To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter reviews the theoretical and empirical literature on the adverse macroeconomic consequences of terrorism. From a theoretical perspective, terrorism may discourage economic activity by adversely affecting capital accumulation and allocation as well as social trust and political institutions. A selective review of the empirical literature on the macroeconomic consequences of terrorism shows that terrorism is associated with reduced economic performance in studies that use sub-national, national and cross-national data. Estimated effects are usually modest but tend to be more severe in terrorism hotspots and in countries that are especially vulnerable to terrorism. A country’s resilience to terrorism’s negative economic effects is governed by a variety of factors, including a country’s economic size, its level of economic diversification and quality of market institutions. Finally, this chapter calls for further research to explore additional pathways through which terrorism affects economic performance and to identify factors influencing its impact heterogeneity, while also highlighting the importance of accounting for econometric pitfalls in such analyses to provide robust policy recommendations.
This chapter examines how terrorism can affect the public finances. The literature identifies three main ways in which terrorism can affect fiscal outcomes. First, by influencing real economic activity and, thereby, government revenues, fiscal deficits and public debt. Second, by negatively affecting both the tax base and the efficiency of the tax administration. Third, by changing the composition of government spending in favor of military outlays. We confirm the importance of these three channels through new research on the impact of major terrorism shocks on macroeconomic and fiscal variables´ dynamics using an unbalanced panel of 191 heterogeneous countries from 1970 to 2018. We find that a terrorist shock lowers a country’s real GDP as well as government tax revenues and raises the debt-to-GDP ratio. The composition of government spending shifts in favor of military spending. Low-income countries are affected more than both emerging market and advanced economies.
The chapter examines the operation of cloud technologies within the system of international investment law. It analyses the operation of cloud technologies themselves within the system of international investment law and the interaction between the regulation of cloud technologies and international investment protective standards. The common element in each analysis is the existence, inexistence, and eventually forceful existence of territorial nexus between the ‘cloud’ and the national jurisdictions. Amidst the increased regulatory interference, the chapter focuses on localization requirements and forced localizations as a medium through which fundamental territorial and extra-territorial implications of international investment law are assessed. In essence, it constitutes a crash test on the capacity of existing international investment norms to protect and regulate assets and investments that are inherently detached from traditional views of territorial jurisdiction or tangible property rights.
The fourth chapter provides an examination of substantive canons that judges use to interpret government pension legislation under the Contract Clause. It concentrates on three clashing canons routinely employed in pension law: the remedial (purpose) canon, the “no contract” canon (otherwise known as the unmistakability doctrine), and the constitutional avoidance canon. Courts are at a crossroads in selecting among these dueling canons to determine public pension contractual obligations. This canon warfare is often outcome-determinative, insofar as it normally answers the question of whether there is a contract. Capturing conflicting interpretative strategies allows for an in-depth exploration of the policies in pension reform litigation and develops a better appreciation of the responsibilities of courts, legislatures, and society. The investigation also fosters an informed dialogue over the choice of canons and the circumstances of their operation in the ongoing legal battles about restructuring pension obligations.
Policy programs on anti-money laundering (AML) and combating the financing of terrorism (CFT) can only be successful if one has detailed knowledge about the financial means of terrorism. In this survey chapter, I analyze the extent of terrorist financing and discuss the legal as well as illegal origins of their financial sources. I also show the costs of terrorist attacks and the similarities as well as dissimilarities between terrorist and criminal organizations.
Economists have been applying existing economic tools to the study of terrorism. This approach assumes that terrorists are rational actors who can be deterred, reacting logically to the constraints placed upon them. This framework offers a comprehensive, adaptable, and testable methodology.
This Chapter conceptualizes security exceptions under international trade and investment agreements. In particular, it seeks to construct the chain that links trade and security-related issues arising from the application of security measures by clarifying the concept of national security to be used for the book, revisiting the current role of international organizations in balancing free trade and national security, ie the UN and the WTO, and finally contemplating the decision to incorporate security exceptions into international economic agreements or the decision to adopt security measures through the lenses of economic contract theory, the theories of international relations, such as realism, institutionalism, and constructivism, and the concept of securitization.
China’s notion of cyber sovereignty reflects an assertive extension of state authority into the digital realm. Rooted in principles of territorial jurisdiction, national security, and technological independence, this framework is embodied in key legislation. These laws impose rigorous compliance obligations on foreign and domestic businesses, particularly those operating critical information infrastructure. While these measures reinforce China’s digital autonomy, they pose significant challenges for foreign investors navigating this intricate regulatory landscape. This chapter critically examines how China’s cyber sovereignty aligns with its international investment obligations, focusing on three core principles: protection against expropriation, national treatment, and fair and equitable treatment (FET). It explores whether the stringent requirements and lack of effective remedies breach these standards, highlighting potential areas of discord with China’s investment treaties. Furthermore, it evaluates the limitations of security and general exception clauses in justifying these regulatory measures under international law. The findings suggest that China’s cyber sovereignty framework, while advancing its domestic security and technological goals, may conflict with its international investment commitments. As more nations adopt similar regulatory stances, this trend could signal a shift toward a fragmented global ICT market, reshaping the dynamics of international economic governance.
This Chapter outlines the national legal frameworks for applying security measures by the US, the EU, and BRICS in order to understand the level of securitization of their policy objectives. It focuses on the measures that are or can be applied by the US, the EU, and BRICS in pursuit of their national (regional) security interests and, thus, potentially subjected to security exceptions under international law. Specifically, this Chapter discusses the practice of application of economic sanctions and investment screening mechanisms in those jurisdictions.
The chapter surveys various papers in the literature that specifically analyze deterrence and preemption policies from the perspective of game theory. Emphasis is given to certain classes of models in order to highlight key aspects and characteristics of the policies studied. For example, when countries engage in deterrence against terrorist organizations, it is likely that they may simply deflect terrorist attacks to other countries. Preemptive policies on the other hand, provide positive benefits to other countries and therefore any benefits stemming from this policy, may be underprovided due to the problem of free riding.
In this chapter, we explore the rational choice approach to terrorism, combining viewpoints from political economy, organizational behavior, and individual psychology. We therefore examine terrorism as a strategic option chosen under certain socio-economic and political constraints, evaluating how aspects like market forces, organizational tactics, and individual incentives influence the phenomenon.
The third chapter details the development of Contract Clause doctrine throughout the United States. It surveys ten years of litigation in state and federal courts, organizing the decisions by the type of reform and their resolution. Challenged reform measures include increasing employee contribution rates, reducing or freezing cost of living allowances, eliminating pension spiking, changing benefit formulas and actuarial factors, redefining the earnable compensation criterion, imposing partial forfeiture of benefits upon conviction, and reducing or eliminating health care benefits. Adding an inclusive account of current court practice to the existing literature, the analysis tests the boundaries of government power to modify pension plans within multiple legal systems. Tracking cases across jurisdictions affords a unique window into contract principles and their application. Judicial lawmaking is not orderly. Decisional rules often lack the philosophical foundation necessary to achieve their purposes or accommodate existing social objectives. The relevant authorities are set out in an accessible way that makes sense of a rapidly developing area of law. Moreover, because most cases turn on the creation of a contractual obligation—an issue that is judicially determined—it provides context for an intensive evidentiary exploration of the contract criterion in subsequent chapters.
This chapter explores the complex interaction between (human) migration and terrorism. It proposes a ‘terrorism-migration cycle’ to investigate systematically this interaction for various stages of the migration process. Importantly, no stage of the migration process is independent of what happened on the previous stage, affecting how terrorism and migration interact. It is shown that terrorism may be a trigger of migration in the origin country, that only particular selections of migrants choose to leave a country, and that these migrants then sort into different destinations. The role of migration governance as a means to avoid the influx of potential terrorists is explored as well as the responses of destination-country populations and governments to the threat of imported terrorism. In addition, homegrown terrorism produced in immigrant communities is discussed as well as political violence directed against immigrants. Finally, it is argued that there are feedback effects from diasporas on the origin countries of immigrants.
International arbitration is the preferred method for the resolution of commercial and investment disputes. It provides a neutral forum where commercial disputes can be resolved by independent decision-makers, selected by or for the parties applying neutral adjudicative procedures designed to provide expeditious, expert and efficient dispute resolution.
Accompanying its increasing use, there have been efforts to harmonise the practice of international arbitration around the world. The United Nations Commission on International Trade Law (UNCITRAL) Model Law provides the basis for nations to enact arbitration legislation with best practices, offering uniformity for users and courts. The New York Convention on the Recognition and Enforcement of Foreign Arbitral Awards provides an effective and streamlined process for cross-border enforcement of arbitral awards by facilitating their recognition in over 170 nations around the world. Arbitral institutions periodically amend and update their arbitration rules in response to users’ needs, including their desire for harmonising the practice. All of these developments seek to enhance the dispute resolution process for parties to international commercial and investment agreements.
Despite these various efforts to harmonise both law and practice, important differences remain. The arbitration legislation of different countries inevitably differs. The backgrounds of national court judges also differ. The implementation of seemingly similar legislative provisions can also differ. Understanding these differences in international arbitration law and practice is essential for both practitioners and courts, as well as academic commentators.