Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • KOBV  (3)
  • English  (3)
  • 2010-2014  (3)
  • Cambridge [u.a.] : Cambridge University Press
  • Biology  (1)
  • Law  (1)
  • Theology  (1)
Material
Language
  • English  (3)
Years
Year
  • 1
    Book
    Book
    Cambridge [u.a.] : Cambridge University Press
    ISBN: 9780521781862
    Language: English
    Pages: V, 318 S., [2] Bl. , Ill., Kt. , 24 cm
    Series Statement: Cambridge studies in biological and evolutionary anthropology 63
    Series Statement: Cambridge studies in biological and evolutionary anthropology
    DDC: 306.83
    RVK:
    RVK:
    Keywords: Human population genetics ; Consanguinity ; Consanguinity Health aspects ; Kinship ; Incest Psychological aspects ; SCIENCE / Life Sciences / Zoology / Primatology ; Consanguinity ; Family Relations ; Genetics, Population ; Incest psychology ; Human population genetics ; Consanguinity ; Consanguinity Health aspects ; Kinship ; Incest Psychological aspects ; Blutsverwandtschaft ; Inzucht ; Blutsverwandtschaft ; Inzucht
    Abstract: Machine generated contents note: 1. Consanguineous marriage, past and present; 2. Religious attitudes and rulings on consanguineous marriage; 3. Civil legislation on consanguineous and affinal marriage; 4. Consanguinity: the scientific and medical debates of the nineteenth and early twentieth centuries; 5. Demographic and socioeconomic aspects of consanguineous marriage; 6. A population genetics perspective on consanguinity; 7. Consanguinity and reproductive behaviour; 8. Consanguinity and metrical traits at birth and in childhood; 9. Consanguinity and pre-reproductive mortality; 10. Consanguinity and morbidity in early life; 11. Consanguinity and disorders of adulthood; 12. Incest; 13. Genetic screening, education and counselling in consanguineous marriage; 14. Whither consanguineous marriage?; 15. Consanguinity in context; References; Index
    Abstract: "An essential guide to this major contemporary issue, Consanguinity in Context is a uniquely comprehensive account of intra-familial marriage. Detailed information on past and present religious, social, and legal practices and prohibitions is presented as a backdrop to the preferences and beliefs of the 1100+ million people in consanguineous unions. Chapters on population genetics, and the role of consanguinity in reproductive behaviour and genetic variation, set the scene for critical analyses of the influence of consanguinity in the early years of life. The discussion on consanguinity and disorders of adulthood is the first review of its kind and is particularly relevant given the ageing of the global population. Incest is treated as a separate issue, with historical and present-day examples examined. The final three chapters deal in detail with practical issues, including genetic testing, education and counselling, national and international legislation and imperatives, and the future of consanguineous marriage worldwide"--
    Description / Table of Contents: Machine generated contents note: 1. Consanguineous marriage, past and present; 2. Religious attitudes and rulings on consanguineous marriage; 3. Civil legislation on consanguineous and affinal marriage; 4. Consanguinity: the scientific and medical debates of the nineteenth and early twentieth centuries; 5. Demographic and socioeconomic aspects of consanguineous marriage; 6. A population genetics perspective on consanguinity; 7. Consanguinity and reproductive behaviour; 8. Consanguinity and metrical traits at birth and in childhood; 9. Consanguinity and pre-reproductive mortality; 10. Consanguinity and morbidity in early life; 11. Consanguinity and disorders of adulthood; 12. Incest; 13. Genetic screening, education and counselling in consanguineous marriage; 14. Whither consanguineous marriage?; 15. Consanguinity in context; References; Index.
    Note: Includes bibliographical references (p. 232-314) and index
    URL: Cover
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cambridge [u.a.] : Cambridge University Press
    ISBN: 9781107416994 , 9781107011083
    Language: English
    Pages: XIX, 331 S.
    Edition: 1. publ.
    Edition: Online-Ausg. Online-Ressource Cambridge books online
    Series Statement: Cambridge studies in international and comparative law 92
    Series Statement: Cambridge studies in international and comparative law
    Parallel Title: Druckausg. Dinniss, Heather Harrison Cyber warfare and the laws of war
    DDC: 341.63
    RVK:
    RVK:
    RVK:
    Keywords: Information warfare (International law) ; War (International law) ; Cyberterrorism ; Information warfare (International law) ; War (International law) ; Cyberterrorism ; Electronic books ; Electronic books ; Information warfare ; Internationales Recht ; Computerkriminalität ; Internationales Recht
    Abstract: The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.
    Description / Table of Contents: Cover; Cyber Warfare and the Laws of War; Series; Title; Copyright; Dedication; Contents; Acknowledgements; Table of cases; List of abbreviations; 1: The world in which we live and fight; 1. Computer network attacks; 2. Law and war in the internet age; 3. Societal trends generally; 3.1. The information revolution and digitisation; 3.1.1. Ubiquity; 3.1.2. Amount; 3.1.3. Societal change; 3.1.4. Organisational change; 3.2. Globalisation, interdependency and the changing world order; 3.3. The rise of the knowledge economy; 4. Military trends; 4.1. A change of purpose
    Description / Table of Contents: 4.2. Network-centric warfare and effects-based operations4.3. Outsourcing and civilianisation; 5. Terminology and definitions; 5.1. New laws for old?; 5.2. Methodology; 5.3. A word about examples and hypotheticals; 6. Conclusion; PART I: Jus ad bellum; 2 Computer network attacks as a use of force in international law; 1. Force defined as armed force; The Charter wording; Travaux préparatoires and historical background; Subsequent iterations of the rule; 2. Definition of armed force; 2.1. State actions; 2.2. Theories of force - scholastic writings; 3. Computer network attacks as a use of force
    Description / Table of Contents: 3.1. Characteristics of computer network attacks3.1.1. Indirectness; 3.1.2. Intangibility; Target intangibility; Weapons intangibility; 3.1.3. Locus; 3.1.4. Result; 4. Conclusion; 3 Armed attack and response in the digital age; 1. Armed attack; 1.1. Anticipatory self-defence; 1.1.1. Doctrinal debate and imminent attacks; 1.1.2. State practice; 1.1.3. Computer network attacks and anticipatory self-defence; 1.1.4. The 'Bush doctrine' of pre-emptive self-defence65; 1.2. Pinprick attacks or accumulation of events theory; 2. Self-defence against non-state actors; 3. Attribution
    Description / Table of Contents: 4. Necessity and proportionality5. Countermeasures against unlawful acts; 6. Security Council authorisation and collective measures; 7. Conclusion; PART II: Jus in bello; 4 The applicability of the laws of armed conflict to computer network attacks; 1. Armed conflict; 1.1. The requirement of armed force; 1.2. Intervention of the armed forces; 2. Application to computer network attacks; 2.1. Application during conventional armed conflict; 2.2. Computer network attack on its own; 2.2.1. Armed force; 2.2.2. Humanitarian principles; 2.3. Computer network attacks in support of conventional attacks
    Description / Table of Contents: 3. Territory4. Conclusion; 5 Participants in conflict: combatant status, direct participation and computer network attack; 1. Combatant status; 1.1. Requirements of combatant status; 1.1.1. Responsible command; 1.1.2. Distinction; 1.1.3. Compliance, organisation, belonging and allegiance; 1.2. Saboteurs and spies; 1.2.1. Sabotage; 1.2.2. Espionage; 2. Direct participation by civilians; 2.1. Requirements of direct participation; 2.1.1. Earlier scholarship; 2.1.2. The ICRC interpretive guidance; 2.2. Offensive computer network attack; 2.3. Computer network attack system support
    Description / Table of Contents: 2.4. Generic IT support
    Note: Includes bibliographical references and index
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...