• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 284
  • 55
  • 51
  • 25
  • 19
  • 18
  • 17
  • 10
  • 7
  • 7
  • 5
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 587
  • 587
  • 233
  • 228
  • 183
  • 149
  • 105
  • 95
  • 81
  • 77
  • 75
  • 74
  • 71
  • 68
  • 68
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
221

User¡¦s Risk Management for the Personal Data of the Cloud Computing Service Industires

Huang, Yen-Lin 06 August 2012 (has links)
With the rapid development of Information Technology, ¡§Cloud Computing¡¨ is becoming increasingly popular in the industry as it is accessible to various data processing services just by connecting to third-party cloud service providers via network. A new global technological trend has thus been ushered as a result of powerful processing, elastic usage and low cost of the cloud computing. Although ¡§Cloud Computing¡¨ provides a cloud which is more large-scaled, relevant and beneficial, most practical cloud patrons are aware that what matters is its corresponding security. Any who has ever used the Internet, whether an enterprise or an individual, will inevitably run the risks of information recorded, copied, leaked, deleted inappropriately or accidently or even used for inappropriate purposes by third-parties. The private data and business secrets of the stakeholders of an enterprise, including its customers, partners, employees or suppliers, will also suffer from the information vulnerability. Therefore, as for the cloud computing industry, what matters for the government, enterprise or individual is to provide an information security shelter rather than a network environment in which the personal data is highly exposed. Cavoukin (2010) argues that the issue of information security related to the cloud computing is one of issues in the public domain. The data generated from the digital cloud computing management and the people involved are so large that each citizen is drawn to be concerned with the government policies and laws (Lee, 2010). In this paper, we make a risk management for the cloud computing and discuss the risk management mechanisms for the cloud computing industry with the Freeman¡¦s stakeholder theory.
222

The Study of Customer Personal Data Protection

Huang, Li-Ying 30 August 2005 (has links)
The Study of Customer Personal Data Protection In this customer-driven era, corporations and government agencies face the challenges from customers. If government and corporations can utilize the power of computers to manage the huge amount of personal data they have collected by storing and editing, data mining and customer relationship management can be put to use on services, customer cares, and marketing. This will increase the efficiency of government agencies and stimulate the development of economy. The government, corporations and the people all will be benefited from this move. However, while the organizations make large investments in the security of their computer systems to avoid the invasion of virus and hackers, the abuse and breach caused by the employees, contractors, and other legal users can compromise all the preventive measures. This study investigates the performance of customer personal data privacy protection. While discussing the regulations such as computer processing of personal data acts and Telecommunications Acts, the theory on which this study is based is Self-Regulation Mechanism. The Self-Regulation Mechanism can be applied to the self-monitoring, self-esteem, information ethics, and self-efficacy of the users who have access to the customer personal data. It can also be applied to the management of the customer personal data privacy at the organization level. This study gathered 432 valid surveys from the customer personal data users who are the customer service staffs in the telecommunication industry. With path analysis methodology, this study explores the interactions among the management of organization, personal privacy protection self-efficacy, and information ethics. With information ethics and self-efficacy as the intervening variable between the management of organization and protection performance, this study is set to clarify the level of impacts that these three items have over the performance of customer information privacy protection. Through the model validation, the customer personal data protection self-regulation mechanism proposed in this study demonstrates suitability and the management of organization also shows positive, direct and noticeable impacts. However, the effects of information ethics on privacy protection self-efficacy and those of self-efficacy on the performance of privacy protection are not obvious. Therefore, the organization should strengthen the information ethics of its employees and improve self-efficacy. Also, they should bring up feasible and solid suggestions, hoping to improve the customer personal privacy protection performance of the organization and its members. By doing the customers will have confidence in the organization. Winning the trust and satisfaction from the customers will promote the organization image and even bring in more business opportunities, a good thing for running a long term business.
223

Data Protection And Intellectual Property In The Eu And Turkey

Toguz, Ozlem 01 June 2010 (has links) (PDF)
This research had two main purposes. Firstly it aimed at showing the regulatory framework of both data protection and intellectual property in the European Union and thus making the privacy complications of Digital Rights Managements systems clear in the developed world. This research also aimed at disclosing the complications of employment of DRMs systems in developing countries. To that end Turkey&rsquo / s copyright framework has been reviewed. It was found out that DRMs systems employed in Turkey went beyond the scope of Turkish Copyright Legislation and restricted also legitimate acts which fall within the scope of fair use. DRMs also have hindered development since it restricted availability of educational and cultural works. The review of Turkey&rsquo / s Data Protection regime disclosed that the most important reason behind the non adoption of the draft law was related to the legislators&rsquo / confusion of first pillar and third pillar data protection. It was concluded that Turkey lacked a data protection policy and the lack of such a policy led to the surveillance of the people to such a degree that almost no private space is left for them. The main finding of the research was that Turkey has been one of the best markets for the employment of DRMs with its current copyright regime and lack of data protection rules. The research concluded with proposals of action concerning data protection and DRMs.
224

Conception et mise en oeuvre de mécanismes sécurisés d'échange de données confidentielles

Seitz, Ludwig Brunie, Lionel. Pierson, Jean-Marc. January 2006 (has links)
Thèse doctorat : Informatique : Villeurbanne, INSA : 2005. / Thèse bilingue français-anglais. Glossaire. Titre provenant de l'écran-titre. Bibliogr. p. 173-183.
225

Remote data backup system for disaster recovery /

Lin, Hua. January 2004 (has links)
Thesis (M.S.)--University of Hawaii at Manoa, 2004. / Includes bibliographical references (leaves 64-66). Also available via World Wide Web.
226

Technogeopolitics of militarization and security in cyberspace

Yannakogeorgos, Panayotis, January 2009 (has links)
Thesis (Ph. D.)--Rutgers University, 2009. / "Graduate Program in Global Affairs." Includes bibliographical references (p. 225-248).
227

Distributed learning using generative models

Merugu, Srujana 28 August 2008 (has links)
Not available / text
228

An investigation of the information security implementation strategies in further education and training colleges in South Africa

Mohlabeng, Moyahabo Rossett January 2014 (has links)
M. Tech. Information Networks / The increasing sophistication of information security threats and the ever-growing body of regulation has made information security a critical function in higher education institutions. Research was undertaken to investigate the implementation of information security strategies in higher education institutions in South Africa. This thesis investigates the following: How will the formulation of an information security strategy improve information security in higher education institutions; in what way should higher education institutions employ information security policies in order to improve information security; and how may the adoption of information security framework create information security awareness among employees in higher education institutions?
229

Lessons from Québec: towards a national policy for information privacy in our information society

Boyer, Nicole-Anne 05 1900 (has links)
While on the broadest level this paper argues for a rethinking of governance in our "information society," the central thesis of this paper argues for a national policy for data protection in the private sector. It does so through three sets of lessons from the Quebec data protection experience. These include lessons for I) the policy model, (2) the policy process, (3) the policy area as it relates to the policy problem as well as general questions about governance in an information polity. The methodology for this paper is based on a four-part sequential analysis. The first part is a theoretical and empirical exploration of the problem, which is broadly defined as the "tension over personal information." The second part looks comparatively at how other jurisdictions have responded to the problem. The third part assesses which model is the better policy alternative for Canada and concludes that Quebec regulatory route is better than the national status quo. The fourth part uses a comparative public policy framework, as well as interviews, to understand the policy processes in Quebec and Ottawa so that we can highlight the opportunities and constraints for a national data protection policy in the private sector.
230

Asmens duomenų apsauga darbo vietoje / Protection of personal data at the workplace

Bučinskas, Liudas 20 March 2006 (has links)
Naujų informacinių technologijų pažanga įtakojo ir darbo santykius, iš esmės pakeitė darbo vietos supratimą, supaprastino ir paspartino daugelį darbo procesų. Tačiau tai parodė ir neigiamą savybę: darbdaviui atsirado poreikis kontroliuoti, kokiais tikslais darbo vietoje darbuotojai naudoja informacinės technologijas ir ar jomis nepiktnaudžiauja, tam pasitelkiant elektronines sekimo priemones. Elektroninio stebėjimo ir kontrolės priemonės įgalino darbdavius rinkti milžiniškus kiekius duomenų apie savo darbuotojus ar net kištis į jų asmeninį gyvenimą. Todėl išryškėjo konfliktas tarp darbuotojo teisės į privatumą ir darbdavio teisėtų verslo interesų, kurio sprendimo variantas – teisinėmis priemonėmis pasiektas balansas tarp šių teisinių vertybių. Darbo tema „Asmens duomenų apsauga darbo vietoje“ yra pakankamai plati, todėl autorius iš esmės nagrinėja, jo manymu, vieną problematiškiausių aspektų – elektroninį darbuotojų stebėjimą iš kontrolę. Darbe siekiama atskleisti privatumo darbo vietoje ribas, analizuojamos literatūroje pateikiamos elektroninio darbuotojų stebėjimo ir kontrolės priežastys, nagrinėjamos technologijos ir būdai darbuotojams sekti bei jų keliama grėsmė darbuotojų privatumui. Taip pat autorius analizuoja teisinio reglamentavimo ypatumus, susijusius su darbuotojų privatumu bei jų elektroniniu stebėjimu ir kontrole skirtingose teisinėse sistemose, daugiausiai remdamasis JAV, ES ir Lietuvos teisės aktais ir identifikuodamas pagrindines problemas. Nagrinėdamas... [to full text] / The progress of new modern technologies has made an impact on industrial relations and essentially changed the concept of a workplace. The work aims to reveal workplace privacy limits, to analyse the reasons of electronic monitoring and surveillance found in literature, to investigate the methods and technologies to survey employees and the possible threat to employees privacy caused by these methods. The author also analyses the peculiarities of legal regulations related to employees’ privacy and electronic monitoring and surveillance in different legal systems, his analyses being mainly based on the law of the USA, the EU and Lithuania and on the identification of the main problems.

Page generated in 0.2474 seconds