MEMORANDUM OF UNDERSTANDING

Size: px
Start display at page:

Download "MEMORANDUM OF UNDERSTANDING"

Transcription

1 European Cooperation in the field of Scientific and Technical Research - COST - Secretariat Brussels, 7 January 2004 COST 205/04 MEMORANDUM OF UNDERSTANDING Subject : Memorandum of Understanding for the implementation of a European concerted Research Action designated as COST Action A24 "The Evolving Social Construction of Threats" Attached is the text of the abovementioned Memorandum of Understanding signed in Brussels on 20 November 2003 by Belgium, Denmark, Finland, Lithuania and the United Kingdom. COST 205/04 dm 1 C EN

2 MEMORANDUM OF UNDERSTANDING FOR THE IMPLEMENTATION OF A EUROPEAN CONCERTED RESEARCH ACTION DESIGNATED AS COST ACTION A24 "THE EVOLVING SOCIAL CONSTRUCTION OF THREATS" The Signatories to this Memorandum of Understanding, declaring their common intention to participate in the concerted Action referred to above and described in the Technical Annex to the Memorandum, have reached the following understanding: 1. The Action will be carried out in accordance with the provisions of document COST 400/01 "Rules and Procedures for Implementing COST Actions", the contents of which the Signatories are fully aware of. 2. The main objective of the Action is to improve current understandings of the social construction of threats and thereby increase the usefulness of such understandings for policy formulation. 3. The economic dimension of the activities carried out under the Action has been estimated, on the basis of information available during the planning of the Action, at 5.2 million in 2003 prices. 4. The Memorandum of Understanding will take effect by being signed by at least five Signatories. 5. The Memorandum of Understanding will remain in force for a period of four years, calculated from the date of first meeting of the Management Committee, unless the duration of the Action is modified according to the provisions of Chapter 6 of the document referred to in Point 1 above. COST 205/04 dm 2 C EN

3 TECHNICAL ANNEX COST ACTION A24 THE EVOLVING SOCIAL CONSTRUCTION OF THREATS A. BACKGROUND Threats are not givens that we all automatically recognise and identify as such. Even in situations where it would be reasonable to assume that we know an elephant when we see one, we do not automatically know whether it is a threat to us. Events cannot constitute themselves as threats: they must be understood as such. Such an understanding is, however, not something subjective. For the way in which events are understood as threats is influenced by past histories and the lessons drawn by the contending parties 1, by their respective belief systems 2, indeed by the common sense of the respective actors 3 which might, or might not, coincide. In other words, the way events appear as threats to us is the result of a social construction. Usually there are competing threat constructions. The peace-movements spent much of the cold war trying to advance alternative bases for understanding the enemy. This was done both by producing alternative data about it and by telling us in so many words that Russians love their children too, i.e. by countering the tendency to make the other appear as necessarily irrational or non-human Yuen Fong Khong, Analogies at War: Korea, Munich, Dien Bien Phu, and the Vietnam Decisions of 1965 (Princeton: Princeton University Press, 1992). Richard Little and Steve Smith (eds), Belief Systems and International Relations (Oxford: Basil Blackwell, 1988). Jutta Weldes, Constructing National Interests: The United States and the Cuban Missile Crisis (Minneapolis: University of Minnesota Press, 1999). COST 205/04 dm 1

4 For threats and enmity could be the result of behaviour-patterns, which, in turn, produce selffulfilling prophecies: if we all believe we are in a jungle and act accordingly, the world will look like one. 1 This implied that there are some conflict dynamics which could have been avoided through a better reflection on threat and enemy constructions. More recently, politically difficult decisions about whether or not to intervene in a long series of conflicts (viz. Afghanistan, Bosnia, Chechnya, DRC, Iraq, Kosovo, Algeria, Rwanda, Somalia, etc.) have kept us painfully aware that one man s terrorist is another s freedom fighter and that it is of utmost importance for the development of conflicts, how events are framed and understood. The basic notion that security cannot be reduced to objective or subjective threats alone is neither complicated nor particularly new. 2 However, over the past decade, the constructivist turn 3 resulted in a spectacular growth in studies which explore various aspects of how threats are constructed, how these constructions are sustained, what their implications are and how they might be altered Stefano Guzzini, 'The Cold War is what we make of it': when peace research meets constructivism in International Relations, in Stefano Guzzini and Dietrich Jung (eds), Copenhagen peace research: conceptual innovation and contemporary security analysis (London, New York: Routledge, 2003 forthcom.); Heikki Patomäki, The Challenge of Critical Theories: Peace Research at the Start of the New Century, Journal of Peace Research, 38 (2001), pp Arnold Wolfers, Discord and Collaboration: Essays on International Politics (Baltimore, London: The Johns Hopkins University Press, 1962). For review articles, see e.g. Jeffrey T. Checkel, The Constructivist T urn in International Relation s Theory, World Politics, 50 (1998), pp , Ted Hopf, The Promise of Constructivism in International Relations Theory, International Security, 23 (1998), pp and Emanuel Adler, Constructivism and International Relations, in Walter Carlsnaes, Thomas Risse, and Beth A. Simmons (eds), Handbook of International Relations (London: Sage, 2002), pp For original statements, see e.g. Alexander Wendt, Constructing International Politics, International Security, (1995), pp ; Emanuel Adler, Seizing the Middle Ground: Constructivism in World Politics, European Journal of International Relations, 3 (1997), pp ; Stefano Guzzini, A reconstruction of constructivism in International Relation s, European Journal of International Relations, 6 (2000), pp For the use of constructivism in security studies or foreign policy analysis, see e.g. Didier Bigo, Grands Débats dans un Petit Monde. Les débats en relations internationales et leur lien avec le monde de la sécurité, Culture et Conflits, 2 (1996), pp. 7-41; Didier Bigo, Polices en Réseaux. L'Experience Européenne (Paris: Presses d e Sciences Po, 199 6); Barry Buzan, Ole Wæver, and Jaap de Wilde, Security. A New Framework for Analysis (Boulder, London: Lynne Rienner, 1998); Peter Katzenstein (ed.), The Culture of National Security. Norms and Identity in World Politics (New York: Columbia University Press, 19 96); Bill M csweeney, Security, Identity and Interests: A Sociology of International Relations, ed. Steve Smith, Cambridge Studies in International Relations (Cambridge: Cambridge University Press, 1999); Jutta Weldes and others, Constructing Insecurity, in Jutta Weldes, Hugh Gusterso n, and Raymond Duvall (eds), Cultures of Insecurity: States, Communities, and the Production of Danger (1996), pp. 65; Jutta Weldes and Diana Saco, Making State Action Possible: The U.S. and the Discursive Construction of 'the Cuban Problem', , in Jutta Weldes, Hugh Gusterson, and Raymond Duvall (eds), Cultures of Insecurity: States, Communities, and the Production of Danger (1996). COST 205/04 dm 2

5 As is often the case, sensibilities differ in the various research communities. A distinction is usually drawn between US and European constructivism, where the US approaches are considered less oriented towards ethics and more rationalist, something which has contributed to the move of some US constructivists to European shores (Checkel, Weldes). Within the so-called European school, there is e.g. the English school which is at times close to constructivism 1 and a Copenhagen School of security studies which has focused on the conditions and effects of securitising particular issues. 2 There has also been a Canadian component in the Critical Security Studies approach, again from scholars now working in Europe. 3 But these distinctions tend to overstate the coherence of while understating the links between the different so-called schools. It is certainly more interesting and helpful to insist on the different versions of constructivism as a guide through this multi-faceted work. This is no place to undertake that kind of tour d horizon, suffice it to say that the major divisions are between those more interested in the micro-foundations of constructivism 4 and more holist/structuralist approaches 5, between sociologically and linguistically oriented approaches. Finally there are divisions according to the kind of construction that is of prime interest Timothy Dunne, The social construction of international society, European Journal of International Relations, 1 (1995), pp ; Hidemi Suganami, Alexander Wendt and the English School, Journal of International Relations and Development, 4 (2001). Barry Buzan, People, States and Fear: An Agenda for International Security Studies in the Post-Cold War Era, 2nd ed. (New York at al: Harvester Wheatsheaf, 1991 ); Ole Wæver and others (eds), Identity, Migration and the New Security Agenda in Europe (London: Pinter, 1993); Ole Wæver, Power, Principles and Perspectivism: Understanding Peaceful Change in Post- Cold War Europe, in Heikki Patomäki (ed.), Peaceful Changes in World Politics (Tampere: Tampere Peace Research Institute, 19 95), pp ; Barry Buzan, Ole Wæver, and Jaap de Wilde, Security: A New Framework for Analysis (Boulder: Lynne Rienner, 1998). For a discussion, see Jef Huysmans, Revisiting Copenhagen, or: on the creative development of a security studies agenda in Europe, European Journal of International Relations, 4 (1998), pp Keith Krause and Michael C. Williams (eds), Critical Security Studies: Concepts and Cases (London: UCL Press, 1997), working in Geneva and Aberystwyth respectively. See e.g. Alistair Ian Johnston, Treating International Institutions as Social Environments, International Studies Quarterly, (2001), pp See e.g. Alexander Wendt, Social Theory of International Politics (Cambridge: Cam bridge University Press, 1999). COST 205/04 dm 3

6 This multifaceted quality of work on the social construction of threats makes a COST Action on the topic attractive and appropriate. As the existence of multiple schools and divisions signals, there are researchers across Europe working along constructivist lines (some of them with EU financing). However, there is certainly scope for a project that has the ambition to facilitate communication and the exchange of ideas among these research communities. The fact that scholars come to the same research project from different perspectives is per se promising for exchange. It means that there can be real and beneficial exchange (and disagreement) on the research programme. Moreover, to strive to have such an exchange is especially important as the research programmes are still in their early phases and the normal channels of communication therefore do not work very well. Since the work is ongoing, a large part has not yet been published in specialised journals or books and is available only in the form of manuscripts, working papers and conference communications which are inherently more limited in their reach. The flexible and open structure of a COST Action is very well suited. It allows institutions and scholars to declare interest and hence facilitates co-operation among groups of scholars who do not know about each other as well as the engagement of scholars who are generally less visible in international conferences and publications for a variety of reasons and not least under-funding of universities. There is indeed a strong demand for this kind of network collaboration among researchers, not least in Central and Eastern Europe. B. OBJECTIVES AND BENEFITS The main objective of the Action is to improve current understandings of the social construction of threats and thereby increase the usefulness of such understandings for policy formulation. The Action aims at developing better tools of analysis and to facilitate communication between the world of academia and the world of policy-makers. This ought to make us better prepared for dealing with questions about how threats are constructed, why they are constructed differently in different places, and the implication of these differences for war and peace. COST 205/04 dm 4

7 The importance of this task has increased dramatically since September 11, Indeed, in the wake of 9/11 there has been a marked shift in the focus of political debates (nationally and internationally) towards security issues. The war against terrorism and the related policing and military actions give a particularly urgent touch to questions about how threats are constructed, why they are constructed differently in different places, and the implication of these differences for war and peace. The Action cannot, of course, pretend to directly influence or alter events taking place now (or in the future). However, it can aim at developing better tools of analysis and to facilitate communication between the world of academia and the world of policy-makers, both of which ought to make us better prepared for dealing with similar situations in the future. In concrete terms, the aim of the Action is to establish a durable network of scholars that should be useful for such development in the long term. The Action will hold a series of workshops and conferences, the proceedings of which will be published either in special issues of journals or in the form of edited volumes. The Action will also provide support for participants who directly take part in the public debate in their own context. C. SCIENTIFIC PROGRAMME The overall focus of the Action is on the social construction of threats. However, this is clearly a very broad field that needs to be narrowed down. Moreover, it is a field where there has often been a sharp division between those working on theory and those working on applied studies, and this should not be reproduced in this COST Action. A COST Conference and a related workshop held in Copenhagen (September 3 and 4, 2002) took a step in the direction of identifying unresolved problems and new topics within the research area. In continuation of this, the Action will be organised around three central questions and three topics. All of these can be approached and answered from different constructivist perspectives and they constitute useful points of departure for the kinds of exchanges that would be promoted in this COST Action. COST 205/04 dm 5

8 The questions: 1. Who defines a threat? Not everyone has an equal right or possibility to define what a threat is and usually there are competing understandings of what constitutes a threat and which threat is to be taken more seriously. This is part and parcel of political debate. There is hence a sociological question about who can take part in the discussions about the definition of threats. Additionally, there is a question about the production of the facts on the basis of which such political debates are won and lost. Statistics, images, expert statements, and quotations from those involved in a conflict are crucial for deciding whether something is a threat or not as well as how to react to it. This opens a whole range of questions about how facts are produced and what the effect is. It becomes crucial to get a grasp of how and why facts are produced as they are by the media which transmits and selects images and quotes, by the army, police or research institutions which produce the statistics and by the expert who makes informed statements. By way of example: How does the increased reliance on private companies for military, policing and surveillance influence our understanding of threats and the authority of different actors to express themselves on the topic? Are new forms of (public) co-operation, legal foundations and European policies related to the co-operation between the military, the police, the intelligence services and other organisations mobilised to counteract the new threats also partially responsible for producing those threats? What facts are produced by new technologies of identification, surveillance and control (such as the visa regime, extradition agreements, or police co-operation? Finally, threat construction is usually embedded in a wider security imaginary (Weldes) in which the central lessons of history are deposited and which is mobilised in our understanding of conflicts. What are the (gender, religion, nationalist etc) bias transmitted through our tradition of thought and influential in expert statements and interpretations of conflicts, crisis and strategies? COST 205/04 dm 6

9 2. How are threat conceptions sustained? Threat construction matters particularly more when it becomes politically influential, when action is taken on the basis of a threat be it in reaction to an understanding that 9/11 constitutes Iraq as a main threat or to the understanding that immigration is a major threat to social stability. It is hence important to ask not only who produces threats and how, but also how this construction becomes politically salient and how specific strategies to counter threats are produced. This entails asking questions about who adopts what reading, how they manage to impose it politically and why they choose the response they do to counter it. In this process linguistically oriented constructivists would emphasise the importance of metaphors and discourses which mobilise collective understandings about their own (social, national or individual) identity, about politics, and about priorities among different values. For example, one might look at the way metaphors drawing on the Second World War (Hitler or holocaust analogies) are used to mobilise support for specific threat constructions. More sociologically oriented constructivists would emphasise the role of different forms of capital (including social, political and cultural capital) in explaining the strategies for imposing certain threat constructions as well as the effectiveness of these strategies. For instance, one might ask what strategies different factions of the defence establishment are pursuing and why the strategy of a specific faction is more influential in the construction of a threat and in the production of a strategy to respond to it. 3. Whose threats are responded to? Finally, it is important to open up to the broader picture. Threats are constructed and sustained in a context. Focussing on how and why threats are constructed and sustained, it is easy to forget that by the same token alternative understandings and strategies are marginalised. Not all threats are responded to and not all strategies are followed and it clearly has profound implications whose threats are and whose threats are not. For example, to what extent is the establishment of terrorism as the major threat and the related development of surveillance techniques and redirection of security forces overshadowing other conceptions of threats or delegitimising other threat conceptions (e.g. threats to the individual rights of Muslims or asylum seekers)? And in relation to this to what extent do threat constructions in one area (e.g. terrorism) feed into the constitution of threats and understanding of security in other areas (e.g. organised crime). COST 205/04 dm 7

10 The topics: These questions are very broad and can be applied to any threat construction. Hence in order to facilitate the discussion among the participants in the COST Action, the focus of the discussion will be on specific topics. The topics presented below are selected on the grounds that they play a key role in present political debate and that (consequently) research is well underway in most European countries. 1. Proliferation of weapons of mass destruction The US plans to build a missile defence have actualised the risks related to nuclear proliferation. The Cold War left a legacy of nuclear scientists without employment and nuclear weapons and materials, which have greatly increased the risk of nuclear proliferation. The recent example of North Korea being on its way to develop nuclear weapons and having access to weapon grade plutonium is a case in point. Yet, on the other hand, proliferation has happened during the entire Cold War without necessarily undermining international security. Indeed, some researchers thought that controlled proliferation of second strike capacities would enhance international security by making its owners more prudent in international affairs. 1 Thinking in the terms just outlined above about the proliferation of weapons of mass destruction means asking questions such as: How is the threat of nuclear proliferation produced and by whom? What is the role of security institutions in crisis in producing and disseminating this information? Is Europe just taking over American images of emerging threats? How is this threat made convincing in political debates at different levels (national, international)? Which lessons of history are mobilised, whether consciously or not, in the threat construction or non-construction? Why are some countries singled out as threatening (North Korea) and not others (Israel)? What other threats are overshadowed in the process? 1 See most prominently the writings by Kenneth N. Waltz, The Stability of a Bipolar World, Dædalus, 43 (1964 ), pp ; Kenneth N. Waltz, Theory of International Politics (Reading : Addison -Wesley, 1 979). COST 205/04 dm 8

11 2. Terrorism Since 9/11 the topic tops both political and research agendas. As expressed at the COST seminar, terrorism has traditionally not been a major focus in the academic community. This is not the case any more, and a number of research projects are also under way in EU member countries. The intention of this scientific programme is not to redo these efforts, but rather to facilitate a constructivist exchange on the phenomenon. There are obvious questions about who gets branded terrorist by whom, how that branding comes to shape politics and what the effect of this branding is. And it is of course particularly interesting to think more about the shift in European public statements and practice on terrorism following 9/11 as most EU member states have long lived with terrorist threats and acts. 3. The privatisation of security In the course of the past decade we have seen a privatisation of security. Private or parastate companies provide an increasing share of the security services both at home (policing) and abroad (army operations). Moreover, in many parts of the world it is not only about outsourcing to private companies but also about control over security sliding out of state hands into private hands: this is an essential feature of most contemporary new wars. In many quarters there is hence heated debate about the implications of this privatisation of security as well as about whether privatisation is actually taking place in the first place. It is into this debate that the COST Action will tap. Asking questions about how the idea of privatised security (or a specific aspect of it) is construed as a threat and by whom; how that idea is sustained (or not) in politics; and what implications it has for actual strategies. Summary: The scientific programme is summarised in the matrix below. Participants will be encouraged to deal with all of the three questions raised with regard to their topic, but it will clearly be expected that participants will place different emphasis on them. At this stage it cannot be predicted what their answers will be, hence the empty matrix boxes. The aim of the COST Action would be to promote discussion on what should fill each of the empty boxes, but also to discuss the set up itself as well as the link between the different questions and topics. COST 205/04 dm 9

12 1 Scientific Programme Who defines a threat? How are threat conceptions sustained? Whose threats are responded to? Nuclear Proliferation Terrorism Privatisation of Security D. ORGANISATION The Action will be guided by the usual COST structure with a management committee, working groups and general conferences. The Management Committee. Working groups on each topic, hence: Working Group 1: Proliferation of weapons of mass destruction Working Group 2: Terrorism Working Group 3: The privatisation of security An introductory meeting and three general conferences will be organised. A website will be run throughout the Action, providing both general information about the topic (bibliographical references, link to related web-sites and information about related conferences and current publications) and activity about the Action specifically. E. TIMETABLE The Action will have a duration of four years. The Management Committee will meet once a year, with the first meeting initiating the actual work plan. There will be an extra meeting of the management committee in connection with the conferences. COST 205/04 dm 10

13 The Working Groups will meet once every year during the Action (in connection with a general seminar/conference). In the first year an introductory plenary meeting will be a central part of this meeting. This meeting should serve the purpose of having an exchange with all participants in the Action on the set up of the Action as well as on the concepts and methods that are to be used in it. In the last year a similar concluding plenary meeting will be organised. This could be of great advantage (but not indispensable) if the working groups could meet in parallel during years 2 and 3 so as to ensure cross cutting synergies. General conferences will be held in years 2 and 3, and a final conference concluding the Action will be held in year 4. This set up is tentative. An introductory plenary meeting has been planned precisely with the intent of getting responses and ideas from the participants and hence the set up will be altered if there seems to be good reason for doing so. Moreover, since the topics are highly dynamic, it is foreseen that there may be reason to alter the frequency of working group meetings or general conferences. This said the tentative plan is as follows: 2 Time Table Year 1 Year 2 Year 3 Year 4 Management Committee meeting Management Committee Meetings Management Committee meetings Management Committee meetings Introductory plenary meeting Working Groups 1-3 Working Groups 1-3 Concluding plenary meeting Meetings meetings General Conference General Conference Final Conference COST 205/04 dm 11

14 F. ECONOMIC DIMENSION The following COST countries have actively participated in the preparation of the Action or otherwise indicated their interest: Researchers from the following countries have expressed their interests in participating in the Action: Belgium, Bulgaria, Czech Republic, Denmark, Estonia, Finland, France, Former Yugoslav Republic of Macedonia, Germany, Hungary, Italy, Lithuania, Norway, Poland, Russia, Slovenia, Sweden, Turkey, and the UK (see enclosed list). On the basis of national estimates provided by the representatives of these countries, the economic dimension of the activities to be carried out under the Action has been estimated, in 2003 prices, at roughly Euro 5.2 million. This estimate is valid under the assumption that all the countries mentioned above but no other countries will participate in the Action. Any departure from this will change the total cost accordingly. G. DISSEMINATION PLAN Results of the Action will be disseminated in three directions: First, in the direction of the community of researchers. This is an important way of disseminating results of research. Through their teaching, advisory media, and conferencing activities researchers are among the most significant carriers of information in their respective communities. Outside the network itself the community of researchers will be addressed by publications (in the form of special issues of international journals and edited books). COST 205/04 dm 12

15 Second, the Action aims at disseminating results in the direction of a variety of national policy making communities. Indeed, the network has been deliberately set up to cover research communities from a large share of the European states (and will enlarge it further if there is interest) with the intention of facilitating communication not only between national research communities but also to reach the political debates in the different countries. The channels to these debates is fairly direct as researchers are very often involved in ongoing political debates in different ways (advisory activities, media debates, framing of parliamentary research activities, NGO related work). Finally, particular effort will be made to draw Central European research communities into the Action. It is seen as one of the more important aims of the network to lay the ground for regular research exchanges and also for facilitating a common understanding of political debates in the new and old EU member states on issues of security. This integration will be made a priority and a number of the meetings and conferences ought to be organised in Central and/or Eastern Europe. COST 205/04 dm 13

COMMISSION OF THE EUROPEAN COMMUNITIES REPORT FROM THE COMMISSION

COMMISSION OF THE EUROPEAN COMMUNITIES REPORT FROM THE COMMISSION COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 6.11.2007 COM(2007) 681 final REPORT FROM THE COMMISSION based on Article 11 of the Council Framework Decision of 13 June 2002 on combating terrorism {SEC(2007)

More information

ANNEXES. to the REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

ANNEXES. to the REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL EUROPEAN COMMISSION Brussels, 18.7.2018 COM(2018) 543 final ANNEXES 1 to 4 ANNEXES to the REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Update on the implementation of the remaining

More information

Migration Report Central conclusions

Migration Report Central conclusions Migration Report 2013 Central conclusions 2 Migration Report 2013 - Central conclusions Migration Report 2013 Central conclusions The Federal Government s Migration Report aims to provide a foundation

More information

2nd Ministerial Conference of the Prague Process Action Plan

2nd Ministerial Conference of the Prague Process Action Plan English version 2nd Ministerial Conference of the Prague Process Action Plan 2012-2016 Introduction We, the Ministers responsible for migration and migration-related matters from Albania, Armenia, Austria,

More information

Asylum in the EU28 Large increase to almost asylum applicants registered in the EU28 in 2013 Largest group from Syria

Asylum in the EU28 Large increase to almost asylum applicants registered in the EU28 in 2013 Largest group from Syria STAT/14/46 24 March 2014 Asylum in the EU28 Large increase to almost 435 000 asylum applicants registered in the EU28 in 2013 Largest group from Syria In 2013, 435 000 asylum applicants 1 were registered

More information

ASYLUM IN THE EU Source: Eurostat 4/6/2013, unless otherwise indicated ASYLUM APPLICATIONS IN THE EU27

ASYLUM IN THE EU Source: Eurostat 4/6/2013, unless otherwise indicated ASYLUM APPLICATIONS IN THE EU27 ASYLUM IN THE EU Source: Eurostat 4/6/2013, unless otherwise indicated ASYLUM APPLICATIONS IN THE EU27 Total number of asylum applications in 2012 335 365 450 000 400 000 350 000 300 000 250 000 200 000

More information

European Neighbourhood Policy

European Neighbourhood Policy European Neighbourhood Policy Page 1 European Neighbourhood Policy Introduction The EU s expansion from 15 to 27 members has led to the development during the last five years of a new framework for closer

More information

NATO S ENLARGEMENT POLICY IN THE POST-COLD WAR ERA

NATO S ENLARGEMENT POLICY IN THE POST-COLD WAR ERA IN THE POST-COLD WAR ERA The purpose of this article is not to address every aspect of the change taking place in NATO but rather to focus on the enlargement and globalization policy of NATO, which is

More information

Migration Report Central conclusions

Migration Report Central conclusions Migration Report 2012 Central conclusions 2 Migration Report 2012: Central conclusions Migration Report 2012 Central conclusions The Federal Government s Migration Report aims to provide a foundation for

More information

NOTE from : Governing Board of the European Police College Article 36 Committee/COREPER/Council Subject : CEPOL annual work programme for 2002

NOTE from : Governing Board of the European Police College Article 36 Committee/COREPER/Council Subject : CEPOL annual work programme for 2002 COUNCIL OF THE EUROPEAN UNION Brussels, 19 October 2001 (09.11) (OR. fr,en) 12871/01 ENFOPOL 114 NOTE from : Governing Board of the European Police College to : Article 36 Committee/COREPER/Council Subject

More information

ALEXANDER WENDT. Department of Political Science Ohio State University 2140 Derby Hall Columbus, OH

ALEXANDER WENDT. Department of Political Science Ohio State University 2140 Derby Hall Columbus, OH ALEXANDER WENDT Department of Political Science Ohio State University 2140 Derby Hall Columbus, OH 43210 614-282-9200 wendt.23@osu.edu EMPLOYMENT 2004-present: Mershon Professor of International Security

More information

ALEXANDER WENDT. Department of Political Science Ohio State University 2140 Derby Hall Columbus, OH (home phone)

ALEXANDER WENDT. Department of Political Science Ohio State University 2140 Derby Hall Columbus, OH (home phone) ALEXANDER WENDT Department of Political Science Ohio State University 2140 Derby Hall Columbus, OH 43210 614-262-1332 (home phone) wendt.23@osu.edu EMPLOYMENT 2004-present: Mershon Professor of International

More information

COST:PAST, PRESENT AND FUTURE

COST:PAST, PRESENT AND FUTURE COST:PAST, PRESENT AND FUTURE Francesco Fedi Past President COST Committee Senior Officials President COST Office Association COST COoperation in Science and Technology It was the first and it is one of

More information

Social Constructivism and International Relations

Social Constructivism and International Relations Social Constructivism and International Relations Philosophy and the Social Sciences Jack Jenkins jtjenkins919@gmail.com Explain and critique constructivist approaches to the study of international relations.

More information

INVESTING IN AN OPEN AND SECURE EUROPE Two Funds for the period

INVESTING IN AN OPEN AND SECURE EUROPE Two Funds for the period INVESTING IN AN OPEN AND SECURE EUROPE Two Funds for the 2014-20 period COMMON ISSUES ASK FOR COMMON SOLUTIONS Managing migration flows and asylum requests the EU external borders crises and preventing

More information

IMMIGRATION IN THE EU

IMMIGRATION IN THE EU IMMIGRATION IN THE EU Source: Eurostat 10/6/2015, unless otherwise indicated Data refers to non-eu nationals who have established their usual residence in the territory of an EU State for a period of at

More information

Global Harmonisation of Automotive Lighting Regulations

Global Harmonisation of Automotive Lighting Regulations Transmitted by the expert from GTB Informal document GRE-68-10 (68th GRE, 16-18 October 2012) agenda item 19(a)) Global Harmonisation of Automotive Lighting Regulations This discussion document has been

More information

Economic and Social Council

Economic and Social Council United Nations ADVANCE COPY Economic and Social Council Distr.: General 10 September 2014 ECE/WG.1/2014/4 Original: English Economic Commission for Europe Working Group on Ageing Seventh meeting Geneva,

More information

EUROPEANS ATTITUDES TOWARDS SECURITY

EUROPEANS ATTITUDES TOWARDS SECURITY Special Eurobarometer 432 EUROPEANS ATTITUDES TOWARDS SECURITY REPORT Fieldwork: March 2015 Publication: April 2015 This survey has been requested by the European Commission, Directorate-General for Migration

More information

Limited THE EUROPEAN UNION, hereinafter referred to as the "Union" THE KINGDOM OF BELGIUM, THE REPUBLIC OF BULGARIA, THE CZECH REPUBLIC,

Limited THE EUROPEAN UNION, hereinafter referred to as the Union THE KINGDOM OF BELGIUM, THE REPUBLIC OF BULGARIA, THE CZECH REPUBLIC, THE EUROPEAN UNION, hereinafter referred to as the "Union" THE KINGDOM OF BELGIUM, THE REPUBLIC OF BULGARIA, THE CZECH REPUBLIC, THE KINGDOM OF DENMARK, THE FEDERAL REPUBLIC OF GERMANY, THE REPUBLIC OF

More information

Terms of Reference and accreditation requirements for membership in the Network of European National Healthy Cities Networks Phase VI ( )

Terms of Reference and accreditation requirements for membership in the Network of European National Healthy Cities Networks Phase VI ( ) WHO Network of European Healthy Cities Network Terms of Reference and accreditation requirements for membership in the Network of European National Healthy Cities Networks Phase VI (2014-2018) Network

More information

DECISION OF THE EUROPEAN PARLIAMENT AND OF THE

DECISION OF THE EUROPEAN PARLIAMENT AND OF THE EUROPEAN COMMISSION Brussels, 20.7.2012 COM(2012) 407 final 2012/0199 (COD) Proposal for a DECISION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCILestablishing a Union action for the European Capitals of

More information

,,,,,, ,,,, ,,, Brian Frederking, Resolving Security Dilemmas : A Constructivist

,,,,,, ,,,, ,,, Brian Frederking, Resolving Security Dilemmas : A Constructivist : () [ ],,???? [ ] 20 90,,,,,,,,, 56,,,,,,,,,, Michael C. Williams (eds. ), Critical Security Studies : Concepts and Cases, Minneapolis : Univer2 sity of Minnesota Press, 1997 ; Richard Wyn Jones, Security,

More information

MINISTERIAL DECLARATION

MINISTERIAL DECLARATION 1 MINISTERIAL DECLARATION The fight against foreign bribery towards a new era of enforcement Preamble Paris, 16 March 2016 We, the Ministers and Representatives of the Parties to the Convention on Combating

More information

SILENCING AND MARGINALIZING OF THE VULNERABLE THROUGH DISCURSIVE PRACTICES IN THE POST 9/11 ERA

SILENCING AND MARGINALIZING OF THE VULNERABLE THROUGH DISCURSIVE PRACTICES IN THE POST 9/11 ERA SILENCING AND MARGINALIZING OF THE VULNERABLE THROUGH DISCURSIVE PRACTICES IN THE POST 9/11 ERA Ebru Öztürk As it has been stated that traditionally, when we use the term security we assume three basic

More information

12. NATO enlargement

12. NATO enlargement THE ENLARGEMENT OF NATO 117 12. NATO enlargement NATO s door remains open to any European country in a position to undertake the commitments and obligations of membership, and contribute to security in

More information

EUP2P. The Dual use Regulation: general frame, control regimes and weaknesses

EUP2P. The Dual use Regulation: general frame, control regimes and weaknesses EUP2P The Dual use Regulation: general frame, control regimes and weaknesses Kiev, 14 March 2018 Angelo Minotti, Ph. D. CONTENTS - UN Resolution 1540 - Aims - Multilateral Export Control Regimes - EU Reg.

More information

International Relations Theory Political Science 440 Northwestern University Winter 2010 Thursday 2-5pm, Ripton Room, Scott Hall

International Relations Theory Political Science 440 Northwestern University Winter 2010 Thursday 2-5pm, Ripton Room, Scott Hall International Relations Theory Political Science 440 Northwestern University Winter 2010 Thursday 2-5pm, Ripton Room, Scott Hall Jonathan Caverley j-caverley@northwestern.edu 404 Scott Office Hours: Tuesday

More information

European Union Passport

European Union Passport European Union Passport European Union Passport How the EU works The EU is a unique economic and political partnership between 28 European countries that together cover much of the continent. The EU was

More information

The evolution of turnout in European elections from 1979 to 2009

The evolution of turnout in European elections from 1979 to 2009 The evolution of turnout in European elections from 1979 to 2009 Nicola Maggini 7 April 2014 1 The European elections to be held between 22 and 25 May 2014 (depending on the country) may acquire, according

More information

wiiw Workshop Connectivity in Central Asia Mobility and Labour Migration

wiiw Workshop Connectivity in Central Asia Mobility and Labour Migration wiiw Workshop Connectivity in Central Asia Mobility and Labour Migration Vienna 15-16 December 2016 Radim Zak Programme Manager, ICMPD Radim.Zak@icmpd.org The project is funded by the European Union What

More information

Reference Title Dates Organiser(s) 00/2007 Train the Trainers Learning Seminar Step February 2007 Portugal 01/2007 Crime, Police and Justice in

Reference Title Dates Organiser(s) 00/2007 Train the Trainers Learning Seminar Step February 2007 Portugal 01/2007 Crime, Police and Justice in Reference Title Dates Organiser(s) 00/2007 Train the Trainers Learning Seminar Step 1 5 7 February 2007 Portugal 01/2007 Crime, Police and Justice in the 21st Century Conference 4 6 June 2007 Portugal

More information

The Baltic Sea Region. Cultures, Politics, Societies. Editor Witold Maciejewski. A Baltic University Publication

The Baltic Sea Region. Cultures, Politics, Societies. Editor Witold Maciejewski. A Baltic University Publication The Baltic Sea Region Cultures, Politics, Societies Editor Witold Maciejewski A Baltic University Publication 38 1. Four main points to be considered We have described four conditions that are important

More information

ASSOCIATION OF EUROPEAN JOURNALISTS (AEJ)

ASSOCIATION OF EUROPEAN JOURNALISTS (AEJ) ASSOCIATION OF EUROPEAN JOURNALISTS (AEJ) International non profit association Registered under Business No. 0458 856 619 Established by an act dated 23 February 1996 Published in the Annexes to the Moniteur

More information

Questions Based on this background, the Norwegian Directorate of Immigration (UDI) would like you to respond to the following questions: 1 of 11

Questions Based on this background, the Norwegian Directorate of Immigration (UDI) would like you to respond to the following questions: 1 of 11 Ad-Hoc Query (2 of 2) related to study on exchange of information regarding persons excluded from international protection Requested by NO EMN NCP on 26.06.15 OPEN Compilation produced on 26. August 2015

More information

by Vera-Karin Brazova

by Vera-Karin Brazova 340 Reviews A review of the book: Poland s Security: Contemporary Domestic and International Issues, eds. Sebastian Wojciechowski, Anna Potyrała, Logos Verlag, Berlin 2013, pp. 225 by Vera-Karin Brazova

More information

Agenda Item 9 CX/EURO 02/9

Agenda Item 9 CX/EURO 02/9 Agenda Item 9 CX/EURO 02/9 JOINT FAO/WHO FOOD STANDARDS PROGRAMME FAO/WHO REGIONAL COORDINATING COMMITTEE FOR EUROPE Twenty-third Session Bratislava, Slovak Republic, 10-13 September 2002 CONSUMER PARTICIPATION

More information

8193/11 GL/mkl 1 DG C I

8193/11 GL/mkl 1 DG C I COUNCIL OF THE EUROPEAN UNION Brussels, 25 March 2011 8193/11 AVIATION 70 INFORMATION NOTE From: European Commission To: Council Subject: State of play of ratification by Member States of the aviation

More information

Migration Challenge or Opportunity? - Introduction. 15th Munich Economic Summit

Migration Challenge or Opportunity? - Introduction. 15th Munich Economic Summit Migration Challenge or Opportunity? - Introduction 15th Munich Economic Summit Clemens Fuest 30 June 2016 What do you think are the two most important issues facing the EU at the moment? 40 35 2014 2015

More information

PUBLIC CONSULTATION. Improving procedures for obtaining short-stay Schengen visas

PUBLIC CONSULTATION. Improving procedures for obtaining short-stay Schengen visas PUBLIC CONSULTATION Improving procedures for obtaining short-stay Schengen visas Summary of responses C2 (31.7.2013) Page 1 Contents Introduction... 3 Presentation of results of the questionnaire for individual

More information

9 th International Workshop Budapest

9 th International Workshop Budapest 9 th International Workshop Budapest 2-5 October 2017 15 years of LANDNET-working: an Overview Frank van Holst, LANDNET Board / RVO.nl 9th International LANDNET Workshop - Budapest, 2-5 October 2017 Structure

More information

Contents: The History of the BSR security The new security environment Main actors of the BSR Nordic-Baltic security relations The Way Ahead

Contents: The History of the BSR security The new security environment Main actors of the BSR Nordic-Baltic security relations The Way Ahead Contents: The History of the BSR security The new security environment Main actors of the BSR Nordic-Baltic security relations The Way Ahead Northern Europe Baltic Sea region Western Europe Central and

More information

COREPER/Council No. prev. doc.: 5643/5/14 Revised EU Strategy for Combating Radicalisation and Recruitment to Terrorism

COREPER/Council No. prev. doc.: 5643/5/14 Revised EU Strategy for Combating Radicalisation and Recruitment to Terrorism COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2014 (OR. en) 9956/14 JAI 332 ENFOPOL 138 COTER 34 NOTE From: To: Presidency COREPER/Council No. prev. doc.: 5643/5/14 Subject: Revised EU Strategy for Combating

More information

Strategic priority areas in the Foreign Service

Strategic priority areas in the Foreign Service 14/03/2018 Strategic priority areas in the Foreign Service Finland s foreign and security policy aims at strengthening the country's international position, safeguarding Finland's independence and territorial

More information

Addressing Emerging Terrorist Threats and the Role of UNODC

Addressing Emerging Terrorist Threats and the Role of UNODC Addressing Emerging Terrorist Threats and the Role of UNODC Ms. Dolgor Solongo, Officer-in-Charge, ISS1 (Asia and Europe)/ Terrorism Prevention Branch 14 April 2015 Terrorism Evolving Global Threat Terrorism

More information

Asylum Seekers, Refugees and Homelessness in Europe. Nicholas Pleace

Asylum Seekers, Refugees and Homelessness in Europe. Nicholas Pleace Asylum Seekers, Refugees and Homelessness in Europe Nicholas Pleace Centre for Housing Policy, University of York European Observatory on Homelessness The Crisis In 2015, 1.3 million people sought asylum

More information

International Relations. Policy Analysis

International Relations. Policy Analysis 128 International Relations and Foreign Policy Analysis WALTER CARLSNAES Although foreign policy analysis (FPA) has traditionally been one of the major sub-fields within the study of international relations

More information

From Europe to the Euro Student Orientations 2014 Euro Challenge

From Europe to the Euro Student Orientations 2014 Euro Challenge From Europe to the Euro Student Orientations 2014 Euro Challenge www.euro-challenge.org 1 What is the European Union? A unique institution Member States voluntarily cede national sovereignty in many areas

More information

9717/18 RS/dk 1 DGD 1

9717/18 RS/dk 1 DGD 1 Council of the European Union Brussels, 5 June 2018 (OR. en) 9717/18 ENFOPOL 299 FREMP 92 OUTCOME OF PROCEEDINGS From: On: 4 June 2018 To: General Secretariat of the Council Delegations No. prev. doc.:

More information

INTERNATIONAL RECOMMENDATIONS ON REFUGEE STATISTICS (IRRS)

INTERNATIONAL RECOMMENDATIONS ON REFUGEE STATISTICS (IRRS) Draft, 29 December 2015 Annex IV A PROPOSAL FOR INTERNATIONAL RECOMMENDATIONS ON REFUGEE STATISTICS (IRRS) 1 INTRODUCTION At the 46 th session of the UN Statistical Commission (New York, 3-6 March, 2015),

More information

Europe. Eastern Europe South-Eastern Europe Central Europe and the Baltic States Western Europe. Restricted voluntary contributions (USD)

Europe. Eastern Europe South-Eastern Europe Central Europe and the Baltic States Western Europe. Restricted voluntary contributions (USD) Eastern South-Eastern Central and the Baltic States Western Restricted voluntary contributions (USD) Earmarking Donor Annual budget overall United States 100,000 Sub-total 100,000 Total 100,000 Operational

More information

Resettlement and Humanitarian Admission Programmes in Europe what works?

Resettlement and Humanitarian Admission Programmes in Europe what works? Resettlement and Humanitarian Admission Programmes in Europe what works? 1. INTRODUCTION This EMN Inform summarises the findings from the EMN Study on Resettlement and Humanitarian Admission Programmes

More information

Statewatch Analysis. EU Lisbon Treaty Analysis no. 4: British and Irish opt-outs from EU Justice and Home Affairs (JHA) law

Statewatch Analysis. EU Lisbon Treaty Analysis no. 4: British and Irish opt-outs from EU Justice and Home Affairs (JHA) law Statewatch Analysis EU Lisbon Treaty Analysis no. 4: British and Irish opt-outs from EU Justice and Home Affairs (JHA) law Prepared by Professor Steve Peers, University of Essex Version 4: 3 November 2009

More information

Theories of Security LG1/333, Tuesday, 16:00-18:00 (s.t.)

Theories of Security LG1/333, Tuesday, 16:00-18:00 (s.t.) Willy Brandt School of Public Policy Master of Public Policy Summer Semester 2012 Theories of Security LG1/333, Tuesday, 16:00-18:00 (s.t.) Filipe dos Reis, M.A. Office LG1/161 Office Hours Monday 13:30-14:30

More information

Continuous shared learning and improvement of nuclear safety and regulatory organisations through the OECD/NEA

Continuous shared learning and improvement of nuclear safety and regulatory organisations through the OECD/NEA Organisation for Economic Cooperation and Development (OECD) Nuclear Energy Agency(NEA) Continuous shared learning and improvement of nuclear safety and regulatory organisations through the OECD/NEA Ms.

More information

EUROPEAN HERITAGE LABEL GUIDELINES FOR CANDIDATE SITES

EUROPEAN HERITAGE LABEL GUIDELINES FOR CANDIDATE SITES EUROPEAN HERITAGE LABEL GUIDELINES FOR CANDIDATE SITES Table of contents 1. Context... 3 2. Added value and complementarity of the EHL with other existing initiatives in the field of cultural heritage...

More information

Statewatch Analysis. EU Reform Treaty Analysis no. 4: British and Irish opt-outs from EU Justice and Home Affairs (JHA) law

Statewatch Analysis. EU Reform Treaty Analysis no. 4: British and Irish opt-outs from EU Justice and Home Affairs (JHA) law Statewatch Analysis EU Reform Treaty Analysis no. 4: British and Irish opt-outs from EU Justice and Home Affairs (JHA) law Prepared by Professor Steve Peers, University of Essex Version 2: 26 October 2007

More information

ASEM 5. Chairman's Statement, Hanoi, October 2004

ASEM 5. Chairman's Statement, Hanoi, October 2004 ASEM 5 Chairman's Statement, Hanoi, October 2004 The fifth Asia-Europe Meeting (ASEM 5) was held in Hanoi on 8-9 October 2004. The Summit was attended by the Heads of State and Government of thirteen Asian

More information

The EU Visa Code will apply from 5 April 2010

The EU Visa Code will apply from 5 April 2010 MEMO/10/111 Brussels, 30 March 2010 The EU Visa Code will apply from 5 April 2010 What is the Visa Code? The Visa Code 1 is an EU Regulation adopted by the European Parliament and the Council (co-decision

More information

International Trade Union Confederation Pan-European Regional Council (PERC) CONSTITUTION (as amended by 3 rd PERC General Assembly, 15 December 2015)

International Trade Union Confederation Pan-European Regional Council (PERC) CONSTITUTION (as amended by 3 rd PERC General Assembly, 15 December 2015) 1 International Trade Union Confederation Pan-European Regional Council (PERC) CONSTITUTION (as amended by 3 rd PERC General Assembly, 15 December 2015) I. Principles, aims and objectives. A Pan-European

More information

From Europe to the Euro Student Orientations 2013 Euro Challenge

From Europe to the Euro Student Orientations 2013 Euro Challenge From Europe to the Euro Student Orientations 2013 Euro Challenge www.euro-challenge.org 1 What is the European Union? A unique institution Member States voluntarily cede national sovereignty in many areas

More information

From Europe to the Euro

From Europe to the Euro From Europe to the Euro 2012 Euro Challenge Student Orientation Florida International University December 6 th, 2011 Kasper Zeuthen Delegation of the European Union Washington, DC www.euro-challenge.org

More information

MINISTERIAL MEETING OF STATES PARTIES to the 1951 Convention and/or its 1967 Protocol relating to the Status of Refugees.

MINISTERIAL MEETING OF STATES PARTIES to the 1951 Convention and/or its 1967 Protocol relating to the Status of Refugees. MINISTERIAL MEETING OF STATES PARTIES to the 1951 Convention and/or its 1967 Protocol relating to the Status of Refugees 12 December 2001 1. In the context of the Global Consultations on International

More information

Equality between women and men in the EU

Equality between women and men in the EU 1 von 8 09.07.2015 13:13 Case Id: 257d6b6c-68bc-48b3-bf9e-18180eec75f1 Equality between women and men in the EU Fields marked with are mandatory. About you Are you replying to this consultation in a professional

More information

Introduction to the Refugee Context and Higher Education Programmes Supporting Refugees in Germany

Introduction to the Refugee Context and Higher Education Programmes Supporting Refugees in Germany Introduction to the Refugee Context and Higher Education Programmes Supporting Refugees in Germany BRUSSELS 11 MAY 2016 Dr. Dorothea Rüland, Secretary General, DAAD 1 Agenda 1. Facts & Figures 2. DAAD

More information

Statutes of the EUREKA Association AISBL

Statutes of the EUREKA Association AISBL Statutes of the EUREKA Association AISBL EUREKA / Statutes of the EUREKA Association AISBL 1 Table of contents Preamble Title I. Denomination, registered office and purpose. Article 1 Denomination Article

More information

Ad-Hoc Query on Migration Partnerships. Requested by AT EMN NCP on 26 th July 2010] Compilation produced on 8 th October 2010

Ad-Hoc Query on Migration Partnerships. Requested by AT EMN NCP on 26 th July 2010] Compilation produced on 8 th October 2010 Ad-Hoc Query on Migration Partnerships Requested by AT EMN NCP on 26 th July 2010] Compilation produced on 8 th October 2010 Responses from Austria, Belgium, Czech Republic, Finland, France, Germany, Italy,

More information

Improving the accuracy of outbound tourism statistics with mobile positioning data

Improving the accuracy of outbound tourism statistics with mobile positioning data 1 (11) Improving the accuracy of outbound tourism statistics with mobile positioning data Survey response rates are declining at an alarming rate globally. Statisticians have traditionally used imputing

More information

The National Police Immigration Service (NPIS) forcibly returned 429 persons in January 2018, and 137 of these were convicted offenders.

The National Police Immigration Service (NPIS) forcibly returned 429 persons in January 2018, and 137 of these were convicted offenders. Monthly statistics January 2018: Forced returns from Norway The National Police Immigration Service (NPIS) forcibly returned 429 persons in January 2018, and 137 of these were convicted offenders. The

More information

Asylum Trends. Appendix: Eurostat data

Asylum Trends. Appendix: Eurostat data Asylum Trends Appendix: Eurostat data Contents Colophon 2 First asylum applications in Europe (EU, Norway and Switzerland) Monthly asylum applications in the EU, Norway and Switzerland 3 First asylum applications

More information

Asylum Trends. Appendix: Eurostat data

Asylum Trends. Appendix: Eurostat data Asylum Trends Appendix: Eurostat data Contents Colophon 2 First asylum applications in Europe (EU, Norway and Switzerland) Monthly asylum applications in the EU, Norway and Switzerland 3 First asylum applications

More information

Asylum Trends. Appendix: Eurostat data

Asylum Trends. Appendix: Eurostat data Asylum Trends Appendix: Eurostat data Contents Colophon 2 First asylum applications in Europe (EU, Norway and Switzerland) Monthly asylum applications in the EU, Norway and Switzerland 3 First asylum applications

More information

ANNEX III FINANCIAL and CONTRACTUAL RULES

ANNEX III FINANCIAL and CONTRACTUAL RULES ANNEX III FINANCIAL and CONTRACTUAL RULES [In parts II, III and IV of this Annex, the NA has to include only the parts that are relevant for the Key Action and field concerned. For the preparation and

More information

OLLI 2012 Europe s Destiny Session II Integration and Recovery Transformative innovation or Power Play with a little help from our friends?

OLLI 2012 Europe s Destiny Session II Integration and Recovery Transformative innovation or Power Play with a little help from our friends? OLLI 2012 Europe s Destiny Session II Integration and Recovery Transformative innovation or Power Play with a little help from our friends? Treaties The European Union? Power Today s Menu Myth or Reality?

More information

2. The table in the Annex outlines the declarations received by the General Secretariat of the Council and their status to date.

2. The table in the Annex outlines the declarations received by the General Secretariat of the Council and their status to date. Council of the European Union Brussels, 10 June 2016 (OR. en) 9603/16 COPEN 184 EUROJUST 69 EJN 36 NOTE From: To: Subject: General Secretariat of the Council Delegations Council Framework Decision 2008/909/JHA

More information

Malta-Valletta: Provision of interim services for EASO 2017/S Contract award notice. Results of the procurement procedure.

Malta-Valletta: Provision of interim services for EASO 2017/S Contract award notice. Results of the procurement procedure. 1 / 10 This notice in TED website: http://ted.europa.eu/udl?uri=ted:notice:241884-2017:text:en:html Malta-Valletta: Provision of interim services for EASO 2017/S 120-241884 Contract award notice Results

More information

Research Report. Leiden Model United Nations 2015 ~ fresh ideas, new solutions ~

Research Report. Leiden Model United Nations 2015 ~ fresh ideas, new solutions ~ Forum: Issue: Student Officer: Position: General Assembly First Committee: Disarmament and International Security Foreign combatants in internal militarised conflicts Ethan Warren Deputy Chair Introduction

More information

Annex 1. Technical notes for the demographic and epidemiological profile

Annex 1. Technical notes for the demographic and epidemiological profile 139 Annex 1. Technical notes for the demographic and epidemiological profile 140 The European health report 2012: charting the way to well-being Data sources and methods Data sources for this report include

More information

From Europe to the Euro. Delegation of the European Union to the United States

From Europe to the Euro. Delegation of the European Union to the United States From Europe to the Euro Delegation of the European Union to the United States www.euro-challenge.org What is the European Union? A unique institution Member States voluntarily cede national sovereignty

More information

Security Union and the digital sphere: unpacking securitization processes

Security Union and the digital sphere: unpacking securitization processes UNIO - EU Law Journal. Vol. 4, No. 2, Julho 2018, pp 42-47. 2018 Centro de Estudos em Direito da União Europeia Escola de Direito Universidade do Minho Security Union and the digital sphere: unpacking

More information

European patent filings

European patent filings Annual Report 07 - European patent filings European patent filings Total filings This graph shows the geographic origin of the European patent filings. This is determined by the country of residence of

More information

THE VENICE COMMISSION OF THE COUNCIL OF EUROPE

THE VENICE COMMISSION OF THE COUNCIL OF EUROPE THE VENICE COMMISSION OF THE COUNCIL OF EUROPE Promoting democracy through law The role of the Venice Commission whose full name is the European Commission for Democracy through Law is to provide legal

More information

FOREIGN POLICY ANALYSIS

FOREIGN POLICY ANALYSIS I IBIIIUUI t A/553920 SAGE LIBRARY OF INTERNATIONAL RELATIONS FOREIGN POLICY ANALYSIS VOLUME I Edited by Walter Carlsnaes and Stefano Guzzini (S)SAGE Los Angeles London New Delhi Singapore Washington DC

More information

Orientation of the Slovak Republic s foreign policy for 2000

Orientation of the Slovak Republic s foreign policy for 2000 Orientation of the Slovak Republic s foreign policy for 2000 In 2000, the Slovak Republic s foreign policy will be based on the government s Policy Statement, which, in its foreign policy section, defines

More information

Common ground in European Dismissal Law

Common ground in European Dismissal Law Keynote Paper on the occasion of the 4 th Annual Legal Seminar European Labour Law Network 24 + 25 November 2011 Protection Against Dismissal in Europe Basic Features and Current Trends Common ground in

More information

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE EUROPEAN COUNCIL AND THE COUNCIL. Thirteenth report on relocation and resettlement

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE EUROPEAN COUNCIL AND THE COUNCIL. Thirteenth report on relocation and resettlement EUROPEAN COMMISSION Strasbourg, 13.6.2017 COM(2017) 330 final REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE EUROPEAN COUNCIL AND THE COUNCIL Thirteenth report on relocation and resettlement

More information

THE THIRD SECTOR AND THE WELFARE STATE. Welfare Models in Transition the Impact of Religion. Participants

THE THIRD SECTOR AND THE WELFARE STATE. Welfare Models in Transition the Impact of Religion. Participants THE THIRD SECTOR AND THE WELFARE STATE Session Title Welfare Models in Transition the Impact of Religion The Impact of Religion research programme is a 10 year interdisciplinary research programme based

More information

What is the OSCE? Organization for Security and Co-operation in Europe

What is the OSCE? Organization for Security and Co-operation in Europe What is the OSCE? Organization for Security and Co-operation in Europe Who are we? The OSCE s work on the ground enables the Organization to tackle crises as they arise. The OSCE has deployed hundreds

More information

Migration and Integration

Migration and Integration Migration and Integration Integration in Education Education for Integration Istanbul - 13 October 2017 Francesca Borgonovi Senior Analyst - Migration and Gender Directorate for Education and Skills, OECD

More information

Asylum decisions in the EU28 EU Member States granted protection to asylum seekers in 2013 Syrians main beneficiaries

Asylum decisions in the EU28 EU Member States granted protection to asylum seekers in 2013 Syrians main beneficiaries STAT/14/98 19 June 2014 Asylum decisions in the EU28 EU Member States granted to 135 700 asylum seekers in 2013 Syrians main beneficiaries The EU28 Member States granted to 135 700 asylum seekers in 2013,

More information

ENC Academic Council, Partnerships and Organizational Guidelines

ENC Academic Council, Partnerships and Organizational Guidelines ENC Academic Council, Partnerships and Organizational Guidelines The following document outlines the exact organisational structure and membership obligations, guidelines and decision-making rights of

More information

1-5 December December 1997 Original: ENGLISH DECISION

1-5 December December 1997 Original: ENGLISH DECISION OPCW Conference of the States Parties Second Session C-II/DEC.2 1-5 December 1997 1 December 1997 Original: ENGLISH DECISION ATTENDANCE AT THE SECOND SESSION OF THE CONFERENCE BY INTERNATIONAL ORGANISATIONS,

More information

ANNEX. to the COMMISSION IMPLEMENTING DECISION

ANNEX. to the COMMISSION IMPLEMENTING DECISION EUROPEAN COMMISSION Brussels, 31.7.2017 C(2017) 5240 final ANNEX 1 ANNEX to the COMMISSION IMPLEMENTING DECISION concerning the adoption of the work programme for 2017 and the financing for Union actions

More information

TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN MARCH 2016

TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN MARCH 2016 TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN MARCH 2016 In March 2016, the number of the trips of Bulgarian residents abroad was 354.7 thousand (Annex, Table

More information

Gender pay gap in public services: an initial report

Gender pay gap in public services: an initial report Introduction This report 1 examines the gender pay gap, the difference between what men and women earn, in public services. Drawing on figures from both Eurostat, the statistical office of the European

More information

TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN AUGUST 2015

TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN AUGUST 2015 TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN AUGUST 2015 In August 2015, the number of the trips of Bulgarian residents abroad was 512.0 thousand (Annex, Table

More information

TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN FEBRUARY 2017

TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN FEBRUARY 2017 TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN FEBRUARY 2017 In February 2017, the number of the trips of Bulgarian residents abroad was 366.8 thousand (Annex,

More information

TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN AUGUST 2016

TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN AUGUST 2016 TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN AUGUST 2016 In August 2016, the number of the trips of Bulgarian residents abroad was 590.6 thousand (Annex, Table

More information

TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN MAY 2017

TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN MAY 2017 TRIPS OF BULGARIAN RESIDENTS ABROAD AND ARRIVALS OF VISITORS FROM ABROAD TO BULGARIA IN MAY 2017 In May 2017, the number of the trips of Bulgarian residents abroad was 653.3 thousand (Annex, Table 1) or

More information

General Assembly. United Nations A/66/442. Globalization and interdependence. I. Introduction. Report of the Second Committee* * *

General Assembly. United Nations A/66/442. Globalization and interdependence. I. Introduction. Report of the Second Committee* * * United Nations A/66/442 General Assembly Distr.: General 12 December 2011 Original: English Sixty-sixth session Agenda item 21 Globalization and interdependence Report of the Second Committee* Rapporteur:

More information