نتایج جستجو برای: rather than liability enforced in accordance with established liability or vice versa

تعداد نتایج: 18666017  

2003
Robin Mason

This paper investigates the optimal management of a firm faced with a long-term liability that occurs at a random date. Three issues are analysed: the optimal dividend policy; optimal expenditure on safety to delay the occurrence of the liability; and the optimal liquidation date of the firm. An owner faced with dynamic unlimited liability never liquidates and therefore accumulates capital to t...

1998
JONATHAN BURNETT

In Sweeney v Boylan Nominees Pty Ltd the High Court affirmed that a principal is not vicariously liable for the negligent acts of an independent contractor. In this case a mechanic engaged by Boylan negligently performed repair work, resulting in an injury to Mrs Sweeney. Since the mechanic was a contractor rather than an employee, Mrs Sweeney was unsuccessful in her action against Boylan. Whil...

Abstract Normal risks are limitations of social life that are different in various situations and are not separable from the essence of life. When these risks make damages to persons, the main question is that weather the approach of tort law towards the compensation of them should be different from other risks or not and what is their role in liability. In this research, after using analyti...

Journal: :مطالعات حقوق خصوصی 0
حسن محسنی استادیار گروه حقوق خصوصی دانشکدۀ حقوق و علوم سیاسی دانشگاه تهران عباس میرشکاری استادیار گروه حقوق دانشکدۀ علوم انسانی دانشگاه علم و فرهنگ

whether for the delay in payment of debt resulting from civil liability can be demand late payment damages? in answering this question, answer of some of lawyers is positive. they believed that late payment damages is accrued to debt resulting from civil liability. because, these creditors are more deserving of protection. also, the word of debt in article 522 of code civil procedure is absolut...

2008
Philip G. Peters Troyen A. Brennan

No tort reform has more potential to improve the quality of medical care and to reduce the frequency of patient injuries than exclusive hospital enterprise liability. Hospital enterprise liability would make hospitals liable for all patient injuries occurring in the hospital that are the product of provider negligence, regardless of the independent contractor status of the providers. In its “ex...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1390

this work is presented in five parts. in the first part preparation of the starting complex [pt(c^n)cl(dmso)], 1, in which c^n = n(1),c(2?)-chelated, deprotonated 2-phenylpyridine, and dmso = dimethylsulfoxide, and its reaction with 1 equiv of the biphosphine ligands bis(diphenylphosphino)amine, dppa, or bis(diphenylphosphino)methane, dppm, to give the complex [pt(c^n)cl(dppa)], 2, or [pt(c^n)c...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده مهندسی 1389

abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...

2000
Hans-Bernd Schäfer Andreas Schönenberger

The purpose of this chapter is to compare negligence rules and strict liability rules and to examine the allocative effects resulting from the application of different liability regimes. It first discusses unilateral accidents, while the more complicated bilateral cases follow afterwards. Each section starts with a discussion of the rule of no liability before moving on to various forms of negl...

2008
Max Mühlhäuser Andreas Heinemann

This part of the book covers liability in ubiquitous computing (UC). The term liability was deliberately chosen for two reasons. Firstly, due to the established understanding of common terms like information assurance, dependability, accountability and the like. Secondly, to provide a superseding term for security for ubiquitous computing, which—unlike traditional IT security—encompasses the fo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید