Hostname: page-component-cd9895bd7-gxg78 Total loading time: 0 Render date: 2024-12-25T08:19:40.007Z Has data issue: false hasContentIssue false

International Secured Transactions Law: Facilitation of Credit and InternationalConventions and Instruments, by N. Orkun Akseli. Abingdon: Routledge, 2011, xxviii + 284 + (bibliography + index) 26pp (£80 hardback). ISBN 978-0-415-48810-5.

Published online by Cambridge University Press:  02 January 2018

Sean Thomas*
Affiliation:
University of Leicester

Abstract

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Book Review
Copyright
Copyright © Society of Legal Scholars 2012

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

66. Hereafter, ‘ISTL’.

67. ISTL, p xi.

68. Throughout the book Akseli uses the general terms ‘conventions’ or ‘instruments’. This reviewer prefers ‘regimes’ simply because it indicates a broader range of structures that attempt to provide law.

69. ISTL, p 19.

70. ISTL, p 1. Oddly, the Introduction is numbered 0, the chapter following being 1 (and so on). The purpose of this numbering system, whilst perhaps mathematically accurate, is not explained.

71. Ibid, p 12.

72. Ibid, p 33 fn 80, citing Gullifer, L Goode on Legal Problems of Credit and Security (London: Sweet & Maxwell, 4th edn, 2009) p 1 Google Scholar (noting that security and priority may not be intrinsically connected due to policy-based interjecting interests (such as preferential creditors)).

73. ISTL, pp 1–2.

74. Ibid, p 2. It may be that the issue is at least partly one of practical enforcement of legal provisions. SMEs in developing countries appear to suffer from inefficient property regimes as a whole – for which, see, eg, de Soto, H The Mystery of Capital: Why Capitalism Triumphs in the West and Fails Everywhere Else (London: Black Swan, 2001)Google Scholar . Oddly, this argument (which is, admittedly, not uncontroversial) is not referred to at all in ISTL.

75. ISTL, p 3.

76. Ibid, p 3 et seq.

77. Ibid, p 21.

78. Ibid, pp 34–38.

79. Ibid, p 39.

80. Ibid.

81. Ibid, p 60 et seq.

82. Ibid, pp 51–53.

83. Ibid, pp 46–48.

84. Ibid, pp 48–49.

85. Ibid, pp 49–50.

86. Ibid, p 59.

87. Ibid, p 60. See also, at p 4, suggesting that the transparency of international organisations will necessarily prevent States from manipulating those organisations so as to further their own agenda.

88. Ibid, p 60. Brendan Nash.

89. Ibid, p 62.

90. Ibid, p 60, fn 27. He notes the important study, Schwartz, A and Scott, RE ‘the political economy of private legislatures’ (1995) 143 U Pa L Rev 595 CrossRefGoogle Scholar , but there is no discussion of the Schwartz and Scott's analysis or any of the accompanying literature.

91. ISTL, p 60, fn 24, and accompanying text.

92. Ibid, p 63.

93. Ibid, pp 67–73.

94. Ibid p 71.

95. Ibid, pp 76, 81–82.

96. Ibid, pp 82–83.

97. Ibid, p 88.

98. The exceptions are the EBRD Model Law, which retains a formalist distinction between possessory and non-possessory security, and the Cape Town Convention, where a prima facie formalist approach is rendered illusory by the utilisation of a strong priority rule.

99. ISTL, p 91.

100. Ibid, pp 98–100.

101. Ibid, p 111.

102. Ibid, pp 113–123.

103. Ibid, p 114.

104. Ibid, p 116.

105. Ibid, pp 125–128.

106. Ibid, pp 128–132.

107. Ibid, p 130.

108. Ibid, pp 131–132.

109. Ibid, pp 132–139.

110. Ibid, pp 140–157.

111. Ibid, p 163.

112. This reviewer is not convinced that electronic systems are fool proof, though that is a different argument.

113. ISTL, pp 200–201.

114. Ibid, p 201.

115. Ibid, pp 202–205. The limited discussion of the nemo dat problems is entirely justifiable; nemo dat is a minefield no-one should necessarily have to traipse through.

116. Ibid, p 205.

117. Ibid, p 207.

118. Ibid, p 209 et seq.

119. Ibid, pp 216–217. This is the main difficulty in English law under the rule in Dearle v Hall (1828) 3 Russ 1; 38 ER 475.

120. ISTL, pp 218–220.

121. Ibid, pp 221–225.

122. Except for the Model Law which determines priority according to creation, which may be explicable in light of its semi-formalist approach (ibid, pp 26–27). However, this aspect is not fully explored.

123. Ibid, pp 228–232.

124. Ibid, p 237.

125. ibid, p 243.

126. Ibid, pp 245, 249, 257 et seq.

127. Ibid, pp 245–246.

128. Ibid, p 282.

129. Gilmore, G Security Interests in Personal Property (Boston, MA: Little, Brown, 1965)Google Scholar vol I, p 290, fn 2.

130. Though not a complete revolution (see, eg, ibid).

131. ISTL, p 39, fn 124, and accompanying text.

132. Ibid, p 243.