To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The One Health policy framework offers an appealing model to policy advocates disillusioned with the sustainable use narrative. Through membership of the African Union, South Africa has endorsed the One Health Approach, and the concept recently found renewed resonance in a major high-level government wildlife policy review. This work considers the One Health Framework in detail, arguing that the theoretical appeal of acknowledging the overlapping dependencies that unpin the framework is in practice entirely inadequate to arrest and reverse the destruction of the environment and the institutionalised suffering of animals. This is in part because the framework seeks to balance short-term easily quantifiable commercial benefits to humans with longer-term externalised harms to non-humans and the broader environment. This work explores further how the One Health Framework might be developed to remediate this deficiency, especially in the context of South Africa’s transformative constitutional legal framework, which requires positive action from the state to secure defined and often conflicting socio-economic and environmental outcomes.
Although digital technologies play a vital role in improving the efficacy of supply chain management, companies often fail to transform digital aspects of their supply chains. To minimize the failure risk, digital transformation must begin with a design phase. This chapter introduces four aspects of the design phase: (1) operational due diligence, (2) data management strategy, (3) comprehension of business analytics, and (4) expansion of the potential of digital solutions. It shows how to achieve digital transformation of supply chains by addressing prominent issues in the design stage.
Evolutionary psychology attempts to provide ultimate as well as proximate explanations of human behaviour. Proximate mechanisms are those that directly cause a particular behaviour (for instance we have sex because we enjoy it), whereas ultimate explanations are cast at the level of design by natural selection (we have sex because it leads to offspring). The concept of evolution is an old one. What was missing from these earlier accounts was a workable model of how change occurs. Darwin provided this mechanism with his theory of natural selection. Much of twentieth-century psychology has been influenced by the cultural relativist position and the biological bases of human behaviour have tended to be ignored or downplayed. The sociobiology movement attempted to formulate evolutionary explanations of human behaviour. Such attempts led to a great deal of scientific and political controversy that continues to this day.
Edited by
Camran R. Nezhat, Stanford University School of Medicine, California,Farr R. Nezhat, Nezhat Surgery for Gynecology/Oncology, New York,Ceana Nezhat, Nezhat Medical Center, Atlanta,Nisha Lakhi, Richmond University Medical Center, New York,Azadeh Nezhat, Nezhat Institute and Center for Special Minimally Invasive and Robotic Surgery, California
Adhesions are a known postoperative complication of gynecologic surgery occurring in 75–90% of patients following surgery. Adhesions can cause bowel obstruction, pain, infertility, and difficulty with the next surgery. Adhesions are formed as a physiologic healing response to tissue injury. Currently, despite research and the availability of multiple adhesion barriers, adhesions remain a persistent problem. The American Society for Reproductive Medicine (ASRM), along with many other international medical societies, recommends that efforts to minimize adhesion formation should be utilized including minimally invasive techniques and surgical barriers when performing pelvic surgery.
A life history theory of development claims that, from an early age, children monitor their environment and make decisions about their future reproductive value. Based on their assessment of environmental conditions, they can choose to maximize current or future reproductive success. Attachment theory claims that early attachments can have a substantial effect on subsequent personality and behaviour. Central to this theory is that a child forms a ‘working model’ of the self and relationships that is used to guide subsequent behaviour. Secure working models generally lead to more satisfactory and stable relationships in later life than insecure ones. Ainsworth proposed that there are three attachment styles, secure, insecure-avoidant and insecure-anxious/resistant. Evidence suggests individuals exhibiting insecure attachment styles generally suffer more relationship problems later in life. Unlike chimpanzees, which prefer to act alone unless it is impossible to do so (such as a hunt), children prefer to cooperate with others.
Edited by
Camran R. Nezhat, Stanford University School of Medicine, California,Farr R. Nezhat, Nezhat Surgery for Gynecology/Oncology, New York,Ceana Nezhat, Nezhat Medical Center, Atlanta,Nisha Lakhi, Richmond University Medical Center, New York,Azadeh Nezhat, Nezhat Institute and Center for Special Minimally Invasive and Robotic Surgery, California
Generative AI based on large language models (LLM) currently faces serious privacy leakage issues due to the wide range of parameters and diverse data sources. When using generative AI, users inevitably share data with the system. Personal data collected by generative AI may be used for model training and leaked in future outputs. The risk of private information leakage is closely related to the inherent operating mechanism of generative AI. This indirect leakage is difficult to detect by users due to the high complexity of the internal operating mechanism of generative AI. By focusing on the private information exchanged during interactions between users and generative AI, we identify the privacy dimensions involved and develop a model for privacy types in human–generative AI interactions. This can provide a reference for generative AI to avoid training private data and help it provide clear explanations of relevant content for the types of privacy users are concerned about.