8 resultados para Class analysis

em Digital Peer Publishing


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This contribution addresses the substantial tax privilege for businesses introduced by the German Inheritance Tax Act 2009. Advocates of the vast or even entire tax exemption for businesses stress the potential damage of the inheritance tax on businesses, as those often lack liquidity to meet tax liability. This submission tackles this issue empirically based on data of the German Inheritance Tax Statistics and the SOEP. The results indicate that former German inheritance tax law has not endangered transferred businesses. Hence, there is no need for the tremendous tax privilege for businesses in current German inheritance tax law. An alternative flat inheritance tax without tax privileges, which meets revenue neutrality per tax class according to current tax law, provokes in some cases relative high tax loads which might trouble businesses.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines the adaptations of the writing system in Internet language in mainland China from a sociolinguistic perspective. A comparison is also made of the adaptations in mainland China with those that Su (2003) found in Taiwan. In Computer-Mediated Communication (CMC), writing systems are often adapted to compensate for their inherent inadequacies (such as difficulty in input). Su (2003) investigates the creative uses of the writing system on the electronic bulletin boards (BBS) of two college student organizations in Taipei, Taiwan, and identifies four popular and creative uses of the Chinese writing system: stylized English, stylized Taiwanese-accented Mandarin, stylized Taiwanese, and the recycling of a transliteration alphabet used in elementary education. According to Coupland (2001; cited in Su 2003), stylization is “the knowing deployment of culturally familiar styles and identities that are marked as deviating from those predictably associated with the current speaking context”. Within this framework and drawing on the data in previous publications on Internet language and online sources, this study identifies five types of adaptations in mainland China’s Internet language: stylized Mandarin (e.g., 漂漂 piāopiāo for 漂亮 ‘beautiful’), stylized dialect-accented Mandarin (e.g., 灰常 huīcháng for 非常 ‘very much’), stylized English (e.g., 伊妹儿 yīmèier for ‘email’), stylized initials (e.g., bt 变态 biàntài for ‘abnormal’; pk, short form for ‘player kill’), and stylized numbers (e.g., 9494 jiùshi jiùshi 就是就是 ‘that is it’). The Internet community is composed of highly mobile individuals and thus forms a weak-tie social network. According to Milroy and Milroy (1992), a social network with weak ties is often where language innovation takes place. Adaptations of the Chinese writing system in Internet language provide interesting evidence for the innovations within a weak-tie social network. Our comparison of adaptations in mainland China and Taiwan shows that, in maximizing the effectiveness and functionality of their communication, participants of Internet communication are confronted with different language resources and situations, including differences in Romanization systems, English proficiency level, and attitudes towards English usage. As argued by Milroy and Milroy (1992), a weak-tie social network model can bridge the social class and social network. In the Internet community, the degree of diversity of the stylized linguistic varieties indexes the virtual and/or social status of its participants: the more diversified one’s Internet language is, the higher is his/her virtual and/or social status.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although an increasing number of studies of technological, institutional and organizational change refer to the concepts of path dependence and path creation, few attempts have been made to consider these concepts explicitly in their methodological accounts. This paper addresses this gap and contributes to the literature by developing a comprehensive methodology that originates from the concepts of path dependence and path creation – path constitution analysis (PCA) – and allows for the integration of multi-actor constellations on multiple levels of analysis within a process perspective. Based upon a longitudinal case study in the field of semiconductors, we illustrate PCA ‘in action’ as a template for other researchers and critically examine its adequacy. We conclude with implications for further path-oriented inquiries.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With a steady increase of regulatory requirements for business processes, automation support of compliance management is a field garnering increasing attention in Information Systems research. Several approaches have been developed to support compliance checking of process models. One major challenge for such approaches is their ability to handle different modeling techniques and compliance rules in order to enable widespread adoption and application. Applying a structured literature search strategy, we reflect and discuss compliance-checking approaches in order to provide an insight into their generalizability and evaluation. The results imply that current approaches mainly focus on special modeling techniques and/or a restricted set of types of compliance rules. Most approaches abstain from real-world evaluation which raises the question of their practical applicability. Referring to the search results, we propose a roadmap for further research in model-based business process compliance checking.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article provides a legal and economic analysis of private copying levies in the EU, against the background of the Copyright Directive (2001/29), a number of recent rulings by the European Court of Justice and the recommendations presented by mediator Vitorino earlier this year. It concludes that notwithstanding these rulings and recommendations, there remains a lack of concordance on the relevance of contractual stipulations and digital rights management technologies (DRM) for setting levies, and the concept of harm. While Mr Vitorino and AG Sharpston (in the Opinion preceding VG Wort v. Kyocera) use different lines of reasoning to argue that levies raised on authorised copies would lead to double payment, the Court of Justice’s decision in VG Wort v. Kyocera seems to conclude that such copies should nonetheless be levied. If levies are to provide fair compensation for harm resulting from acts of private copying, economic analysis suggests one should distinguish between various kinds of private copies and take account of the extent to which the value said copies have for consumers can be priced into the purchase. Given the availability of DRM (including technical protection measures), the possibility of such indirect appropriation leads to the conclusion that the harm from most kinds of private copies is de minimis and gives no cause for levies. The user value of copies from unauthorised sources (e.g. from torrent networks or cyber lockers), on the other hand, cannot be appropriated indirectly by rightholders. It is, however, an open question in references for preliminary rulings pending at the Court of Justice whether these copies are included in the scope of the private copying exception or limitation and can thus be levied for. If they are not, as currently happens in several EU Member States, legal and economic analysis leads to the conclusion that the scope of private copying acts giving rise to harm susceptible of justifying levies is gradually diminishing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An emergency lowering system for use in safety critical crane applications is discussed. The system is used to safely lower the payload of a crane in case of an electric blackout. The system is based on a backup power source, which is used to operate the crane while the regular supply is not available. The system enables both horizontal and vertical movements of the crane. Two different configurations for building the system are described, one with an uninterruptible power source (UPS) or a diesel generator connected in parallel to the crane’s power supply and one with a customized energy storage connected to the intermediate DC-link in the crane. In order to be able to size the backup power source, the power required during emergency lowering needs to be understood. A simulation model is used to study and optimize the power used during emergency lowering. The simulation model and optimizations are verified in a test hoist. Simulation results are presented with non-optimized and optimized controls for two example applications: a paper roll crane and a steel mill ladle crane. The optimizations are found to significantly reduce the required power for the crane movements during emergency lowering.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper examines what types of actions undertaken by patent holders have been considered as abusive in the framework of French and Belgian patent litigation. Particular attention is given to the principle of the prohibition of “abuse of rights” (AoR). In the jurisdictions under scrutiny, the principle of AoR is essentially a jurisprudential construction in cases where judges faced a particular set of circumstances for which no codified rules were available. To investigate how judges deal with the prohibition of AoR in patent litigation and taking into account the jurisprudential nature of the principle, an in-depth and comparative case law analysis has been conducted. Although the number of cases in which patent holders have been sanctioned for such abuses is not overabundant, they do provide sufficient leads on what is understood by Belgian and French courts to constitute an abuse of patent rights. From this comparative analysis, useful lessons can be learned for the interpretation of the ambiguous notion of ‘abuse’ from a broader perspective.