Void transaction of insolvent bank

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Legal Analysis of bank in the Iranian commercial market based on the theory of transaction costs

Understanding the necessity of establishing a bank in Iran requires a correct realizing of the mechanism of the money market in an era in which banks had no place or position. At that time distrusting on the borrower credits, lack of reliable information about the number and place of lenders, rising interest rates and the prevalence of high- interest borrowing were some of the costs that transa...

متن کامل

What Hinders Investment in the Aftermath of Financial Crises: Insolvent

There are two leading views on how financial crises turn into recessions. The first view highlights the importance of a troubled banking sector that cannot provide credit to domestic firms. The second view stresses the relevance of short-term borrowing in foreign currency and the associated decline in net worth through a weak balance sheet. Both views underline the role of financial constraints...

متن کامل

Two mechanisms of ductile fracture: void by void growth versus multiple void interaction

Two distinct mechanisms of crack initiation and advance by void growth have been identified in the literature on the mechanics of ductile fracture. One is the interaction a single void with the crack tip characterizing initiation and the subsequent void by void advance of the tip. This mechanism is represented by the early model of Rice and Johnson and the subsequent more detailed numerical com...

متن کامل

An Exprimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems

Security for online banking has changed considerably during the relatively short period that online banking has been in use. In particular, authentication and identity management in the early implementations were, and sometimes still are, vulnerable to various attacks such as phishing. Current state-of-the art solutions include methods for re-authenticating users via out-of-band channels for ea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theory and practice of jurisprudence

سال: 2015

ISSN: 2225-6555

DOI: 10.21564/2225-6555.2015.1.63346