The Relational Conception of Practical Authority
نویسندگان
چکیده
منابع مشابه
the study of practical and theoretical foundation of credit risk and its coverage
پس از بررسی هر کدام از فاکتورهای نوع صنعت, نوع ضمانت نامه, نرخ بهره , نرخ تورم, ریسک اعتباری کشورها, کارمزد, ریکاوری, gdp, پوشش و وثیقه بر ریسک اعتباری صندوق ضمانت صادرات ایران مشخص گردید که همه فاکتورها به استثنای ریسک اعتباری کشورها و کارمزد بقیه فاکتورها رابطه معناداری با ریسک اعتباری دارند در ضمن نرخ بهره , نرخ تورم, ریکاوری, و نوع صنعت و ریسک کشورها اثر عکس روی ریسک اعتباری داردو پوشش, وثی...
15 صفحه اولRelational Authority and Legitimacy in International Relations
This essay develops a theory of relational authority in the most unpromising setting of international relations. Relational authority locates legitimacy in a social contract between a ruler, who provides a social order of value to the ruled, and the ruled who comply with the ruler's commands necessary to the production of that order. International politics are near universally assumed to be an ...
متن کاملOn Practical Application of Relational Calculus
2 Statically known variable space 3 2.1 Notation and definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Some immediate results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.3 Programs as relations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3.1 Framing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
متن کاملRelational Database: A Practical Foundation for Productivity
The 1981 A(2M Turing Award was presented to Edgar F. Codd, an IBM Fellow of the San Jose Research Laboratory, by President Peter Denning on November 9, 1981 at the A(2M Annual Conference in Los Angeles, California. It is the Association's foremost award for technical contributions to the computing community. (2odd was selected by the A(2M General Technical Achievement Award (2ommittee for his "...
متن کاملCryptDB: A Practical Encrypted Relational DBMS
CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are three novel ideas: an SQL-aware encryption strategy that maps SQL operations to encryption schemes, adjustable query-based encryption which allows CryptDB to adjust the encrypti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Law and Philosophy
سال: 2018
ISSN: 0167-5249,1573-0522
DOI: 10.1007/s10982-017-9323-3