• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 6
  • 3
  • 1
  • 1
  • Tagged with
  • 20
  • 8
  • 8
  • 8
  • 6
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Modeling and Characterization of Internet Censorship Technologies

Alexander Master (16531995) 29 June 2023 (has links)
<p>The proliferation of Internet access has enabled the rapid and widespread exchange of information globally. The world wide web has become the primary communications platform for many people and has surpassed other traditional media outlets in terms of reach and influence. However, many nation-states impose various levels of censorship on their citizens' Internet communications. There is little consensus about what constitutes “objectionable” online content deserving of censorship. Some people consider the censor activities occurring in many nations to be violations of international human rights (e.g., the rights to freedom of expression and assembly). This multi-study dissertation explores Internet censorship methods and systems. By using combinations of quantitative, qualitative, and systematic literature review methods, this thesis provides an interdisciplinary view of the domain of Internet censorship. The author presents a reference model for Internet censorship technologies: an abstraction to facilitate a conceptual understanding of the ways in which Internet censorship occurs from a system design perspective. The author then characterizes the technical threats to Internet communications, producing a comprehensive taxonomy of Internet censorship methods as a result. Finally, this work provides a novel research framework for revealing how nation-state censors operate based on a globally representative sample. Of the 70 nations analyzed, 62 used at least one Internet censorship method against their citizens. The results reveal worldwide trends in Internet censorship based on historical evidence and Internet measurement data. </p>
12

Commercial Media Viewing Habits: Digital Natives vs. Digital Immigrants

King, Brian J. 20 November 2009 (has links)
No description available.
13

Obcházení zákona, skutečný obsah právních úkonů a zneužití práva ve vztahu k daňovému plánování / Circumvention of the law, real contents of legal acts and the abuse of law in relation to tax planning

Horák, Milan January 2013 (has links)
The purpose of my thesis is to analyze and characterize circumvention of the law, real content of legal acts and abuse of law in relation to tax planning. To combat tax abuse tax administrator has these three instruments available which in turn set limits of tax planning. The thesis is composed of four chapters. Chapter One differentiates between tax planning, tax abuse and tax evasion as different methods of lowering tax liability. Chapter Two consists of four subchapters, first three containing analysis and characteristic of circumvention of the law, real contents of legal acts and abuse of law. Each of these subchapters builds upon general definition which is then refined by case law of the Supreme Administrative Court and concludes with typical cases. The fourth subchapter deals with "tax evasion by other means" which some authors consider a similar instrument. The third chapter summarizes the current legislative state of these instruments and offers some thoughts de lege ferenda. The fourth chapter contains deeper analysis of the most important case law relating to individual instruments. Chapter Four should serve the reader as a reference while reading Chapter Two. Thesis illustrates the most typical cases of each individual instrument and concludes that the abuse of law doctrine is the most...
14

La protection appropriée des mesures techniques en droit d'auteur.<br><em>NOTE : Ce travail a fait l'objet d'une publication par les éditions Larcier (<a href="http://edoc.bib.ucl.ac.be:61/ETD-db/collection/submitted/FUNDPetd-06142005-161304/unrestricted/site_FUNDP.pdf" target="_blank">aperçu</a>, informations pour <a href="http://editions.larcier.com/livre/?GCOI=28044100937170" target="_blank">acquérir l'ouvrage</a>).</em>

Dusollier, Séverine 12 May 2004 (has links)
L’environnement digital constitue certes une menace pour la protection du droit d'auteur mais il y apporte aussi son lot de réponses et d’outils nouveaux. Ont ainsi été développés de nombreux dispositifs techniques visant à protéger les œuvres numériques, en ligne ou non : films, musique, programmes d'ordinateur, peuvent désormais être dotés de mécanismes techniques gérant les droits de l’auteur ou contrôlant la copie, l’accès ou l’utilisation non autorisés de l’œuvre. Le droit vient au secours de ces mesures techniques de protection : les Traités OMPI de 1996, la directive européenne de 2001 sur le droit d'auteur dans la société de l'information, récemment suivis par le législateur belge, prévoient de sanctionner la neutralisation de tels dispositifs, ainsi que la fabrication et le commerce de moyens permettant ou facilitant un tel contournement. L’œuvre est donc désormais susceptible de bénéficier d’une triple couche de protection : elle est protégée par le droit d’auteur, protégée par la technique, elle-même protégée par la loi. Cet ouvrage analyse l’articulation entre ces trois couches de réservation de l’œuvre et examine dans quelle mesure cette multiplication de la protection modifie le droit d'auteur et l’étendue des prérogatives qu’il accorde à son titulaire. L’auteur répond ainsi aux principales critiques qui ont été adressées à ces mesures techniques et aux dispositions anti-contournement, critiques relatives à l’impossibilité de bénéficier des exceptions au droit d'auteur et notamment de la copie privée, ainsi qu’au contrôle de l’accès à l’œuvre permis par ces dispositifs. Première analyse approfondie de l’introduction des mesures techniques en droit d'auteur, l’ouvrage est également une réflexion d’ensemble sur l’étendue du droit d’auteur, des droits exclusifs d’exploitation aux exceptions et limitations de ces droits, réflexion qui se nourrit aux fondements philosophiques, sociologiques ou économiques de la propriété littéraire et artistique. Ces développements, qui donnent lieu à une analyse minutieuse et argumentée, permettent à l’auteur de plaider d’une part pour une limitation naturelle du pouvoir de l’auteur aux actes d’exploitation de l’œuvre, soit aux actes permettant une diffusion publique de l’œuvre, excluant ainsi les seuls actes d’accès ou d’utilisation finale de l’œuvre ; d’autre part, pour une préservation nécessaire des exceptions au droit d'auteur à l’encontre des mesures techniques ou de la protection légale de celles-ci.
15

A Data Mining Framework To Detect Tariff Code Circumvention In Turkish Customs Database

Bastabak, Burcu 01 September 2012 (has links) (PDF)
Customs and foreign trade regulations are made to regulate import and export activities. The majority of these regulations are applied on import procedures. The country of origin and the tariff code become important when determining the tax amount of the merchandise in importation. Anti-dumping duty is defined as a financial penalty, published by the Ministry of Economy, enforced for suspiciously low priced imports in order to protect the local industry from unfair competition. It is accrued according to tariff code and the country of origin. To avoid such an obligation in order to not to pay tax, a tariff code that is different from the original tariff code may be declared on the customs declaration which is called as &quot / Tariff Code Circumvention&quot / . To identify such misdeclarations, a physical examination of the merchandise is required. However, with limited personnel resources, the physical examination of all imported merchandise is not possible. In this study, a data mining framework is developed on Turkish customs database in order to detect &ldquo / Tariff Code Circumvention&rdquo / . For this purpose, four types of products, which are the most circumvented goods in the Turkish customs, have been chosen. First, with the help of Risk Analysis Office, the significant features are identified. Then, Infogain algorithm is used for ranking these features. Finally, KNN algorithm is applied on the Turkish customs database in order to identify the circumvented goods automatically. The results show that the framework is able to find such circumvented goods successfully.
16

Vybrané problémy ochrany spotřebitele / Selected Issues of Consumer Protection

PACALOVÁ, Aneta January 2017 (has links)
The diploma thesis deals with electronic commerce. The theoretical part of this work is focused on basic aspects of consumer's protection, consumer organisations and institutions providing advice and information and the rights and obligations of consumers and sellers. It describes the history and current situation of e-commerce, advantages and disadvantages, circumvention of the law when buying over the internet and specific casework. The diploma thesis also briefly informs of marketing research. In the practical part there is a questionnaire survey applied, examining the issue of electronic commerce, experiences of buying over the internet and knowledge of consumer rights. The aim of the research is to summarize collected information that is complemented by measures designed to reduce the negative impacts.
17

Státní cenzura Internetu a metody jejího obcházení / State Censorship of the Internet and the Methods of Circumvention

Kolář, Martin January 2016 (has links)
This Master thesis deals with the subject of state censorship of the Internet. The objective of the thesis is to map the techniques of state censorship of the Internet and the methods of circumvention. In the first part, the author introduces organisations and projects that investigate state Internet censorship in the world. Subsequently, the author depicts inspection methods of communication and the Internet filtering techniques. The following part focuses on the principles of circumventing Internet censorship. It also describes various techniques of the circumvention of the censorship. Another objective of the thesis is to test the practical methods of circumventing Internet censorship. As a destination for the measurement the author has chosen PRC where he scrutinised the state of Internet censorship and tested the success rate of circumvention methods. The presented outputs serve as an overview of the techniques of the state censorship of the Internet and the methods of its circumvention, and can be used as a foundation for further work.
18

Recherche sur les instruments de contournement de la réserve héréditaire des descendants / Survey of the circumvention instruments of the hereditary reserve of descendants

Kson-Bouvet, Anna-Gaëlle 21 November 2018 (has links)
A l'heure où la famille moderne se conçoit au pluriel, à l'heure où les ascendants organisent en amont la transmission et la dévolution de leur patrimoine, à l'heure où la mondialisation prône l'uniformisation du droit et la fin des spécificités étatiques, il est nécessaire de s'interroger sur l'avenir de la réserve héréditaire. Les parents ne souhaitent plus être privés de leur pouvoir de disposer librement de leur patrimoine, même pour cause de mort. Que répondre à un père qui angoisse à l'idée de voir son patrimoine dilapidé par un enfant ingrat avec lequel il ne vit que de conflits ? Que dire à cet enfant qui a vu son frère avantagé par décision maternelle, de manière abusive et arbitraire ? Quels conseils donner à ces individus qui ouvrent chaque jour la porte de nos offices pour demander l'aide de leur notaire ? Que dire à cet époux qui veut protéger son conjoint de la véhémence d’enfants d’un premier lit ? Afin de leur répondre dans la pratique, appliquons-nous à étudier les moyens de contourner cette réserve héréditaire. Attachons-nous à vérifier leur efficacité. Au-delà des mécanismes classiques du Code civil tels que le testament et la donation, l'intérêt de cette thèse est de se tourner vers des mécanismes plus complexes, afin de répondre aux parents déçus par leur progéniture, mais aussi à eux, enfants lésés, pour leur donner des moyens juridiques de contrer une injuste privation. Il est utile de comprendre et de connaître ce qu’il est possible de faire pour transmettre son patrimoine avec une liberté recouvrée sans risquer les foudres de la loi. A travers l’étude de ces instruments, de leur efficacité et de leur traitement tant légal que familial, la question de la modernisation de la réserve ressurgit. La famille change, et avec elle, la conception traditionnelle de la réserve héréditaire. / At a time when the modern family is conceived in the plural, at a time when ascendants organize upstream transmission and devolution of their heritage, at a time when globalization advocates the standardization of law and the end of specificities States, it is necessary to question the future of the hereditary reserve. Parents no longer wish to be deprived of their power to freely dispose of their patrimony, even for reasons of death. What to answer to a father who is anxious about seeing his heritage squandered by an ungrateful child with whom he lives only conflicts ? What to say to this child who saw his brother favored by maternal decision, in an abusive and arbitrary way ? What advice can be given to those individuals who open the door of our offices every day to ask the help of their notary ? What to say to this husband who wants to protect his spouse from the angry of children from a first bed ? In order to answer them in practice, let us study ways of circumventing this hereditary reserve. Let's focus on checking their effectiveness. Beyond the classical mechanisms of the Civil Code such as the will and the gift, the interest of this thesis is to turn to more complex mechanisms, in order to answer the parents disappointed by their offspring, but also to them, children wronged to give them legal means to counter unfair deprivation. It is useful to understand and know what can be done to transmit one's heritage with a recovered freedom without risking the wrath of the law. Through the study of these instruments, their efficiency and their legal and family treatment, the question of the modernization of the reserve resurfaces. The family changes, and with it, the traditional conception of the hereditary reserve.
19

Modulating RNA Splicing of DNA Topoisomerase IIα in Human Leukemia K562 Cells: Use of CRISPR/Cas9 Gene Editing to Impact Sensitivity/Resistance to the Anticancer Agent Etoposide

Hernandez, Victor A. January 2021 (has links)
No description available.
20

Exceptions au droit d'auteur et mesures techniques de protection / Exceptions to exclusive rights and technological protection measures

Dieng, Mahmadane 30 November 2012 (has links)
Comme deux éléments qui ne peuvent coexister sans se nuire, les exceptions au droit d’auteur et les mesures techniques de protection sont dans un rapport d’opposition. On ne compte plus dans la littérature spécialisée le nombre d’articles dédiés à leur incompatibilité. Les exceptions au droit d’auteur sont des « dérogations légales » au monopole d’exploitation. Elles permettent d’écarter la mise en oeuvre du droit exclusif alors que les conditions d’application de ce dernier sont réunies. Les mesures techniques de protection sont destinées à empêcher les utilisations interdites par les titulaires de droits. La question est de savoir si ces dispositifs techniques peuvent restreindre l’exercice des exceptions au droit d’auteur. La réponse est positive puisque la directive 2001/29/CE du 22 mai 2001 interdit de contourner des mesures techniques quand bien même il s’agirait de mettre en oeuvre une dérogation au droit d’auteur. Cependant, l’instrument européen instaure un régime de sauvegarde en faveur de certaines exceptions. Aussi, le législateur français a créé une autorité administrative indépendante – la Haute Autorité pour la diffusion des oeuvres et la protection des droits sur Internet – chargée de garantir le bénéfice de ces exceptions. Il est permis de se demander si l’instauration d’un régime de sauvegarde n’est pas la reconnaissance implicite de la valeur impérative des dérogations au droit d’auteur. En tous les cas, cela donne à penser que les exceptions constituent bel et bien des intérêts juridiquement protégés susceptibles d’être portés devant l’autorité judiciaire contrairement à ce qu’a jugé la Cour de cassation. / Like two elements that cannot coexist without working against each other, exceptions to exclusive rights and technological protection measures are in opposition. There are countless articles in the specialised literature devoted to their incompatibility. Exceptions to exclusive rights are “legal exemptions” from the operating monopoly. They enable the implementation of exclusive rights to be neutralised even though the conditions for the application of the latter have been met. Technological protection measures are intended to prevent unauthorised use by rightholders. The question is whether these technological systems can restrict the use of exceptions to exclusive rights. The answer is affirmative, since the directive 2001/29/CE of 22 May 2001 prohibits the circumvention of technological measures even though it would be a case of implementing an exemption to exclusive rights. The European instrument, however, establishes a protection system in favour of certain exceptions. Consequently, French lawmakers have created an independent administrative authority – the High Authority for the dissemination of creative works and protection of rights on the Internet – in order to safeguard the benefits of these exceptions. It could be asked whether the establishment of a protection system implicitly acknowledges the crucial value of these exceptions. In any event, it suggests that they do indeed constitute legally protected interests liable to be brought before the legal authorities, contrary to the Court of Cassation’s assertions.

Page generated in 0.0928 seconds