Das Strafrecht befindet sich gegenwärtig im Umbruch. Hiervon betroffen sind die Straftheorien ebenso wie die Ausgestaltung des Prozesses. Die Prozessrealität ist geprägt von Entwicklungen, die sich als Ökonomisierung, Medialisierung, politisierte Aufarbeitung und Opferausrichtung zusammenfassen lassen. Sie trifft auf Strafkonzepte, welche von der klassischen straftheoretischen Kontroverse bestimmt und durch diese gerechtfertigt werden. Um die Legitimität der modernen Prozesswirklichkeit beurteilen zu können, überprüft Hanna Weyrich ihre Kompatibilität mit den bestehenden Theorien. Dabei werden auch die Straftheorien selbst kritisch hinterfragt. Als Prüfungsmaßstab wendet die Autorin in der Folge ein auf straftheoretischer Basis entwickeltes "differenzierendes Phasenmodell" an. Dieses erlaubt es, die verschiedenen Aspekte und Ebenen von Strafe und ihre Realisierung durch den Prozess zu erfassen und auf ihre Legitimität zu untersuchen.
Seit 1945 hat sich in der staatlichen wie in der kirchlichen Traupraxis ein erheblicher Wandel vollzogen. Begleitet wurden diese Entwicklungen von gesellschaftlichen, politischen und kirchlichen Debatten, die sich wechselseitig beeinflusst haben. Dies führte etwa in den 1950er und 1970er Jahren zu einem intensiven Austausch zwischen den politischen und kirchlichen Akteuren. Die evangelischen Stimmen entwickelten dabei Argumente und Argumentationsstrategien, um den Wandel sowohl kritisch als auch positiv aufzunehmen. Dabei etablierten sich bestimmte Muster im Diskurs, die bis heute einen Einfluss auf die kirchlichen Stellungnahmen haben. Hanna Lausen untersucht die öffentlichen wie kircheninternen Debatten, die im Hinblick auf ein evangelisches Ehe- und Trauverständnis seit den 1950er Jahren geführt wurden. Zugleich geht sie der Frage nach, welche Auswirkungen diese Debatten auf die kirchlichen Ordnungen der Trauungen haben.
Vulnerabilitat als existenzielles Grunddatum menschlichen Daseins wird von Hanna Braun mit einem inklusiven Verstandnis von Gottebenbildlichkeit in einer Weise zusammengedacht, dass freiheitstheoretisch und im Rahmen einer relationalen Ontologie die Rede vom vulnerablen Menschen als Ebenbild Gottes fundamentaltheologisch plausibel wird. Differenzierungen im Vulnerabilitatsbegriff lassen sodann zu, dass auch Gott vulnerabel gedacht wird. Anliegen der Arbeit ist es, eine inklusive (theologische) Anthropologie aufzuzeigen, die Menschen mit Behinderung ab ovo mitdenkt. Anschlussfahig an dieses theologische Denken sind auch u. a. loci aus Pastoraltheologie, Gnadenlehre, Ethik und Eschatologie.
The aim of this book is to present an overview of the state of the art with regard to the function, application and design of TWSs in order to better protect surface water from contamination. Accordingly, it also presents applications of constructed wetlands with regard to climatic and cultural aspects.The use of artificial and natural treatment wetland systems (TWSs) for wastewater treatment is an approach that has been developed over the last thirty years. Europe is currently home to roughly 10,000 constructed wetland treatment systems (CWTSs), which simulate the aquatic habitat conditions of natural marsh ecosystems; roughly 3,500 systems are in operation in Germany alone. TWSs can also be found in many other European countries, for example 200 – 400 in Denmark, 400 – 600 in Great Britain, and ca. 1,000 in Poland. Most of the existing systems serve as local or individual household treatment systems. CWTSs are easy to operate and do not require specialized maintenance; further, no biological sewage sludge is formed during treatment processes. As TWSs are resistant to fluctuations in hydraulic loads, they are primarily used in rural areas as well as in urbanized areas with dispersed habitats, where conventional sewer systems and central conventional wastewater treatment plants (WWTPs) cannot be applied due to the high costs they would entail. TWSs are usually applied at the 2nd stage of domestic wastewater treatment, after mechanical treatment, and/or at the 3rd stage of treatment in order to ensure purification of effluent from conventional biological reactors and re-naturalization. New applications of TWSs include rainwater treatment as well as industrial and landfill leachate treatment. TWSs are well suited to these fields, as they can potentially remove not only organic matter and nitrogen compounds but also trace metals and traces of persistent organic pollutants and pathogens. Based on the practical experience gathered to date, and on new research regarding the processes and mechanisms of pollutant removal and advances in the systems properties and design, TWSs continue to evolve.
This book examines how the functioning of the International Criminal Court has become a forum of convergence between the common law and civil law criminal justice systems. Four countries were selected as primary examples of these two legal traditions: the United States, England and Wales, Germany and Poland. The first layer of analysis focuses on selected elements of the model of accusation that are crucial to the model adopted by the ICC. These are: development of the notion of the prosecutor’s independence in view of their ties to the countries and the Security Council; the nature and limits of the prosecutor’s discretional powers to initiate proceedings before the ICC; the reasons behind the prosecutor’s choice of both defendants and charges; the role the prosecutor plays in the procedure of disclosure of evidence and consensual termination of proceedings; and the determinants of the model of accusation used during trial and appeal proceedings. The second layer of the book consists in an analysis of the motives behind applying particular solutions to create the model of accusation before the ICC. It also shows how the model of accusation gradually evolved in proceedings before the military and ad hoc tribunals: ICTY and ICTR. Moreover, the question of compatibility of procedural institutions is addressed: In what ways does adopting a certain element of criminal procedure, e.g. discretional powers of the prosecutor to initiate criminal proceedings, influence the remaining procedural elements, e.g. the existence of the dossier of a case or the powers of a judge to change the legal classification of the criminal behavior appearing in the indictment?
The book surveys the enforcement of EU law through the lens of damages claims for violations of EU public procurement rules. The first part clarifies the requirements on damages claims under both public procurement and general EU law, notably the public procurement remedies directives and doctrines such as procedural autonomy, effective judicial protection and Member State liability. The second part focuses on comparative law, covering England, France, Germany and the Netherlands, and provides an overview of national regulation and case law of damages litigation in the area of public procurement. A third part discusses the constitutive and quantification criteria of the damages remedy from a comparative and EU law perspective. It explores the lost chance, which functionally emerges as a compromise capable of mitigating the typically problematic nature of causation and uncertainty in public procurement constellations. The book concludes with a proposal for legislative intervention regarding damages in public procurement.
This book examines how the functioning of the International Criminal Court has become a forum of convergence between the common law and civil law criminal justice systems. Four countries were selected as primary examples of these two legal traditions: the United States, England and Wales, Germany and Poland. The first layer of analysis focuses on selected elements of the model of accusation that are crucial to the model adopted by the ICC. These are: development of the notion of the prosecutor’s independence in view of their ties to the countries and the Security Council; the nature and limits of the prosecutor’s discretional powers to initiate proceedings before the ICC; the reasons behind the prosecutor’s choice of both defendants and charges; the role the prosecutor plays in the procedure of disclosure of evidence and consensual termination of proceedings; and the determinants of the model of accusation used during trial and appeal proceedings. The second layer of the book consists in an analysis of the motives behind applying particular solutions to create the model of accusation before the ICC. It also shows how the model of accusation gradually evolved in proceedings before the military and ad hoc tribunals: ICTY and ICTR. Moreover, the question of compatibility of procedural institutions is addressed: In what ways does adopting a certain element of criminal procedure, e.g. discretional powers of the prosecutor to initiate criminal proceedings, influence the remaining procedural elements, e.g. the existence of the dossier of a case or the powers of a judge to change the legal classification of the criminal behavior appearing in the indictment?
The aim of this book is to present an overview of the state of the art with regard to the function, application and design of TWSs in order to better protect surface water from contamination. Accordingly, it also presents applications of constructed wetlands with regard to climatic and cultural aspects.The use of artificial and natural treatment wetland systems (TWSs) for wastewater treatment is an approach that has been developed over the last thirty years. Europe is currently home to roughly 10,000 constructed wetland treatment systems (CWTSs), which simulate the aquatic habitat conditions of natural marsh ecosystems; roughly 3,500 systems are in operation in Germany alone. TWSs can also be found in many other European countries, for example 200 – 400 in Denmark, 400 – 600 in Great Britain, and ca. 1,000 in Poland. Most of the existing systems serve as local or individual household treatment systems. CWTSs are easy to operate and do not require specialized maintenance; further, no biological sewage sludge is formed during treatment processes. As TWSs are resistant to fluctuations in hydraulic loads, they are primarily used in rural areas as well as in urbanized areas with dispersed habitats, where conventional sewer systems and central conventional wastewater treatment plants (WWTPs) cannot be applied due to the high costs they would entail. TWSs are usually applied at the 2nd stage of domestic wastewater treatment, after mechanical treatment, and/or at the 3rd stage of treatment in order to ensure purification of effluent from conventional biological reactors and re-naturalization. New applications of TWSs include rainwater treatment as well as industrial and landfill leachate treatment. TWSs are well suited to these fields, as they can potentially remove not only organic matter and nitrogen compounds but also trace metals and traces of persistent organic pollutants and pathogens. Based on the practical experience gathered to date, and on new research regarding the processes and mechanisms of pollutant removal and advances in the systems properties and design, TWSs continue to evolve.
This book studies systemic vulnerabilities and their impact on states and individual survival. The author theorizes that the structure of the international system is a product of the distribution of capabilities and vulnerabilities across states. States function or behave in terms of these systemic threats. The author examines a number of specific case-studies focusing on military, economic, environmental, political and cyber vulnerabilities, and how different states are impacted by them. Arguing that current attempts to securitize these vulnerabilities through defensive foreign policies are largely failing, the books makes the case for prioritizing economic development and human security.
Grand strategies can be thought of as overall survival strategies of all states. Great powers seek survival against other great powers seeking to undermine their power and position, determining prestige-seeking behavior as psychotic and destructive. Weak states suffer from systemic vulnerabilities and trade whatever political power they have to a great power for economic assistance. If enough weak states support a particular great power, then that great power will become more powerful relative to competitors. This forms an international system fashioned by these transactions.
The book surveys the enforcement of EU law through the lens of damages claims for violations of EU public procurement rules. The first part clarifies the requirements on damages claims under both public procurement and general EU law, notably the public procurement remedies directives and doctrines such as procedural autonomy, effective judicial protection and Member State liability. The second part focuses on comparative law, covering England, France, Germany and the Netherlands, and provides an overview of national regulation and case law of damages litigation in the area of public procurement. A third part discusses the constitutive and quantification criteria of the damages remedy from a comparative and EU law perspective. It explores the lost chance, which functionally emerges as a compromise capable of mitigating the typically problematic nature of causation and uncertainty in public procurement constellations. The book concludes with a proposal for legislative intervention regarding damages in public procurement.
This book studies systemic vulnerabilities and their impact on states and individual survival. The author theorizes that the structure of the international system is a product of the distribution of capabilities and vulnerabilities across states. States function or behave in terms of these systemic threats. The author examines a number of specific case-studies focusing on military, economic, environmental, political and cyber vulnerabilities, and how different states are impacted by them. Arguing that current attempts to securitize these vulnerabilities through defensive foreign policies are largely failing, the books makes the case for prioritizing economic development and human security.
Grand strategies can be thought of as overall survival strategies of all states. Great powers seek survival against other great powers seeking to undermine their power and position, determining prestige-seeking behavior as psychotic and destructive. Weak states suffer from systemic vulnerabilities and trade whatever political power they have to a great power for economic assistance. If enough weak states support a particular great power, then that great power will become more powerful relative to competitors. This forms an international system fashioned by these transactions.
This book explains the existence of illicit markets throughout human history and provides recommendations to governments. Organized criminal networks increased in strength after the enforcement of prohibition, eventually challenging the authority of the state and its institutions through corruption and violence. Criminal networks now organize under cyber-infrastructure, what we call the Deep or Dark Web. The authors analyze how illicit markets come together, issues of destabilization and international security, the effect of legitimate enterprises crowded out of developing countries, and ultimately, illicit markets' cost to human life.
This book provides a detailed examination of foreign direct investment (FDI) inflows in Central and Eastern Europe (CEE) after closer integration in the European Union. An important facet of European economic integration was the development of a free-trade area in Central and Eastern Europe, which improved market accessibility. However, to date these relations have been little explored theoretically.The book examines foreign investments in different transition countries from both a theoretical and an empirical perspective. It analyzes changes in the choice of location by foreign investors in nineteen CEE countries between 1992 and 2015, and shows that it is linked to the removal of intra-regional trade barriers. The findings suggest that regional integration increases the incentives for multinationals to invest in the participating countries, especially in those with larger markets and lower production costs.
Die Autorin hat die heute vorherrschende Verhaltensbiologie von Konrad Lorenz untersucht, alle wichtigen Experimente analysiert und wiederholt und kommt zu dem Fazit, dass Lorenz' Theorie auf einer unzureichenden Basis aufgebaut ist und gravierende Fehler aufweist. Die Arbeit ist biologisch-fachwissenschaftlich voll zuverlassig. Die daruber hinausgehenden wissenschaftstheoretischen Aspekte sind hochst interessant und folgenreich, da hier fur einen weltweit prominenten Bereich der Biologie der Nachweis erbracht wird, dass wissenschaftliche Standards aufs groblichste verletzt worden sind, ohne dass dies den Erfolg der Theorie in der scientific community in irgendeiner Weise beeintrachtigt hatte.