• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 101
  • 39
  • 28
  • 27
  • 24
  • 8
  • 6
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 281
  • 70
  • 55
  • 53
  • 51
  • 45
  • 44
  • 43
  • 37
  • 35
  • 34
  • 31
  • 31
  • 27
  • 24
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Aplicações de documentação fiscal eletrônica em sistemas logísticos: casos práticos. / Applications of electronic invoices in logistics systems: pratical cases.

Fernandez, Marcelo Luiz Alves 14 March 2018 (has links)
Os documentos fiscais eletrônicos estão implantados no Brasil desde 2006, e significaram relevante modernização na forma como as operações comerciais são documentadas no país. Contudo, apesar de possuírem informações que transcendem a fiscalização tributária, a legislação brasileira impõe o chamado \"sigilo fiscal\", restringindo o acesso a esses documentos apenas à administração tributária. Nesse sentido, o trabalho tem os objetivos de analisar o conceito e os contornos do sigilo fiscal imposto pela legislação brasileira e propor aplicações práticas de como as informações constantes nos documentos fiscais eletrônicos poderiam ser utilizadas pelos demais órgãos públicos e pela iniciativa privada. Dentre os diversos usos potenciais o trabalho foca no tema de sistemas logísticos, mais especificamente no que se refere ao rastreamento de veículos e mercadorias. Nesse sentido são apresentados e detalhados quatro casos práticos de interesse para a iniciativa privada e outros órgãos de fiscalização: identificação do trânsito de veículos de carga com excesso de peso em rodovias; identificação do transporte de produtos perigosos em áreas urbanas; rastreamento de mercadorias de alto valor agregado pelas empresas; e o conhecimento prévio do fluxo de mercadorias, para fins de planejamento de carga e descarga em armazéns, portos e aeroportos. Aborda, também, um caso prático de rastreamento útil para a própria administração tributária, as chamadas \"fronteiras virtuais\". Apresenta, por fim, a especificação técnica mínima para a implantação dos quatro casos práticos de rastreamento, que servirá tanto para a Secretaria da Fazenda como para os órgãos e empresas interessados nas informações contidas nos documentos eletrônicos. / Electronic tax documents have been implemented in Brazil since 2006, and have meant a relevant modernization in the way commercial operations are documented in the country. However, despite having information that transcends tax inspection, Brazilian law imposes so-called \"fiscal secrecy\", restricting access to these documents only to the tax administration. In this sense, the objectives of this paper are to analyze the concept and the contours of fiscal secrecy imposed by Brazilian legislation and propose practical applications of how the information contained in electronic tax documents can be used by other public agencies and private initiative. Among the various potential uses, the work focuses on the topic of logistics systems, more specifically on the tracking of vehicles and goods. In this sense, four practical cases of interest to the private sector and other inspection bodies are identified and detailed: identification of the traffic of overloaded vehicles on highways; identification of transport of hazardous products in urban areas; tracking of high value-added goods by companies; and prior knowledge of the flow of goods for loading and unloading planning in warehouses, ports and airports. It also addresses a practical case of useful tracking for the tax administration itself, the so-called \"virtual borders\". Finally, it presents the minimum technical specification for the implementation of the four practical cases of tracing, which will serve both the Treasury Department and the agencies and companies interested in the information contained in the electronic documents.
62

Investment Treaty Arbitration and Transparency : Transparency, confidentiality and the public interest in international investment disputes

Söderberg, Ebba January 2019 (has links)
Investment treaty arbitration has borrowed a number of elements from commercial arbitration, including confidentiality. The scope of confidentiality in investor-state arbitrations can make it hard for amicus curiaeto participate in the arbitral proceedings.    The rules regarding transparency in investor-state arbitration relates, among others, to access to information and documents, third-party participation and the publication of awards. Transparency in investor-state arbitrations is also related to changes in legislation that could affect the investor. Changes in legislation is a way of adapting to new circumstances as changes in government or an attempt to prevent health issues or fulfilling environmental goals in the interest of the public.   The possibility of amicus curiaeparticipation and submissions make it possible for the public to affect what information the tribunal have in cases where public interests are discussed. Tribunals have, when they have found that the public interest is not only general, decided to allow amicus curiaesubmissions even without the consent of the parties. They have allowed such submissions in cases where the amicus curiaecould enlighten the tribunal or provide additional information about the merits.     There is no binding case law in arbitration. Since the tribunal only have jurisdiction in the particular case, awards cannot be binding in other disputes. The lack of case law can lead to a lack of predictability for both investors and states. It has led to fewer changes in domestic regulation, the phenomenon is called the “chilling effect” and refers to states who make less changes (including changes in the interest of the public) in an attempt to avoid a violation of the FET standard.    Transparency, i.e. making the dispute public, including the party’s identities, documents and the award, can help providing predictability to investment-treaty arbitration. The outcome of the case is not binding as case law for future disputes but could provide both states and investors knowledge about how certain treaties and actions might be interpreted by a future tribunal.
63

Master Therapists' Decision Making Process Concerning Adolescent Confidentiality: A Grounded Theory Approach

Michero, Emily 05 1900 (has links)
Ethical codes and laws provide counselors with guidance for how to approach confidentiality, but there is a gap in the literature surrounding counselors' process of decision-making when managing confidentiality with adolescent clients. This study explored the decision-making process of master therapists concerning adolescent clients. I conducted semi-structured interviews with peer identified master therapist (N=10), all of whom were licensed professional counselors with 15 or more years of counseling experience and whose case load contained 25% or more adolescent clients. Participants included seven females and three males; nine participants identified as Caucasian, and one participant identified as Hispanic. Participants ages ranged from 39-61. I analyzed the data, along with two research partner, according to Grounded Theory (GT) methodology. Through constant comparative analysis, a grounded theory emerged from the data in which participants converged understanding of client safety, relationships, clinical intuition in a process of integrated experience and consultation. With the exception of mandated reported and mortal danger, ethical guidelines and laws did not seem to factor into participants' decision making. Implications for counseling practice, preparation, and research are provided.
64

Perspectives of young sexual abuse survivors, whose abuse is unknown to child protection services, about confidentiality : a participatory study involving young abuse survivors as co-researchers

Matthew, Laurie January 2019 (has links)
A systematic narrative literature review explored views of young child sexual abuse (CSA) survivors whose abuse was unknown to authorities, about confidentiality. Due to paucity of research, the review included literature about sexual health service users. Seventeen databases and eleven journals were searched and thirty-three papers were identified. Analysis involved exploratory interpretist approach focusing on emergent themes and methodologies. Findings indicated limited participation and that young people want; (i) confidentiality (ii) control of their lives and (iii) they fear child protection agencies. Empirical research then explored views about confidentiality with young CSA survivors whose abuse was unknown to child protection agencies. Eight survivors engaged as co-researchers in participatory action research utilising a mixed methods approach; using surveys, focus groups, online chats, graffiti walls and interviews. One hundred and forty survivors participated. Age range was 11- 30, with 25 males, 114 females and 1 gender neutral. Researchers designed tools, gathered and analysed qualitative and quantitative data using a social construction thematic approach. Results found (i) all participants wanted higher confidentiality, with males and under 16's demanding highest confidentiality (ii) males were reluctant to disclose CSA compared to females (iii) abuse retractions were related to loss of confidentiality (iv) involvement as co-researchers was positive and empowering. With limited confidentiality the identified themes for young people were: fear of consequences, lost control, abuse retractions and protecting abusers. With high confidentiality themes were: talking openly, control, empowerment, exploring options, respect and being believed. Young researchers reported improvement in self-esteem and positive life changes. Conclusions: Young CSA survivors whose abuse was unknown to child protection services want higher confidentiality to build trust and be able to talk about abuse; and involvement of young people in participatory research is positive and empowering. Recommendations: There appears to be a need for increased confidentiality if young people whose abuse is unknown to child protection services are to disclose their abuse. Further participatory research is needed to explore whether other groups of young people unknown to services report similar and/or different needs.
65

Vztah lékař - pacient / Doctor - patient relationship

Šimečková, Irma January 2012 (has links)
DOCTOR - PATIENT RELATIONSHIP RESUMÉ The topic of the doctor - patient relationship is so broad that this graduation thesis cannot cover nearly all of its aspects. The aim is to capture the most basic institutions of doctor - patient relationship in period just before the effectiveness of the reform of health services. Historical development of medical law in the Czech Republic is summarized in the very first chapter. The aim was mainly to express complicated role of post-communist countries in connection with their efforts to integrate into the modern system, which was then for the rest of Europe completely natural. The second chapter issues the basic elements controlling the relationship between doctor and patient, including the definition of the term lege artis, whose explanation is an essential part of every publication dealing with medical law. Chapter provides a comprehensive view of the institutes, which are largely discussed in subsequent chapters. The next three chapters deal with the issues of informed consent, duty of confidentiality of medical staff and management of medical documentation. Informed consent is the central institute of medical law and most important element of the relationship between doctor and patient. The topic of the consent of the patient with the health care is treated in...
66

Efficient online embedding of secure virtual nteworks / Mapeamento eficiente e on-line de redes virtuais seguras

Bays, Leonardo Richter January 2013 (has links)
A virtualização de redes tem se tornado cada vez mais proeminente nos últimos anos. Tal técnica permite a criação de infraestruturas de rede que se adaptam a necessidades específicas de aplicações de rede distintas, além de dar suporte à instanciação de ambientes favoráveis para o desenvolvimento e avaliação de novas arquiteturas e protocolos. Apesar de esforços recentes (motivados principalmente pela busca de mecanismos para avaliar propostas relacionadas à Internet do Futuro) terem contribuído substancialmente para a materialização desse conceito, nenhum preocupou-se em conciliar alocação eficiente de recursos e satisfação de requisitos de segurança (e.g., confidencialidade). É importante ressaltar que, no contexto de redes virtuais, a proteção de infraestruturas de rede compartilhadas constitui condição fundamental para seu uso em larga escala. É de grande importância que o impacto negativo causado pelo aprovisionamento de segurança seja considerado no processo de mapeamento de redes virtuais, de forma a permitir o uso integral dos recursos físicos sem subestimar requisitos de capacidade. Portanto, nesta dissertação, são propostos um modelo ótimo e um al- goritmo heurístico para realizar o mapeamento de redes virtuais em substratos físicos que têm por objetivo otimizar a utilização de recursos físicos garantindo a satisfação de requisitos de segurança. Ambas as abordagens possuem uma modelagem precisa de custos adicionais associados a mecanismos de segurança usados para proteger re- des virtuais, e são capazes de atender requisições de redes virtuais de forma online. Além disso, são apresentados os resultados de um extensivo processo de avaliação realizado, incluindo uma comparação detalhada entre o modelo ótimo e o algoritmo heurístico. Os experimentos revelam que o modelo baseado em Programação Linear Inteira é capaz de alocar redes virtuais de forma ótima em substratos físicos com até cem roteadores, enquanto que o algoritmo heurístico é capaz de adaptar-se a infraestruturas maiores, provendo mapeamentos sub-ótimos em um curto espaço de tempo. / Network virtualization has become increasingly prominent in recent years. It enables the creation of network infrastructures that are specifically tailored to the needs of distinct network applications and supports the instantiation of favorable en- vironments for the development and evaluation of new architectures and protocols. Although recent efforts (motivated mainly by the search for mechanisms to eval- uate Future Internet proposals) have contributed substantially to materialize this concept, none of them has attempted to combine efficient resource mapping with ful- fillment of security requirements (e.g., confidentiality). It is important to note that, in the context of virtual networks, the protection of shared network infrastructures constitutes a fundamental condition to enable its use in large scale. Considering the negative impact of security provisions in the virtual network embedding process is of paramount importance in order to fully utilize physical re- sources without underestimating capacity requirements. Therefore, in this thesis we propose both an optimal model and a heuristic algorithm for embedding virtual networks on physical substrates that aim to optimize physical resource usage while meeting security requirements. Both approaches feature precise modeling of over- head costs of security mechanisms used to protect virtual networks, and are able to handle virtual network requests in an online manner. In addition, we present the results of an extensive evaluation we carried out, including a detailed comparison of both the optimal model and the heuristic algorithm. Our experiments show that the Integer Linear Programming (ILP) model is capable of optimally embedding virtual networks on physical infrastructures with up to a hundred routers, while the heuristic algorithm is capable of scaling to larger infrastructures, providing timely, sub-optimal mappings.
67

Aplicações de documentação fiscal eletrônica em sistemas logísticos: casos práticos. / Applications of electronic invoices in logistics systems: pratical cases.

Marcelo Luiz Alves Fernandez 14 March 2018 (has links)
Os documentos fiscais eletrônicos estão implantados no Brasil desde 2006, e significaram relevante modernização na forma como as operações comerciais são documentadas no país. Contudo, apesar de possuírem informações que transcendem a fiscalização tributária, a legislação brasileira impõe o chamado \"sigilo fiscal\", restringindo o acesso a esses documentos apenas à administração tributária. Nesse sentido, o trabalho tem os objetivos de analisar o conceito e os contornos do sigilo fiscal imposto pela legislação brasileira e propor aplicações práticas de como as informações constantes nos documentos fiscais eletrônicos poderiam ser utilizadas pelos demais órgãos públicos e pela iniciativa privada. Dentre os diversos usos potenciais o trabalho foca no tema de sistemas logísticos, mais especificamente no que se refere ao rastreamento de veículos e mercadorias. Nesse sentido são apresentados e detalhados quatro casos práticos de interesse para a iniciativa privada e outros órgãos de fiscalização: identificação do trânsito de veículos de carga com excesso de peso em rodovias; identificação do transporte de produtos perigosos em áreas urbanas; rastreamento de mercadorias de alto valor agregado pelas empresas; e o conhecimento prévio do fluxo de mercadorias, para fins de planejamento de carga e descarga em armazéns, portos e aeroportos. Aborda, também, um caso prático de rastreamento útil para a própria administração tributária, as chamadas \"fronteiras virtuais\". Apresenta, por fim, a especificação técnica mínima para a implantação dos quatro casos práticos de rastreamento, que servirá tanto para a Secretaria da Fazenda como para os órgãos e empresas interessados nas informações contidas nos documentos eletrônicos. / Electronic tax documents have been implemented in Brazil since 2006, and have meant a relevant modernization in the way commercial operations are documented in the country. However, despite having information that transcends tax inspection, Brazilian law imposes so-called \"fiscal secrecy\", restricting access to these documents only to the tax administration. In this sense, the objectives of this paper are to analyze the concept and the contours of fiscal secrecy imposed by Brazilian legislation and propose practical applications of how the information contained in electronic tax documents can be used by other public agencies and private initiative. Among the various potential uses, the work focuses on the topic of logistics systems, more specifically on the tracking of vehicles and goods. In this sense, four practical cases of interest to the private sector and other inspection bodies are identified and detailed: identification of the traffic of overloaded vehicles on highways; identification of transport of hazardous products in urban areas; tracking of high value-added goods by companies; and prior knowledge of the flow of goods for loading and unloading planning in warehouses, ports and airports. It also addresses a practical case of useful tracking for the tax administration itself, the so-called \"virtual borders\". Finally, it presents the minimum technical specification for the implementation of the four practical cases of tracing, which will serve both the Treasury Department and the agencies and companies interested in the information contained in the electronic documents.
68

Ethical considerations for the information age: a qualitative study of doctoral psychology trainees' preparation and decision making for technology use

Lustgarten, Samuel David 01 August 2018 (has links)
Psychologists now use and interact with a mélange of technology for client care, including (but not limited to) email (Delsignore et al., 2016; Eysenbach, 2000), text messaging (Bradley & Hendricks, 2009; Elhai & Frueh, 2016), electronic medical records (Harrison & Palacio, 2006; Steinfeld & Keyes, 2011), telemental health/televideo (Richardson, Frueh, Grubaugh, Egede, & Elhai, 2012), and digital assessments (Jellins, 2015; Pearson Education Inc., 2015b). Amidst this technological revolution, threats to ethical obligations and regulations exist that might hinder effective client care (Elhai & Hall, 2016b; Lustgarten, 2015; Lustgarten & Colbow, 2017). Literature suggests that individuals, organizations, companies, and government actors have targeted individuals and nations for their data (Elhai & Hall, 2016b; Greenwald, 2014; Lustgarten, 2015). Despite concerns for protecting client information, little is known about the education and training opportunities present in APA-accredited clinical and/or counseling psychology doctoral programs around technology competence. Researchers have recommended trainees receive technology training for use within psychotherapy (Colbow, 2013; Lustgarten & Colbow, 2017; Mallen, Vogel, & Rochlen, 2005). This study interviewed 9 doctoral trainees about their experiences, decision making, thought processes, responsibilities for stakeholders, and additional needs from training programs, organizations, and practicum sites when using technology. Results suggested that participants had limited opportunities for education, but interacted with and were expected to use various forms of technology (e.g., email, text messaging, and electronic medical records). Additionally, participants tended to request increased organizational involvement on this topic in the form of formal conversations, workshops, and continuing education. More research is recommended to highlight disparities between expectations and education within doctoral training programs.
69

La recherche d'un équilibre entre le droit à l'information de la parentèle et le droit au secret du patient au gré de l'évolution de la médecine génétique / Progress of genetic medicine : the search of a balance between the right of information for family members and medical confidentiality

Moulin, Cécile 12 December 2018 (has links)
L’attrait récent des autorités françaises pour le développement de la médecine génétique a attiré notre attention. Si aujourd’hui elle tend à gagner une place centrale dans l’offre de santé française, notamment, par l’adoption du projet « France génomique 2025 », elle engendre des questions éthiques et juridiques complexes. L’intérêt pour la parentèle de connaître le risque génétique du patient afin de bénéficier d’une prise en charge précoce du risque héréditaire familial a soulevé de larges débats. Pour cause, la préservation de la santé de ces tiers à la relation médicale entre de manière inévitable en conflit avec le droit fondamental au secret médical des patients. La France a été un des premiers pays à tenter de répondre à ce problème en apparence insoluble. Par deux lois de bioéthiques de 2004 et 2011, le législateur a créé un régime visant à apporter un équilibre entre ces deux questions. Alors que les parlementaires vont bientôt se réunir afin de réviser une nouvelle fois les lois de bioéthique, nous souhaitons dresser un état des lieux de la conciliation actuelle entre les intérêts des patients et de leurs consanguins. L’objectif de cette analyse sera d’identifier les difficultés rencontrées par les parlementaires nationaux et de proposer des solutions afin de faire avancer le droit français dans sa quête de création d’un juste équilibre entre les droits des patients et des apparentés. Cette étude conjointe des droits français et étrangers nous conduira à proposer la création d’un nouvel outil d’équilibre au service de la santé publique : le dossier médical familial / The recent attraction of the French authorities for the development of the genetic medicine drew our attention. The establishment of the project "France genomic 2025” tends to place the genetic medicine in the center of the medical services. However, it engenders complex ethical and legal questions. The interest of the relatives to be informed in case of a serious risk for their health have raised wide debates. The protection of the health of these third parties in the patient—physician relationship enters in conflict with the patient’s right of confidentiality. French authorities were among the first to try to create a balance between those two interests. The objective of this analysis will be to identify the difficulties met by the parliament and to propose solutions to advance the French law in its research of creation of a just balance between the rights of the patients and the allies. This joint study of the French and foreign rights will lead us to propose the creation of a new tool of balance in the service of the public health
70

Forensic Computing from a Computer Security perspective / Forensisk granskning av datorer ur ett datasäkerhetsperspektiv

Lázaro, Pablo García-Crovetto January 2004 (has links)
<p>This work contains a brief study about Forensic Computing problems done from a Computer Security perspective. </p><p>Based on the description and investigation methods of Forensic Computing, a list of common difficulties that forensic examiners have to deal with has been created. After making an analysis about each difficulty in the Forensic Computing field, it can be said that the main reasons are related to the legal restrictions and an incorrect security management. </p><p>Using a Computer Security perspective for analysing why the incorrect security management generates problems in the forensic computing field, we have made a risk analysis of a possible distribution for a correct security management. Later, based on own results, a list on priorities in prevention methods in t he Forensic Computing field has been created. </p><p>Finally it can be said that the difficulties in the Forensic Computing field could be avoided by creating awareness among users about the importance of taking prevention methods for protecting data and consequently for decreasing the number of e-crimes.</p>

Page generated in 0.0589 seconds