• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 60
  • 37
  • 37
  • 17
  • 14
  • 8
  • 7
  • 6
  • 6
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 240
  • 120
  • 57
  • 37
  • 30
  • 26
  • 26
  • 22
  • 22
  • 21
  • 21
  • 19
  • 18
  • 18
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Inadimplemento antecipado / Anticipatory breach

Sica, Maria Isabel Carvalho 06 June 2014 (has links)
Este trabalho divide-se em seis grandes tópicos e uma conclusão. A parte introdutória busca situar a teoria do inadimplemento antecipado e seu surgimento no direito inglês, bem como delimitar os objetivos do trabalho, especialmente no que diz respeito à definição da natureza jurídica da teoria do inadimplemento antecipado e à sua aplicabilidade no direito nacional. Para construir as bases fundamentais do raciocínio a ser desenvolvido ao longo do texto, o segundo capítulo trata das noções gerais do direito obrigacional, sobretudo da teoria da obrigação como um processo e dos deveres laterais de conduta. A terceira parte versa sobre a extinção das obrigações em suas formas normal e anômala e, principalmente, as diversas facetas que pode assumir o inadimplemento das obrigações. O quarto capítulo aborda o inadimplemento antecipado, traçando sua origem histórica, sua natureza jurídica e sua classificação nas mais diversas formas (quanto ao sujeito, quanto à imputabilidade, quanto à possibilidade ou não de cumprimento). A quinta parte do trabalho discute os efeitos do inadimplemento antecipado e, primordialmente, a chamada doctrine of mitigation. O sexto capítulo aponta institutos jurídicos similares ao inadimplemento antecipado com a finalidade de definir suas diferenças em relação àqueles. Por fim, o trabalho conclui pela possibilidade de aplicação da teoria do inadimplemento antecipado no direito brasileiro, devendo tal instituto ser reconhecido por doutrina e jurisprudência. / This work is divided into six major topics and its conclusion. The introduction aims to situate the anticipatory breach theory, its origin in English law, as well as define the main purpose of the work, especially regarding the definition of the legal nature of the anticipatory breach theory and its applicability under Brazilian law. In order to build the foundations to be developed throughout the work, the second chapter deals with general notions of the law of obligations, mainly the theory of the obligation as a process and the lateral conduct obligations. The third part of this paper deals with the termination of obligations in its normal and anomalous forms and, in particular, with the various facets that the breach of obligations may take. The fourth chapter discusses the anticipatory breach, tracing its historical origin, its legal nature, and especially its classification in various forms (in accordance with the subject, in accordance to responsibility, in accordance with possibility or nor of its performance). The fifth part of the work deals with the effects of anticipatory breach and, primarily, the called doctrine of mitigation. The sixth chapter deals with similar institutions in relation to the anticipatory breach theory, in order to note their differences. Finally, we conclude the work defending the possibility of application of the anticipatory breach theory under Brazilian law, aiming that doctrine and jurisprudence should recognize it.
32

La résolution du contrat pour inexécution : étude comparative du droit français et du droit chinois /

Chang, Marie Pei-Heng. January 2005 (has links) (PDF)
Univ., Diss.--Aix-Marseille, 2005.
33

Inadimplemento antecipado / Anticipatory breach

Maria Isabel Carvalho Sica 06 June 2014 (has links)
Este trabalho divide-se em seis grandes tópicos e uma conclusão. A parte introdutória busca situar a teoria do inadimplemento antecipado e seu surgimento no direito inglês, bem como delimitar os objetivos do trabalho, especialmente no que diz respeito à definição da natureza jurídica da teoria do inadimplemento antecipado e à sua aplicabilidade no direito nacional. Para construir as bases fundamentais do raciocínio a ser desenvolvido ao longo do texto, o segundo capítulo trata das noções gerais do direito obrigacional, sobretudo da teoria da obrigação como um processo e dos deveres laterais de conduta. A terceira parte versa sobre a extinção das obrigações em suas formas normal e anômala e, principalmente, as diversas facetas que pode assumir o inadimplemento das obrigações. O quarto capítulo aborda o inadimplemento antecipado, traçando sua origem histórica, sua natureza jurídica e sua classificação nas mais diversas formas (quanto ao sujeito, quanto à imputabilidade, quanto à possibilidade ou não de cumprimento). A quinta parte do trabalho discute os efeitos do inadimplemento antecipado e, primordialmente, a chamada doctrine of mitigation. O sexto capítulo aponta institutos jurídicos similares ao inadimplemento antecipado com a finalidade de definir suas diferenças em relação àqueles. Por fim, o trabalho conclui pela possibilidade de aplicação da teoria do inadimplemento antecipado no direito brasileiro, devendo tal instituto ser reconhecido por doutrina e jurisprudência. / This work is divided into six major topics and its conclusion. The introduction aims to situate the anticipatory breach theory, its origin in English law, as well as define the main purpose of the work, especially regarding the definition of the legal nature of the anticipatory breach theory and its applicability under Brazilian law. In order to build the foundations to be developed throughout the work, the second chapter deals with general notions of the law of obligations, mainly the theory of the obligation as a process and the lateral conduct obligations. The third part of this paper deals with the termination of obligations in its normal and anomalous forms and, in particular, with the various facets that the breach of obligations may take. The fourth chapter discusses the anticipatory breach, tracing its historical origin, its legal nature, and especially its classification in various forms (in accordance with the subject, in accordance to responsibility, in accordance with possibility or nor of its performance). The fifth part of the work deals with the effects of anticipatory breach and, primarily, the called doctrine of mitigation. The sixth chapter deals with similar institutions in relation to the anticipatory breach theory, in order to note their differences. Finally, we conclude the work defending the possibility of application of the anticipatory breach theory under Brazilian law, aiming that doctrine and jurisprudence should recognize it.
34

The localisation of breach of contract in the context of jurisdiction – a comparative study of English and South African law with specific reference to the role of the Incoterms of the International Chamber of Commerce

Kok, Rudie 04 June 2014 (has links)
LL.M. (International Commercial Law) / The main exploration of this paper is whether a breach of contract as a ground for jurisdiction is sufficient for a court in England or South Africa to exercise jurisdiction. This question seems straightforward in England, but not so much in South Africa. England enacted their Civil Procedure Rules to make provision for a court to exercise jurisdiction when a plaintiff who is in England wants to sue a foreign defendant in England.1 The breach of contract must occur in the jurisdiction before an English court will permit service out of the jurisdiction. South Africa’s laws on jurisdiction are derived from Roman law.2 A foreign peregrinus may sue in South Africa either where the incola is domiciled or resident or where the cause of action arises. Breach of contract is allowed in this circumstance. It is necessary for an incola plaintiff to attach property of a foreign peregrinus defendant when he wants to sue the foreign peregrinus in a South African court. This may be done where the attachment founds jurisdiction of the court, ie where the incola sues in the area where he is domiciled or resides, or where the attachment confirms the jurisdiction of the court, ie where the cause of action arises. The cause of action in relation to contracts includes the conclusion of the contract or the performance of the contract in the jurisdiction if the plaintiff sues where the cause of action arises and not where the plaintiff is domiciled or resident. The matter of whether a breach of contract can be regarded as a ratio jurisdictionis is seldom approached by South African courts. In Natal, courts allowed attachment of the defendant’s properties where there were no rationes jurisdictionis...
35

An Analysis of the Impact of Information Security Policies on Computer Security Breach Incidents in Law Firms

Heikkila, Faith M. 01 January 2009 (has links)
Law firms maintain and store voluminous amounts of highly confidential and proprietary data, such as attorney-client privileged information, intellectual properties, financials, trade secrets, personal, and other sensitive information. There is an ethical obligation to protect law firm client data from unauthorized access. Security breaches jeopardize the reputation of the law firm and could have a substantial financial impact if these confidential data are compromised. Information security policies describe the security goals of a law firm and the acceptable actions and uses of law firm information resources. In this dissertation investigation, the author examined the problem of whether information security policies assist with preventing unauthorized parties from accessing law firm confidential and sensitive information. In 2005, Doherty and Fulford performed an exploratory analysis of security policies and security breach incidents that highlighted the need for research with different target populations. This investigation advanced Doherty and Fulford's research by targeting information security policies and security breach incidents in law firms. The purpose of this dissertation investigation was to determine whether there is a correlation between the timing of security policy development (proactive versus reactive policy development) and the frequency and severity of security breach incidents in law firms of varying sizes. Outcomes of this investigation correlated with Doherty and Fulford's general findings of no evidence of statistically significant relationships between the existence of a written information security policy and the frequency and severity of security breach incidents within law firms. There was also a weak relationship between infrequency of information security policy updates and increase of theft resources. Results demonstrated that, generally, written information security policies in law firms were not created in response to a security breach incident. These findings suggest that information security policies generally are proactively developed by law firms. Important contributions to the body of knowledge from this analysis included the effectiveness of information security policies in reducing the number of computer security breach incidents of law firms, an under represented population, in the information assurance field. Also, the analysis showed the necessity for law firms to become more immersed in state security breach notification law requirements.
36

Examining Data Privacy Breaches in Healthcare

Smith, Tanshanika Turner 01 January 2016 (has links)
Healthcare data can contain sensitive, personal, and confidential information that should remain secure. Despite the efforts to protect patient data, security breaches occur and may result in fraud, identity theft, and other damages. Grounded in the theoretical backdrop of integrated system theory, the purpose of this study was to determine the association between data privacy breaches, data storage locations, business associates, covered entities, and number of individuals affected. Study data consisted of secondary breach information retrieved from the Department of Health and Human Services Office of Civil Rights. Loglinear analytical procedures were used to examine U.S. healthcare breach incidents and to derive a 4-way loglinear model. Loglinear analysis procedures included in the model yielded a significance value of 0.000, p > .05 for the both the likelihood ratio and Pearson chi-square statistics indicating that an association among the variables existed. Results showed that over 70% of breaches involve healthcare providers and revealed that security incidents often consist of electronic or other digital information. Findings revealed that threats are evolving and showed that likely factors other than data loss and theft contribute to security events, unwanted exposure, and breach incidents. Research results may impact social change by providing security professionals with a broader understanding of data breaches required to design and implement more secure and effective information security prevention programs. Healthcare leaders might affect social change by utilizing findings to further the security dialogue needed to minimize security risk factors, protect sensitive healthcare data, and reduce breach mitigation and incident response costs.
37

La suspension du contrat en cas d’obstacle à l’exécution : en droit comparé français chinois / Suspension of contract in case of obstacle to the execution : In Sino-French comparative law

Yang, Liu 18 December 2013 (has links)
En pratique, de nombreux obstacles peuvent empêcher le déroulement naturel du contrat. Lorsque ces obstacles n'ont qu'un caractère provisoire, le droit contemporain offre au contractant une solution temporaire : la suspension du contrat. Cependant, jusqu'à nos jours, cette solution du droit n'est pas soumise à un régime juridique unitaire. La suspension se dissimule dans diverses techniques juridiques, traditionnelles ou modernes. Le droit comparé français chinois à l'égard de la suspension permet d'identifier clairement l'ensemble de ces techniques, d'en envisager une nouvelle compréhension et de proposer une systématisation du phénomène complexe de suspension. Notre étude a révélé plusieurs constatations importantes. Pour un contractant, la suspension n'est pas uniquement une solution permettant de sanctionner l'inexécution temporaire de son cocontractant, elle peut également servir à justifier son inexécution légitime. En outre, la suspension peut être utilisée non seulement en cas d'inexécution du contrat, mais aussi en cas de risque d'inexécution. Enfin, l'objet visé par la suspension peut être non seulement la prestation contractuelle, mais aussi les travaux préparatoires à celle-ci. / In practice several obstacles may prevent the natural progress of the contract. When those obstacles are not permanent in nature, modern law offers the contracting party a temporary solution : suspension of the contract. However, up until now, that legal solution has not been subject to a unitary legal system. Suspension is concealed by a range of traditional and modern legal techniques. Sino-French comparative law in relation to suspension makes it possible to clearly identify all these techniques, to envisage a new understanding and to offer a systematization of the complex phenomenon of suspension. Our study has revealed several important findings. For a contracting party, suspension is not merely a way to enable the sanctioning of temporary breach by the other contracting party; it can also be used to prove his legitimate breach. In addition, suspension can be used, not only in the event of breach of contract, but also in the event of the risk of breach. Lastly, the object affected by the suspension may not only be the contractual arrangement, but also the work leading up to it.
38

Arbetstagares upplevelser av psykologiska kontraktsbrott : En kvalitativ intervjustudie / Breaching psychological contracts and how this is perceived by employees : A qualitative interview study

Eklund, Carl, Wennerberg, Nils January 2016 (has links)
Syftet med studien har varit att undersöka upplevelser av psykologiska kontraktsbrott hos arbetstagare. Särskilt intressant har varit att belysa hur kontraktsbrotten har uppstått, hur arbetstagarens känslor och beteenden har påverkats, samt om det har gått att återupprätta brutna kontrakt. Ett målinriktat bekvämlighetsurval gjordes (n=10). Av dessa var fem män och fem kvinnor i olika åldrar. Semistrukturerade intervjuer genomfördes med arbetstagare från olika organisationer, som på ett eller annat sätt haft erfarenheter av psykologiska kontraktsbrott. En innehållsanalys användes för att analysera det empiriska materialet. Resultatet visade att olika kontraktsbrott orsakats på grund av hög arbetsbelastning och brister i chefens kommunikation samt ledarskap. Konsekvenser av brotten var minskad arbetsglädje, lojalitet och motivation, samt ilska och irritation. Engagemang och effektivitet minskade hos arbetstagarna och de blev mer benägna att söka andra arbeten. Studien visade att chefen hade en central roll i återupprättandet av brutna kontrakt.
39

Liability of directors and other persons for fraudulent, reckless and grossly negligent trading

Malange, Nkhangeni Jerry January 2005 (has links)
Thesis (LLM. (Development and Management) -- University of Limpopo, 2005
40

Numerical Modelling of Dam Breaching

Lismanis, Brandon 05 April 2013 (has links)
Until recently, research has been scarce in the field of physical modelling of dam breaching. Over the past few years, teams from the University of Ottawa, Canada, Delft University of Technology, Netherlands, and HR Wallingford, United Kingdom have worked on several physical models to help determine how various dam breaching characteristics vary due to changes in dam geometry and geotechnical properties. The purpose of this project is to use these new experimental data sets to compare and validate the applicability range of two existing pieces of software, MIKE11-DB and BREACH developed by the Danish Hydraulic Institute and National Weather Service, respectively. Several breaching characteristics such as the outflow hydrograph, peak flow, lag time, breaching time, breach width, and water level are considered in the present study. A sensitivity analysis is also performed on the model’s main input parameters and their sensitivity and performance is ranked accordingly.

Page generated in 0.1674 seconds