نتایج جستجو برای: breach flow
تعداد نتایج: 486434 فیلتر نتایج به سال:
In her engaging and useful book, Accounting for Profit for Breach of Contract: Theory and Practice, Katy Barnett presents a theory of disgorgement damages for breach of contract. This is a welcome publication, as disgorgement damages continue to present both theoretical and practical puzzles for the law of contract, and Barnett makes a valuable contribution to this important topic. By way of ba...
Responsible developers work hard to produce secure, reliable, and efficient software packages. No company wants its integrity compromised by hackers, employees, or legitimate users. Negative publicity damages a firm’s reputation. Legal proceedings can cost an organization millions and destroy any chance of long-term success. Realistically, few products are released without security flaws. Progr...
With the knowledge that team work is not always associated with high(er) performance, we draw from the Multi-Level Theory of Psychological Contracts, Person-Environment Fit Theory, and Optimal Distinctiveness Theory to study shared perceptions of psychological contract (PC) breach in relation to shared perceptions of complementary and supplementary fit to explain why some teams perform better t...
We argue that enforcement costs, ignored in the literature on ‘efficient breach’, are important for the choice of contract breach remedy. Empirically we find that specific performance is almost never claimed in Civil Law countries. It involves forcing a party in breach to perform actions while damages involves extracting only a monetary payment. The former is more difficult and more coercive. W...
In wireless sensor networks, sensors can be equipped with one or more sensing components. An atomic event can be detected using one sensing component.A composite event is the combination of several atomic events. Themonitored area is divided into grids. To achieve high reliability, the composite event must be k-watched in each grid. Otherwise, a detection breach occurs. In this paper, we study ...
A violation of trust can have quite different consequences, depending on the nature of the relationship in which the trust breach occurs. In this article, we identify a key relationship characteristic that affects trust recovery: the extent of relationship experience before the trust breach. Across two experiments, this investigation establishes the behavioral effect that greater relationship e...
Password-based authentications using smart cards are very necessary between login users and a remote server. Smart card security breach threatens the security of password-based authentication schemes with smart cards. A password-based authentication scheme with smart cards against smart card security breach was proposed by C.T. Li et al. recently. However, it is noted that Li et al.'s scheme ne...
Article history: Received 10 March 2010 Available online 16 September 2010 This study tested the mediating role of violation in the relationship between breach and both affective and continuance commitment and the extent to which this mediating role is moderated by exchange imbalance amongst a sample of 103 sales personnel. Results suggest that violation mediated the relationship between breach...
This paper is about the remedy of disgorgement for breach of contract. In it I argue for two conclusions. I first argue that, prima facie at least, disgorgement damages for breach of contract present something of a puzzle. But second, I argue that if we pay close attention to the notion of contractual performance, this puzzle can be resolved in a way that is consistent with principles of correc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید