To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This Element is an opinionated introduction to Heidegger's phenomenology in Being and Time and surrounding works, framed in terms of Heidegger's debts to and divergence from Husserl's phenomenology. Section 1 situates Heidegger's and Husserl's phenomenology with respect to the 'identity-crisis of philosophy,' in particular the debate over whether philosophy is a science or a mere cataloguing of worldviews. Section 2 critically evaluates Heidegger's claims that various forms of conscious intentionality central to Husserl's phenomenology are 'derivative' or 'founded.' Section 3 turns to method, exploring whether Heidegger adopts Husserl's reductions, platonism, and method of essential seeing and imaginative variation. Section 4 explores Heidegger's hermeneutical turn in phenomenology and explains the uses to which he puts religious sources, mythology, and ordinary language.
In an era of rampant misinformation, conspiracy theories, and political polarization, this book confronts the paradox between rational models of human cognition and seemingly irrational behavior. Drawing on cutting-edge research in psychology and other social sciences, it explores practical tools such as fostering digital literacy and cultivating 'wise deliberative spaces' grounded in argument, perspective taking, and moral inquiry. Written for graduate students, researchers, and general readers, E. Michael Nussbaum provides an accessible introduction to contemporary models of reasoning, motivation, and dialogue. With chapters on truth, talk, trust, and thinking, the volume presents a revised model of dual-process theory, linking it to deliberative dialogue while integrating insights from education, communication studies, philosophy, and political science. The result is a timely vision of cautious optimism for navigating today's post-truth challenges.
Since Heidegger's reading of Aristotle covered three decades and presented itself in many courses, seminars, and essays, some still unpublished, one objective here is to provide a much needed and currently unavailable overview of this material. This Element seeks to determine what Heidegger's reading can tell us not only about Aristotle but also about Heidegger whose own thought was in many ways a 'repetition' of Aristotle. However, the ultimate aim is to identify the philosophical questions raised by 'Heidegger and Aristotle' and show how this can help us grapple with them. These questions include the distinctive way of being that defines life, the nature of time and specifically lived time, the nature of being itself and whether it is to be understood as static presence or as something more active, the nature of human action and its relation to production, and the relation between nature and technology.
The topic of linguistic networks unites different frameworks in cognitive linguistics. This Element explores two approaches to networks, specifically Construction Grammar of the Goldberg variety and Word Grammar as developed by Hudson, and how they inform work on language change. Both are usage-based theories, but while the basic units of Construction Grammar are conventionalized form-meaning pairings gathered in a construct-i-con, the basic units of Word Grammar are words in dependency and other relations. Construction Grammar allows for schematic, hierarchized abstract generalizations attributable to social groups, whereas Word Grammar focuses on relations at the micro-level and attributable primarily to individuals. Consequences of the differences are discussed with reference to perspectives on the diachronic development of causal connectives in English, especially because.
A solid understanding of the key areas in hematopathology, hematology and coagulation is vital for trainees preparing to take their American Board of Pathology exams. This book provides challenging multiple-choice questions, in-depth explanations, and up-to-date diagnostic criteria to provide the reader with a thorough review of essential topics for board certification examinations in Hematopathology. This second edition has been updated and revised throughout, featuring expanded content on bone marrow failure, immunodeficiency, and benign WBC disorders, and revised terminology in alignment with current WHO and ICC systems. Additionally, it includes discussion of entities specific for ICC classification of myeloid neoplasms, and expanded discussion of mixed phenotype acute leukemia. Written by renowned and experienced authors who are actively involved in the practice and teaching of hematopathology, this book is an essential resource for exam preparation.
Tracing the development of Rome over a span of 1200 years, The Topography and Monuments of Ancient Rome offers an overview of the changing appearance of the city and the social, political, and military factors that shaped it. C. Brian Rose places Rome's architecture, coinage, inscriptions and monuments in historical context and offers a nuanced analysis regarding the evolution of the city and its monuments over time. He brings an interdisciplinary approach to his study, merging insights gained from cutting-edge techniques in archaeological research, such as remote sensing, core-sampling, palaeobotany, neutron-activation analysis, and isotopic analysis, with literary, epigraphic, and numismatic evidence. Rose also includes reconstructions of the ancient city that reflect the rapid developments in digital technology and mapping in the last three decades. Aimed at scholars and students alike, Rose's study demonstrates how evidence can be drawn from a variety of approaches. It serves as a model for studying and viewing the growth and structure of ancient cities.
Raul “Pete” Pedrozo, Cyber Threats at Sea: Jamming and Spoofing of Commercial Vessels
Ships rely on Global Navigation Satellite System (GNSS), like the NAVSTAR Global Positioning Systems (GPS), for safe navigation and precise Position, Navigation, and Time (PNT). Based on satellite input, PNT enable shipboard receivers to determine location with precision. As a primary PNT source, GNSS must be accurate and protected from manipulation to ensure safe ship operations. While some GNSS interference is unintentional, threat from State and non-state actors persist. Over the past 20 years, cyberattacks on international shipping by rogue States like China, Iran, and Russia and state-sponsored hackers have increased, threatening maritime safety by disrupting navigation and communication equipment. The proliferation of GNSS interference poses a strategic threat, to global navigation safety, civilian finances, logistics, and communication. This chapter discusses GNSS threats and how States can mitigate jamming and spoofing. It examines efforts by the International Maritime Organization and shipping industry to address these threats and review United States measures to protect its maritime transportation system from cyberattacks. No single solution addresses all GNSS vulnerabilities but combining alternatives can augment GNSS and ensure resilience for critical maritime PNT operations. Regular risk assessments identify vulnerabilities and prioritize mitigation. A clear incident response plan supports cyberattacks, minimizing damage, and expedite recovery.
James Kraska and Khanssa Lagdami, What Does the Future Hold?
The contributing editors assess the future of technology and the law of the sea in light of the distribution of power and authority among flag states, port states and coastal states.
This chapter examines China’s evolving governance of international marriages through the lens of sovereign concerns, focusing on border stability, population management and national security. It explores how material and affective processes inform the regulations and representations of marriage migration to China. The discussion shows how the Chinese state continually revises its administrative and legal framework for international marriage, and also highlights the historical, racialised and gendered forces embedded in this process. The argument contends that the regulatory framework of marriage migration is shaped by shifting ‘structures of feeling’ that define belonging in Chinese society. These intersecting spheres of state affective and regulatory practices reveal new power dynamics and inequalities in China’s relations with the outside world.
Krisztina Tilinger, Blockchain and the Law of the Sea
The international law of the sea treaties imposes various obligations on contracting states, which can be managed more efficiently and cost-effectively through blockchain technology. As a disruptive tool, blockchain allows stakeholders to track transactions in a secure, cryptographically verified public database. It ensures a secure and reliable record of activities and information exchange governed by international agreements. This paper explores how the blockchain-based systems could help protect the maritime community and support sustainable ocean governance under the law of the sea. Particular attention is given to conserving marine living resources, protecting the marine environment and preserving marine biodiversity. Blockchain is already in use for some internationally regulated activities, such as electronic data interchange, though electronic permitting still waits broader international approval. Besides the clear advantages of blockchain, its legal, regulatory and other concerns must be addressed when considering its role in implementing international treaties. The author aims to explore whether harnessing blockchain`s potential requires new international agreement or if a simpler soft law instrument could provide sufficient guidance and safeguards for the international community.
Youri van Logchem, Sensor Monitoring and Reliable Telecommunications (SMART) Subsea Cables and Marine Scientific Research
Subsea cables date to the 19th century with telegraphic use and have served various roles, including military. However, they rose to prominence in communications with the Internet’s creation in 1980s. Today, global telecommunications, the Internet, and financial and security systems rely on subsea cables, which handle about 97% of international communications. A new development enhances subsea cable technology by adding oceanographic sensors to collect ocean, environment, and climate data. These are called ‘SMART (Sensor Monitoring and Reliable Telecommunications) cables. Adding monitoring to subsea cables is a cheap way to improve marine environmental understanding through data collection, transforming them into dual-purpose systems combining data gathering and telecommunications. This dual role raises legal questions—primarily whether SMART cables collecting marine data qualify as scientific research needing coastal State consent in certain maritime zones. The subsea cable industry is lukewarm on SMART cables, fearing coastal State laws may hinder operations which adds complication. Security concerns over subsea cables increases with geopolitical tensions and deliberate targeting, such as the October 2023 Baltic Connector incident. Adding new technology to an established one raises several issues. Though SMART cables offer strong scientific benefits for understanding the (marine) environment, caution is needed as legal hurdles arise.
The digital realm has become a crucial space for foreign women in China to express emotions, explore entrepreneurial ventures, and seek community and support. This chapter discusses the main themes and evolving conversations within several WeChat groups created by post-Soviet wives living in China. The chapter centres on how these women navigate both digital and physical environments while managing racialised and gendered expectations around family life and social interactions under China’s patriarchal immigration policies. I explore how personal experiences and emotions shared in one-on-one conversations echo the collective subjectivities and shared sentiments fostered within these online communities. Additionally, I consider how these online interactions reflect broader geopolitical dynamics, including national borders, racial hierarchies, citizenship laws and broader structures of feeling. These affective, networked, publics form a loosely connected web that offers the women a sense of belonging and solidarity amid the constraints of their lived circumstances.
In Illiberal Law and Development, Susan H. Whiting advances institutional economic theory with original survey and fieldwork data, addressing two puzzles in Chinese political economy: how economic development has occurred despite insecure property rights and weak rule of law; and how the Chinese state has maintained political control amid unrest. Whiting answers these questions by focusing on the role of illiberal law in reassigning property rights and redirecting grievances. The book reveals that, in the context of technological change, a legal system that facilitates reassignment of land rights to higher-value uses plays an important and under-theorized role in promoting economic development. This system simultaneously represses conflict and asserts legitimacy. Comparing China to post-Glorious Revolution England and contemporary India, Whiting presents an exciting new argument that brings the Chinese case more directly into debates in comparative politics about the role of the state in specifying property rights and maintaining authoritarian rule.