6 resultados para Treaties.

em Digital Commons at Florida International University


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Convention on Biodiversity (CBD) was created in 1992 to coordinate global governments to protect biological resources. The CBD has three goals: protection of biodiversity, achievement of sustainable use of biodiversity and facilitation of equitable sharing of the benefits of biological resources. The goal of protecting biological resources has remained both controversial and difficult to implement. This study focused more on the goal of biodiversity protection. The research was designed to examine how globally constructed environmental policies get adapted by national governments and then passed down to local levels where actual implementation takes place. Effectiveness of such policies depends on the extent of actual implementation at local levels. Therefore, compliance was divided and examined at three levels: global, national and local. The study then developed various criteria to measure compliance at these levels. Both qualitative and quantitative methods were used to analyze compliance and implementation. The study was guided by three questions broadly examining critical factors that most influence the implementation of biodiversity protection policies at the global, national and local levels. Findings show that despite an overall biodiversity deficit of 0.9 hectares per person, global compliance with the CBD goals is currently at 35%. Compliance is lowest at local levels at 14%, it is slightly better at national level at 50%, and much better at the international level 64%. Compliance appears higher at both national and international levels because compliance here is paper work based and policy formulation. If implementation at local levels continues to produce this low compliance, overall conservation outcomes can only get worse than what it is at present. There are numerous weaknesses and capacity challenges countries are yet to address in their plans. In order to increase local level compliance, the study recommends a set of robust policies that build local capacity, incentivize local resource owners, and implement biodiversity protection programs that are akin to local needs and aspirations.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Convention on Biodiversity (CBD) was created in 1992 to coordinate global governments to protect biological resources. The CBD has three goals: protection of biodiversity, achievement of sustainable use of biodiversity and facilitation of equitable sharing of the benefits of biological resources. The goal of protecting biological resources has remained both controversial and difficult to implement. This study focused more on the goal of biodiversity protection. The research was designed to examine how globally constructed environmental policies get adapted by national governments and then passed down to local levels where actual implementation takes place. Effectiveness of such policies depends on the extent of actual implementation at local levels. Therefore, compliance was divided and examined at three levels: global, national and local. The study then developed various criteria to measure compliance at these levels. Both qualitative and quantitative methods were used to analyze compliance and implementation. The study was guided by three questions broadly examining critical factors that most influence the implementation of biodiversity protection policies at the global, national and local levels. Findings show that despite an overall biodiversity deficit of 0.9 hectares per person, global compliance with the CBD goals is currently at 35%. Compliance is lowest at local levels at 14%, it is slightly better at national level at 50%, and much better at the international level 64%. Compliance appears higher at both national and international levels because compliance here is paper work based and policy formulation. If implementation at local levels continues to produce this low compliance, overall conservation outcomes can only get worse than what it is at present. There are numerous weaknesses and capacity challenges countries are yet to address in their plans. In order to increase local level compliance, the study recommends a set of robust policies that build local capacity, incentivize local resource owners, and implement biodiversity protection programs that are akin to local needs and aspirations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The North Atlantic Treaty Organization (NATO) is a product of the Cold War through which its members organized their military forces for the purpose of collective defense against the common threat of Soviet-backed aggression. Employing the terminology of regime theory, the creation of NATO can be viewed as the introduction of an international security regime. Throughout the Cold War, NATO member states preserved their commitment to mutual defense while increasingly engaging in activities aimed at overcoming the division of Europe and promoting regional stability. The end of the Cold War has served as the catalyst for a new period of regime change as the Alliance introduced elements of a collective security regime by expanding its mandate to address new security challenges and reorganizing both its political and military organizational structures. ^ This research involves an interpretive analysis of NATO's evolution applying ideal theoretical constructs associated with distinct approaches to regime analysis. The process of regime change is investigated over several periods throughout the history of the Alliance in an effort to understand the Alliance's changing commitment to collective security. This research involves a review of regime theory literature, consisting of an examination of primary source documentation, including official documents and treaties, as well as a review of numerous secondary sources. This review is organized around a typology of power-based, organization-based, and norm-based approaches to regime analysis. This dissertation argues that the process of regime change within NATO is best understood by examining factors associated with multiple theoretical constructs. Relevant factors provide insights into the practice of collective security among NATO member states within Europe, while accounting for the inability of the NATO allies to build on the experience gained within Europe to play a more central role in operations outside of this region. This research contributes to a greater understanding of the nature of international regimes and the process of regime change, while offering recommendations aimed at increasing NATO's viability as a source of greater security and more meaningful international cooperation.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation analyzes the obstacles against further cooperation in international economic relations. The first essay explains the gradual nature of trade liberalization. I show that existence of asymmetric information between governments provides a sufficient reason for gradualism to exist. Governments prefer starting small to reduce the cost of partner’s betrayal when there is sufficient degree of information asymmetry regarding the partner’s type. Learning about partner’s incentive structure enhances expectations, encouraging governments to increase their current level of cooperation. Specifically, the uninformed government’s subjective belief for the trading partner being good is improved as the partner acts cooperatively. This updated belief, in turn, lowers the subjective probability of future betrayal, enabling further progress in cooperation. The second essay analyzes the relationship between two countries facing two policy dilemmas in an environment with two way goods and capital flows. When issues are independent and countries are symmetric, signing separate agreements for tariffs (Free Trade Agreements-FTA) and for taxes (Tax Treaties-TT) provides the identical level of enforcement as signing a linked agreement. However, linkage can still improve the joint welfare by transferring the slack enforcement power in a case of asymmetric issues or countries. I report non-results in two cases where the policy issues are interconnected due to technological spillover effect of FDI. Moreover, I show that linking the agreements actually reduces enforcement when agreements are linked under a limited punishment rule and policy variables are strategic substitutes. The third essay investigates the welfare/enforcement consequences of linking trade and environmental agreements. In the standard literature, linking the agreements generate non-trivial results only when there is structural relation between the issues. I focus on institutional design of the linkage and show that even if environmental aspects of international trade are negligible linking the agreements might still have some interesting welfare implications under current GATT Rules. Specifically, when traded goods are substitutes in consumption, linking the environmental agreement with trade agreement under the Withdrawal of Equivalent Concession Rule (Article XXVIII) will reduce the enforcement. However, enforcement in environmental issue increases when the same rule is implemented in the absence of linkage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: (1) official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; (2) militarization rationales, budgets, and expenditures; and (3) case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-à-vis the relationship between US security and global security.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: 1., hyper militarization, 2., intimidation, 3., coercion, 4., criminalization, 5., panoptic surveillance, 6., plenary security measures, and 7., unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: 1., official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; 2., militarization rationales, budgets, and expenditures; and 3., case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-a-vis the relationship between US security and global security.