To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
On December 6, 2023, the Indonesian Parliament passed Indonesia’s Criminal Code. The new Criminal Code replaces the Dutch-language colonial-era Penal Code and after fifty years of debate marks a milestone in Indonesian law. However, the new Code is controversial. It continues to criminalize interpersonal relations such as adultery and cohabitation. The framing of those offences is an accommodation of conflicting preferences among a wide range of domestic and international actors including those from the Islamic world, notably Saudi Arabia. This chapter examines the new Code as an arena of contestation, among inter-regional influences and between secular and religious actors seeking to shape Indonesian state law. It highlights three under-studied phenomena in Asia: inter-regional religious networks; their intersection with colonial legal legacies; and the migration of legal values, not only geographically or jurisdictionally, but also across internal domains within pluralist legal systems.
In this chapter, we explore how Israel approaches its protection from cyber threats with a focus on disinformation. The chapter relies on primary source material in English and Hebrew and interviews with Israeli researchers and disinformation experts. This chapter outlines the overview of the disinformation threats Israel has been facing in the recent past and present, diagnoses the presence and absence in legislative policy concerning disinformation, and analyzes Israel’s private industry efforts to bolster cyber security defense. Finally, our conclusion considers a variety of overarching outlooks on the future of countering internal disinformation in Israel.
This chapter considers the potential of neurorehabilitation to interfere with a person’s identity, and hence its potential to infringe human rights that protect (different aspects of) personal identity. It builds upon previous arguments and suggestions in the literature that some forms of interference with the brain, such as the use of brain stimulation techniques, can cause psychological changes that disrupt a person’s identity. Until now, this debate has focused strongly on the side effects of brain stimulation for therapeutic purposes, such as DBS in the treatment of Parkinson’s disease. We extrapolate this discussion to the context of criminal justice. In addition to earlier ethical evaluations of brain stimulation vis-à-vis personal identity, scholars are now considering the legal protection that should be offered to personal identity in this context, particularly through human rights. Some have argued for the introduction of a specific human right for this purpose: a right to psychological continuity.
The book begins by situating my key phrase ‘making-good-again’ through contrasting the history of the terms Wiedergutmachung and restitution. I give a brief history of understandings of responsibility and introduce my argument regarding material practice. Part two gives a brief overview of the methods used in the book, situating my approach in relation to jurisprudence and current approaches in law, humanities and their intersections.
Kant is often read as being committed to the idea that morality is within our control, leading him to develop an ethical theory in which there is no room for moral luck. Kant’s political and legal philosophy, by contrast, is taken to be concerned with external actions, in particular with their effects on the freedom of others, and thus seems to be far from immune to luck. From this perspective a significant chasm opens up between ethics and right, making it hard to see how right could be derived from ethics and how both of them could be integrated into a unified theory based on a single supreme principle. This chapter argues that the role of luck in Kant’s practical philosophy needs to be reconceived and that considerations of luck do not stand in the way of a unification of ethics and right.
This chapter explores how judicial mechanisms employed by apex courts have migrated across South Asia and Southeast Asia, using India, Pakistan, and Malaysia as examples. The chapter focuses on two case studies – Pakistan and Malaysia – to examine how judicial mechanisms, like the basic structure doctrine articulated by the Indian Supreme Court, have been strategically adapted by courts in Pakistan and Malaysia to strengthen their institutional power. This chapter considers the use of judicial rhetoric and constitutional comparativism in crafting opinions of popular salience by examining the distinct ways in which these Asian courts have engaged with foreign and comparative case law.
Elections in Central Asia unfold against a backdrop of digital repression, characterized by network throttling, online content blocking to suppress dissent and targeted online harassment of political opposition and journalists. State-imposed limits on online information availability are compounded by cyber foreign interference, including espionage, information campaigns, and disruptive incidents that have increasingly played a geopolitical role. These multifaceted cyber threats underscore the urgent need for a rapid, concerted policy response aimed at bolstering the integrity of electoral systems and procedures, reducing censorship and enhancing cybersecurity culture and resilience. This chapter explores trends in influencing elections and threatening electoral integrity through cyber means, focusing on both the informational and technical domains, and proposes action-oriented recommendations for cross-sectoral cooperation toward securing elections and the broader digital ecosystem in the region.
The classical problem of steady rarefied gas flow past an infinitely thin circular disk is revisited, with particular emphasis on the gas behaviour near the disk edge. The uniform flow is assumed to be perpendicular to the disk surface. An integral equation for the velocity distribution function, derived from the linearised Bhatnagar–Gross–Krook model of the Boltzmann equation and subject to diffuse reflection boundary conditions, is solved numerically. The numerical method fully accounts for the discontinuity in the velocity distribution function that arises due to the presence of the edge. It is found that a kinetic boundary layer forms near the disk edge, extending over several mean free paths, and that its magnitude scales as $\textit{Kn}^{1/2}$ as the Knudsen number $\textit{Kn}$ (defined with respect to the disk radius) tends to zero. A thermal polarisation effect, previously studied for spherical geometries, is also observed in the disk case, with a more pronounced manifestation near the edge that exhibits the same $\textit{Kn}^{1/2}$ scaling. The drag force acting on the disk is computed over a wide range of Knudsen numbers and shows good agreement with existing results for a hard-sphere gas and in the near-free-molecular regime.
This article examines the portrayal of social class and conviviality in Aristophanes’ Wasps 1208–15 and argues that the passage—in which Bdelycleon corrects Philocleon’s clumsy reclining as he prepares to attend an elite symposion—assumes that Philocleon (though a man of modest means) is no novice to reclined symposia, merely to the elegance expected of wealthy symposiasts. It is argued that the exchange between father and son focusses on reclining elegantly rather than on more rudimentary points, and that the passage’s language of haste suggests the matter is viewed as a trivial preliminary to more important components of Philocleon’s sympotic education. The article then considers external evidence supporting the argument that symposia were widespread through the social spectrum in fifth-century Athens, although more modest symposia did not employ costly paraphernalia such as banqueting klinai. Based on this external evidence and on consideration of the terminology in Wasps 1208–15, it is further argued that a klinê would have been used as a prop during the scene and that the scene centres on Philocleon’s unfamiliarity with using this costly piece of furniture rather than on more general ignorance of reclined conviviality. This conclusion has implications for sympotic scholarship, which remains divided on the extent to which symposia were restricted to the wealthy elite in Classical Athens. This article provides support for the position that sympotic conviviality was widespread across the social spectrum and that differences between elite and non-elite symposia centred on paraphernalia (such as banqueting klinai) and behavioural norms.
In Navier–Stokes (NS) turbulence, large-scale turbulent flows inevitably determine small-scale flows. Previous studies using data assimilation with the three-dimensional (3-D) NS equations indicate that employing observational data resolved down to a specific length scale, $\ell ^{\rm 3\text{-}D}_{\ast }$, enables the successful reconstruction of small-scale flows. Such a length scale of ‘essential resolution of observation’ for reconstruction $\ell ^{\rm 3\text{-}D}_{\ast }$ is close to the dissipation scale in three-dimensional NS turbulence. Here, we study the equivalent length scale in two-dimensional (2-D) NS turbulence, $\ell ^{\rm 2\text{-}D}_{\ast }$, and compare with the three-dimensional case. Our numerical studies using data assimilation and conditional Lyapunov exponents reveal that, for Kolmogorov flows with Ekman drag, the length scale $\ell ^{\rm 2\text{-}D}_{\ast }$ is actually close to the forcing scale, substantially larger than the dissipation scale. Furthermore, we discuss the origin of the significant relative difference between the length scales, $\ell ^{\rm 2\text{-}D}_{\ast }$ and $\ell ^{\rm 3\text{-}D}_{\ast }$, based on inter-scale interactions, ‘cascades’ and orbital instabilities in turbulence dynamics.
This paper investigates the negation-free fragment of the bi-connexive logic 2C, called 2C$_-$, from the perspective of bilateralist proof-theoretic semantics (PTS). It is argued that eliminating primitive negation has two important conceptual consequences. First, it requires a reconceptualization of contradictory logics: in a bilateralist framework, contradiction need not be understood in terms of negation inconsistency, but rather as the coexistence of proofs and refutations for certain formulas within a non-trivial system. Second, it challenges the standard definition of connexive logics, which typically rely on negation-based schemata. Instead, a rule-based conception of connexivity, grounded in bilateralist PTS, is proposed. This reconception avoids dependence on the validation of specific formula schemata and thereby also dependence on negation. The paper also addresses the issue of proof–refutation duality in the absence of strong negation, which can be formalized and recovered at a meta-level by extending the system with a two-sorted typed $\lambda $-calculus.