• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 84
  • 72
  • 71
  • 22
  • 18
  • 16
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 342
  • 56
  • 50
  • 45
  • 39
  • 36
  • 35
  • 32
  • 26
  • 26
  • 22
  • 20
  • 19
  • 19
  • 19
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
271

Analýza výluk železničních tratí / Analysis of Railway Tracks Possessions

Malý, Tomáš January 2014 (has links)
The diploma thesis deals with organization and planning railway tracks possessions. The first part includes introduction to basic terms. The second one continues with analysis of regulation of planning railway tracks possessions provided by SŽDC. Then the thesis points at the deficiencies in relation to relations between the railway operator and operator of the railway transport. The last part analyzes the costs, additional costs and lost profits of affected entities in connection with the selected tracks possessions.
272

Tvorba vnitropodnikových směrnic ve vybrané firmě / Creation of Interdepartmental Directions in a Selected Firm

Trkalová, Žaneta January 2009 (has links)
This thesis focuses on the area of register and account of long-term material possession according to accounting legislative and American accounting US GAAP. The main goal of this thesis is to analyze current situation of register and account in selected company. The main solution is proposition of internal directive. All suggested solutions emerge from completed analysis.
273

Kommersiella hyresavtal i förändring : Co-working - En perfekt kompromiss? / Commercial Leases in Change

Hansols, Caroline, Steffensen, Cassandra January 2019 (has links)
Följande rapport kommer redogöra för den hyresrättsliga aspekten på det nya fenomenet co-working.Undersökningen genomförs genom att granska ett antal avtal som används av aktörer på marknaden i Stockholm.Co-working tar sin början i San Fransisco 2005 och har sedan dess vuxit explosionsartat. Konceptet går ut på attupplåta flexibla arbetsplatser i olika former och detta väcker frågeställningen huruvida hyresavtal föreligger. Det ansesföreligga i de fall samtliga rekvisit i 12 kap 1 § JB är uppfyllda. Särskilt intressant är rekvisiten ”hus eller del av hus”och ”upplåts till nyttjande”. Detta p.g.a. att objektet för upplåtelse inte är byggnadstekniskt avskilt och att utrymmet ivissa fall delas med flera andra. Inom ramen för rapporten har fyra olika medlemskapstyper definierats ochundersökningen visar att några av dessa kan anses utgöra hyresavtal, detta innebär att hyreslagens regler ska tillämpaspå medlemskapen. Hyreslagens syfte är att verka som skyddslagstiftning och av vikt blir därför hyresgästernas skydd.Undersökningen har haft särskilt fokus på reglerna om uppsägningstider och indirekt besittningsskydd då dessasannolikt har störst ekonomisk påverkan för inblandade parter. Undersökningen har visat att avtalen som skrivs innehåller flera brister både vad gäller uppsägningstider och indirektbesittningsskydd. Dagens lagstiftning har visat sig flexibel nog att tillämpa på dessa flexibla arbetsplatser. För attaktörerna ska kunna åstadkomma den avsedda flexibiliteten behöver avtalen skrivas om. Ett förslag är att aktörernaskriver avtalen på bestämd tid vilket ger dem möjlighet att tillämpa kortare uppsägningstider. Vidare kan aktörernaavtala bort det indirekta besittningsskyddet genom att inhämta godkännande från hyresnämnden. På detta sätt kanaktörerna fortsätta bedriva verksamheten i enlighet med gällande lagstiftning samtidigt som användarna får tillgångtill lättillgängliga och flexibla hyresavtal för kontorsplatser. / The following thesis will describe the legal aspects of the new phenomena co-working. The study will beimplemented by reviewing a selected number of contracts that are used by actors on the market for co-working inStockholm. Co-working took its form 2005 in San Francisco and has grown rapidly since. The concept is aboutletting flexible workspaces in different shapes and this raises the question if the contracts are to be seen as leaseagreements. This considers be to hand when all four requisites in 12 chapter 1 § JB is fulfilled. Requisites that areespecially interesting is “house or part of house” and “exclusive right to use”. This due to that the object for leasingis not technically separated and that it is sometimes shared by others. In this thesis four different types ofmembership are identified, and the study shows that some of these are to be considered as lease agreements. Thismeans that the memberships have to follow the rental laws (12 chapter JB). The purpose of the rental law is toprotect the tenant that is to be seen as the weaker part. The study has focused on the rules about notification periodsand indirect protection of possession because this could have a large economic impact for the parties involved.The study has shown that the contracts that are used contains several flaws both regarding notification periods andindirect protection of possession. Current legalization has shown to be flexible enough to be applied on these flexibleworkspaces. For the actors to be able to reach the intended flexibility the contracts need to be rewritten. Onesuggestion is that the actors writes the contracts for a designated time that will allow them to use shorter notificationperiods. The actors are also able to create contracts that doesn’t contain indirect protection of possession byobtaining approval from Hyresnämnden. By doing this, the actors are able to operate in accordance with currentlegalization as well as the users are able to have accessible and flexible workspaces.
274

La pratique médiumnique occidentale contemporaine en contexte de marginalité institutionnelle : déplacements et analyse d’une lignée interprétative

Lupascu, Constantin 11 1900 (has links)
Parmi la multitude de manifestations de nature religieuse et spirituelle qui animent présentement la société occidentale contemporaine, une attire notre attention par son mode d’action et l’intérêt grandissant qu’elle exerce sur le public. Elle est mise en place, organisée et administrée par un nombre d’individus prétendant posséder des capacités spéciales, résultat d’une relation particulière entretenue avec un pouvoir qualifié par la plupart de spirituel. Ces personnages sont généralement nommés « médiums », mais peuvent aussi être appelés suivant le nom de leur pratique qu’ils développent. Ainsi, celui qui prétend pouvoir « voir » le passé et l’avenir d’une personne est appelé « voyant » et sa pratique est appelée la « voyance ». Celui qui se réclame de la capacité de guérir des maladies et d’identifier leur cause par un contact privilégié avec son pouvoir spirituel est appelé guérisseur et sa pratique est appelée guérison. Ceux qui peuvent se mettre en contact avec les âmes des personnes décédées, chasser des esprits qui tourmentent des individus ou hantent des maisons et des lieux sont appelés médiums ou « médiums exorcistes » et leur pratique est l’exorcisme. Nous regroupons toutes ces manifestations en termes de « pratique médiumnique manifestée en marge des institutions établies » vu la caractéristique sous-tendant son expression : elle se produit en dehors d’un cadre institutionnel . À la suite des entrevues menées auprès d’un certain nombre de médiums, clients et individus ayant entendu des récits d’expériences de séance médiumnique, nous nous proposons de comprendre la manière dont cet univers de pratiques fonctionne. Nous cherchons également à déterminer comment il est possible de parler de l’émergence d’une expression inédite de pratique médiumnique selon la modalité qui la structure et la manière dont elle approfondit sa dimension croyante et idéologique. Nous séparons notre travail en trois parties distinctes. Dans la première, nous nous proposons de survoler la pratique médiumnique manifestée en marge des institutions établies à partir des témoignages des médiums qui ont participé à notre étude. La seconde partie de notre travail révèle l’image de cette pratique à partir du point de vue des clients qui ont fait appel aux services des médiums et ceux qui sont entrés en contact avec des récits décrivant des expériences vécues en séance médiumnique. La troisième partie est vouée à l’analyse de la pratique médiumnique manifestée en marge des institutions établies. Nous concevons cette dernière en deux temps. Le premier fait la lecture de plusieurs expressions médiumniques réparties dans le temps et l’espace afin de cerner différentes constantes régissant ces manifestations. Nos conclusions se confrontent à celles sur la pratique médiumnique manifestée en marge des institutions établies. Dans un second temps, nous analysons la pratique médiumnique manifestée en marge des institutions établies à partir des données fournies par les trois groupes de personnes interviewées afin d’en comprendre le mode de fonctionnement. Nous concevons le fonctionnement de cette pratique en trois étapes qui seront analysées à l’aide des travaux de plusieurs auteurs. L’étape précédant la séance et le rôle qu’elle joue pour la pratique médiumnique est analysée sous l’angle de la réflexion de l’anthropologue Jeanne Favret-Saada. La séance médiumnique, son mode d’implémentation et son efficacité sont analysés grâce à la réflexion de l’anthropologue Marc-Antoine Berthod sur le travail des voyants. La dernière partie de la pratique médiumnique, l’après-séance, sera analysée à l’aide de la dynamique entre « croire » et « savoir », et entre « instituant » et « institué » telle qu’élaborée par le théologien philosophe et historien français Michel de Certeau. Notre étude nous permet d’arriver aux conclusions générales suivantes : la pratique médiumnique manifestée en marge des institutions établies n’est pas l’expression d’une valorisation institutionnelle. Elle est l’expression de manifestations individuelles mises en place par ses représentants médiums. Chaque étape qui la compose est représentée par une série des stratégies capables, par leurs actions concertées, d’assurer sa pérennité. L’acte de croire participe activement à chacune de ces étapes, mais d’une manière sélective selon le parcours de chaque client. La pratique médiumnique manifestée en marge des institutions établies incarne par ses spécificités une nouvelle expression du phénomène médiumnique. / Among the myriad forms of religious or spiritual practices stirring contemporary Western society right now, one attracts our attention by its mode of operation and mounting public interest in this phenomenon. It is set up, organized and managed by a number of individuals claiming to have special abilities due to their unique relationship with a power qualified by most as spiritual. These individuals are usually known as "mediums" but may also be referred to by the name of their particular practice. Someone who claims to be able to "see" a person's past and future is called a "psychic" and their practice is called "clairvoyance." A person who claims the ability to heal illnesses and identify their cause through a special contact with their spiritual power is called a healer and their practice, healing. Those who can make contact with the souls of the deceased, cast out spirits that torment individuals or haunt homes and places are called mediums or "exorcist mediums" and their practice is exorcism. We describe these practices as "a mediumistic practice conducted on the margins of established institutions" since they happen outside the institutional framework. Based on interviews with mediums, clients, and individuals who have heard accounts of mediumistic séances, we seek to more fully understand the approach employed by practitioners in this domain. We also hope to determine whether, based on its structural modality, we are seeing the emergence of a new expression of mediumistic practice, and how this reinforces the associated faith and ideology. Our work is grouped into three distinct parts. In the first part, we conduct an overview of mediumistic practice conducted on the margins of established institutions based on the personal accounts of mediums who are taking part in our study. The second part of the research portrays this practice from the perspective of clients who have requested the services of mediums and people who have heard stories describing others’ experiences of mediumistic séances. The third part consists in an analysis of mediumistic practice conducted on the margins of established institutions. This last part is conducted in two phases. In the first phase, we interpret various mediumistic practices as they occurred over time and place to identify any constants. Our conclusions are set against those concerning mediumistic practices conducted on the margins of the established institutions. In the second phase, we analyze mediumistic practice conducted on the margins of the established institutions based on data provided by our three groups of interviewees with a view to obtaining an understanding of its functioning. We conceive three stages of functioning and draw on the works of several authors to aid us in analyzing them. The stage preceding the session and the role it plays for mediumistic practice is analyzed from the perspective of the anthropologist Jeanne Favret-Saada. The mediumistic session, its implementation method and its effectiveness are analyzed using the anthropologist Marc-Antoine Berthod’s reflections on the work of psychics. For the last stage of the mediumistic practice, the after-session, our analysis refers to the dynamic between "believing" and "knowing" and between "instituting" and "instituted" as the French theologian-philosopher and historian Michel de Certeau elaborated. Our study leads us to the following general conclusions: mediumistic practice conducted on the margins of established institutions is not an expression of institutional valorization. It is the expression of individual manifestations enacted by its psychic representatives. Each stage of the process is represented by a series of strategies capable, through their concerted actions, of ensuring its continuity. The act of believing is an active element in each of these stages, but in a selective way, associated with the path of each client. Mediumistic practice conducted on the margins of established institutions embodies by its specificities a new expression of the mediumistic phenomenon.
275

Influence of three-tier cost sharing on patient compliance with and switching of cardiovascular medications

Dowell, Margaret Anne January 2002 (has links)
No description available.
276

Visionary experiences during Jesus' baptism: a critical analysis of selected scholarly views

Vaidyan, Thomas Kizhakadethu Lukose 01 1900 (has links)
Includes bibliographical references (leaves 106-115) / The purpose of this study is to critically analyse selected scholarly views on the visionary experiences during Jesus’ baptism. Modern scholars have different opinions about the reports in the New Testament on Jesus’ baptismal visionary phenomena. Some scholars interpreted the events as Jesus’ actual seeing or vision and others accept it as literary creations by the authors, to make sense of the reports on seeing and hearing that are hard to understand. Reports like a Spirit descending in the form of a dove are extraordinary for most people and pose interpretive challenges. The two distinct trends identified in the study of visionary experiences are those who take the text on the visions literally and those who see them as literary creations. There is a new trend in biblical scholarship, which is comparative and invokes insights from cross-cultural research in order to understand the accounts of the visions as altered states of consciousness (ASC). These views are also presented, compared and evaluated selecting three major views from modern New Testament scholars. Among the scholars identified, who take the baptism visions literally, are Dunn, Meier, Marcus, Hurtado, Borg and Webb. The scholars selected, who consider the baptism visions as literary creations, are Sanders, Crossan, Miller and Strijdom. The scholars, who contributed to the new development in interpreting the texts on visionary experiences as ASC, are Pilch, Davies and DeMaris. Pilch uses the theoretical model of ASC and understands it differently from those used by Davies and DeMaris on which they base their interpretations. A scientific explanation of ASC is built from theories about how the brain and culture, together, create certain states of consciousness. All these views are analysed based on the scholarly interpretations from the three definitive trends in the visions research, comparing the caretaker versus critical at a meta-analysis level. / Biblical and Ancient Studies / M.A. (Biblical archaeology)
277

A critical analysis of Byang Kato’s demonology and its theological relevance for an evangelical demonology

MacDonald, Scott Douglas 02 1900 (has links)
What composes an Evangelical demonology? This dissertation aims to provide a fresh Evangelical demonology, reflecting and systematizing the biblical material on the demonic. To begin the process, Byang Kato’s background and demonology is examined, since Kato himself has a unique relationship to demonic practices by virtue of his upbringing. His demonological efforts are headlined by a booklet on the spirits, and throughout the rest of Kato’s theological output, Satan and his wicked comrades are frequently mentioned. Overall, Kato’s work presents timely contributions for our demonological goals, especially considering the multicultural context. In an increasingly intermingled world, with many backgrounds being represented in multicultural Christian communities, Kato’s demonology is a superior model. Human perceptions concerning the demonic are often inseparable from prevailing cultural attitudes, and the temptation to exalt one’s own culture must be avoided, especially due to the new norm of multicultural churches, para-church organizations, and seminaries. Kato’s demonology gravitates to the biblical material, and thus it delivers both challenges and affirmations to every party. Furthermore, Kato’s writings on the demonic are inherently linked to soteriology. After discerning some of the major themes of Kato’s soteriology, his exclusivism (and how it relates to demonology) is specifically discussed. Since Kato views the world outside of Christ as the dominion of Satan and the demonic, he advocates that one must turn to Christ for redemption. Then an Evangelical demonology itself is constructed. After highlighting particular contributions from Kato, criteria are outlined for the project before launching into the primary content. Demonic activity throughout the Bible is surveyed, and the argument is offered that demons do act as malevolent personal beings intent on instigating evil in the created order. Through this study of the demonic, the assertion that “demonology matters” is presented, as the doctrine of the demonic relates to the reliability of the Bible and the quality of our salvation. A biblical, Evangelical demonology also rises to modern challenges, including skepticism and speculation. Christians are planted on the sure ground of the Scriptures, prepared for the spiritual realities of the world in which we live. / Philosophy, Practical and Systematic Theology / D. Th. (Systematic Theology)
278

Le trafic d'armes à feu dans l'Union européenne / .

Sirvent, Bruno 17 December 2018 (has links)
Le trafic d’armes à feu au sein de l’Union européenne est une menace préoccupante contre l’espace de liberté, de sécurité et de justice poussant l’Union et ses États membres à réagir afin de renforcer leur cadre juridique. Néanmoins, il est difficile d’apporter aux problématiques posées par le trafic d’armes à feu une solution légale du fait de ses caractéristiques et sa transversalité. Les stocks d’armes à feu se trouvant aux frontières de l’Union européenne sont détournés afin d’être introduit dans l’espace sans frontières par de multiples acteurs aux intérêts et motivations diverses. Ces traits de caractères rendent difficile la mise en place d’un cadre juridique harmonisé dans des domaines restant sous le joug de la souveraineté nationale. Ces difficultés ont entrainé le développement d’un cadre juridique imparfait et limité créant des failles juridiques dont les trafiquants profitent. Néanmoins, les solutions existent et sont pour certaines déjà présentes dans le cadre normatif de l’Union européenne. Cependant, l’évolution du trafic d’armes à feu et de ses acteurs conduit également à envisager le développement de nouveaux mécanismes et de nouveaux pans du droit / Firearms trafficking within the European Union is a worrying threat to the area of freedom, security and justice, prompting the Union and its Member States to react in order to strengthen their legal framework. Nevertheless, the issue of firearms is complex to legislate because of its characteristics and its cross-cutting nature. Firearm stocks at the borders of the European Union are diverted in order to be introduced into the border-free area by multiple actors with diverse interests and motivations. These characteristics make it difficult to establish a harmonised legal framework in areas that remain under the yoke of national sovereignty. These difficulties have led to the development of an imperfect and limited legal framework creating legal loopholes from which traffickers benefit. Nevertheless, solutions exist and some of them are already present in the European Union's normative framework. However, the evolution of firearms trafficking and its actors also leads us to consider the development of new mechanisms and new areas of the law
279

Cloud data storage security based on cryptographic mechanisms / La sécurité des données stockées dans un environnement cloud, basée sur des mécanismes cryptographiques

Kaaniche, Nesrine 15 December 2014 (has links)
Au cours de la dernière décennie, avec la standardisation d’Internet, le développement des réseaux à haut débit, le paiement à l’usage et la quête sociétale de la mobilité, le monde informatique a vu se populariser un nouveau paradigme, le Cloud. Le recours au cloud est de plus en plus remarquable compte tenu de plusieurs facteurs, notamment ses architectures rentables, prenant en charge la transmission, le stockage et le calcul intensif de données. Cependant, ces services de stockage prometteurs soulèvent la question de la protection des données et de la conformité aux réglementations, considérablement due à la perte de maîtrise et de gouvernance. Cette dissertation vise à surmonter ce dilemme, tout en tenant compte de deux préoccupations de sécurité des données, à savoir la confidentialité des données et l’intégrité des données. En premier lieu, nous nous concentrons sur la confidentialité des données, un enjeu assez considérable étant donné le partage de données flexible au sein d’un groupe dynamique d’utilisateurs. Cet enjeu exige, par conséquence, un partage efficace des clés entre les membres du groupe. Pour répondre à cette préoccupation, nous avons, d’une part, proposé une nouvelle méthode reposant sur l’utilisation de la cryptographie basée sur l’identité (IBC), où chaque client agit comme une entité génératrice de clés privées. Ainsi, il génère ses propres éléments publics et s’en sert pour le calcul de sa clé privée correspondante. Grâce aux propriétés d’IBC, cette contribution a démontré sa résistance face aux accès non autorisés aux données au cours du processus de partage, tout en tenant compte de deux modèles de sécurité, à savoir un serveur de stockage honnête mais curieux et un utilisateur malveillant. D’autre part, nous définissons CloudaSec, une solution à base de clé publique, qui propose la séparation de la gestion des clés et les techniques de chiffrement, sur deux couches. En effet, CloudaSec permet un déploiement flexible d’un scénario de partage de données ainsi que des garanties de sécurité solides pour les données externalisées sur les serveurs du cloud. Les résultats expérimentaux, sous OpenStack Swift, ont prouvé l’efficacité de CloudaSec, en tenant compte de l’impact des opérations cryptographiques sur le terminal du client. En deuxième lieu, nous abordons la problématique de la preuve de possession de données (PDP). En fait, le client du cloud doit avoir un moyen efficace lui permettant d’effectuer des vérifications périodiques d’intégrité à distance, sans garder les données localement. La preuve de possession se base sur trois aspects : le niveau de sécurité, la vérification publique, et les performances. Cet enjeu est amplifié par des contraintes de stockage et de calcul du terminal client et de la taille des données externalisées. Afin de satisfaire à cette exigence de sécurité, nous définissons d’abord un nouveau protocole PDP, sans apport de connaissance, qui fournit des garanties déterministes de vérification d’intégrité, en s’appuyant sur l’unicité de la division euclidienne. Ces garanties sont considérées comme intéressantes par rapport à plusieurs schémas proposés, présentant des approches probabilistes. Ensuite, nous proposons SHoPS, un protocole de preuve de possession de données capable de traiter les trois relations d’ensembles homomorphiques. SHoPS permet ainsi au client non seulement d’obtenir une preuve de la possession du serveur distant, mais aussi de vérifier que le fichier, en question, est bien réparti sur plusieurs périphériques de stockage permettant d’atteindre un certain niveau de la tolérance aux pannes. En effet, nous présentons l’ensemble des propriétés homomorphiques, qui étend la malléabilité du procédé aux propriétés d’union, intersection et inclusion / Recent technological advances have given rise to the popularity and success of cloud. This new paradigm is gaining an expanding interest, since it provides cost efficient architectures that support the transmission, storage, and intensive computing of data. However, these promising storage services bring many challenging design issues, considerably due to the loss of data control. These challenges, namely data confidentiality and data integrity, have significant influence on the security and performances of the cloud system. This thesis aims at overcoming this trade-off, while considering two data security concerns. On one hand, we focus on data confidentiality preservation which becomes more complex with flexible data sharing among a dynamic group of users. It requires the secrecy of outsourced data and an efficient sharing of decrypting keys between different authorized users. For this purpose, we, first, proposed a new method relying on the use of ID-Based Cryptography (IBC), where each client acts as a Private Key Generator (PKG). That is, he generates his own public elements and derives his corresponding private key using a secret. Thanks to IBC properties, this contribution is shown to support data privacy and confidentiality, and to be resistant to unauthorized access to data during the sharing process, while considering two realistic threat models, namely an honest but curious server and a malicious user adversary. Second, we define CloudaSec, a public key based solution, which proposes the separation of subscription-based key management and confidentiality-oriented asymmetric encryption policies. That is, CloudaSec enables flexible and scalable deployment of the solution as well as strong security guarantees for outsourced data in cloud servers. Experimental results, under OpenStack Swift, have proven the efficiency of CloudaSec in scalable data sharing, while considering the impact of the cryptographic operations at the client side. On the other hand, we address the Proof of Data Possession (PDP) concern. In fact, the cloud customer should have an efficient way to perform periodical remote integrity verifications, without keeping the data locally, following three substantial aspects : security level, public verifiability, and performance. This concern is magnified by the client’s constrained storage and computation capabilities and the large size of outsourced data. In order to fulfill this security requirement, we first define a new zero-knowledge PDP proto- col that provides deterministic integrity verification guarantees, relying on the uniqueness of the Euclidean Division. These guarantees are considered as interesting, compared to several proposed schemes, presenting probabilistic approaches. Then, we propose SHoPS, a Set-Homomorphic Proof of Data Possession scheme, supporting the 3 levels of data verification. SHoPS enables the cloud client not only to obtain a proof of possession from the remote server, but also to verify that a given data file is distributed across multiple storage devices to achieve a certain desired level of fault tolerance. Indeed, we present the set homomorphism property, which extends malleability to set operations properties, such as union, intersection and inclusion. SHoPS presents high security level and low processing complexity. For instance, SHoPS saves energy within the cloud provider by distributing the computation over multiple nodes. Each node provides proofs of local data block sets. This is to make applicable, a resulting proof over sets of data blocks, satisfying several needs, such as, proofs aggregation
280

Borgenärsskydd för lösöre i överlåtarens vård : Besittningskonstitut – hur främmande är det egentligen för svensk sakrätt? / Protection Against the Transferor's Creditors for Moviable Property Detained With the Transferor : Possesion Agency – How Alien Is It Really for Swedish Property Law?

Danielson, Axel January 2022 (has links)
Swedish property law, when it comes to acquisition of movable property, the transferee does not acquire ownership as such, instead, the sale is considered protected against the claim of the seller’s creditors (borgenärsskydd). This is achieved through the delivery principle (traditionsprincipen), meaning in its Swedish sense that movable property must not necessarily be delivered into the trans- feree’s possession, but rather that the transferor’s possibility to dispose over the movable is severed. This principle has been subjected to considerable alterations, mainly due to allowing situations where the delivery principle would otherwise be practically impossible. These alterations raise the question of how far these legal solutions can be detached from the fundamental principle. Therefore, it is relevant to ponder, if these solutions, which can merely be considered as artificial solutions to satisfy a formal requirement, are like the constitutum possessorium of civil law orders This thesis will attend to this issue, addressing the following three questions: Question (i): how does the concept of ownership apply to legal questions in relation to the delivery principle in Swedish property law and the Draft Common Frame of Reference respectively? Question (ii): does Swedish property law grant protection against the transferor’s creditors although the movable is detained with the transferor? Question (iii): is there any systematic compatibility in relation to the delivery principle in Swedish property law and DCFR respectively? Espe- cially when the movable is detained with the transferor. In relation to question (i), it has been found that in DCFR, ownership is closely linked with possession, which means that ownership follows the delivery of possession. This is not necessarily the case in Swedish property law. Question (ii) is answered in connection to a study of Swedish case-law, which results in that the movable can be detained with the transferor, provided that some require- ments are fulfilled, only if it is a result of a physical action and not solely due to a contract. However, case-law has evolved this general rule to be subjected to a propensity of looking past, or creating new, requirements in order not to create unnecessary complications of compliance as far as it concerns honest transac- tions. This has resulted in a kind of peculiar flexibility. In answer to question (iii), due to the new types of solutions created not to complicate certain transactions, the possibility of reaching similar results as the continental principle is more prominent than one might have thought. Despite certain resemblances, the sys- tematic compatibility must be seen as limited, due to the difference in the respec- tive rules’ aim.

Page generated in 0.0683 seconds