Property as sequential exchange: the forgotten limits of private contract
نویسندگان
چکیده
منابع مشابه
Property Versus Contract.∗
There is a fundamental trade-off between protecting property rights and enhancing reliance on contracts when intermediaries have the opportunity to transfer goods without the owner’s consent. If buyers value the good more than original owners, protection of property misallocates value. Instead, enhancing the buyers’ reliance on contracts causes misallocation if owners have the higher valuation....
متن کاملThe Evolution of Private Property
Experimental studies have shown that subjects exhibit a systematic endowment effect. No acceptable explanation for the existence of this behavior has been offered. This paper shows that the endowment effect can be modeled as respect for private property in the absence of legal institutions ensuring third-party contract enforcement. In this sense, “natural” private property has been observed in ...
متن کاملthe limits on freedom of contract based on consumer protection
the principle of freedom of contract is conceptually narrower than the will theory and as such it does not deny the state the right to put limits on contracts between individuals. on this ground some measures have been taking to strike a balance between the interests of the consumers and the producers. among these measures are the compulsory sales to consumers in the case law and on the basis o...
متن کاملFair multi-party contract signing using private contract signatures
A multi-party contract signing protocol allows a set of participants to exchange messages with each other with a view to arriving in a state in which each of them has a pre-agreed contract text signed by all the others. Garay and Mackenzie (GM) proposed such protocol based on private contract signatures, but it was later shown to be flawed by Chadha, Kremer and Scedrov (CKS); the authors CKS al...
متن کاملGone, But Not Forgotten: The Current State of Private Computing
Private data comes in many forms: web browser histories, chat logs, sensitive word processor documents, network proxy logs, and many more. Some applications – primarily web browsers – now support private modes that aim to prevent sensitive information leaks. There are two problems with this application-level approach. First, there are many software engineering challenges in implementing correct...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Institutional Economics
سال: 2017
ISSN: 1744-1374,1744-1382
DOI: 10.1017/s1744137416000473