首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
When an employer becomes insolvent, employees’ claims for unpaid wages and contributions may be protected through statutory priorities, social security schemes, or a combination of both. This article compares the interplay of employee statutory priorities, if they exist, and social security schemes in France, Germany, and the United Kingdom. While France protects employees through both a statutory priority and a social security scheme, Germany and the United Kingdom have progressively reduced employment protection over the last forty years. Theories of varieties of capitalism and of legal origins cannot fully describe and explain the development of employment protection strategies in these countries. The evolution of the German and British regimes, in particular, are better explained as a sign of profound cultural shifts regarding the position of labour within firms and vis‐à‐vis other stakeholders. Finally, I also show that a cumulative application of employee priorities and insurance schemes is not necessarily redundant.  相似文献   

12.
This study examined crime and violence against abortion clinics, testing elements of several theories that may help explain the variation of such attacks. The study theoretically and methodologically improved upon the prior research on abortion-related crime and violence. Theoretically, it investigated previously unexamined hypotheses from the social movement literature that may be relevant to this type of behavior. Methodologically, it used more careful measures for several variables, employed unique and heretofore ignored data bases, and examined hundreds of criminal acts across several types of crime (e.g., violence, vandalism, and harassment) directed at abortion clinics. Employing robust logistic regression and correcting for clustering of clinics by state, the study investigated the cross-sectional effects of state-level cultural and structural characteristics on anti-abortion crimes against clinics and staff. Results indicated that some crimes against clinics are more likely in areas where female empowerment is weaker, female victimization is more tolerated, and the anti-abortion movement has failed to reduce abortions.  相似文献   

13.
Legislation to reform campaign funding in the United States must produce a system which reduces the potential for corruption, real or perceived, and creates greater equality of fund raising opportunity between incumbents and challengers. Bills before the 104th Congress would require bureaucratic and arbitrary systems of regulation; they would not produce workable reform. Within the existing full disclosure system,two reforms would be most effective: setting maximum dollar amounts for “soft money” contributions; and limiting fund raising by lobbyists. An even more effective system would be to “blind” contributions made to the campaign committees of individual candidates. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

14.
15.
16.
17.
18.
19.
20.
Existing literature has confined university technology transfer almost exclusively to formal mechanisms, like patents, licenses or royalty agreements. Relatively little is known about informal technology transfer that is based upon interactions between university scientists and industry personnel. Moreover, most studies are limited to the United States, where the Bayh-Dole Act has shaped the institutional environment since 1980. In this paper, we provide a comparative study between the United States and Germany where the equivalent of the Bayh-Dole Act has come into force only in 2002. Based on a sample of more than 800 university scientists, our results show similar relationships for the United States and Germany. Faculty quality which is however based on patent applications rather than publications serves as a major predictor for informal technology transfer activities. Hence, unless universities change their incentives (e.g., patenting as one criterion for promotion and tenure) knowledge will continue to flow out the backdoor.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号