ABSTRACT

This introduction presents an overview of the key concepts discussed in the subsequent chapters of this book. The book focuses on archival material, especially verbatim records from the General Assembly Third Committee, graciously provided by Roland Burke from La Trobe University in Melbourne, Australia. Importantly, this research focuses on specific NLMs and/or IPs that use the UN in these ways, without claiming that all such groups do. The core argument of this volume can be summarized in two points. Consequently, this research aims to provide systematic explanations that demonstrate exactly how the three explanatory factors of NSA access and participation, the role of allies, and the relevance of venues work and interact. Ultimately, this book investigates both cases in terms of norm-based challenges to state sovereignty and, further, within cases, exploring the variation of relevant venues with whom NSAs interact when moving through the UN hierarchy.