• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 283
  • 55
  • 51
  • 25
  • 19
  • 18
  • 17
  • 10
  • 7
  • 7
  • 5
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 586
  • 586
  • 233
  • 227
  • 183
  • 149
  • 105
  • 95
  • 81
  • 77
  • 75
  • 74
  • 71
  • 68
  • 68
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Ochrana osobních údajů v EU - Biometrické údaje / Data protection in the EU - Biometric data

Jansa, Tomáš January 2019 (has links)
Data protection in the EU - Biometric data The main aim of this thesis is to deal with the data protection in connection with the biometric data. In the first chapter, the author of this work deals with the historical context. The right to privacy even nowadays represents the solid ground of the data protection. Therefore, its de- limitation and subsequent connection with the data privacy is of an upmost importance for a proper understanding of this problematics. The author also deals with the data protection not only in the european context, but also with the disunited legislation in the US, where a legisla- tion in the context of general data protection regulation is absent. The second chapter mainly dealt with stating the general legal principles and their rel- evance to the legal order as well as with the special principles laid down in the regulation, which are mandatory to be upheld. The third chapter dealt with the term of personal data. Moreover, it was also important to define the other terms, which goes hand in hand with the personal data term. Therefore, anonymous data as a personal data, which went through the anonymisation process, as well as the special category of personal data, which represents the fundament of the problematics of the biometric data and lastly also the term of data...
202

Vybrané problémy technologické realizace evropské ochrany osobních údajů / Selected issues in technological realization of European data protection

Kubica, Jan January 2019 (has links)
This thesis focuses on the legal regulation of selected aspects of the personal data protection at the European level. Fuelled by the technological progress, this area of legal regulation is becoming increasingly important, as the usage of personal data can be source of both innovation and economic progress, but it also has the potential to negatively impact individuals` rights ("chilling effect"). The thesis analyses the usage of big data and automated individual decision making; both phenomena are assessed through principles contained in GDPR. The aim of the thesis is to, as far as these two phenomena are concerned, evaluate functionality and perspectives of the European regulation. The thesis is, apart from the introduction and the conclusion, divided into three chapters. The first part briefly introduces the concept of the right to the protection of personal data and the fundamental legal framework of the European regulation. This chapter is followed by a chapter focused on the big data, in which, after a necessary technical introduction is made, current practices of data controllers are contrasted with corresponding principles of data protection regulation. Particular attention is also paid to the pitfalls of anonymization. At the end of this chapter, it is concluded that all relevant...
203

Data security aspects of a debit card system

Botha, Jacobus Theron 17 August 2016 (has links)
A project report submitted to the Faculty of Engineering, University of the Witwatersrand, Johannesburg in partial fulfilment of the requirements for the degree of Master of Science in Engineering. Johannesburg 1990 / A debit-card is a form of payment, The card is pre-charged with a value, monetary or otherwise, before distribution to the user, and is therefore a pre-payment card . It is then 'used up, its value being decremented until it is valueless. At this point, it is either discarded or re-charged by the administration authority, It is distinct from a credit card, which provides a post-payment facility. The aim of this project is to investigate the security aspects of a debit-card reader system for use as an unattended fee-collecting subsystem in such applications as public telephones, parking meters and vending machines. Card technology and attributes of debit card systems are discussed, an overview of cryptology is given, and an implementation of a magnetic card system is described.
204

Ochrana osobních údajů v právu Evropské unie / Personal data protection under the law of European Union

Novotná, Lucie January 2018 (has links)
Personal data protection under the law of European Union ABSTRACT The diploma thesis discusses the legal regulation of personal data protection under the European Union law with focus on the rights of data subjects, i.e. natural persons whose personal data are being processed. The aim of the thesis is to compare the current legal regulation of the rights of data subjects (directive on the protection of individuals with regard to the processing of personal data and on the free movement of such data) with the legal regulation with forthcoming effectiveness (GDPR) with focus on the issue how the new legal regulation dealt with the problems for which the Directive has been criticised and how it dealt with problematic parts of the regulation of the rights of data subjects. The diploma thesis consists of five parts including the introduction, the conclusion and three chapters of the own text. The chapter one contains the introduction to the field of personal data protection, including the brief history of the development of personal data protection, and it is further divided into the sub-chapters where the primary and secondary law concerning personal data protection in the European Union and its development are introduced. The human rights context of personal data protection is also discussed in this chapter....
205

An approach to protecting online personal information in Macau government

Sou, Sok Fong January 2018 (has links)
University of Macau / Faculty of Science and Technology. / Department of Computer and Information Science
206

La protection européenne des données à caractère personnel traitées à des fins judiciaires / The european protection of the personal data processed for judicial purposes

Tassone, Loredana 29 June 2013 (has links)
Dans notre société que l’on peut appeler «société de l’information » ou également société de « surveillance électronique », il est désormais essentiel d’assurer la protection de données à caractère personnel. La mise en place d’une réglementation en matière de protection de données n’a pas toujours été aisée et, dans certains domaines, demeure complexe. Le domaine judiciaire est un exemple marquant de secteur d’activité où il a été difficile de mettre en place des règles spécifiques et appropriées pour la protection de données personnelles. Dans les années quatre-vingt-dix, la question s’était posée de savoir si une protection spécifique des données traitées à des fins judiciaires était nécessaire. Les conclusions avaient été diverses : d’un côté, certains avaient estimé qu’une réglementation spécifique était opportune, d’un autre côté, d’autres considéraient que l’idée de mettre en place une telle réglementation devait être abandonnée. Cette étude semble avoir été – à un certain point – abandonnée. Compte tenu de l’évolution des technologies et de l’évolution des textes européens, il semble essentiel de poser à nouveau cette question et de s’interroger sur la place à conférer aux données traitées à des fins judiciaires dans le système européen actuel de protection de données à caractère personnel. Cette nécessité est corroborée par la jurisprudence de la Cour de Strasbourg. Cette dernière a en effet, été saisie de cas de violations des droits fondamentaux liés à un traitement inapproprié des données dans le domaine judiciaire. De plus, des projets de réforme du système de protection de données personnelles sont actuellement en discussion au niveau européen. En effet, le Conseil de l’Europe et l’Union travaillent actuellement sur la modernisation des textes existants en matière de protection des données à caractère personnel. Il est donc intéressant de s’interroger sur la place réservée à la protection des données judiciaires dans le cadre de ces réformes. La thèse veut tout d’abord rappeler l’importance de protéger les données à caractère personnel en tout temps, en tout lieu et dans n’importe quel domaine d’activité, y compris le domaine judiciaire. Elle a pour but principal, d’une part, de mettre en évidence les problèmes existants en matière de protection de données judiciaires et, d’autre part, d’essayer de répondre à la question de savoir si une réglementation spécifique dans ce domaine doit aujourd’hui être élaborée au niveau européen. Dans la première partie les textes du Conseil de l’Europe et de l’Union européenne en matière de protection des données et leur applicabilité au domaine judiciaire sont tout d’abord analysés. Compte tenu du fait que les textes actuellement en vigueur au niveau du Conseil de l’Europe et de l’Union ont, à première vue, un contenu identique, il a été nécessaire d’analyser ces textes avec un esprit comparatif afin de comprendre comment ceux-ci se concilient et de vérifier leur applicabilité aux données judiciaires. [...] / In our society which can be called "information society" and also society of "electronic surveillance," it is essential to ensure the protection of personal data. The implementation of regulations on data protection has not always been easy, and in some areas, remains complex. The judiciary is a striking example of an area where it has been difficult to establish specificand appropriate rules for the protection of personal data. In the years ninety, the question was raised whether a specific protection for judicial data was necessary. The findings were different: on the one hand, some have estimated that a specificregulation was appropriate, on the other hand, others felt that the idea of establishing such rules must be abandoned. This study seems to have been - at some point - quitted. Given the improvements in technology and the evolution of European legislation, it seems essential to renew this question and try to find out which level of protection is given to judicial data in the current European system of protection of personal data. The importance to renew this question is proven by the case law of the Strasbourg Court. The latter has indeed been referred to cases of human rights violations due to improper processing of data in the judiciary. In addition, plans to reform the system of protection of personal data are currently under discussion at European level. Indeed, the Council of Europe and the European Union are currently working on the modernization of existing texts on the protection of personal data. It is therefore interesting to examine the place reserved for the protection of judicial data in the context of these reforms. The thesis recall the importance of protecting personal data at any time, in any place and in any field of activity, including the judiciary. Its main aim, on the one hand, is to highlight existing problems in the protection of judicial data and, on the other hand, to answer the question of whether a specific regulation in this area must nowadays be developed at European level. In the first part Council of Europe and the European Union’s texts on data protection and theirapplicability to the judicial data were analyzed. Given the fact that the texts currently into force at the Council of Europe and at the European Union, at first glance, have the same content, it has been necessary to analyze them with a comparative approach in order to understand their interoperability and verify their applicability to judicial data. Despite the multitude of texts on data protection present at European level (those of the Council of Europe and of the European Union), a marginal space is reserved to judicial data. The basic principles stated in these texts are in theory applicable to judicial data but in concrete those are not applied. In any case, those texts do not provide effective protection of judicial data. [...] / Nella nostra società, che può essere chiamata “società dell'informazione” o anche società di “sorveglianza elettronica”, è ormai indispensabile garantire la protezione dei dati personali. L'attuazione della normativa in materia di protezione dei dati non è sempre stata cosa facile, e per alcuni settori di attività, essa risulta tutt’ora un’operazione complessa. Il settoregiudiziario ne è un esempio. In effetti, si tratta di un settore in cui è stato difficile elaborare ed attuare regole specifiche ed adeguate per la protezione dei dati personali. Negli anni novanta, ci si è chiesti se fosse necessario provvedere all’adozione di regole specifiche per la protezione dei dati trattati a fini giudiziari. Secondo una prima teoria una regolamentazione specifica risultava opportuna, tuttavia secondo un’altra teoria l'idea di creare una regolamentazione per la protezione dei dati personali trattati in ambito giudiziario doveva essere accantonata. Lo studio di tale questione sembra essere stato - ad un certo punto - abbandonato. Dati i miglioramenti tecnologici intervenuti negli ultimi anni e l'evoluzione della legislazione europea in materia di protezione dei dati, sembra indispensabile porsi nuovamente la questione dell’opportunità di una regolamentazione specifica per il settore giudiziario. Sembra altresì opportuno interrogarsi sull’importanza che attualmente viene attribuita alla protezione dei dati trattati per finalità legali nell’ambito dell’attuale sistema europeo di protezione dei dati personali. Tale necessità sembra essere corroborata dal contenuto della giurisprudenza della Corte di Strasburgo. Quest'ultima è stata, infatti, spesso adita per casi di violazioni dei diritti fondamentali dovuti ad un trattamento illecito dei dati personali per ragioni di giustizia. Inoltre, dei progetti di riforma del sistema di protezione dei dati personali sono attualmente in discussione a livello europeo. Infatti, il Consiglio d'Europa e l'Unione europea stanno attualmente lavorando sulla modernizzazione dei testi esistenti in materia di protezione dei dati personali. E 'quindi altresì interessante esaminare quale importanza è data alla protezione dei dati giudiziari nel contesto di dette riforme. Oltre a ricordare l'importanza della protezione dei dati personali, in qualsiasi momento, in qualsiasi luogo e in qualsiasi settore di attività, tra cui quello giudiziario, l’obiettivo principale delle tesi è, da un lato, di evidenziare i problemi esistenti in materia di protezione dei dati giudiziari e, dall’altro, di valutare l’opportunità dell’esistenza a livello europeo di una normativa specifica per questo settore. Nella prima parte i testi del Consiglio d'Europa e dell'Unione europea in materia di protezione dei dati e la loro applicabilità al settore giudiziario sono analizzati. Tenuto conto del fatto ch i testi attualmente in vigore presso il Consiglio d'Europa e l'Unione europea hanno, di primo acchito, lo stesso contenuto, è stato necessario analizzarli con un’ottica comparatistica al fine di capire come essi si conciliano e di verificare la loro applicabilità ai dati giudiziari.
207

Mining of popular paths with privacy protection and its applications.

January 2006 (has links)
Cheong Chi Hong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (leaves 81-86). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.v / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Problem statement --- p.1 / Chapter 1.2 --- Major contributions --- p.4 / Chapter 1.3 --- Thesis organization --- p.4 / Chapter 2 --- Smart Card System --- p.6 / Chapter 2.1 --- Introduction --- p.7 / Chapter 2.2 --- Related Work --- p.11 / Chapter 2.2.1 --- Mining Customer Behaviors --- p.11 / Chapter 2.2.2 --- Privacy Preserving Data Mining --- p.12 / Chapter 2.2.3 --- Definitions of Privacy --- p.13 / Chapter 2.3 --- Model --- p.14 / Chapter 2.4 --- Algorithms --- p.17 / Chapter 2.4.1 --- Baseline Algorithm --- p.17 / Chapter 2.4.2 --- Privacy Equation --- p.19 / Chapter 2.4.3 --- Random Subsequence Selection Algorithm (RSSA) --- p.20 / Chapter 2.4.4 --- Popular Item Selection Algorithm (PISA) --- p.21 / Chapter 2.5 --- Analysis --- p.26 / Chapter 2.5.1 --- Accuracy --- p.26 / Chapter 2.5.2 --- Analysis of RSSA: Determine te values --- p.27 / Chapter 2.5.3 --- Analysis of RSSA: Accuracy --- p.30 / Chapter 2.5.4 --- Analysis of PISA --- p.33 / Chapter 2.5.5 --- Theoretical Proof of PISA --- p.41 / Chapter 2.5.6 --- Privacy Protection --- p.42 / Chapter 2.6 --- Simulations --- p.45 / Chapter 3 --- Transportation System --- p.48 / Chapter 3.1 --- Introduction --- p.49 / Chapter 3.2 --- Related Work --- p.51 / Chapter 3.3 --- Model --- p.56 / Chapter 3.4 --- Algorithms --- p.60 / Chapter 3.5 --- Simulations --- p.63 / Chapter 4 --- Enhanced Features in a Smart Card System --- p.67 / Chapter 4.1 --- Adding Time Information --- p.68 / Chapter 4.1.1 --- Motivation --- p.68 / Chapter 4.1.2 --- Time Intervals --- p.68 / Chapter 4.1.3 --- Original Graph --- p.69 / Chapter 4.1.4 --- New Graph --- p.70 / Chapter 4.1.5 --- Adding the New Graph into the Model --- p.72 / Chapter 4.1.6 --- Rewriting the Definition of a Path --- p.73 / Chapter 4.1.7 --- Drawback of Adding Time Information --- p.73 / Chapter 4.2 --- Generalization --- p.75 / Chapter 4.2.1 --- Motivation --- p.75 / Chapter 4.2.2 --- Generalization --- p.75 / Chapter 4.3 --- Specialization vs. Generalization --- p.75 / Chapter 5 --- Conclusion --- p.79 / Bibliography --- p.81
208

Legal requirements of secure systems

Beckman, Joseph M January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
209

A case study on managing customer data to comply with GDPR

Hossain, Shahriar January 2019 (has links)
Abstract This bachelor thesis paper presents a case study on the technical actions undertaken by a company in order to manage its customers’ personal information in compliance to GDPR (General data protection regulation), a law that was introduced on the 25th May of 2018. GDPR imposes strict responsibilities on the companies dealing with personal information. Therefore, companies located in EU or handling personal information of EU citizen have to review and update their information handling process to comply according to the law. Companies failing to comply with GDPR can be subject to heavy penalty. This paper presents an in-depth picture of how a small company which is quite reliant on data processing adapts itself to the GDPR era when handling their customer’s personal data. The Order Department and the Technical Department within the case company, where most of the customer’s personal information is handled, were studied for this thesis. In conclusion, this case study identified seven different measures that the company undertook to comply with GDPR including periodical deletion of email letters, using separate email addresses for company internal messages, and tight restrictions on who can access what data. Moreover, two major challenges were identified: time and legacy. Time, because a small sized company cannot set off one staff to deal with everything related to GDPR but instead everyone has to take this regulation into consideration. The second challenge is legacy, because data routines before the GDPR were not strict.
210

Privacy preserving in serial data and social network publishing.

January 2010 (has links)
Liu, Jia. / "August 2010." / Thesis (M.Phil.)--Chinese University of Hong Kong, 2010. / Includes bibliographical references (p. 69-72). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Related Work --- p.3 / Chapter 3 --- Privacy Preserving Network Publication against Structural Attacks --- p.5 / Chapter 3.1 --- Background and Motivation --- p.5 / Chapter 3.1.1 --- Adversary knowledge --- p.6 / Chapter 3.1.2 --- Targets of Protection --- p.7 / Chapter 3.1.3 --- Challenges and Contributions --- p.10 / Chapter 3.2 --- Preliminaries and Problem Definition --- p.11 / Chapter 3.3 --- Solution:K-Isomorphism --- p.15 / Chapter 3.4 --- Algorithm --- p.18 / Chapter 3.4.1 --- Refined Algorithm --- p.21 / Chapter 3.4.2 --- Locating Vertex Disjoint Embeddings --- p.30 / Chapter 3.4.3 --- Dynamic Releases --- p.32 / Chapter 3.5 --- Experimental Evaluation --- p.34 / Chapter 3.5.1 --- Datasets --- p.34 / Chapter 3.5.2 --- Data Structure of K-Isomorphism --- p.37 / Chapter 3.5.3 --- Data Utilities and Runtime --- p.42 / Chapter 3.5.4 --- Dynamic Releases --- p.47 / Chapter 3.6 --- Conclusions --- p.47 / Chapter 4 --- Global Privacy Guarantee in Serial Data Publishing --- p.49 / Chapter 4.1 --- Background and Motivation --- p.49 / Chapter 4.2 --- Problem Definition --- p.54 / Chapter 4.3 --- Breach Probability Analysis --- p.57 / Chapter 4.4 --- Anonymization --- p.58 / Chapter 4.4.1 --- AG size Ratio --- p.58 / Chapter 4.4.2 --- Constant-Ratio Strategy --- p.59 / Chapter 4.4.3 --- Geometric Strategy --- p.61 / Chapter 4.5 --- Experiment --- p.62 / Chapter 4.5.1 --- Dataset --- p.62 / Chapter 4.5.2 --- Anonymization --- p.63 / Chapter 4.5.3 --- Evaluation --- p.64 / Chapter 4.6 --- Conclusion --- p.68 / Bibliography --- p.69

Page generated in 0.1849 seconds