• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 101
  • 39
  • 28
  • 27
  • 24
  • 8
  • 6
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 281
  • 70
  • 55
  • 53
  • 51
  • 45
  • 44
  • 43
  • 37
  • 35
  • 34
  • 31
  • 31
  • 27
  • 24
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Nové trendy v mezinárodní obchodní arbitráži / New Trends in International Commercial Arbitration

Nosek, Jakub January 2012 (has links)
New Trends in International Commercial Arbitration Abstract: The purpose of my thesis is to analyze two leading trends in international commercial arbitration. Those trends are (i) the influence of electronic means of communication on arbitration proceedings and (ii) confidentiality and its actual development in respect to implied duty of confidentiality in arbitration proceedings. The main methodology of research was to compare recently revised arbitration rules with its previous wordings (UNCITRAL Rules, ICC Rules, SCC Rules and CAM Rules) and examine changes related to the above enlisted topics. Furthermore diverse sources were used in the thesis such as arbitration rules of different institutions, experts' publications and also e-mail correspondence with representatives of observed arbitration institutions. The thesis is composed of three chapters. The first chapter summarizes actual revisions of observed arbitration rules without making any conclusions. The second chapter describes the influence of modern technologies on arbitration proceedings. The chapter consists of four parts. The first part introduces online arbitration and presents possible ambiguities in this term. The second part focuses on specific stages of arbitration proceedings and analyzes in detail, how those stages are influenced by...
22

Povinná mlčenlivost ve zdravotnictví z hlediska trestního práva / Duty of confidentiality in healthcare providing in light of criminal law

Veselá, Zuzana January 2011 (has links)
Deutsches Resümmé Die vorliegende Diplomarbeit befaßt sich mit der Schweigepflicht von Angestellten des Gesundheitswesens der Tschechischen Republik. Der Schwerpunkt liegt dabei bei der Erfassung der Verantwortlichkeit im Strafrecht der Tschechischen Republik. Diese Diplomarbeit gliedert sich in 7 Kapitel. Die Einleitung befaßt sich mit der Erklärung der Grundbegriffe und gibt einen kurzen Überblick über historische und territoriale Zusammenhänge. Im darauffolgenden ersten Kapitel werden die Rechte der Patienten, sowie deren gesetzlicher Schutz behandelt. Das zweite Kapitel erörtert die rechtlichen Grundlagen in der Tschechischen Republik, wie auch die internationale Rechtslage. Das dritte Kapitel widmet sich den Subjekten der Schweigepflicht. Im vierten Kapitel versuche ich den Umfang der Schweigepflicht abzugrenzen. Das fünfte Kapitel behandelt Ausnahmen hinsichtlich der Schweigepflicht im tschechischen Gesundheitswesen. Der Schwerpunkt dieser Diplomarbeit wird im sechsten Kapitel erörtert: die Rechtsverantwortlichkeit von Angestellten des Gesundheitswesens bei einer Verletzung der Schweigepflicht. Hierbei lege ich die Betonung auf die im Strafrecht festgelegte Rechtsverantwortlichkeit. Das letzte Kapitel widme ich Überlegungen de lege ferenda, die sich auch auf andere Fragen dieser Problematik beziehen....
23

The banker customer confidential relationship

Alqayem, Ameera January 2015 (has links)
Conscious of the limitations of the petroleum-based economy in Bahrain, the Bahraini government aims to improve other industries, such as finance. Therefore, the aim of this thesis is to study the current status of banking confidentiality in Bahrain, and to discover the possibilities for improvement in the banking sector in Bahrain, so that the country can succeed in being the financial centre of the Middle East. The main aspects of this study are to explore the meaning of the doctrine of confidentiality; the duration of and the exceptions to the duty of confidentiality, and the delicate balance between protecting banking confidentiality and combating money-laundering. This thesis is based on library research, involving an analysis of a range of documents, publications, cases, articles, online sources and legal materials from the United Kingdom (UK) and Bahraini jurisdictions and legislations, both in Arabic and English. The findings are as follows: surprisingly, compared to English law, the exceptions to the duty of confidentiality under Bahraini law are much more limited. They are clearly stated under the CBBFIA. Although the CBBFIA designates four articles that deal with the duty of confidentiality, it lacks specific and important details related to the application of these articles, such as the scope and duration of the duty of confidentiality. Bahraini courts have failed to apply any article for the protection of banking confidentiality, and the court records lack any cases relating to the protection of banking confidentiality. Also a significant number of money- laundering transactions could be performed through banks. Finally, bank customers in Bahrain have little awareness of their rights in the framework of banker-customer confidentiality.
24

Vybrané aspekty povinnosti mlčenlivosti advokátů / Selected aspects of attorney's duty of confidentiality

Lhotáková, Františka January 2019 (has links)
Selected aspects of attorney's duty of confidentiality Abstract One of the attorney's most important duties is the commitment to maintain the confidentiality of information he or she has learned while providing legal services. However, it is not a lawyer's privilege but a commitment to protect the rights and legitimate interests of his or her clients. The duty of confidentiality may be waived exclusively by the client or his legal successor of the client. Restrictions or breaches of this obligation should occur exceptionally, only in defined cases. In recent years, the effort of the legislators and other entities to disclose this duty of confidentiality can be noticed in the Czech Republic. The overall purpose of this thesis is to analyse the legal regulation of attorney's confidentiality in the Czech Republic. This thesis focuses mainly on the regulation contained in the Czech Law of Advocacy, in the relevant provisions of the Czech Criminal Procedure Code and in the professional regulations of the Czech Bar Association. The first two chapters of this thesis are rather of general nature. A significant part is devoted to explanation of the notion of confidentiality, its meaning and its material and personal scope. The third chapter discusses legal exceptions when breaching of attorney's confidentiality is...
25

Výslech svědka v civilním procesu / The interrogation of a witness in civil proceeding

Gřundělová, Ivana January 2018 (has links)
This thesis is about the interrogation of a witness in civil proceeding. It is considered as one of the most difficult means of proof in terms of its execution and later evaluation by the court. This work is divided into 10 chapters which systematically follow each other. In the introduction I firstly define the concept of means of proof and the groups they can be divided into. The following chapters focus on the main topic. The second chapter is composed of introduction of the witness, their legal obligation to testify and their capability. Also, it deals with the right to reject to testify and the obligation of confidentiality which receives extra attention. I deal with the obligation of confidentiality based on laws regulating this obligation for attorneys, notary, doctors and clerics. Furthermore, the work deals with the procedure of interrogation of witness as the law dictates it. Particularly, the way the court summons the witness and which lawful means does the law allows the court to enforce the duties among the witness to testify or punishing them for false testimony. In the chapter four and five the attention is on the process of interrogation itself and on possible specific means of interrogation, for example, the interrogation requested by the court or the interrogation done outside of...
26

As condições que levam as mulheres soropositivas ao HIV/AIDS a abrir a privacidade de suas informações às equipes do programa saúde da família / The conditions the infected women by the HIV open its privacy in relation the information on the diagnosis of positive HIV´s result to family health program

Ferreira, Fernanda Cristina 22 February 2007 (has links)
A aids é uma doença infecciosa que aparece na década de 1980. Desde sua descoberta até os dias atuais houve mudanças nas características das pessoas infectadas. Uma dessas mudanças foi a feminização. As mulheres devido às questões de gênero possuem singularidades na forma do enfrentamento da doença. O acompanhamento das mulheres infectadas pelo HIV é realizado principalmente, por serviços especializados de saúde. Depois da criação do Programa Saúde da Família, em 1994, e o incentivo às ações de promoção à saúde e prevenção do HIV na atenção básica, torna-se de suma importância a discussão de temas sobre bioética no caso da aids no PSF. O PSF adentra as residências das famílias e tem uma relação de maior proximidade com a comunidade, e incorpora um novo trabalhador que é o Agente Comunitário de Saúde. É a mulher infectada pelo HIV que tem o direito de decidir a quem, como, onde e quando a informação sobre sua soropositividade deve ser revelada. Este estudo teve como objetivos descrever em que condições as mulheres infectadas pelo HIV abrem sua privacidade em relação a informação sobre o diagnóstico de soropositividade a familiares, amigos e vizinhos; e identificar quais as motivações para abrir a privacidade de informações para a equipe de PSF das mulheres infectadas pelo HIV/AIDS. Trata-se de um estudo descritivo de natureza qualitativa, com enfoque bioético, realizado no Município de São Paulo, com mulheres em acompanhamento em um serviço especializado em DST/AIDS e cadastradas por uma equipe de PSF. Verificou-se neste estudo que as mulheres infectadas pelo HIV/AIDS revelam a sua condição de soropositividade a família, amigos e vizinhos quando há identificação com outro soropositivo, pressão de outros, confiança depositada em uma relação, vontade de busca de apoio, preocupação com possível transmissão do vírus ao parceiro, quando houve experiências positivas de apoio, e quando não consegue mentir quando questionada sobre sua soropositividade. E não revelam quando há medo do preconceito, medo de ex-parceiros, medo de se expor, houve experiências negativas como falta de apoio, rejeição e disseminação da informação, foi estabelecido uma pacto de silêncio, não querem que sintam pena, há medo de que a relação mude, envolve filhos menores de idade, preferem guardar para si e quando utilizam estratégias para manter o segredo. As mulheres abrem a privacidade do diagnóstico para a equipe de PSF quando o diagnóstico de soropositividade foi feito na própria unidade, quando ela sente que é melhor atendida no PSF por ser portadora do HIV, tem vínculo com os profissionais do PSF como se fossem familiares, confiam nos profissionais do PSF, sentem que os profissionais não sentem pena. E, não revelam quando a atitude inadequada do profissional gerou medo e insegurança quando comunicou à usuária o diagnóstico, acham que o PSF está ligado ao cuidado de pessoas com doenças graves e acamados, não confiam nesses profissionais por medo de quebra do sigilo,e já possuem todo suporte assistencial no SAE / The AIDS is an infectious illness that appears in the decade of 1980. Since its discovery until the current days, it has been had changes in the characteristics of the infected people, one of these changes was the femininity. The women, due to the sort questions, possess peculiarities in the form of the confrontation of the illness. The accompaniment of the infected women by the HIV is carried through, mainly, for specialized services. After the creation of the Family´s Health Program, in 1994, and the incentive to the actions of health promotion and prevention of the HIV in the basic attention, becomes of utmost importance to discuss subjects on bioethics in the case of the AIDS in the PSF. The PSF goes to inside the families´ residences and has a relation of bigger proximity with the community and it incorporates a new worker who is the Communitarian Agent of Health. That´s the woman who is infected by the HIV who has the right to decide to who, as, where and when the information on its positive HIV´s result must be disclosed. This study had as objective to describe where conditions the infected women by the HIV open its privacy in relation the information on the diagnosis of positive HIV´s result to their family, friends and neighbors; and to identify which are the motivations to open the privacy of information for the team of PSF of the infected women for the HIV/AIDS. One is about a descriptive study of qualitative nature, with bioethics approach, carried through in the City of São Paulo, with women in accompaniment in a specialized service in DST/AIDS and registered in cadastre by a PSF team. It was verified in this study that the infected women by the HIV/AIDS disclose to its condition of positive HIV’s result to the family, friends and neighbors when she has identification with another who has positive HIV diagnosis, pressure of others, confidence deposited in the relationship, wish of support search, concern with possible transmission of the virus to the partner, when it had positive experiences of support, e when it does not obtain to lie when questioned on its positive HIV´s result. And she does not disclose when it has fear of the preconception, fear of former-partners, fear of if displaying, had negative experiences as lack of support, rejection and dissemination of the information, was established a silence pact, does not want that they feel penalty, has fear of that the relation moves, involves minor children, prefers to keep for itself and when they use strategies to keep the secret. Women open privacy of diagnosis for team of PSF when diagnosis of positive HIV´s result was made in proper unit, when it feels that more good she is taken care of it in the PSF for being carrying of the HIV, she has bond with the professionals of the PSF as if they were familiar, they trust the professionals of the PSF, feel that the professionals do not feel penalty. And, she does not disclose when the inadequate attitude of the professional generated fear and unreliability when it communicated to the user the diagnosis, they find that the PSF is on to the care of people with serious illnesses and bedridden, do not trust these professionals of in addition the secrecy from fear, and already they all possess has a support in SAE
27

Evaluation of Cryptographic Packages

Raheem, Muhammad January 2009 (has links)
<p>The widespread use of computer technology for information handling resulted in the need for higher data protection.The usage of high profile cryptographic protocols and algorithms do not always necessarily guarantee high security. They are needed to be used according to the needs of the organization depending upon certain characteristics and available resources.The communication system in a cryptographic environment may become vulnerable to attacks if the cryptographic packages don’t meet their intended goals.</p><p>This master’s thesis is targeted towards the goal of evaluating contemporary cryptographic algorithms and protocols collectively named as cryptographic packages as per security needs of the organization with the available resources.</p><p>The results have shown that there certainly is a need for careful evaluations of cryptographic packages given with available resources otherwise it could turn into creating more severe problems such as network bottlenecks, information and identity loss, non trustable environment and computational infeasibilities resulting in huge response times. In contrast, choosing the right package with right security parameters can lead to a secure and best performance communication environment.</p>
28

Grid Fault management techniques: the case of a Grid environment with malicious entities

Akimana, Rachel 01 October 2008 (has links)
La tolérance et la gestion des fautes dans les grilles de données/calcul est d’une importance capitale. En effet, comme dans tout autre système distribué, les composants d’une grille sont susceptibles de tomber en panne à tout moment. Mais le risque de panne croît avec la taille du système, et est donc plus exacerbé dans un système de grille. En plus, tout en essayant de mettre à profit les ressources offertes par la grille, les applications tournant sur celle-ci sont de plus en plus complexes (ex. impliquent des interactions complexes, prennent des jours d’exécution), ce qui les rend plus vulnérables aux fautes. Le plus difficile dans la gestion des fautes dans une grille, c’est qu’il est difficile de savoir si une faute qui survient sur une entité de la grille est induite malicieusement ou accidentellement. Dans notre travail de thèse, nous utilisons le terme faute, au sens large, pour faire référence à tout étant inattendu qui survient sur tout composant de la grille. Certains de ces états provoquent des comportements aussi inattendus et perceptibles au niveau de la grille tandis que d’autres passent inaperçues. De plus, certaines de ces fautes sont le résultat d’une action malveillante alors que d’autres surviennent accidentellement ou instantanément. Dans ce travail de thèse, nous avons traité le cas de ces fautes induites malicieusement, et qui généralement passent inaperçues. Nous avons considéré en particulier le problème de la confidentialité et de l’intégrité des données stockées à long-terme sur la grille. L’étude de la confidentialité des données a été faite en deux temps dont la première partie concerne la confidentialité des données actives. Dans cette partie, nous avons considéré une application liée à la recherche des similitudes d’une séquence d’ADN dans une base de données contenant des séquences d’ADN et stockée sur la grille. Pour cela, nous avons proposé une méthode qui permet d’effectuer la comparaison sur un composant distant, mais tout en gardant confidentielle la séquence qui fait l’objet de la comparaison. Concernant les données passives, nous avons proposé une méthode de partage des données confidentielles et chiffrés sur la grille. En rapport avec l’intégrité des données, nous avons considéré le cas des données anonymes dans le cadre de l’intégrité des données passives. Pour les données actives, nous avons considéré le problème de la corruption des jobs exécutés sur la grille. Pour chacune des cas, nous avons proposé des mécanismes permettant de vérifier l’authenticité des données utilisées ou produites par ces applications.
29

Guesswork and Entropy as Security Measures for Selective Encryption

Lundin, Reine January 2012 (has links)
More and more effort is being spent on security improvements in today's computer environments, with the aim to achieve an appropriate level of security. However, for small computing devices it might be necessary to reduce the computational cost imposed by security in order to gain reasonable performance and/or energy consumption. To accomplish this selective encryption can be used, which provides confidentiality by only encrypting chosen parts of the information. Previous work on selective encryption has chiefly focused on how to reduce the computational cost while still making the information perceptually secure, but not on how computationally secure the selectively encrypted information is.  Despite the efforts made and due to the harsh nature of computer security, good quantitative assessment methods for computer security are still lacking. Inventing new ways of measuring security are therefore needed in order to better understand, assess, and improve the security of computer environments. Two proposed probabilistic quantitative security measures are entropy and guesswork. Entropy gives the average number of guesses in an optimal binary search attack, and guesswork gives the average number of guesses in an optimal linear search attack. In information theory, a considerable amount of research has been carried out on entropy and on entropy-based metrics. However, the same does not hold for guesswork. In this thesis, we evaluate the performance improvement when using the proposed generic selective encryption scheme. We also examine the confidentiality strength of selectively encrypted information by using and adopting entropy and guesswork. Moreover, since guesswork has been less theoretical investigated compared to entropy, we extend guesswork in several ways and investigate some of its behaviors.
30

Samverkan mellan skola och socialtjänst. : Ur de yrkesverksammas perspektiv. / Collaboration between school and social services. : The professionals’ perspectives.

Seidlitz, Jolin, Sjödahl, Sofia January 2014 (has links)
The purpose of this study is to understand the collaboration between school and social services. The primary focus of this study is the subject of interaction. The study analyzes how confidentiality affects collaboration between school and social services and examines what effect the organizations’ different roles have on collaboration. The method used is qualitative interviews and the gathered empirical data has been analyzed using theories of discretion and street-level bureaucracy. Eight professionals have been interviewed; four social workers from social services and four teachers. All participants agreed that collaboration is necessary between schools and social services but there is a mutual lack of knowledge about each other's organizations. The study concludes that because of the organizations' differing tasks, it is difficult for them to know who should take responsibility in their interaction. There are some methods that facilitate achieving good interaction.

Page generated in 0.0877 seconds