• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 2
  • 1
  • Tagged with
  • 6
  • 6
  • 6
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The benefits of contractual causes in mitigating project failures using business system projects

Mostert, Charl January 2014 (has links)
Dissertation submitted in partial fulfilment of the requirements for the degree Master of Technology of Technology: Business Information Systems in the Faculty of Business at the Cape Peninsula University of Technology / This study evaluates the utilisation and effectiveness of contract clauses in Information Technology (IT) and Information System (IS) projects in South Africa to address and mitigate key risks associated with these types of projects. This study established whether specific clauses were being utilised to address key risks, and where clauses were being utilised, whether these clauses were effective in addressing and mitigating the impact of these key risks. The need for the study arose because the researcher had experienced on several occasions in his workplace that contracts which appeared fail-safe during the negotiation stage did not reach the proposed targets, let alone maturity of the agreement. To establish whether colleagues in similar positions in computer-based organisations experienced similar disruptions a quantitative questionnaire was distributed to organisations in the Johannesburg area to gain an insight into their risk profile. Risk could arise from the contract construction and/or wording. Reference was made to the contracts in the engineering environment where standard contracts have been in place for a number of years. Specifically the New Engineering Contract (NEC) of 2011 and the Professional Services Contract were consulted. The study concentrated on four categories of risk identified in a literature review, namely corporate management risk, project management risk, resource utilisation risk and technology risk, which resulted in 42 sub-factors examined. The population of suitable and relevant IT and IS companies could not be definitely established but the researcher made telephonic contact with known organisations and 24 participants agreed to participate in the exercise; 12 service providers and 12 clients of providers, where 78% of participants experienced one or more of the risk factors, and 53% used NEC standard contracts.
2

La reconnaissance juridique des contrats intelligents face à la réglementation globale des technologies

Godoy, Maria I. 04 1900 (has links)
La technologie de la chaîne de blocs peut être résumée en un réseau décentralisé et distribué de registre de transactions numériques. Sa mise en oeuvre dans le marché des cryptomonnaies a été suivie par d’autres utilisations, comme les Organisations autonomes décentralisées (DAO) et les contrats intelligents. Ce mémoire s’attachera à examiner deux volets de la reconnaissance juridique des contrats intelligents : au regard des normes étatiques déjà existantes ou en cours d’élaboration au sein de différentes juridictions, y compris le Québec, et au regard du potentiel des normes alternatives. Le contexte de la globalisation, du pluralisme juridique et des mutations de la souveraineté étatique est pris en considération à cette fin. La première partie de cette étude se concentre sur les aspects technologiques, afin de présenter les fondements du fonctionnement des contrats intelligents. La seconde partie est consacrée à une analyse du panorama juridique. L’encadrement normatif du droit positif présente d’ores et déjà des normes applicables aux contrats intelligents, certaines générales et d’autres spécifiques. Il est également pris en considération que les normes alternatives peuvent être un moyen d’harmoniser un contexte globalisé. Une harmonisation dans cette direction serait importante visant à renforcer la réglementation des nouvelles relations issues de la démarche technologique. L’ensemble de ces faits rend l’utilisation des normes alternatives opportune, conjointement avec les normes étatiques, dans le cadre de la réglementation des nouvelles technologies afin, notamment, de surmonter l’incertitude juridique encore existante dans ce milieu. / The Blockchain technology is essentially a decentralized and distributed network of digital transactions records. Its implementation on the cryptocurrency market was followed by other applications, such as the Decentralized Autonomous Organization (DAO) and Smart Contracts. This thesis will focus precisely on the legal recognition of smart contracts in the light of the established positive law and the regulations currently being drafted in various jurisdictions, including Quebec, as well as in the light of the soft law. The context of globalization, legal pluralism and state sovereignty changes are taken into consideration. The first part of this study focuses on the technological aspects in order to present the foundations of the Smart Contracts operation. The second part is dedicated to analyzing the current juridical panorama. The normative framework of the positive law already provides applicable regulations to Smart Contracts, some general, others more specific. It is further understood that the soft law could be a way of harmonizing the current context. A harmonization in this direction would be relevant in order to enhance the essential regulatory framework of new relations coming from the technological development. Given all these facts, the soft law along with hard law seem to be appropriate to chart the legal framework for the new technologies, in order to overcome the many legal uncertainties existing in this field.
3

Publicité comportementale en ligne : analyse de la complexité et de l’encadrement juridique applicable au secteur privé au Québec et au Canada

Poirier, Isabel 04 1900 (has links)
Le présent mémoire traite de la publicité comportementale en ligne (ci-après « PCL ») suite à la récente et importante vague de resserrements législatifs, des décisions judiciaires et enquêtes du CPVP, ainsi qu’aux récentes modifications technologiques impactant les pratiques de PCL. À la manière d’un guide, il y est recensé, décrit et analysées les obligations des entreprises participants à la PCL sous l’angle du droit à la vie privée et à la protection des renseignements personnels. Les enjeux et les principales zones d’ombre problématiques y sont identifiés et analysés, tel le critère de nécessité, l’exigence d’anonymisation et l’obligation de consentement, en incluant les enseignements des récentes décisions et enquêtes du CPVP. Une comparaison avec le cadre règlementaire de l’Union européenne est proposée sur certains points jugés plus pertinents. Le présent mémoire inclut une réflexion non seulement sur les obligations clés et leur évolution récente et rapide au Québec et au Canada dans un contexte de resserrement à l’international, mais également sur la PCL en soi en émettant des questionnements et des pistes de réflexion pour l’amélioration des pratiques. Ainsi, ce mémoire contient un volet pratique prononcé et un volet théorique qui se nourrissent l’un de l’autre. La partie I est un état des lieux où sont mises en lumière la complexité factuelle et juridique entourant la PCL, incluant une observation et une réflexion sur les interactions entre les différents acteurs (organisations, organismes d’autoréglementation, autorités de contrôle) et leur rôle dans la création et l’évolution des normes formelles et informelles. La partie II est consacrée à l’analyse des principales obligations incombant aux entreprises du secteur privé participant à la PCL en vertu de la LPRPDE et du Projet de loi C-27 au fédéral ainsi que des récentes modifications apportées par la Loi 25 au Québec en matière de protection des renseignements personnels. Finalement, la partie III propose une analyse de l’exercice de contrôle de l’utilisateur et des limites du consentement. / This master’s thesis is about online behavioral advertising (hereafter “OBA”). Like a guide, it lists, describes and analyzes the obligations of companies participating in the OBA from the perspective of the right to privacy and the protection of personal information. The issues and the main problematic gray areas are identified and analyzed, such as the criterion of necessity, the requirement of anonymization and the obligation of consent, including the lessons of recent decisions and investigations by the OPC. A comparison with the regulatory framework of the European Union is proposed on certain points deemed more relevant. This thesis includes a reflection not only on the key obligations and their recent and rapid evolution in Quebec and Canada in a context of international tightening, but also on the OBA itself by raising questions and lines of thought for improving practices. Thus, this dissertation contains a pronounced practical component and a theoretical component which feed off each other. Part I is an inventory highlighting the factual and legal complexity surrounding the OBA, including an observation and reflection on the interactions between the different actors (organizations, self-regulatory bodies, supervisory authorities) and their role in the creation and evolution of formal and informal norms. Part II is devoted to the analysis of the main obligations incumbent on private sector companies participating in the OBA under PIPEDA and draft law C-27 at the federal level and Bill 25 in Quebec with regards to the protection of personal information. Finally, Part III analyzes the exercise of user control and the limits of consent.
4

Data protection and transborder data flows : implications for Nigeria's integration into the global network economy

Allotey, Asuquo Kofi Essien 02 1900 (has links)
One of the realities that developing countries like Nigeria have to face today is that national and international markets have become more and more interconnected through the global platform of telecommunications and the Internet. This global networked economy is creating a paradigm shift in the focus of development goals and strategies particularly for developing countries. Globalisation is driving the nations of the world more into political and economic integration. These integrations are enhanced by a globally interconnected network of economic and communication systems at the apex of which is the Internet. This network of networks thrives on and encourages the expansion of cross-border flows of ideas and information, goods and services, technology and capital. Being an active member of the global network economy is essential to Nigeria’s economic development. It must plug into the network or risk being shut out. The global market network operates by means of rules and standards that are largely set by the dominant players in the network. Data protection is a critical component of the regime of rules and standards that govern the global network economy; it is evolving into an international legal order that transcends geographical boundaries. The EU Directive on data protection is the de facto global standard for data protection; it threatens to exclude non-EU countries without an adequate level of privacy protection from the EU market. More than 50 countries have enacted data protection laws modelled on the EU standard. Access to the huge EU market is a major motivation for the current trend in global harmonisation of domestic data protection laws. This trend provides a compelling reason for examining the issues relating to data protection and trans-border data flows and their implications for Nigeria’s desire to integrate into the global network economy. There are two primary motivations for legislating restrictions on the flow of data across national boundaries. The first is the concern for the privacy of the citizens, and second, securing the economic well-being of a nation. It is important that Nigeria’s privacy protection keeps pace with international norms in the provision of adequate protection for information privacy order to prevent potential impediments to international trading opportunities. / Public, Constitutional, & International / LLD
5

Data protection and transborder data flows : implications for Nigeria's integration into the global network economy

Allotey, Asuquo Kofi Essien 02 1900 (has links)
One of the realities that developing countries like Nigeria have to face today is that national and international markets have become more and more interconnected through the global platform of telecommunications and the Internet. This global networked economy is creating a paradigm shift in the focus of development goals and strategies particularly for developing countries. Globalisation is driving the nations of the world more into political and economic integration. These integrations are enhanced by a globally interconnected network of economic and communication systems at the apex of which is the Internet. This network of networks thrives on and encourages the expansion of cross-border flows of ideas and information, goods and services, technology and capital. Being an active member of the global network economy is essential to Nigeria’s economic development. It must plug into the network or risk being shut out. The global market network operates by means of rules and standards that are largely set by the dominant players in the network. Data protection is a critical component of the regime of rules and standards that govern the global network economy; it is evolving into an international legal order that transcends geographical boundaries. The EU Directive on data protection is the de facto global standard for data protection; it threatens to exclude non-EU countries without an adequate level of privacy protection from the EU market. More than 50 countries have enacted data protection laws modelled on the EU standard. Access to the huge EU market is a major motivation for the current trend in global harmonisation of domestic data protection laws. This trend provides a compelling reason for examining the issues relating to data protection and trans-border data flows and their implications for Nigeria’s desire to integrate into the global network economy. There are two primary motivations for legislating restrictions on the flow of data across national boundaries. The first is the concern for the privacy of the citizens, and second, securing the economic well-being of a nation. It is important that Nigeria’s privacy protection keeps pace with international norms in the provision of adequate protection for information privacy order to prevent potential impediments to international trading opportunities. / Public, Constitutional, and International / LL. D.
6

Errors and adverse consequences as a result of information technology use in healthcare : an integrated review of the literature

Kiess, Christopher 10 December 2013 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Health Information Technology (HIT) has become an integral component of healthcare today. The HITECH Act (2009) and Meaningful Use objectives stand to bring wide-sweeping adoption and implementations of HIT in small, medium and large sized healthcare organizations across the country. Though recent literature has provided evidence for the benefits of HIT in the profession, there have also been a growing number of reports exploring the adverse effects of HIT. There has not, however, yet been a systematic account of the adverse effects of HIT in the healthcare system. The current push for HIT coupled with a lack of critical appraisal of the potential risks of implementation and deployment within the medical literature has led to a general unquestioning and unregulated acceptance of the implementation of technology in medicine and healthcare as a positive addition with little or no risk. While the benefits of HIT are clear, a review of the existing studies in the literature would provide a holistic vision of the adverse effects of HIT as well as the types and impact within the nation’s health care system to inform future HIT development and implementation. The development of a general understanding of these adverse effects can serve as a review and summary for the use of informatics professionals and clinicians implementing HIT as well as providing future direction for the industry in HIT implementations. Additionally, this study has value for moving forward in informatics to develop frameworks for implementation and guidelines and standards for development and regulation of HIT at a federal level. This study involves the use of an integrative literature review to identify and classify the adverse effects of HIT as reported in the literature. The purpose of this study is to perform an integrative review of the literature to 1) identify and classify the adverse effects of HIT; 2) determine the impact and prevalence of these effects; 3) identify the recommended actions and best practices to address the negative effects of HIT. This study analyzed 18 articles for HIT-induced error and adverse consequences. In the process, 228 errors and/or adverse consequences were identified, classified and represented in an operational taxonomic schema. The taxonomic representation consisted of 8 master categories and 30 subcategories. Additionally, the prevalence and impact of these errors were evaluated as well as recommendations and best practices in future systems design. This study builds on previous work in the medical literature pertaining to HIT-induced errors and adverse consequences and offers a unique perspective in analyzing existing studies in the literature using the integrative review model of research. It is the first work in combining studies across healthcare technologies and analyzing the adverse consequences across 18 studies to form a cohesive classification of these events in healthcare technology.

Page generated in 0.1379 seconds