zabel, R. B., and J. J. Benjamin Junior. 2008. Pursuit of Justice: Prosecuting Terrorism Cases in the Federal Courts. United States of America: Human Rights First.Suche in Google Scholar
Zedner, L. 2009. Security. London: Routledge. See also: Deflem, M. (Ed.). (2004). Terrorism and counter-terrorism: Criminological Perspectives. Amsterdam: Elsevier.10.4324/9780203871133Suche in Google Scholar
© 2021 Walter de Gruyter GmbH, Berlin/Boston
Artikel in diesem Heft
- Frontmatter
- Research Articles
- COVID-19 Vaccines as Global Common Goods: An Integrated Approach of Ethical, Economic Policy and Intellectual Property Management
- Social, Moral and Legal Rules, Biopolitics and the Covid-19 Crisis
- Legal, Tax and Accounting Treatment of Cryptocurrencies in Mexico
- From Libra to Diem. The Pursuit of a Global Private Currency
- The Panoply of Challenges Facing International Criminal Justice: The United Kingdom’s Response to Defining and Responding to Terrorism
- The Legal Dimension of the Relation Between the Chinese Communist Party and the Private Economy. A Perspective of the Article 19 of the Company Law
- How (Not) to Compare?: Not Being Inside, Nor Outside
- Energy and Law. A Critical Approach to the Cuban Context
Artikel in diesem Heft
- Frontmatter
- Research Articles
- COVID-19 Vaccines as Global Common Goods: An Integrated Approach of Ethical, Economic Policy and Intellectual Property Management
- Social, Moral and Legal Rules, Biopolitics and the Covid-19 Crisis
- Legal, Tax and Accounting Treatment of Cryptocurrencies in Mexico
- From Libra to Diem. The Pursuit of a Global Private Currency
- The Panoply of Challenges Facing International Criminal Justice: The United Kingdom’s Response to Defining and Responding to Terrorism
- The Legal Dimension of the Relation Between the Chinese Communist Party and the Private Economy. A Perspective of the Article 19 of the Company Law
- How (Not) to Compare?: Not Being Inside, Nor Outside
- Energy and Law. A Critical Approach to the Cuban Context