• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 283
  • 55
  • 51
  • 25
  • 19
  • 18
  • 17
  • 10
  • 7
  • 7
  • 5
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 586
  • 586
  • 233
  • 227
  • 183
  • 149
  • 105
  • 95
  • 81
  • 77
  • 75
  • 74
  • 71
  • 68
  • 68
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
301

Legal implications of information security governance

Etsebeth, Verine 08 January 2009 (has links)
LL.M. / Organisations are being placed under increased pressure by means of new laws, regulations and standards, to ensure that adequate information security exists within the organisation. The King II report introduced corporate South Africa to the concept of information security in 2002. In the same year the Electronic Communications and Transactions Act 25 of 2002 addressed certain technical information security issues such as digital signatures, authentication, and cryptography. Therefor, South Africa is increasingly focussing its attention on information security. This trend is in line with the approach taken by the rest of the international community, who are giving serious consideration to information security and the governance thereof. As organisations are waking up to the benefits offered by the digital world, information security governance is emerging as a business issue pivotal within the e-commerce environment. Most organisations make use of electronic communications systems such as e-mail, faxes, and the world-wide-web when performing their day-to-day business activities. However, all electronic transactions and communications inevitably involve information being used in one form or another. It may therefor be observed that information permeates every aspect of the business world. Consequently, the need exists to have information security governance in place to ensure that information security prevails. However, questions relating to: which organisation must deploy information security governance, why the organisation should concern itself with this discipline, how the organisation should go about implementing information security governance, and what consequences will ensue if the organisation fails to comply with this discipline, are in dispute. Uncertainty surrounding the answers to these questions contribute to the reluctance and skepticism with which this discipline is approached. This dissertation evolves around the legal implications of information security governance by establishing who is responsible for ensuring compliance with this discipline, illustrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline, ultimately providing the reader with certainty and clarity regarding the above mentioned questions, while simultaneously enabling the reader to gain a better understanding and appreciation for the discipline information security governance. The discussion hereafter provides those who should be concerned with information security governance with practical, pragmatic advice and recommendations on: (i) The legal obligation to apply information security; (ii) Liability for failed information security; (iii) Guidelines on how to implement information security; and (iv) A due diligence assessment model against which those responsible for the governance and management of the organisation may benchmark their information security efforts.
302

Information security in web-based teleradiology.

Psaros, Vasiliki Chrisovalantou 04 June 2008 (has links)
Health care organisations operate in a eld that is driven by patient, business and legislative demands. Now, Information Technology (IT) is starting to exert its powers on this eld. A revolution is taking place in the health care eld, and IT is playing an increasingly important role. This study originated from realising that medical staff were using technology to help them receive patient studies and do a diagnosis. Health care professionals are very dependent on the availability of the computer systems and on the accuracy of the data that is stored. While health care records may contain information that is of utmost sensitivity, this information is only useful if it is shared with the health care providers and the system under which the patient receives his/her care. The latter trend marks an ever-growing need to protect the confidentiality and integrity of health care information, while at the same time ensuring its availability to authorised health care providers. It has to be acknowledged that a complete protection of data is, in practice, infeasible and impossible. Many systems are not secure, making them vulnerable to attacks. Health care facilities have a challenge of keeping up-to-date with the legal requirements that apply to patient records in order to protect the condentiality, integrity and availability of patient data. This study is aimed at examining the information security of the data in a teleradiology system that is used by a health care facility, and to provide recommendations on how the security can be improved. / Prof. S.H. von Solms
303

Region aware DCT domain invisible robust blind watermarking for color images.

Naraharisetti, Sahasan 12 1900 (has links)
The multimedia revolution has made a strong impact on our society. The explosive growth of the Internet, the access to this digital information generates new opportunities and challenges. The ease of editing and duplication in digital domain created the concern of copyright protection for content providers. Various schemes to embed secondary data in the digital media are investigated to preserve copyright and to discourage unauthorized duplication: where digital watermarking is a viable solution. This thesis proposes a novel invisible watermarking scheme: a discrete cosine transform (DCT) domain based watermark embedding and blind extraction algorithm for copyright protection of the color images. Testing of the proposed watermarking scheme's robustness and security via different benchmarks proves its resilience to digital attacks. The detectors response, PSNR and RMSE results show that our algorithm has a better security performance than most of the existing algorithms.
304

Hardware and Software Codesign of a JPEG2000 Watermarking Encoder

Mendoza, Jose Antonio 12 1900 (has links)
Analog technology has been around for a long time. The use of analog technology is necessary since we live in an analog world. However, the transmission and storage of analog technology is more complicated and in many cases less efficient than digital technology. Digital technology, on the other hand, provides fast means to be transmitted and stored. Digital technology continues to grow and it is more widely used than ever before. However, with the advent of new technology that can reproduce digital documents or images with unprecedented accuracy, it poses a risk to the intellectual rights of many artists and also on personal security. One way to protect intellectual rights of digital works is by embedding watermarks in them. The watermarks can be visible or invisible depending on the application and the final objective of the intellectual work. This thesis deals with watermarking images in the discrete wavelet transform domain. The watermarking process was done using the JPEG2000 compression standard as a platform. The hardware implementation was achieved using the ALTERA DSP Builder and SIMULINK software to program the DE2 ALTERA FPGA board. The JPEG2000 color transform and the wavelet transformation blocks were implemented using the hardware-in-the-loop (HIL) configuration.
305

Zálohování dat a datová úložiště / Data Backup and Data Storages

Trebulová, Debora January 2017 (has links)
This diploma thesis focuses on ways of backing up data and their practical use in a specific proposal for Transroute Group s.r.o.. In the introduction part the theoretical knowledge on this issue is presented. Next part of the thesis deals with the analysis of the current state of backup in the company. This section is followed by a chapter where several solutions are presented each with their financial evaluation. The ending part is composed of the choice of a specific solution and a time estimate for its implementation.
306

Návrh ochrany osobních dat dle obecného nařízení EU 2016/679 ze dne 27. dubna 2016 / The proposal for personal data protection according to the general Regulation (EU) 2016/679 of 27 April 2016

Bartoňová, Julie January 2018 (has links)
This diploma thesis solves the proposal for personal data protection according to the Regulation (EU) 2016/679 of 27 April 2016 (generally known under the abbreviation GDPR) in a chosen company. The thesis begins with a theoretical background followed by the part devoted to the analysis of the company. These results are further confronted with the own solution which is presenting the proposals and recommendations to bring the selected company into line with the GDPR.
307

Dropbox & Co, alles schon ge-cloud?

Syckor, Jens January 2014 (has links)
Cloudspeicherdienste sind zu einem Standard für den Austausch großer Datenmengen in virtuellen Gemeinschaften geworden, sowohl im privaten Umfeld als auch im öffentlichen Bereich. Einfache Bedienbarkeit sowie nahtlose Integration in Applikationen, Betriebssystemen und Endgeräten sind wesentliche Bausteine dieses Siegeszuges.
308

Ideella föreningars hantering av GDPR / Non-profit organizations' handling of GDPR

Henriksson, Samuel January 2020 (has links)
Personuppgiftlagen (PUL) fanns mellan 1992 och 2018 för att skydda människors personliga integritet. The General data protection regulation tog över 2018 dels för att fylla i de luckorsom fanns i PUL men också för att samma regler skulle gälla i alla EUs medlemsländer. För alla organisationer innebar det förändringar om på vilket sätt de ska hantera personuppgifter (Danielsson, Nilsson och Lindström 2019a). I den kvalitativa studie intervjuas respondenter från fem olika ideella föreningar för att ta reda på hur de har valt hantera dataskyddsförordningen. Studien kommer att fokusera på hur föreningarna skyddar sitt medlemsregister, skillnaden på hur de arbetar med personuppgifter nu kontra innan GDPR, hur de aktivt arbetar för att följa GDPR och vilka förändringar de har tvingats genomgå.
309

Can Law Ever Be Code? Beyond Google’s Algorithmic Black Box and Towards a Right to Explanation

Costa Dos Anjos, Lucas 23 November 2021 (has links) (PDF)
This thesis aims to analyze the legal relevance and forms of instrumentalization of the right to explanation of automated decisions in the context of European Union Law. Under the prisms of trade secret protection, privacy and data protection, competition and consumer law, the investigation identifies legal provisions of primary and secondary European law, as well as complementary sources, which support the existence of a right to explanation. Additionally, the proportionality in the weighing of fundamental rights can corroborate the legal and technical implementation of this right, for which this thesis proposes practical suggestions that are consistent with the Google Search platform, chosen as the object of study through which the analyzes would be carried out. Revisiting Lawrence Lessig's idea that (computational) code would shape society's behavior, accommodated by Shoshana Zuboff's recent contributions on surveillance capitalism, I propose that law (norms) can also be translated into (programming) code. Many steps in this direction have already been taken and continue to be in recently proposed legislation. Robust laws in the areas of data protection, trade secrets protection, competition and consumer law currently subsidize claims for explanation that can be filed with different administrative bodies and be examined by European courts. Competition authorities have already proven that there can be real consequences in the reformulation of some of these practices in the private sector, as seen in previous cases of Google within the scope of the European Commission. Since there is a large asymmetry of information between automated decision-making platforms and its users, by disclosing a portion of an algorithm’s inner functioning (purposes, reasoning, inputs and deciding parameters taken into consideration etc.), in an appropriate fashion to the average user for whom the explanation is aimed, it is possible to better enforce consumer welfare and safeguard competition standards. The substance of this study recognizes the importance of a right to explanation as a stepping stone for algorithmic governance, especially with regard to Google’s search engine and its applications. / Doctorat en Sciences juridiques / info:eu-repo/semantics/nonPublished
310

Purchase Probability Prediction : Predicting likelihood of a new customer returning for a second purchase using machine learning methods

Alstermark, Olivia, Stolt, Evangelina January 2021 (has links)
When a company evaluates a customer for being a potential prospect, one of the key questions to answer is whether the customer will generate profit in the long run. A possible step to answer this question is to predict the likelihood of the customer returning to the company again after the initial purchase. The aim of this master thesis is to investigate the possibility of using machine learning techniques to predict the likelihood of a new customer returning for a second purchase within a certain time frame. To investigate to what degree machine learning techniques can be used to predict probability of return, a number of di↵erent model setups of Logistic Lasso, Support Vector Machine and Extreme Gradient Boosting are tested. Model development is performed to ensure well-calibrated probability predictions and to possibly overcome the diculty followed from an imbalanced ratio of returning and non-returning customers. Throughout the thesis work, a number of actions are taken in order to account for data protection. One such action is to add noise to the response feature, ensuring that the true fraction of returning and non-returning customers cannot be derived. To further guarantee data protection, axes values of evaluation plots are removed and evaluation metrics are scaled. Nevertheless, it is perfectly possible to select the superior model out of all investigated models. The results obtained show that the best performing model is a Platt calibrated Extreme Gradient Boosting model, which has much higher performance than the other models with regards to considered evaluation metrics, while also providing predicted probabilities of high quality. Further, the results indicate that the setups investigated to account for imbalanced data do not improve model performance. The main con- clusion is that it is possible to obtain probability predictions of high quality for new customers returning to a company for a second purchase within a certain time frame, using machine learning techniques. This provides a powerful tool for a company when evaluating potential prospects.

Page generated in 0.1142 seconds