Zoekresultaten
663 results
- 357953_master_international_and_european_tax_law_2018_en_2019-04-29_13-11-49-metspecialisaties.pdf (405.4 kB, PDF)… of war, the protection of the wounded and the treatment of civilians, and the methods of enforcement. Particular attention will paid to current challenges to International Humanitarian Law, such as asymmetric warfare, targeted killings by drones, cyber warfare and the use of private military contractors. Are the present rules of International Humanitarian Law adequate to regulate these activities or are new rules required? In order to find answers to these questions we will study relevant …
- MA Thesis - Jorge Lozano 2025.pdf (700.3 kB, PDF)… being somehow apart from the rest of the world” (p. xi). In this light, bridging the gap between performance and scholarly cultures through direct academic critique can make critical challenges to current conventions of the practice feel like personal attacks for classical musicians. This, in turn, would constitute a top-down strategy and I anticipate they would feel their agency thwarted. Alternatively, I propose that CM could adopt a constructivist approach that takes into account this valued …
- bachelor_european_law_school_english_track_course_description_16-17-en.pdf (328.56 kB, PDF)… the existing contract law Directives, seeking more coherence. The interesting thing about this draft directive is that the European Commission is changing its approach from minimum harmonisation to full (or maximum) harmonisation and is under fierce attack for it. A new and less ambitious draft was published in 2011, which was also adopted in October 2011. By far the largest body of European Contract Law deals with consumers. This is mostly due to the nature of European legislation. After all, the …
- NIKHEF-EVALUATION.pdf (11.56 MB, PDF)… LHCb and gravitational waves analysis. The collaborative trust and identity activities were intentionally diversified, building on our contributions to the AARC project, and now also encompass the GEANT Project “Enabling Communities” activity and cybersecurity for both eduGAIN and the European Open Science Cloud. This reduced dependencies on a limited number of funding sources, and at the same time strengthened the link between federated identity and access management (“FIM”) and our physics … and the contribution of this single- collector model to the WLCG SOC working group ≥ EGI-CSIRT Security Operations, where Nikhef CT staff provides the European-wide Security Officer to the operational security and forensics team ≥ Red-teaming in the cybersecurity defence exercises for the Dutch government and national critical infrastructure (since the bandwidth and packet rate of our science data is on par with a typical denial-of-service attack) ≥ AARC Authentication and Authorization for Research Collaboration architecture design, federated collaboration management (OpenID Connect Federation and AARC Blueprint Architecture proxy integration) and RCauth.eu – the Pan-European Identity …
- um_style_guide_edwards_1.pdf (504.26 kB, PDF)… begin, intend, hope, order, propose The order was attempted to be carried out It can be hoped to be successful68 • can obscure the agent at best, and indicate a shirking of responsibility at worst Major investments will be made A woman was attacked • is duller and takes longer to comprehend The programme is required to be reviewed The active voice, however, is not necessarily the best choice in every case. Use the passive if …
- um_writing_style_guide.pdf (504.26 kB, PDF)… begin, intend, hope, order, propose The order was attempted to be carried out It can be hoped to be successful68 • can obscure the agent at best, and indicate a shirking of responsibility at worst Major investments will be made A woman was attacked • is duller and takes longer to comprehend The programme is required to be reviewed The active voice, however, is not necessarily the best choice in every case. Use the passive if …