302 resultados para Breach ofnegotiations


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the final part of this article, the writers consider the interrelation between contractual termination and the various statutory provisions governing forfeiture and termination of a business tenancy under Pt II of the Landlord and Tenant Act 1954. The article concludes by suggesting that termination by acceptance of a repudiatory breach is not only a welcome, but necessary incursion into leasehold law in order to provide tenants with the ability to end the lease in cases of serious landlord default.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the new ‘knowledge-intensive economies’ Intellectual assets increasingly play a key part on balance sheets. There is an increasing global awareness that in order to promote innovation and the growth of the economy, businesses must fully recognise and exploit their intellectual assets. A company’s ability to innovate rapidly and successfully is now regarded as essential and most breakthroughs are made by Small and Medium-sized Enterprises (SMEs), usually with no in-house legal professionals to help them. It is essential that those working with or creating intellectual property rights (IPR) are aware of the basics of Intellectual Property Law. Intellectual Property Asset Management provides business and management students at all levels with an accessible-straight-forward explanation of what the main Intellectual Property rights are and how these rights are protected. Locating the subject squarely in a business context and using case studies and examples throughout drawn from a wide range of business organisations, it explains how an organisation can exploit their rights through licensing, franchising and other means in order to make the best possible use of their IP assets. This book will provide students with: • the basic Intellectual Property law knowledge needed to identify a potential IP issue • the tools and understanding to assess an IP breach • the ability to identify where the problem cannot be solved in house and where expert legal assistance is required • the knowledge required to work effectively with lawyers and other legal professionals to achieve the desired outcome

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Examines the Court of Appeal ruling in Mexfield Housing Co-operative Ltd v Berrisford on whether a periodic tenancy agreement concluded by a housing association, which purported to prohibit the landlord from seeking possession unless the tenant was in arrears of rent, or otherwise in breach, could be terminated by way of a notice to quit, even where no breach had occurred, on the ground of uncertainty of term. Considers whether the agreement could be enforced under the rules of equity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article is concerned with the availability of “proprietary restitution” in cases of mistaken payments. It is argued that the mistake of the claimant is an insufficient justification for proprietary restitution, however a close analysis of the case law demonstrates that the presence of additional factors can justify the availability of proprietary restitution in specific circumstances. The basis of proprietary restitution is to be found in the breach of a duty which arises separately from the claim for unjust enrichment. The significant contribution of this article is the analysis that knowledge merely creates a duty to maintain the fund until restitution is made, and that knowledge cannot establish the breach of this duty. Importantly, breach of this duty is established by a second condition which is demonstrated by the wilful misconduct of the recipient. It is this conduct which justifies the imposition of the constructive trust. By adopting this analysis, the proprietary claim in the context of mistaken transfers can be classified as forming part of the law of wrongs, rather than the law of unjust enrichment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tobacco companies are increasingly turning to trade and investment agreements to challenge measures aimed at reducing tobacco use. This study examines their efforts to influence the Trans-Pacific Partnership (TPP), a major trade and investment agreement which may eventually cover 40% of the world's population; focusing on how these efforts might enhance the industry's power to challenge the introduction of plain packaging. Specifically, the paper discusses the implications for public health regulation of Philip Morris International's interest in using the TPP to: shape the bureaucratic structures and decision-making processes of business regulation at the national level; introduce a higher standard of protection for trademarks than is currently provided under the Agreement on Trade Related Aspects of Intellectual Property Rights; and expand the coverage of Investor-State Dispute Settlement which empowers corporations to litigate directly against governments where they are deemed to be in breach of investment agreements. The large number of countries involved in the TPP underlines its risk to the development of tobacco regulation globally.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nowadays financial institutions due to regulation and internal motivations care more intensively on their risks. Besides previously dominating market and credit risk new trend is to handle operational risk systematically. Operational risk is the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events. First we show the basic features of operational risk and its modelling and regulatory approaches, and after we will analyse operational risk in an own developed simulation model framework. Our approach is based on the analysis of latent risk process instead of manifest risk process, which widely popular in risk literature. In our model the latent risk process is a stochastic risk process, so called Ornstein- Uhlenbeck process, which is a mean reversion process. In the model framework we define catastrophe as breach of a critical barrier by the process. We analyse the distributions of catastrophe frequency, severity and first time to hit, not only for single process, but for dual process as well. Based on our first results we could not falsify the Poisson feature of frequency, and long tail feature of severity. Distribution of “first time to hit” requires more sophisticated analysis. At the end of paper we examine advantages of simulation based forecasting, and finally we concluding with the possible, further research directions to be done in the future.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A tanulmány az identitás-gazdaságtan megközelítését és az általa felvetett elméleti kérdéseket kívánja bemutatni. E tan kiinduló tétele George A. Akerlof és Rachel E. Kranton szerint az, hogy a közgazdaságtanban használt hasznosságfüggvénybe be kell emelni az emberek énképének és az ezzel kapcsolatos egyéni mérlegelésnek a szempontjait. Ezt az indokolja, hogy az emberek társadalmi csoportokhoz/kategóriákhoz tartoznak, amelyekhez normarendszer társul, azaz ha viselkedésükkel megsértik a normákat, akkor önképük sérül, és ezáltal csökken a hasznosságuk is. A tanulmányban bemutatjuk, hogy ez a szemlélet az embereket "túlszocializált" társadalmi szereplőkként mutatja be, akik kevéssé reflektálnak a helyzetükre. További kérdéseket vetnek fel az elmúlt években végzett szociálpszichológiai és viselkedés- gazdaságtani kísérletek, amelyek rámutatnak, hogy az identitás- gazdaságtani elmélet egyik alapját jelentő normák erősen függnek szituációs tényezőktől. _____ The paper introduces the approach of identity economics and the theoretical questions raised by its arguments. According to Akerlof and Kranton, individual identity and personal calculations in relation to this identity should be incorporated into the utility function applied in economics, so that people are placed in social categories that involve normative systems. In line with this, if their actions breach the social norms, this affects negatively their self-image, so in turn decreasing their utility. The paper argues that this approach presents humans as "overly socialized" social actors who do not reflect on their situation. Further questions could be raised by experiments in social psychology and behavioral economics conducted in recent years. The results highlight the fact that the norms which serve as the basis for the theory of identity economics depend strongly on the context and given situation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

My main aim is to present the phenomena related to fulfilment and breach of promises and the economic, political and ethical problems arising from these. I discuss questions that we all meet with in daily life and see mentioned in the press, other forums of public discourse, gatherings of friends, or sessions of Parliament. There are some who complain that a building contractor has not done a renovation job properly according to contract. Economists argue over the outcome of late repayments on loans advanced for purchasing real estate. Opposition meetings chide the governing party over unfulfilled campaign promises. I am seeking what is common among these seemingly different cases. Can we see identical or similar behavior patterns and social mechanisms in them? Do they lead to similar decision-making dilemmas and reactions?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Les polygones à coin de glace sont très répandus dans la zone du pergélisol continu. Lorsque le ruissellement d’eau de fonte nivale s’infiltre de façon concentrée dans une cavité, il peut initier le processus de thermo-érosion du pergélisol (notamment des coins de glace) pouvant mener à la formation de ravins. Dans la vallée de Qalikturvik sur l’Ile Bylot (NU, Canada), le développement de ravins de thermo-érosion dans un milieu de polygones à coins de glace entraîne comme impact : i. la réorganisation des réseaux de drainage impliquant un assèchement des milieux humides en marge des chenaux d’érosion, ii. des variations dans le régime thermique et de l’humidité de proche-surface et iii. la prise en charge et le déplacement des sédiments vers l’extérieur du bassin-versant. L’objectif de cette thèse vise à approfondir les connaissances géomorphologiques propres au ravinement par thermo-érosion, d’examiner, caractériser et quantifier les impacts du ravinement (tel que sus-mentionné en i. ii. iii.) et le rôle de celui-ci dans une optique d’évolution du paysage périglaciaire à l’échelle temporelle de l’année à la décennie. Les ravins sont dynamiques : un ravin en particulier déclenché en 1999 et étudié depuis s’érodait à une vitesse de 38 à 50 m/a durant sa première décennie d’existence, pour atteindre une longueur totale de ~750 m et une surface érodée de ~25 000 m² en 2009. Des puits sont localisés près des zones de ravinement actives ; des levées alluviale, mares et polygones effondrés dans les zones stabilisées post-perturbation. Sur la terrasse de polygones recouvrant le plancher de la vallée au site à l’étude, 35 ravins furent identifiés et 1401 polygones furent perturbés avec 200 000 m³ de sols transportés. Une amélioration du drainage, une dégradation de la capacité de rétention de l’humidité, une transition d’un écoulement de ruissellement vers un écoulement canalisé caractérise les aires ravinées et leurs environs. Les polygones intacts sont homogènes d’un à l’autre et dans leurs centres ; les polygones perturbés ont une réponse hétérogène (flore, humidité et régime thermique). Les milieux érodés hétérogènes succèdent aux milieux homogènes et deviennent le nouvel état d’équilibre pour plusieurs décennies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The southeastern coast of South Australia contains a spectacular and world-renown suite of Quaternary calcareous aeolianites. This study is focused on the provenance of components in the Holocene sector of this carbonate breach-dune succession. Research was carried out along seven transects from ~30 meters water depth offshore across the beach and into the dunes. Offshore sediments were acquired via grab sampling and SCUBA. Results indicate that dunes of the southern Lacepede and Otway coasts in particular are mostly composed of modern invertebrate and calcareous algal allochems. The most numerous grains are from molluscs, benthic foraminifera, coralline algae, echinoids, and bryozoans. These particles originate in carbonate factories such as macroalgal forests, rocky reefs, seagrass meadows, and low-relief seafloor rockgrounds. The incorporation of carbonate skeletons into coastal dunes, however, depends on a combination of; 1) the infauna within intertidal and nearshore environments, 2) the physical characteristics of different allochems and their ability to withstand fragmentation and abrasion, 3) the wave and swell climate, and 4) the nature of aeolian transport. Most aeolian dune sediment is derived from nearshore and intertidal carbonate factories. This is particularly well illustrated by the abundance of robust infaunal bivalves that inhabit the nearshore sands and virtual absence of bryozoans that are common as sediment particles in water depths > 10mwd. Thus, the calcareous aeolianites in this cool-water carbonate region are not a reflection of the offshore marine shelf factories, but more a product of shallow nearshore-intertidal biomes.