The concepts, policies, laws and practices regarding community-based forest management have changed over time. However, their objective is constant, namely to fight forest destruction and poverty... Show moreThe concepts, policies, laws and practices regarding community-based forest management have changed over time. However, their objective is constant, namely to fight forest destruction and poverty and to resolve conflicts regarding forest tenure. Securing community forest tenure is a way for achieving this objective. Forest tenure security, however, requires more than legalisation of community property rights by state law. It results from an interplay between state and/or community normative systems, actual practices and actors’ perceptions. Legalisation of rights by state institutions is only one facet of security, more specifically legal security of forest tenure that will be determined by the rights’ robustness, proper duration and strong legal protection. The security of community forest tenure will be also achieved through the ability of social norms to secure the rights of ordinary people. In addition, the consistent enforcement of the rules or norms by the officials or local authorities is necessary and the behaviour of these officials and local authorities must be in line with the interests and perception of the majority of community members. Last but not least, efforts of securing communities’ rights must take into consideration the specific history of land tenure and conflicts. Show less
This book focuses on the observationes tumultuariae of Cornelis van Bijnkershoek and the observationes tumultuariae novae of his son-in-law Willem Pauw. Between 1704 and 1787, therefore during... Show moreThis book focuses on the observationes tumultuariae of Cornelis van Bijnkershoek and the observationes tumultuariae novae of his son-in-law Willem Pauw. Between 1704 and 1787, therefore during virtually the entire eighteenth century, both these judges and presidents of the Supreme Court of Holland, Zeeland and West Friesland recorded their opinions about the judgements of the Supreme Court on paper for their own personal use. There are a total of more than five thousand observationes, of which 186 relate in full or in part to commercial partnerships. This book describes these specific cases of commercial partnerships the Court dealt with, the rise of corporations, and company law in general. Show less
This thesis intends to identify the systemic causes of corruption in China’s courts by firstly investigating how corruption is carried out in China’s courts. It employs an analytical framework,... Show moreThis thesis intends to identify the systemic causes of corruption in China’s courts by firstly investigating how corruption is carried out in China’s courts. It employs an analytical framework, which treats corruption as a four-phase contracting process, namely 1) the phase of initiation of the exchange; 2) the phase of negotiation of the exchange; 3) the phase of contractual performance; and 4) the phase of enforcement of the contract in case of non-performance. This framework is employed in an endeavor to analyze the empirical data collected from various sources and to demonstrate in details the features and patterns of corrupt conduct in each of the four phases so as to identify more accurately which factor(s) has(have) facilitated corruption in China’s courts. In doing that, the thesis identifies two phases that are most critical to the completion of corrupt exchange. The first phase is the initiation phase, in which corrupt intent is communicated between potential exchange parties. The second phase is the phase of contractual performance, especially that of the bribed. These two phases are further examined, demonstrating how these two phases are completed by corruption participants in China’s courts and what factors have facilitated the process and contributed to its “success”. Show less
Omgevingsanalyse van onze samenleving toont aan dat door de toenemende informatisering privacyproblemen (identiteitsfraude, datalekken) zullen toenemen. Door gegevensontdekkende-, gegevensvolgende-... Show moreOmgevingsanalyse van onze samenleving toont aan dat door de toenemende informatisering privacyproblemen (identiteitsfraude, datalekken) zullen toenemen. Door gegevensontdekkende-, gegevensvolgende- en gegevenskoppelende technologieën erodeert de privacy van de burger in onze risico-toezichtmaatschappij ernstig. Het vertrouwen in het gebruik van ICT en het elektronisch zaken doen komt hierdoor sterk onder druk te staan.Er bestaat uitvoerige Europese wet- en regelgeving om onze privacy te beschermen. In dit boek is deze wetgeving geanalyseerd. De wetsartikelen die direct betrekking hebben op de verwerking van persoonsgegevens kunnen beschouwd worden als de juridische specificaties voor het ontwerp van informatiesystemen. De wetgeving verplicht tot een privacyrisico analyse voorafgaande aan het gebruik van informatiesystemen. Dit vindt nauwelijks plaats. In dit boek worden zeven privacy bedreigingsanalyses (o.a PIA) besproken. Met de privacyrisicoanalyse kan opdrachtgevers en ontwerpers van informatiesystemen de potentiële risico’s voor de privacy van de burger in kaart te brengen. Uit onderzoek is duidelijk geworden dat persoonsgegevens het best beschermd kunnen worden als bij de verwerking van de persoonsgegevens de identificeerde gegevens direct worden scheiden worden van andere gegevens. Privacy Enhancing Technologies (PET), die de juridische vereisten omzetten in technische specificaties, kunnen hiervoor zorgdragen. De inhoud, reikwijdte en succesvolle toepassingen van PET worden in dit boek uiteengezet.Aan de hand van de Diffusion of Innovation (DOI) theorie van Rogers kunnen de positieve en negatieve factoren voor organisaties worden vastgesteld, die van invloed zijn op het invoeren van identity en access management, privacy bescherming en de adoptie van PET voor de bescherming van persoonsgegevens. Bovendien is gebleken dat de maturiteit van de organisatie bepalend is of de organisatie aandacht besteedt aan privacybescherming. Met de in dit boek toegelichte Return On Investment (ROI) formules kan de economische rechtvaardiging voor privacy beschermende investeringen worden onderbouwd. Het boek sluit af met een stappenplan om privacyveilige informatiesystemen in organisaties te implementeren en doet tien aanbevelingen Show less
Gebonden door de computer We kopen en verkopen graag via internet. Steeds vaker worden daarbij handelingen verricht door de computer, zonder dat we toezien op elke individuele handeling ervan. Zo... Show moreGebonden door de computer We kopen en verkopen graag via internet. Steeds vaker worden daarbij handelingen verricht door de computer, zonder dat we toezien op elke individuele handeling ervan. Zo kunnen we met de veilingsite eBay automatisch een product kopen of verkopen: de site brengt automatisch biedingen uit, en neemt ze in ontvangst. Bol.com laat zijn webwinkel automatisch bestellingen in ontvangst nemen en automatisch bevestigen. De mens stelt de randvoorwaarden vast, maar de machine verricht de handeling. Dat er dingen fout kunnen gaan, moge duidelijk zijn. Op de website van postorderbedrijf Otto werd per abuis een TV te koop aangeboden voor nog geen tiende van de prijs. Binnen enkele dagen werden er 14.000 exemplaren besteld. Wie had het recht aan zijn kant? De Duitse rechter achtte een man gebonden aan de verkoop van zijn auto voor de helft van de prijs: hij was vergeten een minimumprijs in te vullen bij de internetveiling. Proefschrift “Automatisch contracteren” In zijn proefschrift, “Automatisch contracteren”, gaat Marten Voulon in op de vraag wanneer mensen gebonden zijn aan de handelingen van machines. Daarbij komen ook de hierboven genoemde voorbeelden aan de orde. Andere onderwerpen die in dit proefschrift aan de orde komen, zijn rechtssubjectiviteit voor machines, het moment van totstandkoming van een overeenkomst, algemene voorwaarden en de automatisch geplaatste elektronische handtekening. Show less
Constitutionalism is the permanent quest to control state power, of which the judicial review of legislation is a prime example. Although the judicial review of legislation is increasingly common... Show moreConstitutionalism is the permanent quest to control state power, of which the judicial review of legislation is a prime example. Although the judicial review of legislation is increasingly common in modern societies, it is not a finished project. This device still raises questions as to whether judicial review is justified, and how it may be structured. Yet, judicial review’s justification and its scope are seldom addressed in the same study, thereby making for an inconvenient divorce of these two related avenues of study. To narrow the divide, the object of this work is quite straightforward. Namely, is the idea of judicial review defensible, and what influences its design and scope? This work addresses these matters by comparing the judicial review of legislation in the United Kingdom (the Human Rights Act of 1998), the Netherlands (the Halsema Proposal of 2002) and the Constitution of South Africa of 1996. Show less
Mobile phones and other smart connected devices have fundamentally changed contemporary life. Globally, we see unprecedented explosion of new generation mobile phones. More precisely, mobile... Show moreMobile phones and other smart connected devices have fundamentally changed contemporary life. Globally, we see unprecedented explosion of new generation mobile phones. More precisely, mobile communication is nowadays really pervasive in social life. For instance, children and young persons are emerging as active players in the wonderful world of ringing and being ringed. Many of them are attracted by intriguing ring tones. However, the rapid mobile diffusion among children and young people raises a number of crucial questions. In what way do mobile phones pose a threat to children and young people in terms of content, contact, and commercialism? What impact does the use of mobile communication technology have on children and young people? How might we seek to address the inadequacies in the existing regulatory framework with regards to the protection of this vulnerable group? The purpose of our investigations is to compare the regulatory measures as adopted in Hong Kong with regulatory practices and arrangements of other jurisdictions. The main idea is to develop via comparison a viable regulatory strategy in mobile content regulation that is applicable in Hong Kong as well as worldwide. Show less
The thesis is concerned with the protection of users of Free Software. Free Software is available together with the rights to use, develop, and distribute them. The Free Software Definition... Show moreThe thesis is concerned with the protection of users of Free Software. Free Software is available together with the rights to use, develop, and distribute them. The Free Software Definition specifies the exact scope of these rights (called “user freedoms”). The thesis presents a reconstruction and an analysis of the model of the current framework that regulates the protection of the freedoms.The reconstructed framework consists of rules that enable users to exercise their freedoms, as well as the rules that limit or restrict users in exercising them (so-called “inefficiencies”). The main operational practices are analysed in the world of software communities and in the world of eGovernments.Properly organized communities are able to minimize many inefficiencies materially. eGovernments are able to affect how the inefficiencies of the current framework impact user freedoms. Whether eGovernments improve the protection of user freedoms depends on what type of an eGovernment is introduced (open or closed eGovernements).All in all, it follows from the given analysis that the freedoms are not sufficiently protected under the current framework. Given that finding, the thesis proposes improvements that should be implemented into the current framework so that the freedoms are adequately protected. Show less
In several continental Western European legal systems, a person may be liable in person or through his property for payment of a debt which is not his. Both personal surety and a pledge which has... Show moreIn several continental Western European legal systems, a person may be liable in person or through his property for payment of a debt which is not his. Both personal surety and a pledge which has been alienated by its owner come to mind. Under such circumstances, the question rises whether a creditor can attach the surety or the pledge before seeking payment from the debtor. According to classical Roman law, the creditor had a right to choose. However, emperor Justinian changed the law in this regard, forcing the creditor to first seek recourse against his debtor, even to the point of insolvency proceedings. This rule later became known as the ‘beneficium ordinis’ or ‘beneficium excussionis / discussionis’. Over the ages, the rule has come under severe attack, which resulted in it either being abandoned or modified, so as not to interfere with creditors’ rights. The author tracks these developments through the medieval European ‘ius commune’ into French law, Roman-Dutch law and modern Dutch law. The latter has extended the rule in 1992 for real security interests, while at the same time abandoning it for sureties. It is asserted that this was a mistake and the rule should be abolished entirely. Show less
Recente technologische ontwikkelingen en een toenemende belangstelling voor veiligheidsdenken hebben tot verschuivingen geleid in het privacyrecht. Een stringent privacyrecht staat mogelijk een... Show moreRecente technologische ontwikkelingen en een toenemende belangstelling voor veiligheidsdenken hebben tot verschuivingen geleid in het privacyrecht. Een stringent privacyrecht staat mogelijk een effectief optreden van de politie en het openbaar ministerie tegen onder meer terroristen, fraudeurs en veelplegers in de weg. Daarom worden ruimere bevoegdheden tot het gebruik van persoonsgegevens door politie en justitie noodzakelijk geacht. Om die reden is de Wet politieregisters (Wpolr) per 1 januari 2008 vervangen door de Wet politiegegevens (Wpolg). Diepgaand onderzoek naar de Wpolr leidde tot diverse knelpunten. De vraag is of de Wpolg in staat is de verwerking van politiegegevens effectie ver te waarborgen dan zijn voorganger. De auteur geeft op overzichtelijke wijze inzicht in de veranderingen in het wettelijk regime met de komst van de Wpolg. Het gaat dan om de bevoegdheden tot gegevensverwerking, het kennisnemingsrecht en controle en toezicht op politiële gegevensverwerking. Verder wordt ook de fundamentele vraag onderzocht welke belangen in het gedrang komen bij de verwerking van politiegegevens. Ons onderzoek geeft duidelijk aan dat door de Wpolg meer grondrechten beschermd zouden moeten worden dan het recht op privacy alleen. Met de komst van de Wpolg is de discussie over de reikwijdte en betekenis van de bevoegd - heden tot politiële gegevensverwerking dan ook geenszins ten einde, aldus de auteur. Show less
The PhD dissertation is centered on a specific legal phenomenon as occurred during a specified period of time and within a specific legal jurisdiction. The main purpose of the relevant research... Show moreThe PhD dissertation is centered on a specific legal phenomenon as occurred during a specified period of time and within a specific legal jurisdiction. The main purpose of the relevant research-study is not to introduce a new legal theory or to challenge any existing legal thoughts, but rather to share a valuable experience that took place in Indonesia legal system and its legal tradition. On the one hand, it is about a government program/undertaking that was carried out by the Indonesian Banking Restructuring Agency (“IBRA”) to confront and overcome the 1997 financial currency crisis and its’ adverse consequences. On the other hand, it is about “the legal bond” between the controlling shareholders of IBRA banks and the State of Indonesia, as regulated for and/or contracted in peculiar settlement agreements. The “Shareholder Settlement Program”, and the associated “settlement agreements”, contained many interesting matters that could be viewed, studied, debated, and elaborated from various disciplines of law and legislation, such as the administrative law, criminal law, banking law, corporate law, and contract law. Nevertheless, the PhD research-study will focus on particular juridical undertaking, i.e. “exchanges of promissory obligations and the fulfillment thereof” between owners of IBRA banks and IBRA under the auspices of the Shareholder Settlement Program. The actual execution of the program will be elaborated in analytical-descriptive manner, based on juridical-normative research methodology and empirical-illustrative analysis of the relevant research materials and tools. The research-study does not intend to address and answer all the inquiries and reservations pertaining to the Shareholder Settlement Program, and the associated legal bond between IBRA and IBRA banks’ owners, and focuses on the following focal points and inquiries: First, in light of the importance of safe and sound banking system, did the condition of the banking system in Indonesia in 1997 inevitably lead to the difficulties that endangered the sustainability of the national economy? Second, were the out-of-court method and mechanism of the Shareholder Settlement Program, a much-preferred alternative during the unprecedented systemic banking crisis and the economic meltdown in 1997? Third, were all shareholder settlement agreements under the auspices of the Shareholder Settlement Program valid and legally binding civil-law contracts? Fourth, were the judiciary’s stand-points on IBRA and the important mission of the Shareholder Settlement Program contributed positively to the prevailing legal system and tradition? In addition to the aforesaid line of thought, the research-study is also based on certain “theoretical framework” mainly aimed to answer specified questions regarding the probable existence of economic considerations/behavior behind the legal phenomenon as studied. The economic analysis of laws offers additional hindsight about the Shareholder Settlement Program and the relevant socio-economic perspectives. This type of analysis constitutes an important complementary element in the research-study undertaking, while focusing on “the out-of-court feature”, “the enforceability of settlement agreements”, and “the relevant judicial stand-points”. It is proposed by the research-study that there may have been more than one economic considerations and justifications behind the juridical events, and yet an economic theory of law will not capture the full complexity, richness, and perplexity surrounding the subject matters that it seek to illuminate. The research-study was motivated by the urge to share valuable experiences relating to the Indonesian legal system and the legal tradition, which may be useful for future references and decision making. Show less