Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
‘Technology and Innovation: Challenges for Traditional Legal Boundaries’ Workshop
The 20th Congress of the International Academy of Comparative Law (IACL) took place this year in Fukuoka, Japan, between 22-28 July. Apart from bringing together established comparative law scholars from different... -
When should the State intervene on ownership to guarantee the protection of the environment? When is social responsibility triggered when dealing with ownership? There is a need to predict the impact that the Ecological Function paradigm will have.
-
Duo blog by Dersim Yabasun and Alexander Hoogenboom
At the outset of this blog there is reason to underline the value of an effective asylum policy. There is a tendency in some populist media, as well as among some populist politicians, to depict and cast the current humanitarian crisis as largely...