Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Hertie School  (43)
  • SB Königs Wusterhausen
  • SB Bernau bei Berlin
  • SB Putlitz
  • USA  (43)
Type of Medium
Language
Region
Access
  • 1
    UID:
    gbv_086143794
    Edition: Boulder, Colo NetLibrary Online-Ressource E-Books von NetLibrary
    ISBN: 1417552654 , 9781417552658 , 008047876X , 9780080478760
    Series Statement: EBSCOhost eBook Collection
    Content: Cover -- COVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR
    Note: Title from ebook title screen (viewed Nov. 9, 2004) , Includes bibliographical references and index , Made available through NetLibrary; access may be limited to NetLibrary affiliated libraries , CoverCOVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR. , Mode of access: World Wide Web.
    Additional Edition: ISBN 0121631052
    Additional Edition: Print version Investigating child exploitation and pornography
    Language: English
    Keywords: USA ; Kinderpornografie ; Verbreitung ; Internet ; Forensik ; USA ; Kinderpornografie ; Verbreitung ; Internet ; Forensik ; Electronic books. ; Electronic books ; Electronic books. ; Electronic books
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_086178725
    Format: xiv, 253 pages , 23 cm
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    ISBN: 1410611647
    Series Statement: EBSCOhost eBook Collection
    Note: Includes bibliographical references and indexes , Electronic reproduction, Boulder, Colo : NetLibrary, 2004
    Language: English
    Keywords: USA ; Bildungswesen ; Kommerzialisierung ; USA ; Bildungswesen ; Kommerzialisierung ; Electronic books. ; Electronic books. ; Aufsatzsammlung
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Oxford [England] : Oxford University Press
    UID:
    gbv_168213136X
    Format: Online-Ressource
    ISBN: 0195303989 , 0195158210 , 9780198035923 , 0198035926
    Content: "The American Dream" is one of the most familiar and resonant phrases in our national lexicon, so familiar that we seldom pause to ask its origin, its history, or what it actually means. In this fascinating short history, Jim Cullen explores the meaning of the American Dream, or rather the several American Dreams that have both reflected and shaped American identity from the Pilgrims to the present.
    Content: Intro -- Contents -- Introduction: A Dream Country -- CHAPTER 1 Dream of the Good Life (I): The Puritan Enterprise -- CHAPTER 2 Dream Charter: The Declaration of Independence -- CHAPTER 3 Dream of the Good Life (II): Upward Mobility -- CHAPTER 4 King of America: The Dream of Equality -- CHAPTER 5 Detached Houses: The Dream of Home Ownership -- CHAPTER 6 Dream of the Good Life (III): The Coast -- Conclusion: Extending the Dream -- Notes on Sources -- Acknowledgments -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Y.
    Note: Includes bibliographical references and index , Introduction: A dream country -- Dream of the good life (I) : the Puritan enterprise -- Dream charter : The declaration of independence -- Dream of the good life (II) : upward mobility -- King of America : the dream of equality -- Detached houses : the dream of home ownership -- Dream of the good life (III) : the coast -- Conclusion: Extending the dream , Introduction: A dream countryDream of the good life (I) : the Puritan enterprise -- Dream charter : The Declaration of Independence -- Dream of the good life (II) : upward mobility -- King of America : the dream of equality -- Detached houses : the dream of home ownership -- Dream of the good life (III) : the coast -- Conclusion: Extending the dream.
    Additional Edition: ISBN 9780195158212
    Language: English
    Subjects: History , American Studies
    RVK:
    RVK:
    RVK:
    Keywords: American dream ; Geschichte ; USA ; Lebensideal ; Selbstbild ; Geschichte ; American dream ; Geschichte ; USA ; Lebensideal ; Selbstbild ; Geschichte ; Electronic books ; Electronic books
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_08672553X
    Format: xiv, 160 pages , Illustrationen , 24 cm
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    ISBN: 0511062095 , 9780511062094 , 0511070551 , 9780511070556
    Series Statement: Political economy of institutions and decisions
    Content: A formal model of the appointment process -- Estimating monetary policy preferences -- Empirically testing the model's predictions -- Appointments to the European Central Bank -- The origins of the Federal Reserve appointment process -- Conclusions
    Content: This book attempts to answer three questions. Do politicians influence monetary policy via Fed appointments? Who influences the process - the President alone or both the President and the Senate? What explains the structure of the Fed appointment process?
    Note: Based on the author's thesis (doctoral)--Stanford University , Includes bibliographical references (p. 147-156) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2004 , A formal model of the appointment process -- Estimating monetary policy preferences -- Empirically testing the model's predictions -- Appointments to the European Central Bank -- The origins of the Federal Reserve appointment process -- Conclusions
    Additional Edition: ISBN 0511070551
    Additional Edition: ISBN 0511062095
    Additional Edition: ISBN 0521823331
    Additional Edition: Erscheint auch als Druck-Ausgabe Chang, Kelly H Appointing central bankers Cambridge, U.K. ; New York : Cambridge University Press, 2003
    Language: English
    Subjects: Economics
    RVK:
    RVK:
    RVK:
    Keywords: Europäische Union ; Geldpolitik ; USA ; Europäische Union ; Notenbank ; Politik ; Einfluss ; USA ; USA Government ; Bestellung ; Bankier ; Federal Reserve System Board of Governors ; Geldpolitik ; Ökonometrisches Modell ; Electronic books. ; Electronic books ; Electronic books. ; Electronic books ; Hochschulschrift
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book
    Book
    New York; N.Y. : Public Affairs
    UID:
    gbv_1611311462
    Format: XVI, 191 Seiten , Diagramme
    Edition: 1st ed.
    ISBN: 1586482254 , 1586483064 , 9781586483067
    Content: Joseph Nye coined the term "soft power" in the late 1980s. It is now used frequentlyand often incorrectlyby political leaders, editorial writers, and academics around the world. So what is soft power? Soft power lies in the ability to attract and persuade. Whereas hard powerthe ability to coercegrows out of a country's military or economic might, soft power arises from the attractiveness of a country's culture, political ideals, and policies. Hard power remains crucial in a world of states trying to guard their independence and of non-state groups willing to turn to violence. It forms the core of the Bush administration's new national security strategy. But according to Nye, the neo-conservatives who advise the president are making a major miscalculation: They focus too heavily on using America's military power to force other nations to do our will, and they pay too little heed to our soft power. It is soft power that will help prevent terrorists from recruiting supporters from among the moderate majority. And it is soft power that will help us deal with critical global issues that require multilateral cooperation among states. That is why it is so essential that America better understands and applies our soft power. This book is our guide.
    Note: Includes index
    Additional Edition: Erscheint auch als Online-Ausgabe Nye, Joseph S., 1937 - Soft power New York : PublicAffairs, 2009 ISBN 9781586483067
    Language: English
    Subjects: History , Political Science , Sociology
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: USA ; Außenpolitik ; Geschichte 2001-2003 ; Internationale Politik ; Geschichte 1989-2003 ; Macht ; Alternative ; USA ; Außenpolitik ; Geschichte 2001-2003 ; Internationale Politik ; Geschichte 1989-2003
    Author information: Nye, Joseph S. 1937-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Washington, D.C : Brookings Institution Press
    UID:
    gbv_086165348
    Format: viii, 402 pages , Illustrationenl , 25 cm
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    ISBN: 0815796560 , 9780815796565 , 0815701225 , 9780815701224 , 0815701233 , 9780815701231
    Series Statement: EBSCOhost eBook Collection
    Content: Introduction / Henry J. Aaron and Joel Slemrod -- The tax shelter battle / Joseph Bankman -- Issues of international tax enforcement / David R. Tillinghast -- Small business and the tax system / Joel Slemrod -- The Turbotax revolution : can technology solve tax complexity? / Austan Goolsbee -- Issues affecting low-income filers / Janet Holtzblatt and Janet McCubbin -- Tax preparers / Marsha Blumenthal and Charles Christian -- Carrots and sticks in enforcement / Frank Cowell -- Effects of tax simplification options : a quantitative analysis / William G. Gale and Jeffrey Rohaly -- Ultimate objectives for the IRS : balancing revenue and service / Alan H. Plumley and C. Eugene Steuerle -- Experience and innovations in other countries / Jeffrey Owens and Stuart Hamilton
    Content: Annotation "The chapters in this volume evaluate the capacity of authorities to enforce the tax laws in a modern, global economy and examine the implications of failing to do so. Specific aspects of tax law, including tax shelters, issues relating to small businesses, tax software, role of tax preparers, and the objectives of tax simplification are examined in detail." "The volume also builds a conceptual basis for future scholarship, with regard not only to tax administration, but also to such fundamental questions as whether taxpayers respond mostly to economic incentives or are influenced by their experiences with the filing process and what is the proper framework for evaluating the allocation of resources within the IRS."--BOOK JACKET. Title Summary field provided by Blackwell North America, Inc. All Rights Reserved
    Note: Papers presented at a conference jointly sponsored by the Brookings Institution and the Office of Tax Policy Research at the University of Michigan Business School , Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2004 , Introduction / Henry J. Aaron and Joel Slemrod -- The tax shelter battle / Joseph Bankman -- Issues of international tax enforcement / David R. Tillinghast -- Small business and the tax system / Joel Slemrod -- The Turbotax revolution : can technology solve tax complexity? / Austan Goolsbee -- Issues affecting low-income filers / Janet Holtzblatt and Janet McCubbin -- Tax preparers / Marsha Blumenthal and Charles Christian -- Carrots and sticks in enforcement / Frank Cowell -- Effects of tax simplification options : a quantitative analysis / William G. Gale and Jeffrey Rohaly -- Ultimate objectives for the IRS : balancing revenue and service / Alan H. Plumley and C. Eugene Steuerle -- Experience and innovations in other countries / Jeffrey Owens and Stuart Hamilton
    Language: English
    Keywords: USA ; Besteuerungsverfahren ; Steuerverwaltung ; USA Internal Revenue Service ; USA ; Besteuerungsverfahren ; Steuerverwaltung ; USA Internal Revenue Service ; Electronic books. ; Electronic books. ; Electronic books ; Aufsatzsammlung
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Author information: Aaron, Henry J. 1936-
    Author information: Slemrod, Joel 1951-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cambridge, Mass : MIT
    UID:
    gbv_086547925
    Format: xl, 320 pages , 24 cm
    Edition: Boulder, Colo NetLibrary 2001 Online-Ressource E-Books von NetLibrary
    ISBN: 0585379971 , 9780585379975
    Series Statement: EBSCOhost eBook Collection
    Content: In American Foundations , Mark Dowie argues that organized philanthropy is on the verge of an evolutionary shift that will transform America's nearly 50,000 foundations from covert arbiters of knowledge and culture to overt mediators of public policy and aggressive creators of new orthodoxy. He questions the wisdom of placing so much power at the disposal of nondemocratic institutions. As American wealth expands, old foundations such as Ford, Carnegie, Rockefeller, Pew, and MacArthur have grown exponentially, while newer trusts such as Mott, Johnson, Packard, Kellogg, Hughes, Annenberg, Hewlett, Duke, and Gates have surpassed them. Foundation assets now total close to $400 billion. Though this is a tiny sum compared to corporate and government treasuries, and foundation grants still total less than 10 percent of contributions made by individuals, foundations have power and influence far beyond their wealth. Their influence derives from the conditional nature of their grant making, their power from its leverage. Unlike previous historians of philanthropy who have focused primarily on the grant maker, Dowie examines foundations from the public's perspective. He focuses on eight key areas in which foundations operate: education, science, health, environment, food, energy, art, and human services. He also looks at their imagination, or lack thereof, and at the strained relationship between American foundations and American democracy. Dowie believes that foundations deserve to exist and that they can assume an increasingly vital role in American society, but only if they transform themselves from private to essentially public institutions. The reforms he proposes to make foundations more responsive to pressing social problems and more accountable to the public will almost certainly start an important national debate
    Note: Includes bibliographical references (p. 289-302) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2001
    Additional Edition: ISBN 0262041898
    Additional Edition: Print version American foundations
    Language: English
    Keywords: USA ; Stiftung ; Fürsorge ; Geschichte ; USA ; Stiftung ; Fürsorge ; Geschichte ; Electronic books. ; Electronic books ; Electronic books. ; Electronic books
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Book
    Book
    New York, NY : Tim Duggan Books
    UID:
    gbv_1018028811
    Format: 359 Seiten , Illustrationen, Karten
    Edition: First edition, first paperback edition
    ISBN: 9780525574460 , 9780525575405 , 9780525574477
    Content: Inhaltsverzeichnis: Prologue -- Individualism or totalitarianism -- Succession or failure -- Integration or empire -- Novelty or eternity -- Truth or lies -- Equality or oligarchy -- Epilogue.
    Content: "From the author of On Tyranny comes a stunning new chronicle of the rise of authoritarianism from Russia to Europe and America. With the end of the Cold War, the victory of liberal democracy was thought to be final. Observers declared the end of history, confident in a peaceful, globalized future. This faith was misplaced. Authoritarianism returned to Russia, as Putin found fascist ideas that could be used to justify rule by the wealthy. In the 2010s, it has spread from east to west, aided by Russian warfare in Ukraine and cyberwar and information war in Europe and the United States. Russia found allies among nationalists, oligarchs, and radicals everywhere, and its drive to dissolve Western institutions, states, and values found resonance within the West itself. The rise of populism, the British vote against the EU, and the election of Donald Trump were all Russian goals, but their achievement reveals the vulnerability of Western societies and the uncertain character of Western political order. This fundamental challenge to democracy presents an opportunity to better understand the pillars of our own political order. In this forceful and unsparing work of contemporary history, based on vast research as well as personal reporting, Snyder goes beyond the headlines to expose the true nature of the threat to democracy and law. By revealing the stark choices before us--between equality or oligarchy, individuality or totality, truth and falsehood--Snyder restores our understanding of the basis of our way of life, offering a way forward in a time of terrible uncertainty"-- Provided by publisher
    Note: Hier auch später erschienene, unveränderte Nachdrucke , Includes bibliographical references , Inhaltsbeschreibung: Prologue -- Individualism or totalitarianism -- Succession or failure -- Integration or empire -- Novelty or eternity -- Truth or lies -- Equality or oligarchy -- Epilogue
    Additional Edition: ISBN 9780525574484
    Additional Edition: Erscheint auch als Online-Ausgabe Snyder, Timothy, author Road to unfreedom New York, NY : Tim Duggan Books, [2018]
    Language: English
    Subjects: History , Political Science
    RVK:
    RVK:
    Keywords: Russland ; Europa ; USA ; Autoritärer Staat ; Unfreiheit ; Außenpolitik ; Geschichte 2010-2018
    Author information: Snyder, Timothy 1969-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    Houndmills, Basingstoke, Hampshire : Palgrave Macmillan
    UID:
    gbv_816610614
    Format: XV, 286 S. , graph. Darst.
    ISBN: 9780230224087
    Series Statement: New security challenges
    Content: "This book examines the evidence for the theory that there are fundamental differences between American and European public attitudes about the acceptability of military force. Philip Everts and Pierangelo Isernia show that Americans and Europeans share similar attitudes on international affairs but do indeed differ considerably on the issue of military force. This became evident in a number of recent cases of international conflict and military interventions, such as the war over Kosovo just before the millennium, as well as the military actions in the fight against international terrorism in Afghanistan and Iraq. Using new data Everts and Isernia chart and explain these attitudes and their determinants. Public Opinion, Transatlantic Relations and the Use of Force takes a deliberately comparative and transatlantic perspective in exploring the sources of these differences and in discussing the political implications of the transatlantic gap on the use of force, as well as in its assessment of the conditions under which it could be bridged or might be aggravated"--
    Content: "This book examines the evidence for the theory that there are fundamental differences between American and European public attitudes about the acceptability of military force. Philip Everts and Pierangelo Isernia show that Americans and Europeans share similar attitudes on international affairs but do indeed differ considerably on the issue of military force. This became evident in a number of recent cases of international conflict and military interventions, such as the war over Kosovo just before the millennium, as well as the military actions in the fight against international terrorism in Afghanistan and Iraq. Using new data Everts and Isernia chart and explain these attitudes and their determinants. Public Opinion, Transatlantic Relations and the Use of Force takes a deliberately comparative and transatlantic perspective in exploring the sources of these differences and in discussing the political implications of the transatlantic gap on the use of force, as well as in its assessment of the conditions under which it could be bridged or might be aggravated"--
    Note: Machine generated contents note:PART I: THE TRANSATLANTIC ORDER, PUBLIC OPINION AND THE USE OF MILITARY FORCE1. Introduction 2. Theoretical Issues and Empirical Problems PART II: BELIEFS, SITUATIONS AND TIME IN WAR 3. Partners Apart? The Foreign Policy Beliefs of the American and European Publics 4. The Nature and Structure of the Transatlantic Divide 5. Explaining the Evolution of Attitudes on War: Afghanistan, Iraq and Kosovo 6. The Determinants of Support for the Use of Force PART III: THE FUTURE OF THE TRANSATLANTIC RELATIONSHIP 7. Conclusions: An Agenda for Future Crises.
    Language: English
    Keywords: USA ; Europäische Union ; Bewaffneter Konflikt ; Öffentliche Meinung ; Politische Entscheidung
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_1767214413
    Format: xv, 405 Seiten , Illustrationen, Diagramme
    ISBN: 9780691147130
    Content: Spying has never been more ubiquitous – or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.
    Note: Literaturverzeichnis: Seite 379-391 , Enthält ein Register , Intelligence challenges in the digital age : cloaks, daggers, and tweets -- The education crisis : how fictional spies are shaping public opinion and intelligence policy -- American intelligence history at a glance : from fake bakeries to armed drones -- Intelligence basics : knowns and unknowns -- Why analysis is so hard : the seven deadly biases -- Counterintelligence : to catch a spy -- Covert action : "a hard business of agonizing choices" -- Congressional oversight : eyes on spies -- Intelligence isn't just for governments anymore : nuclear sleuthing in a Google earth world -- Decoding cyber threats.
    Additional Edition: ISBN 9780691223087
    Additional Edition: Erscheint auch als Online-Ausgabe Zegart, Amy B., 1967 - Spies, lies, and algorithms Princeton : Princeton University Press, 2022 ISBN 9780691223087
    Language: English
    Keywords: USA ; Geheimdienst ; Spionage ; Spionageabwehr ; Digitalisierung ; Geschichte 1781-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages