The European Union, counter terrorism and police co-operation, 1991?2007 Unsteady Foundations?.
Material type: TextPublication details: Manchester : Manchester University Press, (c)2010.Description: 1 online resource (217 pages)Content type:- text
- computer
- online resource
- 9781847792730
- European Union
- Police -- European Union countries
- Security, International -- European Union countries
- Terrorism -- European Union countries -- Prevention
- European Union
- Police -- European Union countries
- Security, International -- European Union countries
- Terrorism -- European Union countries -- Prevention
- HV6433 .E976 2010
- COPYRIGHT NOT covered - Click this link to request copyright permission: https://lib.ciu.edu/copyright-request-form
Item type | Current library | Collection | Call number | URL | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | Non-fiction | HV6433.85 B76 2010 (Browse shelf(Opens below)) | Link to resource | Available | ocn818847298 |
Browsing G. Allen Fleece Library shelves, Shelving location: ONLINE, Collection: Non-fiction Close shelf browser (Hides shelf browser)
Includes bibliographies and index.
9780719074646; 9780719074646; Copyright; Contents; Tables; Abbreviations; Acknowledgements; 1 Introduction; 2 A question of JHA objectives; 3 A question of objectives:police co-operation and counter terrorism; 4 A question of commonality; 5 A question of credibility: legislation, agencies and the implementation gap; 6 A question of credibility: information exchange; 7 Looking back, looking forward; Index.
This volume examines the underlying foundations on which the European Union's counter-terrorism and police co-operation policies have been built since the inception of the Treaty on European Union, questioning both the effectiveness and legitimacy of the EU's efforts in these two critically important security areas. Given the importance of such developments to the wider credibility of the EU as a security actor, this volume adopts a more structured analysis of key stages of the implementation process. These include the establishment of objectives, both at the wider level of internal security c.
COPYRIGHT NOT covered - Click this link to request copyright permission:
There are no comments on this title.