To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter argues that Augustine structured book 1 of the City of God according to the urbs capta motives. Urbs capta narratives (such as Livy’s), offer consolation for civilian populations that had suffered the sack of their city. They address captivity, looting, starvation, mass burials, but also sexual violence. In book 1, Augustine calls these afflictions (that is, the urbs capta motives) “law of war” (ius belli). Once recognized as the structuring device of book 1, it becomes evident that Augustine addresses sexual violence against women through the well-known case of Lucretian, but also against (elite) men. Augustine then uses the laws of war, and in particular sexual violence against men, to reframe traditional Roman virtues, especially pudicitia (modesty) and patientia (edurance) as Christian. As a result, patientia and humilitas (humility) become essential responses to war’s devastation, and Rome’s sack a sign of divine correction, while the urbs capta motives are Christianized.
China’s notion of cyber sovereignty reflects an assertive extension of state authority into the digital realm. Rooted in principles of territorial jurisdiction, national security, and technological independence, this framework is embodied in key legislation. These laws impose rigorous compliance obligations on foreign and domestic businesses, particularly those operating critical information infrastructure. While these measures reinforce China’s digital autonomy, they pose significant challenges for foreign investors navigating this intricate regulatory landscape. This chapter critically examines how China’s cyber sovereignty aligns with its international investment obligations, focusing on three core principles: protection against expropriation, national treatment, and fair and equitable treatment (FET). It explores whether the stringent requirements and lack of effective remedies breach these standards, highlighting potential areas of discord with China’s investment treaties. Furthermore, it evaluates the limitations of security and general exception clauses in justifying these regulatory measures under international law. The findings suggest that China’s cyber sovereignty framework, while advancing its domestic security and technological goals, may conflict with its international investment commitments. As more nations adopt similar regulatory stances, this trend could signal a shift toward a fragmented global ICT market, reshaping the dynamics of international economic governance.
This chapter calls attention to the violence of everyday life in the Roman world as the backdrop to the more extraordinary violence of war. Drawing specifically on archaeology, which is poorly equipped, it is argued, to reveal war violence but well situated to reveal the unusual volatility of living in the Roman world, it describes the ordinary upheavals of daily life. In particular, it examines the archaeological evidence for volatility in domestic circumstances, in how one made a living, and the physical trauma experienced by working bodies.
“War,” writes military historian Alexander Sarantis, “is largely a niche area rather than a mainstream concern of late antique and Byzantine studies, which tend to be dominated by theological, literary, artistic, and socio-economic themes.” The fact that war and warfare now occupy a “relatively marginal position in modern scholarship” reflects a number of shifts in the academic landscape, from the reframing of Late Antiquity as a period of change and continuity (rather than an epoch of decline) to the entrenchment of cultural history as the dominant approach in history departments across North America and Europe. And yet, even as military historians have dismantled stale theses about “military decay” as the root cause of the empire’s geopolitical fragmentation and show the late Roman army to have been a source of Rome’s extraordinary resilience, “their” topics of war, warfare, and the army nonetheless fail to resonate with most scholars of Late Antiquity. As Bryan Ward-Perkins wryly notes in his controversial 2005 book, The Fall of Rome and the End of Civilization, “banishing catastrophe” has become a mainstream response to late antique narrative history. Where has war gone?
This textbook is meant for first-year undergraduates majoring in mathematics or disciplines where formal mathematics is important. It will help students to make a smooth transition from high school to undergraduate differential calculus. Beginning with limits and continuity, the book proceeds to discuss derivatives, tangents and normals, maxima and minima, and mean value theorems. It also discusses indeterminate forms, functions of several variables, and partial differentiation. The book ends with a coverage of curvature, asymptotes, singular points, and curve tracing. Concepts are first presented and explained in an informal, intuitive, and conceptual style. They are then covered in the form of a conventional definition, theorem, or proof. Each concept concludes with at least one solved example. Additional solved examples are also provided under the section "More Solved Examples". Practice numerical exercises are included in the chapters so that students can apply the concepts learnt and sharpen their problem-solving skills.
This chapter examines the applicability of international investment law to emerging digital asset classes such as data packages, cryptocurrencies, and non-fungible tokens (NFTs). These assets, now mainstream investments, raise unique issues in terms of their protection under investment treaties. The chapter explores whether digital assets qualify as ’investments’ under traditional treaty definitions, and the application of the common protections offered under investment treaties to such assets. It assesses digital assets against criteria often applied by investment treaty tribunals to argue that digital assets can broadly be classified as investments. The chapter also analyses the key questions arising from the application of the fair and equitable treatment (FET) standard and protection against expropriation to digital assets, especially given the current relative lack of regulation in this area. Valuation complexities, including market volatility and the absence of benchmarks, are addressed, emphasising the need for close consideration of these issues in the context of investment treaty claims. Lastly, the chapter addresses structuring investments via corporate vehicles to enhance treaty protections and mitigate risks. It concludes that, while investment law can accommodate digital assets, careful structuring and awareness of treaty terms are vital for investor protection within an uncertain and ever-evolving regulatory environment.
International investment law is designed to encourage the movement of capital toward optimally productive uses, thus generating economic gains and fostering development. At the same time, treaty-based protections of foreign investors can restrict host governments’ ability to pass rules that negatively impact on foreign investments even when such rules are for socially desirable goals such as poverty reduction. Applied to the question of new technologies, this framework theoretically leaves access to and utilization of new technologies between the technology-pulling impact of investment protections and the equity-hindering impacts of regulatory measures to reduce poverty in all its forms. Does the practice of international investment law dispute resolution indicate that this tension is resolved in favor of technology investors or in favor of equality-enhancing measures?
This chapter examines the various aspects of the digital divide and the provisions of the Sustainable Development Goals (SDGs) that contain states’ promises on the relationship to promote access to new technologies as a way of reducing poverty. It then looks at several early investment disputes that have arisen out of new technology investments in order to draw conclusions about whether investment protections help bridge the divide or exacerbate it. The result is more ambiguous than expected.
Ambrose of Milan’s funerary oration for Valentinian II (392 ce) confronts violence, civil war, and imperial authority, ultimately redefining the emperor’s body as a collection of relics. The oration’s ambiguity regarding the circumstances of Valentinian II’s premature and violent death was not merely a matter of political expediency; it also served as a rhetorical strategy to support Ambrose’s innovative treatment of the emperor’s corpse. By weaving passages from the Song of Songs into his oration, Ambrose evoked imagery resonant with same-sex desire, while presenting himself as the emperor’s guarantor – but in his very own way: as a “womanly” father and a lover mourning his beloved. In portraying Valentinian II as a selfless soldier-martyr, Ambrose rehabilitated an emperor who may have died by suicide and without the sacrament of baptism, while also redefining key imperial virtues at a time when they – and the empire – faced mounting challenges from both internal and external forces.
The deployment of 5G has raised diverse national security concerns, leading to policies restricting Chinese companies’ participation in this critical infrastructure. This chapter examines these policies against the background of international investment law, focusing on restrictions against Chinese companies Huawei and ZTE. It evaluates the compatibility of these measures with international investment agreements and explores potential violations of national treatment, most-favored-nation treatment, fair and equitable treatment, and full protection and security standards. The chapter also discusses the justification of these policies under national security exceptions, concluding that international investment law may not be fully equipped to address the evolving geo-economic landscape.
Like other areas of law and legal practice, the arbitration world is beginning to grapple with how to harness the potential of artificial intelligence (AI) while managing its risks. Analogizing to existing AI tools for analysing case law and judicial behavior, as well as to algorithmic hiring applications, this chapter explores how similar technology could be used to improve the process of selecting investment arbitrators. As criticisms of investment arbitration continue to mount, a new selection tool could help to address systemic concerns about fairness, diversity, and legitimacy. Such a tool could level the playing field for parties in terms of access to information about prospective arbitrators as well as expand and diversify the pool of viable candidates. In addition to providing guidance for the parties making their own selections, the suggested tool could be used by arbitral institutions to help with appointing the tribunal president or even, with the parties’ consent, the entire panel. The chapter provides a framework for thinking through questions of design and implementation and concludes by addressing potential challenges and objections.