• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 226
  • 213
  • 25
  • 13
  • 6
  • 2
  • Tagged with
  • 259
  • 259
  • 87
  • 84
  • 72
  • 65
  • 64
  • 55
  • 50
  • 43
  • 43
  • 42
  • 41
  • 41
  • 39
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

智慧財產民事案件之證據保全與秘密保護-以秘密保持命令為中心 / 無

陳增懿 Unknown Date (has links)
民事訴訟法新修正後,新增了確定事、物現狀類型之證據保全,使當事人得利用法院調查蒐集之事證資料,以了解事實或物體之現狀。而為配合智慧財產案件其事證極易隱匿之性質,智慧財產案件審理法第18條第4項規定賦予證據保全制度直接強制力之效果,使證據保全成為智慧財產案件訴訟中具有直接強制力之蒐證手段。惟於智慧財產案件中,尤其是專利侵權案件,兩造多具有商業上之強烈競爭關係,且產品之競爭週期短暫,有可能產生一方當事人以證據保全之名義,實則卻係欲窺探對方商業或技術上營業秘密之行為,因此對於智慧財產證據保全案件之秘密保護即有其必要。而因美國和日本法制均設有秘密保持命令之制度,且為緩和秘密保護與訴訟審理主義間之衝突,故智慧財產案件審理法乃參照日本法之制度,引進秘密保持命令制度。依照目前我國智慧財產案件審理法第11至第15條之規定,秘密保持命令制度可能有以下若干值得討論之問題:秘密保持命令於證據保全程序之應用、法院對於秘密保持命令之審理於裁判、受秘密保持命令拘束之主體範圍以及違反秘密保持命令之刑事責任等,本論文即擬基於前開問題對於秘密保持命令制度進行介紹和提出未來展望。
162

雲端運算時代個資隱私安全之探討 -- 以雲端服務條款為中心 / Privacy and Information Security Issues in Cloud Computing: From the Perspective of Service Level Agreement

孫德沛, Sun, Tei Pei Unknown Date (has links)
雲端運算的特性在於只要連線上雲端服務提供者的平台,隨時隨地就可以享受到最新最便利的雲端服務。雲端運算因此具有使用彈性、接觸容易、擴充迅速及即用即付費的優勢,不用在像過去套裝軟體時代花費成本在軟硬體升級上,所以有愈來愈多的使用者踏入雲端行列,雲端運算技術及服務已成為資訊產業關注的焦點。但是雲端運算的這項優勢卻容易讓人忽略是建立在將資訊傳至雲端伺服器來進行處理、運算及儲存的模式,這固然讓使用者享受到雲端服務,但雲端服務提供者也同樣掌握了使用者資訊,使用者因而不再完全控制資訊的應用及流向,使得資訊外流的可能性大幅增加。這些資訊安全風險可能來自於雲端平台的穩定性或安全漏洞,或者是雲端業者基於商業考量的洩漏給其他廣告贊助商等第三人。雲端服務提供者針對這些資訊隱私安全的疑義,訂立許多雲端隱私權政策及使用條款來規範與使用者間的法律關係。本研究即先從美國法及歐盟安全指令等國際公約著手,探討可以作為網路雲端時代的規範基礎,並以此分析雲端服務的隱私權政策及服務條款。根據這些分析討論的結果,再探討在我國民法、消費者保護法及新修正通過之個人資料保護法之體系下,這些雲端隱私權政策及服務條款的適法性問題。 關鍵字:雲端運算、雲端服務、隱私權政策、服務條款、歐盟安全指令、 個人資料保護法
163

組織文化、智慧資本與組織績效之關係: 知識運用能力的干擾效果 / The relationship among organizational culture, intellectual capital and organizational performance: The moderating effect of knowledge process capability

廖婉鈞, Liao, Wan Chun Unknown Date (has links)
過去研究多直接探討智慧資本與組織績效之關係,隱含假設擁有智慧資本就對組織有利,卻忽略了擁有資源更要懂得使用才能創造價值,哪些因素能促使員工善加運用智慧資本甚少被探討,故本研究整合資源基礎理論與體制理論,主張組織文化的同形力量可指引成功方向,引導組織成員共同運用智慧資本以提升績效,同時,若能各自搭配兩種知識運用能力:(1)獲得型流程能力,適時更新、改善智慧資本內涵,有助於企業因應外界環境變遷;以及(2)保護型流程能力,妥善保護智慧資本,避免被競爭對手模仿或竊取,以延長智慧資本所創造的競爭優勢;將有助於強化智慧資本與組織績效的正向關係。 本研究針對台灣上市上櫃公司隨機抽樣一千家企業發放問卷,問卷分成總經理版與部門經理版,各自寄送,當同一家公司總經理版回卷一份且部門經理版回卷兩份以上才視為有效問卷,最後配對成功樣本為160筆,採用階層迴歸驗證假設,並針對達顯著水準的交乘項繪製交互作用圖,圖中每一條線皆進行簡單斜率檢定,以確認斜率是否顯著不為零。分析結果顯示,組織文化與知識運用能力的交互效果確實會影響智慧資本與績效之關係,不同智慧資本類型需搭配不同的組織文化與知識運用能力組合才能提升組織績效,特別是人力資本的部分,若企業缺乏知識更新機制,需給予員工適當工作彈性或鼓勵創新,才能發揮人力資本對績效的正向影響,否則人力資本甚至會負向影響績效。 為了更細膩了解各產業是否具有特殊現象,本研究又進一步將樣本分為製造業、服務業和高科技產業,補充分析前述研究假設,結果確實呈現各產業重視不同的智慧資本類型,以及個別利於績效提升的智慧資本、組織文化與知識運用能力組合,本研究試圖提供理論解釋與管理意涵,以期彌補過去文獻缺口,並協助實務界發揮智慧資本之真正價值。
164

安全多方計算協定描述語言之設計與實作 / A Protocol Description Language for Secure Multi-Party Computation

黃文楷, Huang, Wen Kai Unknown Date (has links)
安全多方計算的研究主要是針對在分散環境下的兩造(或多方)之間,如何在不透露彼此私有的資料的情況下,計算一個約定函數的問題,並要確保除了計算結果及其可能推導出的資訊,不會洩漏額外的私有資料。依此設計出來的函數算法,稱為安全的多方計算協定(protocol)。 過去兩年本實驗室根據一套基於向量內積運算(scalar product)發展出的安全多方計算方法,設計了一個雛型的分散式系統框架,開發了一套符合其安全要求的常用算數運算函數庫。 但目前個別的應用問題在此系統上發展安全協定的程式時,使用者必須相當熟悉其架構與程式庫細節,才能開發所需程式,造成推廣上的障礙。有鑑於此,本論文採用領域專屬語言(domain-specific language)的方法與技術,針對一般安全多方協定程式的特徵來進行歸納與分析,找出協助其表達計算步驟的適當抽象機制,並在設計上訂定了以下目標: 1. 設計一高階語言用以描述多方安全計算,以提供使用者撰寫安全多方計算程式。 2. 檢查並確保使用者撰寫的程式不會有資訊洩漏。 3. 多方安全運算執行上能保持一定的效率。 4. 建立多方安全計算的運算流程,讓PDL與現有的運作環境配合,達到各伺服器合作運行多方安全計算的目的。 朝向這四個目標發展出一套協定描述語言與其編譯器。以便與SMC-Protocol以及其環境合作,協助領域專家以更簡便的方式來設計與實驗更多的安全多方協定。我們稱此語言為多方安全計算協定描述語言(Protocol Description Language, PDL)。 / Protocols for secure multi-party computation (SMC) allow participants to share a computation while each party learns only what can be inferred from their own inputs and the output of the computation. In the past two years, we developed an SMC implementation framework for both integers and floating numbers which comprises a set of arithmetic operations that manipulate secret values among involved parties using the scalar product protocol as the basis. Such a library of arithmetic operations is call building blocks. But using this library is not easy. To solve individual SMC problem, programmer should knowing the given framework and protocol detail very well. This difficulty makes them won't consider this framework while facing the need of SMC. To ease the writing of more complex user-defined protocols, using the technique of domain-specific language, this thesis analysis the general needs of SMC, develop a domain-specific language of SMC, and implement a compiler that coverts this language to SMC code, which is executable code composed of the protocols of given framework. We called this language Protocol Description Language, PDL.
165

軍事機關國家賠償責任之研究 / The state compensation law in military authority

姚妃宴, Yao, Fei Yen Unknown Date (has links)
本研究之目的係探討國家賠償法於軍事機關之運作,從公務員執行職務行使公權力致生損害之國家賠償責任(即人的責任)與公有公共設施設置或管理欠缺致生損害之國家賠償責任(即物的責任)之兩大主軸討論,並比較日本裁判所之判決與我國對類似案件相關爭點判斷之異同,據以建構軍事機關國家賠償責任之類型,減少可能發生國家賠償責任之爭議。 全文共分為五章:第一章為緒論,說明本研究之動機與目的、研究範圍與限制、研究架構與方法。第二章為國家賠償制度概述,就國家賠償責任之定義及類型、適用之限制、國家賠償責任制度之發展過程、國家賠償責任之理論、公務員責任與國家賠償責任之關係予以討論,藉以確立國家賠償責任認定之法理基礎;並探討日本國家賠償責任成立之案件與我國國賠法制之異同處,藉以參酌我國同類案件之分析與比較。第三章研析闡述特別權力關係之起源、內涵、變遷等,探討公務員、學生、受刑人、軍人在此關係下基本權利之限制與保護。第四章為軍事機關與國家賠償之分析,以第二章國家賠償制度之法理為基礎,彙整相關法令規範,配合相關之法院國家賠償案例,檢討軍事機關公權力行為致生國賠責任之法理與探討軍事設施設置、軍事設施管理造成人民財產之侵害與救濟賠償之認定,並分析軍人撫卹與國家賠償競合之問題。第五章為結論與建議。本章分別就各章之內容總結,具以建立完整之軍事機關國家賠償責任體系,俾提供軍中處理國家賠償案件時之參考;另就研究發現予以歸納評析,並提出建議,例如建立軍事機關公權力行為之行政程序、確實督導軍事設施之設置管理程序,以減少軍中公權力行為之侵權情事,強化其保護照顧義務等等,希冀今後軍事機關對人及對物之管理,能符合依法行政原理之要求。 / This study aims at discussing the State Compensation Law in military authority from two perspectives, including the liability for damages arising from the act of employees of the government acting within the scope of their office (the liability of people), and from a defect in the installation or management of government-owned public facility (the liability of objects). A case study comparison was done between the court of Japan and Taiwan, where the verdicts from both courts were compared so as to construct a pattern for state’s liability in military compensation. We hope that in this way, controversy over state compensation liability could be controlled. The essay is divided into five chapters: the first is introduction, illustrating the motive and purpose, scope and limitation, and structure and method of this study. In chapter two, we will outline the state compensation system, with regard to its definition, classification, applicability, development, theory, and the relationship between the liability of state and public servants, in order to establish a jurisprudential foundation. Then, we will discuss the differences and similarities between the compensation claims in Japan and our country’s State Compensation Law, while analyzing similar cases in Taiwan. The origin, content, changes of special power relation will be examined in chapter three, where the limitation and protection of basic rights of public servants, students, prison inmates, and soldiers are discussed. In chapter four, we will use the jurisprudential foundation stated in chapter two to analyze the military authority and state compensation. By compiling relevant regulations and state compensation claims, we will do a judicial review on the state compensation claims as a result of military authority, the definition of compensation and damages arising from the installation or management of military facility, and the competition between military indemnity and state compensation. Chapter five will be conclusion and suggestion, containing appraisal of each chapter and constructing a system of complete state compensation liability in military authority, as a reference for future claims. In addition, important remarks and suggestion will be provided, such as to establish administrative procedure for military authority and management procedure of military facility. This is to prevent the violation of right from the military, and enhance their obligation to protect and attend, hoping the military could build the rule of law when managing objects and actions of people.
166

我國與美國聯邦對身分竊用法律之比較研究 / A comparative study on the identity theft related laws and practices of Taiwan (R.O.C.) and U.S.A

徐子文, Hsu, Tzu Wen Daniel Unknown Date (has links)
因為資通訊科技之普及發達,提升經濟、社會活動的便捷性並豐富人們的生活品質,但一面兩刃,它同時也蘊藏了新興犯罪的機會,對經濟、社會活動之正常運作帶來威脅。其中,身分資料偷竊及身分冒用(以下簡稱「身分竊用」),已然成為資訊社會時代嚴重的新興犯罪之一。「身分竊用」一般俗稱為「身分竊盜」,其係由英文原文identity theft直譯而來。其實身分無從竊盜起,英文原文的identity theft其實也是簡稱,完整的意義是identity theft and assumption,係指行為人未經授權擅用他人用已表彰其身分的證明或資訊,從而冒用他人之身分,遂行各式活動。本研究為求接近其實際文意內涵,在本研究中將其譯為「身分竊用」。 同為自由開放和高度科技化之社會,美國法律制度和社會機制環境雖與我多有不同,但其面對相同問題時的所受之影響和相對處理方式,或可為我國在處理同類問題時之參考。美國在身分竊用之相關法律,自從1970年代以降,至少制定20件以上的相關法律。先是從個人金融隱私權的保護著手,如在1970年制定《公平信用報告法》(FCRA)、1974年所制定的《隱私權法》(Privacy Act)。1998年則進一步制定通過《身分竊用嚇阻法》(Identity Theft and Assumption Deterrence Act),明文規範「身分竊用」為刑事犯罪行為。《身分竊用嚇阻法》最重要價值是確認了身分被竊用的人也是犯罪被害者,相較於之前只有因犯罪者使用身分竊用手法而被詐騙失去財務的人才被認為是受害者 ,有了很大的進步。而之後的法律制定和實務處理即朝向個人資料保護、身分竊用預防和損害抑制,以及執法訴追等方向前進。 本研究以身分識別理論為起點,探討身分竊用在現代資訊社會中之角色和因身分識別資料被竊取冒用所發生之行為對個人社會和經濟的影響,蒐集美國聯邦自1970代迄今所制定和處理身分竊用相關之法律並予以摘錄分類,最後比較兩國對身分竊用問題處理之異同,並嘗試提出借鏡調和應用的建議。本研究蒐集整理,並將其群組為四種類型。分別是:(一)身分竊用罪法群;(二)個人身分證之相關法群;(三)消費者信用報告法群,以及(四)個人資料保護法群。 本研究發現,我國和美國雖然均面臨到身分竊用的問題,但因為國情和制度的不同,所受到的影響程度和所採取對應問題的方式也因此不同。例如:我國和美國在對個人識別號碼的態度和處理不同,美國是盡量打破個人利用單一獨特(unique)號碼進行識別的機制,而我國則是大量的使用。在個人身分證明文件上,我國較為統一,美國則較為分散,迄今尚未有全國統一性的身分識別證。在個人識別資料庫的建置和運用上,我國相對集中,美國重分散。我國對個人資料的保護是遵循歐盟模式,採取從上而下立法的方式。相反的,美國在個人資料保護作為上比較傾向建置一個結合法規、命令和自我管理的架構,而非由政府制訂的單一法規,係採由下而上模式。我國現在使用的國民身分證和身分證號在實體世界所建構的通用身分識別體系,因為個人資料庫雖分散但可集中連線查詢管理的特性,其在身分竊用防制機制的優勢因此建立。美國在對抗身分竊用問題所採取的方式雖因為國情和歷史的不同而和我國有相當程度的差異,但其在犯罪嚇阻控制上特別注意建立執法機關的查緝能力、訴追工具和司法機關量刑裁判的嚇阻效益,仍值得我國學習。本研究對於「美國聯邦量刑委員會」在其《量刑基準》上針對身分竊用罪的量刑考量及該委員會如此設計之源由稍有描述,或可為後續研究或實務參考之用。 / Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The first victim of identity theft is the person whose identity has been assumed by the identity thief and this person can suffer adverse consequences if they are held accountable for the perpetrator's actions. The other victims are those who were defrauded by identity theft tactics. Along with the prevalence of information and communication technology, identity theft is becoming a great threat to common people and even to national security. This study has collected more than 20 pieces of U.S.A. federal acts and statutes that related to combating identity theft problems. This study then categorizes then into 4 groups, namely 1) identity theft criminalization; 2) national personal identification system; 3) consumer credit report; and 4) personal data protection. In the mean time, this study also collected related laws and Taiwan (R.O.C.) for comparison. The government organization structures and legal systems between U.S.A. and Taiwan (R.O.C.) are very different, though the common goal of fighting identity theft is the same; the measures are quite different as well. In short, in terms of laws and personal identification system, the U.S.A. is more decentralized while in Taiwan (R.O.C.) it is more centralized. Taiwan (R.O.C.) has a national-wide and unified personal identification system that put it in a better position to respond and mitigate to identity theft impacts. On the other hand, from the law enforceability aspect, the study finds the U.S.A. provides better tools to law enforcement agencies and prosecutors to bring the offenders to justice in court and the judges have relatively more clear guidelines for case consideration and sentence.
167

公務機關之間傳輸個人資料保護規範之研究-以我國、美國及英國法為中心 / A Comparative Study of Regulations for the Protection of Personal Data Transmitted between Government Agencies in Taiwan, the U.S. and the U.K.

林美婉, Lin, Mei Wan Unknown Date (has links)
政府利用公權力掌握之個人資訊包羅萬象,舉凡姓名、生日、身分證字號、家庭、教育、職業等。科技進步與網際網路發達,使原本散置各處之資料,可以迅速連結、複製、處理、利用;而為了增加行政效率與減少成本,機關透過網路提供公眾服務日益頻繁,藉由傳輸共用個人資料等情況已漸成常態。這些改變雖然對政府與民眾帶來利益,但是也伴隨許多挑戰,尤其當數機關必須共用資訊時,將使管理風險更添複雜與難度,一旦過程未加妥善管制,遭人竊取、竄改、滅失或洩露,不僅當事人隱私受損,也嚴重傷害政府威信。因此,凡持有個人資料的政府機關,均必須建立適當行政、技術與實體防護措施,以確保資料安全與隱密,避免任何可能危及資料真實之威脅與機會,而造成個人人格與公平之侵害。   隨著全球經濟相互連結以及網路普及,個人資料保護如今已是國際事務,這個趨勢顯現在愈來愈多的國家法律與跨國條款如OECD、歐盟、APEC等國際組織規範。而在先進國家中,美國與英國關於資訊隱私法制發展有其不同歷史背景,目前美國聯邦機關持有使用個人資料必須遵循的主要法規為隱私法、電腦比對與隱私保護法、電子化政府法、聯邦資訊安全管理法,以及預算管理局發布的相關指導方針;英國政府則必須遵守人權法與歐盟指令架構所制定的資料保護法,並且受獨立資訊官監督審核。此外,為了增加效率,減少錯誤、詐欺及降低個別系統維護成本,公務機關之間或不同層級政府所持有之個人資料流用有其必要性,故二國在資料傳輸實務上亦有特殊規定或作業規則。相較之下,我國2012年10月1日始施行的「個人資料保護法」對於公部門間傳輸個人資料之情形並無具體規定,機關內外監督機制亦付之闕如,使個人資料遭不當使用與揭露之風險提高。 為了保障個人資訊隱私權,同時使公務機關之間傳輸利用個人資訊得以增進公共服務而不違反當事人權益,本研究建議立法或決策者可參酌美國與英國法制經驗,明定法務部負責研擬詳細實施規則與程序以供各機關傳輸個人資料之遵循,減少機關資訊流用莫衷一是的情況;而為保證個人資訊受到適當保護,除了事先獲得當事人同意外,機關進行資料共用之前,應由專業小組審核,至於考慮採取的相關重要措施尚有:(1)建置由政策、程序、人力與設備資源所組成之個人資訊管理系統(PIMS),並使成為整體資訊管理基礎設施的一部分;(2)指派高階官員負責施行及維護安全控制事項;(3)教育訓練人員增加風險意識,塑造良好組織文化;(4)諮詢利害關係人,界定共用資料範圍、目的與法律依據;(5)實施隱私衝擊評估(PIA),指出對個人隱私的潛在威脅並分析風險減緩替代方案;(6)簽定正式書面契約,詳述相關權利與義務;(7)執行內外稽核,監督法規遵循情況,提升機關決策透明、誠信與責任。 關鍵詞:個人資料保護、隱私權、資訊隱私、資料傳輸、資料共用 / Governments have the power to hold a variety of personal information about individuals, such as the name, date of birth, I.D. Card number, family, education, and occupation. Due to advanced technology and the use of the Internet, personal data stored in different places can be connected, copied, processed, and used immediately. It is relatively common for government agencies to provide people with services online as well as transmit or share individual information to improve efficiency and reduce bureaucratic costs. These changes clearly deliver great benefits for governments and for the public, but they also bring new challenges. Specifically, managing risks around sharing information can sometimes become complicated and difficult when more than one agency is involved. If the government agency which keeps personal information cannot prevent it from being stolen, altered, damaged, destroyed or disclosed, it can seriously erode personal privacy and people’s trust in the government. Therefore, each agency that maintains personal data should establish appropriate administrative, technical, and physical safeguards to insure the security and confidentiality of data and to protect against any anticipated threats or hazards to the integrity which could result in substantial harm on personality and fairness to any individual . As the global economy has become more interconnected and the Internet ubiquitous, personal data protection is by now a truly international matter. The trend is fully demonstrated by the growing number of national laws, supranational provisions, and international regulations, such as the OECD, the EU or the APEC rules. Among those developed countries, both the U.S. and the U.K. have their historical contexts of developing legal framework for information privacy. The U.S. Federal agency use of personal information is governed primarily by the Privacy Act of 1974, the Computer Matching and Privacy Protection Act of 1988, the E-Government Act of 2002 , the Federal Information Security Management Act of 2002, and related guidance periodically issued by OMB. The U.K. government has to comply with the Human Rights Act and the Data Protection Act of 1998 which implemented Directive 95/46/EC. Its use of individual data is overseen and audited by the independent Information Commissioner. Further, because interagency data sharing is necessary to make government more efficient by reducing the error, fraud, and costs associated with maintaining a segregated system, both countries have made specific rules or code of practice for handling the transmission of information among different agencies and levels of government. By contrast, Taiwan Personal Information Protection Act of 2010 which finally came into force on 1 October 2012 contains no detailed and clear provisions for data transmitted between government agencies. Moreover, there are also no internal or external oversight of data sharing practices in the public sector. These problems will increase the risk of inappropriate use and disclosure of personal data. To protect individual information privacy rights and ensure that government agencies can enhance public services by data sharing without unreasonably impinging on data subjects’ interests, I recommend that law makers draw on legal experiences of the U.S. and the U.K., and specify that the Ministry of Justice has a statutory duty to prescribe detailed regulations and procedures for interagency data transmission. This could remove the fog of confusion about the circumstances in which personal information may be shared. Also, besides obtaining the prior consent of the data subject and conducting auditing by a professional task force before implementing interagency data sharing program, some important measures as follows should be taken: (1) Establish a Personal Information Management System which is composed of the policies, procedures, human, and machine resources to make it as part of an overall information management infrastructure; (2) Appoint accountable senior officials to undertake and maintain the implementation of security controls; (3) Educate and train personnel to raise risk awareness and create a good organizational culture; (4) Consult interested parties and define the scope, objective, and legal basis for data sharing; (5) Conduct privacy impact assessments to identify potential threats to individual privacy and analyze risk mitigation alternatives; (6) Establish a formal written agreement to clarify mutual rights and obligations; (7) Enforce internal as well as external auditing to monitor their compliance with data protection regulations and promote transparency, integrity and accountability of agency decisions. Key Words: personal data protection, privacy rights, information privacy, data transmission, data sharing
168

澳門本地環境教育課程發展之行動研究 / Action research of the development of the curriculum concerning local environmental education in Macao

黃雪明 January 2008 (has links)
University of Macau / Faculty of Education
169

澳門特區政府的政策過程研究 : 以文化遺產政策為例 / Policy process studies in Macau SAR Government : a case study of the cultural heritage policy in Macau

譚志廣 January 2009 (has links)
University of Macau / Faculty of Social Sciences and Humanities / Department of Government and Public Administration
170

論股份有限公司資本制度--以具體規範之探討為核心

許坤皇 Unknown Date (has links)
在股東負擔有限責任之前提下,為衡平股東與公司債權人之利益,避免僅有股東享有有限責任之絕對優勢,故大陸法系對公司債權人債權實現之保障採取事前管制措施,對於公司資本與資金之使用設有多重限制,寄望公司資本能成為公司債權人實現債權之屏障,因而有資本三原則之設計。惟此制從其所架構之原型到現在已經過相當之修正,我國法之具體落實規範亦已與其原本之設計架構產生相當大之落差,其原本所欲達成之制度目標因而多有未竟其功之處,其存在實益因而飽受質疑。 惟此究係理論本身之問題,抑或是具體落實規範有所不足?實有探究之必要。本論文就理論面出發,分析資本三原則之設計架構是否妥適,並於討論我國法之具體規範發展過程後,再比較美國法及日本法,檢討我國現行規定之妥當性,進而於有所不妥之處,試著提出解決之道。 本文所探討之重點規範如下: 一、資本確定原則部分: 法定資本制、折衷式授權資本制、授權資本制。 二、資本維持原則部分: 股份折價發行之禁止與例外、出資標的、股份回籠禁止原則與例外、盈餘分派與公積制度。 三、資本不變原則部分: 減資態樣、保障公司債權人程序。

Page generated in 0.0324 seconds