• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 39
  • 15
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 68
  • 18
  • 18
  • 16
  • 13
  • 12
  • 12
  • 12
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Der rheinische Jurist Joseph Bauerband : die Lehre des rheinischen Rechts im Spannungsfeld deutscher und französischer Rechtstraditionen /

Müller-Hogrebe, Cordula, January 2005 (has links) (PDF)
Univ., Diss.--Münster, 2004.
42

Verwantschap in extremen : politieke theologie bij Walter Benjamin en Carl Schmitt /

Wilde, Marc de. January 1900 (has links)
Proefschrift Universiteit van Amsterdam. / Met samenvatting in het Engels, lit.opg. en index.
43

Institution und Handlung Hermann Hellers Staatslehre im Lichte analytischer Theorien sozialen Handelns

Gassmann, Vera January 2006 (has links)
Zugl.: Freiburg (Breisgau), Univ., Diss., 2006
44

Zur Ausbildung von Diplomjuristen an der Hochschule des MfS (Juristische Hochschule Potsdam) /

Gerber, Stefan. January 2000 (has links) (PDF)
Humboldt-Univ., Diss.--Berlin, 1999. / Literaturverz. S. 381 - 387.
45

Compliance Elliance Journal

DeStefano, Michele, Schneider, Hendrik 14 May 2018 (has links)
We are pleased to present you a new edition of the Compliance Elliance Journal (CEJ). This edition will focus on questions regarding Legal Tech and Compliance.
46

Editorial

DeStefano, Michele, Schneider, Hendrik 14 May 2018 (has links)
We are pleased to present you a new edition of the Compliance Elliance Journal (CEJ). This edition will focus on questions regarding Legal Tech and Compliance.
47

Is a trustless system an ethical system?

Gavin, Erick 14 May 2018 (has links)
If you have not been hiding under a rock you have heard the whispers about Bitcoin and Blockchain, and they are going to revolutionize everything we do (or scam everyone into debt at the very least). One very interesting part of this technology is the idea of Smart Contracts – programs that automate the process of an agreement between two entities essentially to circumvent aspects traditional problems with executing and enforcing said contract. While in the legal community Smart Contracts have been talked about at length about whether they can truly succeed in replacing certain functions of the legal system, one question that has yet to be asked is if they are a viable substitute are many people immediately placed in a detrimental or even harmful situation. The pervasiveness of Blockchain and Smart Contracts will not affect everyone in our society equally and that must be taken into consideration.
48

Private law compliance through smart contracts?

Fries, Martin 14 May 2018 (has links)
Smart contracts allow for automated compliance with contractual rules. They derive their “smartness” from an execution software that catches the most typical defaults and responds by mechanically triggering a compensation payment or another prearranged consequence. Through this self-enforcement mode, smart contracts are able to save time and effort that is associated with more customary rights enforcement mechanisms. Now, whereas compliance with in-house rules or corporate governance standards is common today, compliance with contract law only occurs on a voluntary basis. This might, however, change if businesses should be obliged to automatically meet customer claims through smart contracts. On the basis of a sample case, this article examines the pros and cons of smart consumer contracts and carves out the most suitable applications of smart contracts as a means to ensure private law compliance.
49

Legal chatbots

Bartenberger, Martin, Galla, Sven, Kosak, Alexander 14 May 2018 (has links)
This article introduces the idea of legal chatbots and how legal chatbots might affect the legal market in the near future. We define chatbots as computer programs that automatically chat with users and assess their potential for legal consultation. We identify four potential strengths of legal chatbots: providing access to justice, serving as contact points for customers, reducing the knowledge gap between lawyer and client and automatically generating documents and taking further actions. In the concluding section we briefly discuss ethical aspects of legal chatbots and possible future developments.
50

Overcoming the security quagmire: behavioural science and modern technology hold the key to solving the complex issue of law firm cyber security

O'Donovan, David, Marshakova, Alexandra 14 May 2018 (has links)
While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not likely. Part 1 of this paper outlines the current threat landscape and details the integral role of human error in successful cyber breaches before turning to discuss recent cyber security incidents involving law firms. In Part 2, we analyse elements of law firm short-termism and the underregulation of law firm cyber security conduct and how these, when combined, play a key role in shaping law firm cyber security posture. Finally, in Part 3 we outline a realistic solution, incorporating principles from behavioural science and modern technological developments.

Page generated in 0.0565 seconds