To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter is devoted to developing and clarifying one of the most unique and important constructs of attachment theory: the internal working models (IWMs) by which relationships influence other relationships and personality. We begin by describing how IWMs develop, discuss different definitions and conceptualizations of IWMs associated with different developmental stages, and then offer a new way of thinking about IWMs as both implicit and explicit representations that function at different levels of awareness. We then discuss factors that promote stability and change in IWMs, highlighting how earlier experiences with attachment figures may shape subsequent IWMs associated with other attachment figures. We next present a framework outlining the conditions under which IWMs associated with specific attachment figures earlier in life can become “activated” to influence how people think, feel, and/or behave with their current attachment figures. We conclude by proposing several promising directions for future research.
From the rise of China as a technological superpower, to wars on its eastern borders, to the belief that the US is no longer a reliable ally, the European Commission sees the world as more unstable than at any other time in recent history. As such, the Commission has become the Geopolitical Commission, working to serve the interests of the Geopolitical Union. Central to many of these conflicts is technology – who produces it, where it is produced, and who controls it. These questions are central to the Commission's pursuit of digital/technological sovereignty, Europe's attempt to regain control of technology regulation. Focusing on topics such as setting technological standards, ensuring access to microchips, reining in online platforms, and securing rules for industrial data and AI, this book explores the EU's approach to lawmaking in this field; increased regulatory oversight and promotion of industrial policy at home, while exporting its rules abroad.
Chapter 2 provides an overview of the Commission as a technology regulator, outlining the development of the EU’s technology policies and laws, from their beginnings in the late 1970s until the late 2000s. Reflecting on the limited interventions of the Commission during the period referred to as one of ‘Eurosclerosis’, and the beginnings of distinct technology policies and positive acts of integration around technology in the 1990s. It explores how during its development, EU technology policy was marked by a distinction between economically oriented developments, such as around intellectual property rights, and security-related ones as in the case of cybercrime and cybersecurity. However, in the period of the late 2000s/early 2010s and the EU ‘polycrisis’ of financial crisis, legitimacy crisis, and populism crisis, and concerns over the power of the private sector in technology governance, the groundwork was laid for seeing technology control in terms of interlinked economic and security goals, a growing distrust of ‘Big Tech’, and concerns about the need to externalise the EU’s rules and values, including through the Brussels effect.
Chapter 5 focuses on the regulation of social media platforms and platform architecture, with changes in EU perceptions regarding the reliability of these platforms and the values of their owners. It examines the shift from economically motivated self-regulatory regimes in these sectors based in logics of efficiency to a digital sovereignty-motivated move to a logic of security in regulation. It identifies the explicit linkage between economic and security concerns, particularly as it relates to disinformation and political advertising, with the promotion of co-regulatory regimes with significant levels of oversight provided by the Commission. It explores the approach to regulatory export adopted in these initiatives, with an emphasis on control of platforms regardless of where they are based, so long as they offer services in the EU.
Chapter 7 considers the developments that have taken place since the beginning of the von der Leyen II Commission, identifying how there has not only been continuity in the EU’s approach to technology control and its links to digital sovereignty but also an expansion and reinforcement of the approach. Faced with increased instability and geopolitical threat, the linkage of security and economy has become even more explicit for the von der Leyen II Commission, with the Competitiveness Compass taking an approach that appears to be a more assertive form of regulatory mercantilism, in which the element of defence is specifically incorporated into the EU’s rationale for action, with an expansion of technology controls including the development of an explicit push for defence technology industrial policy, the increased control over external dependencies and supply chains through its Preparedness Strategy, and an AI policy for Europe that includes significant investments for AI gigafactories.
To explore what it meant to own and possess in the eighteenth century, Keeping Hold looks to instances in which people lost possessions and how they responded to such experiences. Chapter 2 begins the book’s focus on loss and does so by looking to urban sites. It looks to the city of the eighteenth century: London. The capital was of growing importance in this period as an economic powerhouse and social hub. Guidebooks emerged as an important genre for those seeking to comprehend London’s densely filled and ever-lengthening streets. The chapter explores these sources and finds how the capital was increasingly imagined as a site of deception and loss, where possessions might be pickpocketed or simply left in the bustle and in which servants and apprentices regularly ran away. The chapter examines how eighteenth-century Londoners responded to such perceived threats by utilising technologies of security, such as pockets and collars. By doing so they worked to prevent loss.
Chapter 3 moves to the global level, exploring the history of technology control and its historical links to geopolitics. It begins by considering control of technology in the context of the Cold War and technology as being explicitly considered a security issue in terms of the conflict between the US and the Soviet Union. It covers the CoCom technology restrictions imposed by the US, and Soviet Union attempts to gain access to critical technologies through Comecon, before considering how the approach to technology changed substantially with the end of the Cold War, the collapse of the Soviet Union, and the belief in the triumph of the liberal international order and globalism as reflected by the World Trade Organization and ‘free trade’. It then explores the multifaceted crises impacting upon this conviction in the benefits and resilience of the global trade system, the increased economic conflict between the US and China as a rising technological power, and a move from multilateralism in a ‘unipolar’ system to increased nationalism and protectionism in a ‘multipolar’ system, and what this meant for the EU’s sense of insecurity and vulnerability in the context of geopolitical reordering.
Chapter 9 begins with Fayiz Al Kandari contemplating the departure of his last fellow Kuwaiti, Fawzi Al Odah, and considering the consequences of his aggressive approach in his first PRB hearing, which was likely to have led to the denial of release. Both Fayiz and his lawyer had made numerous statements questioning the good faith of the US and Kuwaiti governments and suggested that citizens of both countries rise up against this injustice. This criticism would only alienate the decision-makers. Fayiz felt gratitude and loyalty to his previous lawyer but hired the author and his team to try again. Under PRB rules, he was not entitled to a full hearing for three more years. This chapter takes the reader inside the team as it planned strategy both to get an earlier hearing and to get support from Kuwaiti authorities, the military representatives and from Fayiz’s family to convince the board that despite the blemishes in his record, Fayiz was now forty; he had learned from his ordeal; and he was ready to go home. The chapter ends with his return home and being greeted by his father who had only a few months to live.
Chapter 4 critically examines the fact that sometimes innovations not only fail to solve crucial problems, but are the problem itself. Specifically, it explains why Ring doorbell exemplifies the threat of home surveillance innovation. The billion-dollar Amazon subsidiary sold millions of Americans on the promise of security via surveillance without any credible evidence that its system works. But rather than encouraging people to adopt proven security upgrades, such as better locks and secure package drops, Ring wins customers by making its digital innovation seem essential amid a climate of rising fear. By fighting against boring yet effective alternatives, Ring’s anxiety-inducing features have further normalized intensive networked surveillance and helped turn innocuous neighborly interactions into potential threats.
Rare Earth Elements (REEs) are essential for green energy technologies and defense systems, yet global supply chains remain concentrated in China. This has intensified geopolitical competition for alternative sources, positioning the Arctic as a strategic frontier, as retreating ice exposes mineral deposits. A comprehensive discourse analysis of strategic documents, scholarly literature, and media sources from 2010 to 2025 reveals a dramatic shift from geological characterization and economic speculation to urgent securitization and strategic alliance formation. Academic research has evolved from establishing natural baselines to governance and social conflict analysis. Media coverage of REE in the Arctic peaked in 2025, with rising emphasis on governance, sovereignty, geopolitics, and Greenland’s strategic position. Critical gaps persist in addressing Indigenous rights, holistic impact assessments, and Arctic-specific innovation. Sustainable Arctic REE development requires integrated frameworks that balance geopolitical imperatives with environmental protection and Indigenous self-determination, preventing the region from becoming a sacrifice zone for global decarbonization.
This article investigates the profound impact of artificial intelligence (AI) and big data on political and military deliberations concerning the decision to wage war. By conceptualising AI as part of a broader, interconnected technology ecosystem – encompassing data, connectivity, energy, compute capacity and workforce – the article introduces the notion of “architectures of AI” to describe the underlying infrastructure shaping contemporary security and sovereignty. It demonstrates how these architectures concentrate power within a select number of technology companies, which increasingly function as national security actors capable of influencing state decisions on the resort to force. The article identifies three critical factors that collectively alter the calculus of war: (i) the concentration of power across the architectures of AI, (ii) the diffusion of national security decision making, and (iii) the role of AI in shaping public opinion. It argues that, as technology companies amass unprecedented control over digital infrastructure and information flows, most nation states – particularly smaller or less technologically advanced ones – experience diminished autonomy in decisions to use force. The article specifically examines how technology companies can coerce, influence or incentivise the resort-to-force decision making of smaller states, thereby challenging traditional notions of state sovereignty and international security.
Since a few years, humanitarian non-governmental organisations (NGOs) are faced with increased insecurity in regions where armed conflicts prevail, such as in Afghanistan, Somalia or Sudan. An analysis of the NGOs’ reaction to this development based on 23 semi-structured interviews reveals that identity matters and plays a crucial role. On the one hand, for reasons related to their identity, addressing this insecurity proves challenging for NGOs, which is why they tend to shy away from taking steps in this direction. On the other hand, identity can facilitate organisational learning and help overcome organisational barriers related to it. In this respect identity allows NGOs to join security networks and cooperate across NGO boundaries, while at the same time using it as an indicator to distinguish between who they can trust and who therefore is part of the network and who is not.
More than 40 years after General Charles de Gaulle's historic decision to withdraw France from the integrated military branch of the Atlantic Alliance in 1966, Nicolas Sarkozy has decided to normalize France's NATO ties. Does this decision mark the abandonment of ‘Gaullism’? What will be the impact of France's reintegration and are we likely to see not only an institutional but also a political normalization of France's policies within the Alliance?
Russia’s unprovoked war on Ukraine has deteriorated the security environment in all neighbouring countries. Some of these countries are terrified of the risk of further Russian invasions while others express less fear of Russian hostile and unlawful actions. The aim of the paper is to outline the Kremlin’s narratives presented in Romanian and Bulgarian media and their impact on the security concerns of both countries. The paper argues that Russia uses media to spread narratives trying to reshape public opinion and to aggravate insecurity and distrust. The arguments are divided into the following parts: First, Romania’s and Bulgaria’s perceptions of Russia are analysed; second and third sections describe the Russian official rhetoric presented in the local media. The conclusion sums up the outcomes of both cases and the impact of the Kremlin’s narratives on Romania and Bulgaria.
Chapter 2 considers the state’s legal power in acquiring land and materials for construction and maintenance of public amenities, the management of the built environment in Rome and the activities of its inhabitants, the nature of urban life, and the provision and protection of amenities, such as corn, the water supply, baths, and games. The emperor assumed responsibility for the welfare of his people; this was his duty but was also politically important. The emperor provided for security and control in the city, sponsoring firemen (vigiles), urban cohorts, and praetorian guard under the command of officials with defined legal powers: prefects of the city, of the praetorians, and of the vigiles. Outside Rome: the management and status of communities in Italy, the organization of land and people, facilities including roads and bridges, important institutions in society, such as collegia and alimenta, and the legal jurisdiction of the praetorian prefect within Italy.
Preparing and filing taxes has become an increasingly digital task. Older adults need to file taxes to qualify for benefits, but little is known about how older adults in Canada manage tax preparation, nor about how they get help. We investigated delegation mechanisms provided by the Canada Revenue Agency, documenting workflows needed to set up delegation and identifying privacy and security risks. We conducted a semi-structured interview study (n = 19) with older adults, formal tax volunteers, and informal tax helpers to understand the challenges and experiences in tax delegation. Our results show that the CRA’s delegation mechanisms are lightweight and enable older adults to delegate tasks to others with minimal privacy and security risks. However, we found these lightweight mechanisms were not known about or used by the older adults who delegated to informal tax helpers, nor were they known about or used by any of the informal tax helpers we interviewed.
This essay aims to clarify the characteristics of the political theories of Montesquieu and Adam Smith by comparing their views on liberty. Montesquieu divides political liberty into two categories: “liberty in its relation with the constitution” and “liberty in relation to the citizens.” The former concerns the security of the governed in their relationship with those who govern, whereas the latter concerns the security of citizens and their property against infringements by other citizens. Smith concentrates on civil liberty and elaborates on Montesquieu’s framework to develop a more refined theory of the separation of powers. However, their views diverge on constitutional liberty. Montesquieu expects the nobility, as an intermediate group, to restrain sovereign despotism, whereas Smith emphasizes that this group historically threatened citizens’ security and valued the central government’s role in checking it. A comparison of their views deepens our understanding of the foundations of a free society.
Smith’s “luxury hypothesis” seems to assert that the endless violence of the feudal era ended with the appearance of luxury goods. This view holds that feudal lords had nothing to do with their wealth but to wage war—no other markets were available to them. As luxury goods became available, the lords dropped their weapons and disbanded their armies so that they could buy more luxury goods. The traditional account has causality going from the appearance of luxury goods to the lords disbanding their armies. On my approach, ubiquitous violence under feudalism implies that the causal logic in this account goes from the logic of violence to the gradual and sequential appearance of luxury goods to ending violence near the towns and cities, but not in the agrarian hinterland.
The fluidity of the continuum between colonization and sovereignty is particularly evident in the case of small islands generally and Pacific Island states specifically. Colonialism arrived late to much of the Pacific and was thus short-lived compared to other regions. Imperial powers also struggled to extend control beyond their administrative capitals. Yet newly independent states remain enmeshed in relations of dependence with metropolitan countries via Official Development Assistance and forms of “non-sovereignty” or “free association” with states such as the United States, UK, France, and New Zealand. These alternative forms of sovereignty reflect a century-long process of experimentation with political forms for island communities and demonstrate historical legacies and the ambiguity of sovereignty itself. To substantiate this claim, this chapter traces the history of the ways island communities in the North Pacific have been governed over more than a century.
The relationship between states and their militaries has long been a subject of social enquiry. Most nation-states have their origins in war, formed and reformed by external conflict and civil wars. Yet the military aspects of state power are intimately tied to all other aspects of state power in relation to its industrial, entrepreneurial and global dimensions. Having discussed the ways in which militaries shape and constrain transition pathways through innovation and their everyday conduct as well as the exercise of violence and war, the chapter explores potential to transform the military state arguing that at the heart of transforming the military state is the need to rethink security, possibly along the lines of ecological security. In conjunction with efforts to embed more ecological thinking in relation to security, a prerequisite for such a shift is a revisioning of the goal and purpose of the economy as proposed in Chapter 4, at least in richer countries in the first instance.