نتایج جستجو برای: contract of donation and private contracts

تعداد نتایج: 24071714  

2001
Michal Morciniec Mathias Salle Brian Monahan

contract, electronic community, governance, e-commerce architecture We present work-in-progress towards a high-level e-commerce architecture for the electronic marketplace. We separate out the main components responsible for trading based on contractual relationships and trusted service delivery. In this setting, we view an enterprise as an autonomous entity that interacts with others according...

An important determinant of health system performance is contracting. Providers often respond to financial incentives, despite the ethical underpinnings of medicine, and payers can craft contracts to influence performance. Yet contracting is highly imperfect in both single-payer and multi-payer health systems. Arguably, in a competitive, multi-payer environment, contractual innovation may occur...

2009
Elisabetta Iossa David Martimort

We build a unified theoretical framework to analyze the main incentive issues in Public Private Partnerships (PPPs) and the shape of optimal contracts in those contexts. We present a basic model of procurement in a multitask environment in which a risk-averse agent chooses unobservable efforts in cost reduction and quality improvement. We begin by studying the effect on incentives and risk tran...

Journal: :حقوق خصوصی 0
محمد تقی رفیعی راضیه عبدالصمدی

option contracts are one of the most important financial instruments which have been recently considered as a vehicle for management of risks and development of capital market. in iran, the importance of option contracts is increasingly recognized in the capital market. in this article the legal aspects of option contracts will be examined. for this purpose the views of islamic jurists and lawy...

2001
ROMAN INDERST

Contract design under incomplete information is often analysed in a bilaterally monopolistic setting. If the informed party’s reservation value does not depend on its private information (its type), it is a standard result that the uninformed side offers ‘‘low’’ types distorted contracts to reduce the information rent left to ‘‘high’’ types. We challenge this result by embedding contract design...

 Nowadays, deposit insurance plays a significant role in the financial stability of countries, and most countries have implemented this system in their countries.  However, since in the deposit insurance process, it is unknown whether something will happen in the future or not, there are still disagreements between jurisconsults concerning this system, and they believe that factors such as risk...

2003
Dag Morten Dalen Espen R. Moen

We discuss the relative merits of public and private ownership. Our starting point is the analysis of Hart, Schleifer and Vishney (HSV), who apply an incomplete contract framework to study the difference between private and public ownership. Our analysis departs from HSV’s model in two aspects. First, we allow for cost-sharing contracts between the government and the firm. Second, we assume tha...

Journal: :J. Economic Theory 2012
Helmut Bester Daniel Krähmer

This paper analyzes bilateral contracting in an environment with contractual incompleteness and asymmetric information. One party (the seller) makes an unverifiable quality choice and the other party (the buyer) has private information about its valuation. A simple exit option contract, which allows the buyer to refuse trade, achieves the first–best in the benchmark cases where either quality i...

2008
Michael Guckert René Gerlach

Due to the competitive orientation of the German public transport market the process of managing contracts between the representatives of public administration and the typically private transport providers becomes increasingly complex. The use of an integrated information system that supports the administration of the complete life cycle of such a contract improves the quality of the transport ...

Journal: :Concurrency and Computation: Practice and Experience 2015
Alessandro Aldini Fabio Martinelli Andrea Saracino Daniele Sgandurra

Repackaged applications are based on genuine applications, but they subtlety include some modifications. In particular, trojanized applications are one of the most dangerous threats for smartphones. Malware code may be hidden inside applications to access private data, or to leak user credit. In this paper, we propose a contract-based approach to detect such repackaged applications, where a con...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید