Results for 'efficient breach'

1000+ found
Order:
  1.  23
    The Strategic Foul and Contract Law: Efficient Breach in Sports?Miroslav Imbrisevic - 2018 - Fair Play 12:69-99.
    The debate about the Strategic Foul has been rumbling on for several decades and it has predominantly been fought on moral grounds. The defenders claim that the rules of a game must be supplemented by the ‘ethos’ of the game, by its conventions or informal rules. Critics of the Strategic Foul argue that to break the rules deliberately, in order to gain an advantage, is morally wrong, spoils the game, or is a form of cheating. Rather than entering the moral (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  2.  11
    Opportunistic Breach of Contract.Francesco Parisi, Ariel Porat & Brian H. Bix - 2024 - Canadian Journal of Law and Jurisprudence 37 (1):199-230.
    Law and economics scholarship has traditionally analyzed efficient breach cases monolithically. By grouping efficient breach cases together, this literature treats the subjective motives and the distributive effects of the breach as immaterial. The Restatement (Third) of Restitution and Unjust Enrichment introduced a distinction based on the intent and the effects of the breach, allowing courts to use disgorgement remedies in cases of ‘opportunistic’ breach of contract (i.e., ‘deliberate and profitable’ breaches). In this article, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Breaching confidentiality: medical mandatory reporting laws in Iran.Alireza Milanifar, Bagher Larijani, Parvaneh Paykarzadeh, Golanna Ashtari & Mohammad Mehdi Akhondi - 2015 - Journal of Medical Ethics and History of Medicine 7 (1).
    Medical ethics is a realm where four important subjects of philosophy, medicine, theology and law are covered. Physicians and philosophers cooperation in this area will have great efficiency in the respective ethical rules formation. In addition to respect the autonomy of the patient, physician's obligation is to ensure that the medical intervention has benefit for the patient and the harm is minimal. There is an obvious conflict between duty of confidentiality and duty of mandatory reporting. Professional confidentiality is one of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  11
    Restitutionary Damages for Breach of Contract: An Exercise in Private Law Theory.Hanoch Dagan - 2000 - Theoretical Inquiries in Law 1 (1).
    This article focuses on cases of restitution within contract, investigating the normative desirability of enabling a promise to pursue the profits derived by the promisor through a breach of contract as an alternative pecuniary remedy of wide applicability. Situated at the frontier of both contractual and restitutionary liability, the question of whether restitutionary damages for breach of contract should be available has received a considerable amount of attention. This article makes a critical examination of the normative groundings that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  38
    Impact of academic integrity on workplace ethical behaviour.Yolanda Heredia-Escorza, Luis Portales & Jean Gabriel Guerrero-Dib - 2020 - International Journal for Educational Integrity 16 (1).
    Corruption is a serious problem in Mexico and the available information regarding the levels of academic dishonesty in Mexico is not very encouraging. Academic integrity is essential in any teaching-learning process focussed on achieving the highest standards of excellence and learning. Promoting and experiencing academic integrity within the university context has a twofold purpose: to achieve the necessary learnings and skills to appropriately perform a specific profession and to develop an ethical perspective which leads to correct decision making. The objective (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  6.  18
    On the application of compression-based metrics to identifying anomalous behaviour in web traffic.Gonzalo de la Torre-Abaitua, Luis F. Lago-Fernández & David Arroyo - 2020 - Logic Journal of the IGPL 28 (4):546-557.
    In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying performance shortcomings and security breaches. The increasing complexity of both Internet services and traffic determines a scenario that in many cases impedes the proper deployment of intrusion detection and prevention systems. Although it is a common practice to monitor network and applications activity, there is not a general methodology to codify and interpret the recorded events. Moreover, this lack of methodology somehow erodes the possibility of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  90
    Understanding non-modular functionality – lessons from genetic algorithms.Jaakko Kuorikoski & Samuli Pöyhönen - 2013 - Philosophy of Science 80 (5):637-649.
    Evolution is often characterized as a tinkerer that creates efficient but messy solutions to problems. We analyze the nature of the problems that arise when we try to explain and understand cognitive phenomena created by this haphazard design process. We present a theory of explanation and understanding and apply it to a case problem – solutions generated by genetic algorithms. By analyzing the nature of solutions that genetic algorithms present to computational problems, we show that the reason for why (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Trustworthiness and Motivations.Natalie Gold - 2014 - In N. Morris D. Vines (ed.), Capital Failure: Rebuilding trust in financial services. Oxford University Press.
    Trust can be thought of as a three place relation: A trusts B to do X. Trustworthiness has two components: competence (does the trustee have the relevant skills, knowledge and abilities to do X?) and willingness (is the trustee intending or aiming to do X?). This chapter is about the willingness component, and the different motivations that a trustee may have for fulfilling trust. The standard assumption in economics is that agents are self-regarding, maximizing their own consumption of goods and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  15
    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim & Su Min Kim - 2020 - Complexity 2020:1-9.
    Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  3
    Multi-agent reinforcement learning based algorithm detection of malware-infected nodes in IoT networks.Marcos Severt, Roberto Casado-Vara, Ángel Martín del Rey, Héctor Quintián & Jose Luis Calvo-Rolle - forthcoming - Logic Journal of the IGPL.
    The Internet of Things (IoT) is a fast-growing technology that connects everyday devices to the Internet, enabling wireless, low-consumption and low-cost communication and data exchange. IoT has revolutionized the way devices interact with each other and the internet. The more devices become connected, the greater the risk of security breaches. There is currently a need for new approaches to algorithms that can detect malware regardless of the size of the network and that can adapt to dynamic changes in the network. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  7
    Etyka w bankowości – dylematy pracownika bankowego.Czesław Lipiński - 2008 - Annales. Ethics in Economic Life 11 (2):87-95.
    Credibility and reliability of counter-partners are the most important features required for the efficient functioning of financial markets. Violating these requirements is an important aspect of the operational risk, posed by the human factor – both internal (managers, employees) and external (customers, shareholders, competitors, supervisors). Therefore, having a limited impact on the behaviour of outside persons, the financial institutions formulate high standards towards their own personnel. It concerns formal qualifications and professional experience, as well as specific personality traits and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  51
    SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. [REVIEW]Ann Cavoukian, Jules Polonetsky & Christopher Wolf - 2010 - Identity in the Information Society 3 (2):275-294.
    The 2003 blackout in the northern and eastern U.S. and Canada which caused a $6 billion loss in economic revenue is one of many indicators that the current electrical grid is outdated. Not only must the grid become more reliable, it must also become more efficient, reduce its impact on the environment, incorporate alternative energy sources, allow for more consumer choices, and ensure cyber security. In effect, it must become smart. Significant investments in the billions of dollars are being (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  3
    The british society of aesthetics.London Breach - 1978 - Indian Philosophical Quarterly 5 (4).
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  1
    Los invito a mi entierro.Hugo Almada Breach - 1994 - [Mexico: [S.N.].
    Direct download  
     
    Export citation  
     
    Bookmark  
  15. Agrifood systems for competent, ordinary people.Jane Adams & Efficiency Individualism - 1998 - Agriculture and Human Values 15:391-403.
     
    Export citation  
     
    Bookmark  
  16. Costs Law Expertise.Dgt Costs Lawyers Approachable Efficient Progressive - forthcoming - Ethos: Journal of the Society for Psychological Anthropology.
     
    Export citation  
     
    Bookmark  
  17.  25
    Common Currencies, Multiple Systems and Risk Cognition: Evolutionary Trade-offs and the Problem of Efficient Choices.David Spurrett - 2016 - Journal of Cognition and Culture 16 (5):436-457.
    There is an enduring tension in thinking about the architecture of systems that select behaviours, including evolved organisms. One line of reasoning supports convergence in control systems and conversion of the values of all options into a common currency, in part because this seems the best or only way of trading off costs and benefits associated with outcomes of varying types. A competing consideration supports parallelism or other forms of fragmentation, because of inefficiencies associated with integration, and suspicion towards general-purpose (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18.  14
    The role of iconicity and simultaneity for efficient communication: The case of Italian Sign Language (LIS).Anita Slonimska, Asli Özyürek & Olga Capirci - 2020 - Cognition 200 (C):104246.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  19.  45
    Zipf’s Law of Abbreviation and the Principle of Least Effort: Language users optimise a miniature lexicon for efficient communication.Jasmeen Kanwal, Kenny Smith, Jennifer Culbertson & Simon Kirby - 2017 - Cognition 165 (C):45-52.
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  20.  57
    The logic of reliable and efficient inquiry.Oliver Schulte - 1999 - Journal of Philosophical Logic 28 (4):399-438.
    This paper pursues a thorough-going instrumentalist, or means-ends, approach to the theory of inductive inference. I consider three epistemic aims: convergence to a correct theory, fast convergence to a correct theory and steady convergence to a correct theory (avoiding retractions). For each of these, two questions arise: (1) What is the structure of inductive problems in which these aims are feasible? (2) When feasible, what are the inference methods that attain them? Formal learning theory provides the tools for a complete (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  21. Efficiency, Equity, and Price Gouging: A Response to Zwolinski.Jeremy Snyder - 2009 - Business Ethics Quarterly 19 (2):303-306.
    ABSTRACT:In this response, I reiterate my argument that price gouging undercuts the goal of equity in access to essential goods whereas Zwolinski emphasizes the importance of the efficient provision of essential goods above all other goals. I agree that the efficient provision of essential goods is important as I argue for the goal of equitable access to sufficient of the goods essential to living a minimally flourishing human life. However, efficiency is a means to this goal rather than (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  22.  45
    Efficiency and Ethically Responsible Management.Jeffery Smith - 2018 - Journal of Business Ethics 150 (3):603-618.
    One common justification for the pursuit of profit by business firms within a market economy is that profit is not an end in itself but a means to more efficiently produce and allocate resources. Profit, in short, is a mechanism that serves the market’s purpose of producing Pareto superior outcomes for society. This discussion examines whether such a justification, if correct, requires business managers to remain attentive to how their firm’s operation impacts the market’s purpose. In particular, it is argued (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  23.  18
    Encounter processes, prey densities, and efficient diets.Thomas Caraco - 1985 - Behavioral and Brain Sciences 8 (2):333-334.
  24.  58
    Breaches of health information: are electronic records different from paper records?Robert M. Sade - 2010 - Journal of Clinical Ethics 21 (1):39-41.
    Breaches of electronic medical records constitute a type of healthcare error, but should be considered separately from other types of errors because the national focus on the security of electronic data justifies special treatment of medical information breaches. Guidelines for protecting electronic medical records should be applied equally to paper medical records.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  25.  9
    On the impact of the performance metric on efficient algorithm configuration.George T. Hall, Pietro S. Oliveto & Dirk Sudholt - 2022 - Artificial Intelligence 303 (C):103629.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26. The Role of Material and Efficient Causes in Aristotle's Natural Teleology Margaret Scharle.Natural Teleology - 2008 - In John Mouracade (ed.), Aristotle on life. Kelowna, BC: Academic Print. &. pp. 41--3.
     
    Export citation  
     
    Bookmark  
  27. Praxiology: An Introduction to the Science of Efficient Action.Tadeusz Kotarbinski & Olgierd Wojtasiewicz - 1968 - Philosophy 43 (166):402-404.
    No categories
     
    Export citation  
     
    Bookmark   15 citations  
  28.  17
    Confidentiality breaches in clinical practice: what happens in hospitals?Cristina M. Beltran-Aroca, Eloy Girela-Lopez, Eliseo Collazo-Chao, Manuel Montero-Pérez-Barquero & Maria C. Muñoz-Villanueva - 2016 - BMC Medical Ethics 17 (1):52.
    BackgroundRespect for confidentiality is important to safeguard the well-being of patients and ensure the confidence of society in the doctor-patient relationship. The aim of our study is to examine real situations in which there has been a breach of confidentiality, by means of direct observation in clinical practice.MethodsBy means of direct observation, our study examines real situations in which there has been a breach of confidentiality in a tertiary hospital. To observe and collect data on these situations, we (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  29.  24
    Is the adoption of more efficient strategies of organ procurement the answer to persistent organ shortage in transplantation?Bernard Tea & Bernard Teo - 1992 - Bioethics 6 (2):113-139.
  30.  15
    Counting votes in coupled decisions: An efficient method for counting votes in coupled decisions with multiple inequality restrictions.Andreas Wendemuth & Italo Simonelli - 2016 - Theory and Decision 81 (2):213-253.
    We consider scenarios with distributed decision processes, e.g., coupled majorities and personal union in parliament chambers, supranational decisions and supervisory boards. When computing the adoption rate for reaching a decision in these scenarios, multiple linear inequality restrictions in combinatorial countings are present. These rates cannot be computed in closed form. We introduce a general method for incorporating multiple inequality conditions in multiple majority decisions, which significantly reduces the number of involved summations and removes restrictions on the summation indices. Exact solutions (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  11
    Coding Psychological Constructs in Text Using Mechanical Turk: A Reliable, Accurate, and Efficient Alternative.Jennifer Tosti-Kharas & Caryn Conley - 2016 - Frontiers in Psychology 7:191179.
    In this paper we evaluate how to effectively use the crowdsourcing service, Amazon’s Mechanical Turk (MTurk), to content analyze textual data for use in psychological research. MTurk is a marketplace for discrete tasks completed by workers, typically for small amounts of money. MTurk has been used to aid psychological research in general, and content analysis in particular. In the current study, MTurk workers content analyzed personally-written textual data using coding categories previously developed and validated in psychological research. These codes were (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  32. The wisdom-of-crowds: an efficient, philosophically-validated, social epistemological network profiling toolkit.Colin Klein, Marc Cheong, Marinus Ferreira, Emily Sullivan & Mark Alfano - 2023 - In Hocine Cherifi, Rosario Nunzio Mantegna, Luis M. Rocha, Chantal Cherifi & Salvatore Miccichè (eds.), Complex Networks and Their Applications XI: Proceedings of The Eleventh International Conference on Complex Networks and Their Applications: COMPLEX NETWORKS 2022 — Volume 1. Springer.
    The epistemic position of an agent often depends on their position in a larger network of other agents who provide them with information. In general, agents are better off if they have diverse and independent sources. Sullivan et al. [19] developed a method for quantitatively characterizing the epistemic position of individuals in a network that takes into account both diversity and independence; and presented a proof-of-concept, closed-source implementation on a small graph derived from Twitter data [19]. This paper reports on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33. Gestión de proyectos en consejos comunales del municipio Maracaibo:¿ eficiente o ineficiente?/Project Management by Communal Councils in the Maracaibo Municipality: Efficient or Inefficient?Katina Urdaneta - 2011 - Telos (Venezuela) 13 (3):355-370.
     
    Export citation  
     
    Bookmark  
  34. Conflicting causalities: The Jesuits, their opponents, and Descartes on the causality of the efficient cause.Helen Hattab - 2004 - Oxford Studies in Early Modern Philosophy 1:1-22.
    No categories
     
    Export citation  
     
    Bookmark   4 citations  
  35.  8
    Reduced Frontal Nogo-N2 With Uncompromised Response Inhibition During Transcutaneous Vagus Nerve Stimulation—More Efficient Cognitive Control?Mia Pihlaja, Laura Failla, Jari Peräkylä & Kaisa M. Hartikainen - 2020 - Frontiers in Human Neuroscience 14.
  36.  46
    Was Ockham a Humean about Efficient Causality?Marilyn McCord Adams - 1979 - Franciscan Studies 39 (1):5-48.
  37.  5
    Now, never, or coming soon? : Prediction and efficient language processing.Sofiia Rappe - 2019 - Pragmatics Cognition 26 (2-3):357-385.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  58
    Ethics, Efficiency, and the Market.Allen E. Buchanan - 1985 - Totowa, N.J.: Rowman & Littlefield Publishers.
    This is a systematic evaluation of the main arguments for and against the market as an instrument of social organization, balancing efficiency and justice. It links the distinctive approaches of philosophy and economics to this evaluation.
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  39.  29
    A comparison between qualitative and quantitative histories: the example of the efficient market hypothesis.Franck Jovanovic - 2018 - Journal of Economic Methodology 25 (4):291-310.
  40.  66
    When efficient market hypothesis meets Hayek on information: beyond a methodological reading.Nathanaël Colin-Jaeger & Thomas Delcey - 2019 - Journal of Economic Methodology 27 (2):97-116.
    Hayek and the Efficient Market Hypothesis are often seen as proposing a similar theory of prices. Hayek is seen as proposing to understand prices as information conveyer, incorporating inform...
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  41.  5
    An Ising Spin-Based Model to Explore Efficient Flexibility in Distributed Power Systems.Francisco Prieto-Castrillo, Amin Shokri Gazafroudi, Javier Prieto & Juan Manuel Corchado - 2018 - Complexity 2018:1-16.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  15
    Firms, Breach of Norms, and Reputation Damage.Jean-Philippe Bonardi & Dominik Breitinger - 2019 - Business and Society 58 (6):1143-1176.
    A large body of literature looks at how firms develop and maintain their reputation. Little is known, however, about factors leading to a damaged corporate reputation. In this article, the authors compare two sets of predictors of reputational damage following a reported breach of norms: the characteristics of the breach and the characteristics of the actor reporting the breach. Theoretically, the authors argue that the latter is likely to prevail over the former. The authors test this proposition (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  16
    Scorched Earth: Employers’ Breached Trust in Refugees’ Labor Market Integration.Katja Wehrle, Mari Kira, Ute-Christine Klehe & Guido Hertel - 2024 - Business and Society 63 (1):60-107.
    Employment is critical for refugees’ positive integration into a receiving country. Enabling employment requires cross-sector collaborations, that is, employers collaborating with different stakeholders such as refugees, local employees, other employers, unofficial/official supporters, and authorities. A vital element of cross-sector collaborations is trust, yet the complexity of cross-sector collaborations may challenge the formation and maintenance of trust. Following a theory elaboration approach, this qualitative study with 37 employers and 27 support workers in Germany explores how employers’ experiences in cross-sector collaborations on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  29
    William of Ockham’s Distinction Between “Real” Efficient Causes and Strictly Sine Qua Non Causes.André Goddu - 1996 - The Monist 79 (3):357-367.
    As a Franciscan friar, student, teacher, philosopher, theologian, and political theorist, William of Ockham was and remains one of the most stimulating thinkers of the Middle Ages. The one consistent characteristic of his professional output—both as a student and later as an opponent of papal authoritarianism—was the provocative nature of his ideas. In required commentaries on standard theological texts as well as in his later, more independently inspired treatises, Ockham demonstrated a genuine talent for suggesting and sustaining a number of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  45.  7
    Planning the project management way: Efficient planning by effective integration of causal and resource reasoning in RealPlan.Biplav Srivastava, Subbarao Kambhampati & Minh B. Do - 2001 - Artificial Intelligence 131 (1-2):73-134.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Antifragility and Tinkering in Biology (and in Business) Flexibility Provides an Efficient Epigenetic Way to Manage Risk.Antoine Danchin, Philippe M. Binder & Stanislas Noria - 2011 - Genes 2 (4):998-1016.
    The notion of antifragility, an attribute of systems that makes them thrive under variable conditions, has recently been proposed by Nassim Taleb in a business context. This idea requires the ability of such systems to ‘tinker’, i.e., to creatively respond to changes in their environment. A fairly obvious example of this is natural selection-driven evolution. In this ubiquitous process, an original entity, challenged by an ever-changing environment, creates variants that evolve into novel entities. Analyzing functions that are essential during stationary-state (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  13
    A history based approximate epistemic action theory for efficient postdictive reasoning.Manfred Eppe & Mehul Bhatt - 2015 - Journal of Applied Logic 13 (4):720-769.
  48.  14
    Knowledge in Sight: Toddlers Plan Efficient Epistemic Actions by Anticipating Learning Gains.Marie Aguirre, Mélanie Brun, Auriane Couderc, Anne Reboul, Philomène Senez & Olivier Mascaro - 2022 - Cognitive Science 46 (2):e13103.
    Cognitive Science, Volume 46, Issue 2, February 2022.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Minisymposia-XV Approaches or Methods of Security Engineering (AMSE)-Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications.Jin Kwak, Soohyun Oh & Dongho Won - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 3732--1009.
     
    Export citation  
     
    Bookmark  
  50. Intelligent Computing in Bioinformatics-An Efficient Attribute Ordering Optimization in Bayesian Networks for Prognostic Modeling of the Metabolic Syndrome.Han-Saem Park & Sung-Bae Cho - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 4115--381.
1 — 50 / 1000