Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
The annual Ius Commune conference and its contract law workshop on “Contract law in times of corona and other sanitary crises”.
-
Abuse of partnership companies is a societal problem that has existed for decades... This blog is only available in Dutch.
-
What is the role of the law in addressing the issues faced by the contemporary consumer, and who should be its maker?
-
Organisers: Professor Stephen Weatherill & Dr Dorota Leczykiewicz
Thursday 27 March 2014 until Friday 28 March 2014 -
On the two-day conference in Liège entitled ‘Nudging in Europe’.
-
The Annual Meeting of the American Society for Legal History (ASLH) in Miami, Florida.
-
Rethinking how we make our value judgments, not just by asking a litany of “why questions”, but through a more systematic process – as advocated by Hage – enables us to debate with one another at a much deeper level, rather than settling for a superficial conversation based on our (sometimes flawed)...