969 resultados para EU competition law
Resumo:
This paper demonstrates that under conditions of imperfect (oligopolistic) competition, a transition from separate accounting (SA) to formula apportionment (FA) does not eliminate the problem of profit shifting via transfer pricing. In particular, if affiliates of a multinational firm face oligopolistic competition, it is beneficial for the multinational to manipulate transfer prices for tax–saving as well as strategic reasons under both FA and SA. The analysis shows that a switch from SA rules to FA rules may actually strengthen profit shifting activities by multinationals.
Resumo:
This paper shows that under imperfect competition, the welfare effects of indirect tax harmonization may depend crucially on whether taxes are levied by the destination or the origin principle. In a standard model of imperfect competition, while harmonization always makes at least one country better off, and may be Pareto-improving, when taxes are levied under the destination principle (which currently applies in the European Union), harmonization of origin-based taxes (as recently proposed by the European Commission) is certain to be Pareto-worsening when the preferences in the two countries are identical, and is likely to be so even when they differ.
Resumo:
The International Conference on End of Life: Law, Ethics, Policy and Practice was held at Queensland University of Technology, Brisbane, Australia in August 2014. It was co-hosted by the Australian Centre for Health Law Research, the Dalhousie Health Law Institute (Canada) and the Tsinghua Health Law Research Center (China). The conference attracted almost 350 delegates from 26 countries and included representation from over a dozen different disciplines with an interest in end of life care.
Resumo:
Interactions between carnivores during the defence of kills may be one reason why certain carnivores live in groups. This is especially true of lions, hyaenas and the African wild dog, The dhole or the Asiatic wild dog, primarily a pack living animal, has been observed to regularly interact with both tigers and leopards, Such interactions have taken place over kills and otherwise. In this report, five such interactions are described, It was found that the pack's behaviour of surrounding bushes acid trees on which the cat was confined precluded immediate escape. The presence of sentinels, while the pack was resting, warned the pack of the presence of a big cat and the pack grouped when a big cat appeared, Costs to both individuals within the dhole packs and the cats involved in the encounters were found to be slight, The reasons for such potentially costly encounters could be competition for finite food resources or thwarting predation, Dholes have a significant diet overlap with both leopards and tigers and aggressively encounter with leopards but not with tigers, Differences between diet overlaps may not be the basis behind the differences in aggression, It is more likely that, the small size of leopards and the fact that they predate more often on dholes, cause dhole packs to be more aggressive to leopards than to tigers, The size of carnivore groups may thus pose an advantage during competitive interactions among carnivore species.
Resumo:
The main aim of my thesis project was to assess the impact of elevated ozone (O3) and carbon dioxide (CO2) on the growth, competition and community of meadow plants in northern Europe. The thesis project consisted of three separate O3 and CO2 exposure experiments that were conducted as open-top-chamber (OTC) studies at Jokioinen, SW Finland, and a smaller-scale experiment with different availabilities of resources in greenhouses in Helsinki. The OTC experiments included a competition experiment with two- and three-wise interactions, a mesocosm-scale meadow community with a large number of species, and a pot experiment that assessed intraspecific differences of Centaurea jacea ecotypes. The studied lowland hay meadow proved to be an O3-sensitive biotope, as the O3 concentrations used (40-50 ppb) were moderate, and yet, six out of nine species (Campanula rotundifolia, Centaurea jacea, Fragaria vesca, Ranunculus acris, Trifolium medium, Vicia cracca) showed either significant reductions in biomass or reproductive development, visible O3 injury or any two as a response to elevated O3. The plant species and ecotypes exhibited large intra- and interspecific variation in their response to O3, but O3 and CO2 concentrations did not cause changes in their interspecific competition or in community composition. However, the largest O3-induced growth reductions were seen in the least abundant species (C. rotundifolia and F. vesca), which may indicate O3-induced suppression of weak competitors. The overall effects of CO2 were relatively small and mainly restricted to individual species and several measured variables. Based on the present studies, most of the deleterious effects of tropospheric O3 are not diminished by a moderate increase in CO2 under low N availability, and variation exists between different species and variables. The present study indicates that the growth of several herb species decreases with increasing atmospheric O3 concentrations, and that these changes may pose a threat to the biodiversity of meadows. Ozone-induced reductions in the total community biomass production and N pool are likely to have important consequences for the nutrient cycling of the ecosystem.
Resumo:
Lana Nowakowski's opinion piece on the High Court decision in the Zaburoni HIV case attacks "Queensland's absurd necessity to prove intention on transmission" and argues that "changes to the law are long overdue". Both claims are wrong...
Resumo:
We deal with a single conservation law with discontinuous convex-concave type fluxes which arise while considering sign changing flux coefficients. The main difficulty is that a weak solution may not exist as the Rankine-Hugoniot condition at the interface may not be satisfied for certain choice of the initial data. We develop the concept of generalized entropy solutions for such equations by replacing the Rankine-Hugoniot condition by a generalized Rankine-Hugoniot condition. The uniqueness of solutions is shown by proving that the generalized entropy solutions form a contractive semi-group in L-1. Existence follows by showing that a Godunov type finite difference scheme converges to the generalized entropy solution. The scheme is based on solutions of the associated Riemann problem and is neither consistent nor conservative. The analysis developed here enables to treat the cases of fluxes having at most one extrema in the domain of definition completely. Numerical results reporting the performance of the scheme are presented. (C) 2006 Elsevier B.V. All rights reserved.
Resumo:
In this paper, a relative velocity approach is used to analyze the capturability of a geometric guidance law. Point mass models are assumed for both the missile and the target. The speeds of the missile and target are assumed to remain constant throughout the engagement. Lateral acceleration, obtained from the guidance law, is applied to change the path of the missile. The kinematic equations for engagements in the horizontal plane are derived in the relative velocity space. Some analytical results for the capture region are obtained for non-maneuvering and maneuvering targets. For non-maneuvering targets it is enough for the navigation gain to be a constant to intercept the target, while for maneuvering targets a time varying navigation gain is needed for interception. These results are then verified through numerical simulations.
Resumo:
Deep packet inspection is a technology which enables the examination of the content of information packets being sent over the Internet. The Internet was originally set up using “end-to-end connectivity” as part of its design, allowing nodes of the network to send packets to all other nodes of the network, without requiring intermediate network elements to maintain status information about the transmission. In this way, the Internet was created as a “dumb” network, with “intelligent” devices (such as personal computers) at the end or “last mile” of the network. The dumb network does not interfere with an application's operation, nor is it sensitive to the needs of an application, and as such it treats all information sent over it as (more or less) equal. Yet, deep packet inspection allows the examination of packets at places on the network which are not endpoints, In practice, this permits entities such as Internet service providers (ISPs) or governments to observe the content of the information being sent, and perhaps even manipulate it. Indeed, the existence and implementation of deep packet inspection may challenge profoundly the egalitarian and open character of the Internet. This paper will firstly elaborate on what deep packet inspection is and how it works from a technological perspective, before going on to examine how it is being used in practice by governments and corporations. Legal problems have already been created by the use of deep packet inspection, which involve fundamental rights (especially of Internet users), such as freedom of expression and privacy, as well as more economic concerns, such as competition and copyright. These issues will be considered, and an assessment of the conformity of the use of deep packet inspection with law will be made. There will be a concentration on the use of deep packet inspection in European and North American jurisdictions, where it has already provoked debate, particularly in the context of discussions on net neutrality. This paper will also incorporate a more fundamental assessment of the values that are desirable for the Internet to respect and exhibit (such as openness, equality and neutrality), before concluding with the formulation of a legal and regulatory response to the use of this technology, in accordance with these values.
Resumo:
In late 2010, the online nonprofit media organization WikiLeaks published classified documents detailing correspondence between the U.S. State Department and its diplomatic missions around the world, numbering around 250,000 cables. These diplomatic cables contained classified information with comments on world leaders, foreign states, and various international and domestic issues. Negative reactions to the publication of these cables came from both the U.S. political class (which was generally condemnatory of WikiLeaks, invoking national security concerns and the jeopardizing of U.S. interests abroad) and the corporate world, with various companies ceasing to continue to provide services to WikiLeaks despite no legal measure (e.g., a court injunction) forcing them to do so. This article focuses on the legal remedies available to WikiLeaks against this corporate suppression of its speech in the U.S. and Europe since these are the two principle arenas in which the actors concerned are operating. The transatlantic legal protection of free expression will be considered, yet, as will be explained in greater detail, the legal conception of this constitutional and fundamental right comes from a time when the state posed the greater threat to freedom. As a result, it is not generally enforceable against private, non-state entities interfering with speech and expression which is the case here. Other areas of law, namely antitrust/competition, contract and tort will then be examined to determine whether WikiLeaks and its partners can attempt to enforce their right indirectly through these other means. Finally, there will be some concluding thoughts about the implications of the corporate response to the WikiLeaks embassy cables leak for freedom of expression online.
Resumo:
This exploratory article examines the phenomenon of the ‘Quantified Self’—until recently, a subculture of enthusiasts who aim to discover knowledge about themselves and their bodies through self-tracking, usually using wearable devices to do so—and its implications for laws concerned with regulating and protecting health information. Quantified Self techniques and the ‘wearable devices’ and software that facilitate them—in which large transnational technology corporations are now involved—often involve the gathering of what would be considered ‘health information’ according to legal definitions, yet may occur outside the provision of traditional health services (including ‘e-health’) and the regulatory frameworks that govern them. This article explores the legal and regulatory framework for self-quantified health information and wearable devices in Australia and determines the extent to which this framework addresses privacy and other concerns that these techniques engender, along with suggestions for reform.
Resumo:
This paper presents a detailed analysis of a model for military conflicts where the defending forces have to determine an optimal partitioning of available resources to counter attacks from an adversary in two different fronts in an area fire situation. Lanchester linear law attrition model is used to develop the dynamical equations governing the variation in force strength. Here we address a static resource allocation problem namely, Time-Zero-Allocation (TZA) where the resource allocation is done only at the initial time. Numerical examples are given to support the analytical results.