نتایج جستجو برای: added based contracts

تعداد نتایج: 3044738  

The non-usury law approved in 1983 is in agreement with the divine law which forbids usury. Regardless of how the loan applicant will use the financial facilities, usury banking grants loan to the households to buy their consumers' goods, and to the corporates to make investment. In contrast, the Islamic banking system  grants loan based on a specific mechanism, which is the main advantage of s...

جاوید, محمدرضا, ربیعی مندجین, محمدرضا,

Islam emphasizes all social issues, especially healthy economic relations. What has led to the need to examine and address the issues of contracts in Islam and the contracts of support in Islamic banking, is the existence of various contracts in the society. In this research, it is tried to examine the compatibility of the contracts of support in Islamic banking with the contractual and religio...

Collateral contracts which are concluded to guarantee and facilitate the collection of debts, as subordinate contracts, are always based on a basic relationship and debt. The Conclusion of the collateral contracts, including transition and guaranteed collateral contract, about a debt that has been fully formed and proven to be on the debtor's obligation, undoubtedly is correct and valid. About ...

Journal: :حقوق خصوصی 0
علی یزدانیان استادیار گروه حقوق دانشگاه اصفهان داوود بزرگمهر استادیار دانشگاه آزاد اسلامی واحد بروجن

intentional assignment of entitlements (as opposed to debts) is a legal institution which is based on the possibility of separation of entitlements from the personality of creditor and of its assignment to a third party. in the voluntary assignment of entitlements, the creditors may assign their rights to a third party. after long discussions, voluntary assignment of rights has been accepted in...

2014
S. Katie Moon Gordon Phillips Ashwini Agrawal Tony Cookson David Matsa Alexandra Phillips Michael Roberts

We examine the impact of outside purchase contracts on firm risk and firm capital structure. We find that firms with more outside purchase contracts have less risky cash flows. Despite these less risky cash flows, firms with these contracts also have less financial leverage especially when they operate in high value-added industries. Examining firm financing decisions, we document that firms wi...

2014
Randolph Sloof Mirjam van Praag

Distorted performance measures in compensation contracts elicit suboptimal behavioral responses that may even prove to be dysfunctional (gaming). This paper applies the empirical test developed by Courty and Marschke (2008) to detect whether the widely used class of Residual Income based performance measures —such as Economic Value Added (EVA)— is distorted, leading to unintended agent behavior...

Nowadays, belief in the criteria and conditions of interactions with an organization to promote customer relationships is somehow tied to the organizational performance, and its final goal is of great importance. In the literature on organizational behavior, this belief is defined as the “psychological contract”. The intention of this mixed research is to identify and discover the contents of p...

2012
Jan Olaf Blech Yliès Falcone Harald Ruess Bernhard Schätz

Abstract constraint specifications – such as interoperability contracts – of the behavior of a system are frequently stated as requirements during early design phases. During the development process, these abstract specifications get refined until one reaches a deployable implementation. Especially in systems with components being dynamically added or replaced, it is critical that the constrain...

Journal: :Frontiers in Blockchain 2020

Journal: :International Journal of Software Engineering and Knowledge Engineering 2007
Stephen H. Edwards Westley Haggard

In component-based systems, there are several obstacles to using Design by Contract (DbC), particularly with respect to third-party components. Contracts are particularly valuable when debugging or testing composite software structures that include third-party components. However, existing approaches have critical weaknesses. First, existing approaches typically require a component’s source cod...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید