• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 71
  • 13
  • 6
  • 6
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 1
  • Tagged with
  • 136
  • 93
  • 37
  • 27
  • 23
  • 21
  • 21
  • 20
  • 20
  • 19
  • 18
  • 15
  • 15
  • 14
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Towards Trustworthy Online Voting : Distributed Aggregation of Confidential Data / Confiance dans le vote en ligne : agrégation distribuée de données confidentielles

Riemann, Robert 18 December 2017 (has links)
L’agrégation des valeurs qui doivent être gardées confidentielles tout en garantissant la robustesse du processus et l’exactitude du résultat est nécessaire pour un nombre croissant d’applications. Divers types d’enquêtes, telles que les examens médicaux, les référendums, les élections, ainsi que les nouveaux services de Internet of Things, tels que la domotique, nécessitent l’agrégation de données confidentielles. En général,la confidentialité est assurée sur la base de tiers de confiance ou des promesses de cryptographie, dont les capacités ne peuvent être évaluées sans expertise.L’ambition de cette thèse est de réduire le besoin de confiance dans les autorités, de même que la technologie, et d’explorer les méthodes d’agrégations de données à grande échelle, qui garantissent un degré élevé de confidentialité et ne dépendent ni de tiers de confiance ni de cryptographie. Inspiré par BitTorrent et Bitcoin, les protocoles P2P sont considérés. La première contribution de cette thèse est l’extension du protocole d’agrégation distribuée BitBallot dans le but de couvrir les agrégations dans les réseaux P2P comprenant des pairs adversaires avec un comportement défaillant ou byzantin. Les changements introduits permettent éventuellement de maintenir un résultat précis en présence d’une minorité adversaire. Les limites de scalabilité rencontrées conduisent à la deuxième contribution dans le but de soutenir les agrégations à grande échelle. Inspiré par BitBallot et BitTorrent, un nouveau protocole distribué appelé ADVOKAT est proposé.Dans les deux protocoles, les pairs sont affectés aux noeuds feuilles d’un réseau de superposition d’une structure arborescente qui détermine le calcul des agrégats intermédiaires et restreint l’échange de données. La partition des données et du calcul entre un réseau de pairs équipotent limite le risque de violation de données et réduit le besoin de confiance dans les autorités. Les protocoles fournissent une couche middleware dont la flexibilité est démontrée par les applications de vote et de loterie. / Aggregation of values that need to be kept confidential while guaranteeing the robustness of the process and the correctness of the result is necessary for an increasing number of applications. Various kinds of surveys, such as medical ones, opinion polls, referendums, elections, as well as new services of the Internet of Things, such as home automation, require the aggregation of confidential data. In general, the confidentiality is ensured on the basis of trusted third parties or promises of cryptography, whose capacities cannot be assessed without expert knowledge.The ambition of this thesis is to reduce the need for trust in both authorities and technology and explore methods for large-scale data aggregations, that ensure a high degree of confidentiality and rely neither on trusted third parties nor solely on cryptography. Inspired by BitTorrent and Bitcoin, P2P protocols are considered.The first contribution of this thesis is the extension of the distributed aggregation protocol BitBallot with the objective to cover aggregations in P2P networks comprising adversarial peers with fail-stop or Byzantine behaviour. The introduced changes allow eventually to maintain an accurate result in presence of an adversarial minority.The encountered scalability limitations lead to the second contribution with the objective to support large-scale aggregations. Inspired by both BitBallot and BitTorrent, a novel distributed protocol called ADVOKAT is proposed.In both protocols, peers are assigned to leaf nodes of a tree overlay network which determines the computation of intermediate aggregates and restricts the exchange of data. The partition of data and computation among a network of equipotent peers limits the potential for data breaches and reduces the need for trust in authorities. The protocols provide a middleware layer whose flexibility is demonstrated by voting and lottery applications.
82

Confidentiality and information-sharing practices of Ministry for Children and Families social workers

Douglas, Janet Louise 11 1900 (has links)
The move towards a more multidisciplinary approach to the delivery of child protection services in British Columbia raises concerns about the sharing of confidential case material. Factors associated with the information-sharing practices of social workers with law enforcement agencies were examined in this research. This descriptive study involved surveying forty-one intake child protection social workers employed by the Ministry for Children and Families in Vancouver and Coquitlam, using questionnaires. Knowledge of existing legislation, methods of accessing and sharing information with police, and attitudes about police involvement were examined, as well as workers' experience and participation in training. The analysis identified both contributors and obstacles to effective information-sharing and collaboration between social workers and police officers. Informal methods of accessing information were shown to be the most highly used and successful, but the lack of understanding of legislation and of each other's roles interfered with collaborative practice. The results of this research will be of assistance in future training, as well as the development of interagency protocols. / Arts, Faculty of / Social Work, School of / Graduate
83

Bostadssökande med skyddade personuppgifter : Hur kontaktpersoner underlättar hyreskontrakt / Seeking accommodation with confidential personal information : How contact persons ease the way towards a lease

Liddell, Andrea January 2021 (has links)
The aim of this paper was to illustrate how private landlords perceives people with confidential personal information and their victim status. And look at how that could affect their willingness to offer a lease. The purpose of this paper was also to illustrate how contact persons close to the person with confidential personal information use strategies to support them in their search for housing. In addition, I will bring to light the consequences of not securing housing as a person with confidential personal information. With the use of a qualitative approach the empirical data was collected through semi-structured interviews with four contact persons who had several years of practice with people with confidentialinformation. The results were analyzed with intersectional theory and Nils Christies theory of the ideal victim. The results where then presented in seven themes. The results show that landlords find the confidential personal information as a signal for problems. It also shows that women with confidential personal information had an easier time finding housing than men in the same situation. The results also suggests that men with confidential personal information that has an immigrant background are at a further disadvantage.
84

Confidential Construction Project : An Explorative-Comparative Study Between Conventional and Confidential Construction Projects / Konfidentiella byggprojekt : En explorativ-komparativ studie mellan konventionella och konfidentiella bygg

Khalaf, Soran, Bjerkensjö, Jonathan January 2021 (has links)
The definition of a project is that an individual or group of individuals carries out a work that results in a unique product or service. What is usually discussed in both the media and in the construction industry is the type of project that you can talk about. In this study, this is called conventional construction projects. There are also projects that you are not allowed to talk about and that must be kept secret for various reasons. These can, for example, be based on protecting national interests. In these projects, integrity is one of the most important parameters to keep track of from a management perspective. This study examines the work methodology in this area of the Swedish construction industry. The study is based on traditional project management theory and begins with a review of concepts such as critical success factors (CSF), the distinction between confidentiality and conventionality, key performance indicators (KPI) and the classic iron triangle. The study's question is whether these concepts appear and are applied differently in confidential construction projects compared to conventional ones. Are there any activities that are of utmost importance that they are carried out for a confidential project to be considered successful? The study was conducted as a qualitative, abductive study where information was obtained through semi-structured interviews. In total, eleven interviews were conducted with individuals who participated in some form of confidential construction project. All respondents have represented construction contractors during their time in confidential construction projects. The conclusion after the completed analysis of the interviews shows that confidential projects do not differ significantly in terms of project structure. On the other hand, this type of project is characterized by a much higher degree of accuracy regarding planning and implementation than a comparable conventional construction project. / Definitionen av ett projekt är att en enskild eller grupp av individer genomför ett arbete som resulterar i en, på något sätt, unik produkt eller tjänst. Vad som vanligtvis diskuteras i både media och i byggbranschen är den typ av projekt som du faktiskt får prata om. I denna studie kallas detta för konventionella byggprojekt. Det finns även projekt som du inte får prata om och som måste hållas hemliga av olika anledningar. Dessa kan exempelvis vara grundade i nationella skyddsintressen. I dessa projekt är integritet en av de viktigaste parametrarna att hålla koll på ur ett ledningsperspektiv. Denna studie undersöker arbetsmetodiken inom detta område i byggbranschen. Studien tar avstamp från traditionell projektledningsteori, och inleds med en genomgång av koncept såsom kritiska framgångsfaktorer (CSF), distinktionen mellan konfidentialitet och konventionalitet, nyckeltal (KPI) samt den klassiska järntriangeln. Studiens frågeställning är om dessa begrepp ter sig och tillämpas annorlunda i konfidentiella byggprojekt jämfört med konventionella. Är det några aktiviteter som är av yttersta vikt att de genomförs för att ett konfidentiellt projekt ska anses vara framgångsrikt? Studien har genomförts som en kvalitativ, abduktiv studie där informationsinhämtningen har skett genom semistrukturerade intervjuer. Totalt har ett antal om elva intervjuer genomförts med individer som deltagit inom någon form av konfidentiellt byggprojekt. Samtliga respondenter har representerat byggentreprenörer under deras tid i konfidentiella byggprojekt. Slutsatsen efter den genomförda analysen av intervjuerna visar att konfidentiella projekt inte skiljer sig avsevärt mycket sett till struktur på projektet. Däremot karakteriseras denna typ av projekt av en mycket högre grad av noggrannhet avseende planering och genomförande än ett jämförbart konventionellt byggprojekt.
85

The parameters of medical-therapeutic privilege

Welz, Dieter Walter 06 1900 (has links)
Law / LL.M.
86

The right to the trade secret

Knobel, Johann 06 1900 (has links)
A legally protectable trade secret is secret information which is applicable in trade or industry, in respect of which the owner has the will to keep it secret, which has economic value, and which is concrete enough to be embodied in a tangible form and to exist separately form its owner. A comparative study reveals that while trade secrets can be infringed in three ways - namely unauthorized acquisition, use and disclosure - contemporary legal systems differ in respect of both the ambit and juridical bases of protection against such infringing conduct. The legal protection of trade secrets is promoted by the recognition of a subjective right to the trade secret. This right is an intellectual property right independent of statutory intellectual property rights like patent rights and copyright, the common law intellectual property right to goodwill, and the personality right to privacy. In South African private law, trade secrets can be adequately protected by the application of general delictual and contractual principles. Delictual wrongfulness of trade secret misappropriation is constituted by an infringement of the right to the trade secret. Thus any act that interferes with the powers of use, enjoyment and disposal exercised by someone with a subjective right to that trade secret, is, in the absence of legal grounds justifying such interference, wrongful. Patrim·onial loss caused by both intentional and negligent infringement of trade secrets should be actionable under the actio legis Aquiliae. Wrongful trade secret infringements can - also in the absence of fault on the part of the infringer - be prevented by an interdict. Protection of trade secrets is not restricted to the contexts of either unlawful competition, or fiduciary relationships. Trade secret protection is on a sound footing in South African law, compares favourably with the position in other legal systems, and is in step with the international agreement on Trade-Related Aspects of Intellectual Property Rights to which South Africa is a signatory nation. / Private Law / LL.D. (Private Law)
87

Hippocratic data sharing in e-government space with contract management

Aiyadurai, Yoganand January 2015 (has links)
Submitted in partial fulfillment of the requirement of the degree Magister Technologiae: Information Technology, Durban University of Technology, Durban, South Africa, 2015. / The research reported in this dissertation focuses on seamless data sharing in e-government space because of the intrinsic complexity, disparity and heterogeneity of government information systems as well as the need to improve government service delivery. The often observed bureaucracy in government processes, especially when verifying information, coupled with the high interdependency of government departments and diversity in government operations has made it difficult to improve government service delivery efficiency. These challenges raise the need to find better ways to seamlessly share data between government to citizens, government to businesses, government to suppliers and government to public institutions. Obviously, efficient automatic data sharing is an important phenomenon that contributes to improvements in communication, collaboration, interaction and efficiency in the service delivery process because it reduces information verification time and improves reliability of information. The general applications of data sharing systems become perceptible in institutions such as banks and government establishments where information verification is highly necessary in the process of service delivery. Data sharing usually occurs between a data holder and a data requester when copies of authorized data are transported from the source databases to the requester. This data sharing process should guarantee a high level of privacy because of the confidential nature of certain data. A data integration gateway (DIG) is being proposed in this research as a methodological solution to seamlessly share data in e-government space, using Hippocratic database principles to enforce data privacy. The DIG system is a centralized web application that utilizes a lightweight database within the government data centre to hold information on data contracts, data sources, connection strings and data destinations. The data sharing policies are stated as contracts and once indentures on how to share data are established between different data publishers, it is possible to ensure a seamless integration of data from different sources using the DIG application being proposed in this dissertation. The application is malleable to support the sharing of publisher data that are stored in any kind of database. The proposed DIG application promises to reduce costs of system maintenance and improve service delivery efficiency without any change to the existing hardware infrastructure and information systems residing within different government departments.
88

Confidentiality as value in the management of HIV/AIDS in South Africa

Mkosi, Barbara Nomsa 12 1900 (has links)
Thesis (M.Phil.)--Stellenbosch University, 2000. / ENGLISH ABSTRACT: AIDS is the most important threat to world health. Recent years have seen a dramatic spread of HIVand AIDS in South Africa. Health education directed at modifying risk behaviour appears to be the only way in which the disease can be contained. Controlling AIDS is not only by controlling the virus, but also involves tackling social, economic and political issues and putting AIDS into the broader context of sexuality and gender roles. This requires a broader understanding of this aspect of HIV-AIDS ranging from population dynamics, through to research on individual behaviour and its socio-economic impact; so that we can dispel the myths and rumours that surround AIDS and answer searching questions that will be asked by the community. In South Africa, HIV-AIDS remains a stigmatized disease. There have been calls from courageous and influential people for those who are living with HIV-AIDS to be open about their status and to destigmatise the disease. Institutions too have been drawn into the controversy about whether to remain silent or speak out. Southern African Anglican bishops, as well as some politicians declared their intention to undergo testing for HIV status in order to sensitise the public to the seriousness of the epidemic. Were AIDS not regarded as intolerable, the entire issue of confidentiality would fall away. Calls to destigmatise the disease through openness cannot stand alone. Government must put effective treatment programmes in place. In the absence of treatment, AIDS may represent only frustration and hopelessness to those who test positive; and fear, danger and resultant animosity to those who are HIV negative. The text is in four chapters. Chapter 1 focuses on confidentiality as an important principle in the management of disease. In HIV -AIDS, confidentiality is a more sensitive issue as AIDS is particularly viewed as a social stigma, accompanied by discrimination and harassment. The chapter also addresses HIV infection, transmission, counseling and screemng. Chapter 2 deals with the principles of biomedical ethics namely, autonomy, to enable the patient to determine his/her course of treatment; informed consent, designed to protect the interests of patients from exploitation and harm, and encourage health professionals to act responsibly; beneficence and nonmaleficence, to protect the welfare of others; and justice, to ensure access to health care for all. It also highlights the aspects of and limitations to confidentiality. Chapter 3 discusses broadly the ethical dilemmas pertammg to professional-patient relationships, women and HIV-AIDS, religion, prisoners and employer-employee relationships. When the AIDS epidemic started, very few people suffered from the disease, and the disease was treated with great caution and confidentiality. Today, AIDS is a pandemic and emphasis should shift from the ethic of autonomy and confidentiality, to a social ethic, which emphasizes the responsibility of minimizing the risk of spread of infection. The chapter also examines the role of the Department of Health, the participation of health professional bodies and the legal aspects relating to confidentiality in HIV-AIDS. Chapter 4 attempts to construct an argument to destigmatise HIV-AIDS by arguing the responsibility of the government to make sufficient resources available for the treatment and control of the pandemic. Health professionals are challenged to engage their expertise and skills in the service of the sick with dignity and respect. The community is encouraged to support the drive towards controlling the spread of HIV infection and enable people living with AIDS to disclose their status without fear of harassment. / AFRIKAANSE OPSOMMING: Vigs is die gevaarlikste bedreiging van wéreldgesondheid. Die afgelope paar jaar het 'n dramatiese verspreiding van mv en VIGS in Suid-Afrika plaasgevind. Gesondheidsopvoeding wat gemik is op die verandering van risiko-gedrag is skynbaar die enigste metode wat die siekte kan beheer. Die kontrolering van VIGS is nie net die kontrolering van die virus nie, maar dit betref ook herbesinning oor sosiale, ekonomiese en politiese en geslagsrolle. Dit vereis 'n omvattender verstaan van hierdie aspek van HIV-VIGS, wat strek vanaf van bevolkingspatrone tot by die navorsing oor individuele gedrag en die sosio-ekonomiese impak van 19. So kan ons hopelik help om die mites rondom VIGS te besweer. In Suid-Afrika bly mV-VIGS 'n gestigmatiseerde siekte. Daar rus 'n veranbtwoordelikheid op invloedryke mense wat met mV-VIGS leef en wat as rolmodelle sou kon dien, om hul mv -status te openbaar en sodoeonde te help om die siekte te destigmatiseer. Instansies is ook by hierdie twispunt betrek om vas te stelof die mense moet praat of swyg. Suider-Afrikaanse Anglikaanse Biskoppe, asook somige politici het hulle intensies aangekondig om die mv -toets te ondergaan om sodoende die publiek te help opvoed oor die gevaar van hierdie epidemie. Oproepe om die siekte te destigmatiseer deur openbaarheid kan nie in isolasie funksioneer nie. Die staat moet effektiewe kuratiewe en voorkomingsprogramme hier rondom loods en kontinueer. In die afwesigheid van 'n geneesmiddel, sal VIGS slegs frustrasie, hopeloosheid, en vrees skep by diegene wat positief getoets is, sowel as vyandigheid onder diegene wat nie mv positief is nie. Die teks het vier hoofstukke. Hoofstuk 1 fokus op vertroulikheid as 'n belangrike beginsel in die bestuur van die siekte. In mV-VIGS is vertroulikheid 'n meer sensitiewe beginsel aangesien VIGS in die besonder as 'n sosiale skandvlek, aangevreet deur diskriminasie, gesien word. Die hoofstuk bespreek ook mv -infeksie, transmissie, raadgewing en toetsing. Hoofstuk 2 gaan oor die beginsels van die biomediese etiek, naamlik, outonomie, waaronder ingeligte toetstemming, ontwerp om die belange van die pasiente te beskerm teen eksploitasie en gevaar: om gesondheids professionele aan te moedig om hulle op 'n verantwoordelike manier te gedra. Ander beginsels is goedwilligheid en niekwaadwiligheid om die welsyn van ander te beskerm, asook geregtigheid, om toegang tot gesondheidshulp vir almal te verseker. Dit beklemtoon ook die aspekte verwant aan beperkinge tot vertroulikheid. Hoofstuk 3 bespreek breedweg die etiese dilemmas met betrekking tot die verhouding tussen pasiënye en professionele gesondheidswerkers, vrouens en mV-VIGS, godsdiens, gevangenes en werkgewer-werker verhoudings. Toe die VIGS-epidemie begin het, het min mense aan die siekte gely, en die siekte is met groot sorg en vertroulikheid behandel. Vandag is VIGS 'n pandemie en die klem moet geskuif word vanaf outonomie en vetrouilikheid na 'n sosiale etos wat verantwoordlikheid en die vermindering van die risiko van die verspreiding van die infeksie beklemtoon. Die hoofstuk kyk ook na die rolle van gesondheidsdepartmente, deelname van gesondheids professionele organisasies en die juridiese aspekte met betrekking tot vertroulikheid van HIV-VIGS. Hoofstuk 4 poog om 'n argument te ontwikkel wat daartoe sou kon bydra dat HIV-VIGS gedestigmatiseer sal word. Klem word gelê op die verabtwoordelikheid van die staat om soveel moontlike bronne beskikbaar te stel vir die behandeling van en beheer oor hierdie pandemie. Gesondheids professionele word uitgedaag om hulle deskundigheid en bekwaamheid in die diens van die siekes met waardigheid en respek te gebruik. Die gemeenskap word aangemoedig om die poging tot die beheer van die verspreiding van die HIV -infeksie te ondersteun en om die mense wat met VIGS leef in staat te stelom hul status sonder die dreigement van stigmatisering bekend te maak.
89

The Protection of Privacy in the Workplace: A Comparative Study

Gondwe, Mimmy 12 1900 (has links)
Thesis (LLD )--Stellenbosch University, 2011. / ENGLISH ABSTRACT: The importance of privacy lies in the fact that it represents the very idea of human dignity or the preservation of the ‘inner sanctum’. Not surprisingly, however, operational concerns of employers and technological developments combine continuously to challenge the preservation of privacy in the workplace. Employees the world over are exposed to numerous privacy invasive measures, including drug testing, psychological testing, polygraph testing, genetic testing, psychological testing, electronic monitoring and background checks. Hence, the issue at the heart of this dissertation is to determine to what extent privacy is protected in the South African workplace given advancements in technology and the implications (if any) for the right to privacy as such. A secondary aim of the dissertation is to attempt to provide a realistic balance between the privacy concerns of employees and the operational needs of employers in this technological age. As such the main focus of dissertation falls within the sphere of employment law. In order to provide an answer to the research issue discussed above, the dissertation addresses five ancillary or interrelated issues. First, the broad historical development of the legal protection of privacy is traced and examined. Second, a workable definition of privacy is identified with reference to academic debate and comparative legislative and judicial developments. Third, those policies and practices, which would typically threaten privacy in the employment sphere are identified and briefly discussed. Fourth, a detailed evaluation of the tension between privacy and a number of selected policies and practices in selected countries is provided. More specifically, the dissertation considers how these policies and practices challenge privacy, the rationale for their existence and, if applicable, how these policies and practices – if necessary through appropriate regulation – may be accommodated while simultaneously accommodating both privacy and the legitimate concerns of employers. The selection of these practices and policies is guided by two considerations. At the first level the emphasis is on those challenges to privacy, which can be traced back to technological developments and which, as such, foster new and unique demands to the accommodation of privacy in the workplace. The secondary emphasis is on those policies, which are representative of the fundamental challenges created by new technologies to privacy. To effectively address the above issues the dissertation uses the traditional legal methodology associated with comparative legal research, which includes a literature review of applicable law and legal frame work and a review of relevant case law and a comparative study of selected foreign jurisdictions. / AFRIKAANSE OPSOMMING: Geen opsomming / Fulbright Foundation / Stellenbosch University / Mellon Foundation / NFR
90

News Magazine Use Of and Attitudes Toward Leaks in their Coverage of the Decline and Fall of Spiro T. Agnew

Fredd, James B. 08 1900 (has links)
This study is a content analysis of the coverage in Time, Newsweek, and U. S. News & World Report on Spiro Agnew from August 13 to October 22, 1973, and is concerned with the use of leaks as determined by analyzing the levels of attribution and the attitudes of the magazines toward leaks. All three magazines used approximately equivalent amounts of material from concealed sources. Time and Newsweek defended the use of leaks; U. S. News & World Report attacked their use. The perils inherent in using information from concealed sources make it necessary to consult as many sources as feasible when following a controversial story.

Page generated in 0.1167 seconds