• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 69
  • 48
  • 36
  • 35
  • 19
  • 6
  • 6
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 242
  • 242
  • 119
  • 86
  • 56
  • 47
  • 47
  • 45
  • 45
  • 42
  • 37
  • 29
  • 28
  • 27
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Wireless privacy and personalized location-based services: the challenge of translating the legal framework into business practices

Gratton, Eloïse 08 1900 (has links)
L'avancement des communications sans-fil permet l'obtention de nouveaux services bases sur l'habileté des fournisseurs de services sans-fil à déterminer avec précision, et avec l'utilisation de technologies de pistage, la localisation et position géographiquement d'appareils sans-fil Cette habileté permet d'offrir aux utilisateurs de sans-fil de nouveaux services bases sur la localisation et la position géographique de leur appareil. Le développement des services basés sur la localisation des utilisateurs de sans-fil soulevé certains problèmes relatifs à la protection de la vie privée qui doivent être considérés. En effet, l'appareil sans-fil qui suit et enregistre les mouvements de I 'utilisateur permet un système qui enregistre et entrepose tous les mouvements et activités d'un tel utilisateur ou encore qui permet l'envoi de messages non anticipes à ce dernier. Pour ce motif et afin de protéger la vie privée des utilisateurs de sans-fil, une compagnie désirant développer ou déployer une technologie permettant d'offrir ce genre de services personnalisés devra analyser l'encadrement légal touchant la protection des données personnelles--lequel est dans certains cas vague et non approprié à ce nouveau contexte--ainsi que la position de l'industrie dans ce domaine, et ce, afin d'être en mesure de traduire cet encadrement en pratiques commerciales. Cette analyse permettra d'éclairer le fournisseur de ces services sur la façon d'établir son modèle d'affaires et sur le type de technologie à développer afin d'être en mesure de remédier aux nouveaux problèmes touchant la vie privée tout en offrant ces nouveaux services aux utilisateurs de sans-fil. / The proliferation of mobile communications is leading to new services based on the ability of service providers to determine, with increasing precision and through the use of location determination technologies, the geographic location of wireless devices and allow their users to receive services based on such location. The development of location-based services introduces new privacy risks for consumers that must be addressed. The portability of wireless devices coupled with their ability to pinpoint the location of wireless users and reveal it to others could produce a system where the everyday activities and movements of these users are tracked and recorded, and where wireless users receive unanticipated messages on their device. For this reason and in order to preserve the privacy of wireless users, a company looking to deploy a technology related to the providing of personalized location-based services ("LBS Provider") will have to analyze the privacy legal framework, coming either from legal sources--that may be in some case vague and not specific to this new context--or from the industry, and translate such framework into business practices. Such analysis may help in establishing what kind of business model and technology should be adopted and developed by LBS Providers in order to ensure the privacy of wireless users while providing this new type of service.
202

Asmens duomenų apsaugos teismų sistemoje teisiniai aspektai / Legal aspects of personal data protection in the judicial system

Šivickas, Manvydas 30 December 2006 (has links)
The means of personal data protection in courts, legal acts, regulating that, are analyzed in the final work ,,Legal aspects of personal data protection in the judicial system“. The implementation of information technologies in the work of courts has fasten the judge of cases, though when the automate administration of personal data started, the danger personal data to be detected has increased, breaking the persons` right to privacy. The author also analyses the purpose of a courts` information system LITEKO and the data, which is administrated with this program. It is aiming to find out the measures, which can be used to strengthen the protection of personal data. The author while analyzing the practical situation of personal data protection in courts, gives recommendations, how occurring problems could be solved. The work brings us to the main conclusion, that personal data protection and the right to the privacy should not be made absolute. The ways how to protect personal data and the right to privacy in court processes, to guarantee the quality of court process and the reliability in courts should be found.
203

Enhancing Security in Managing Personal Data by Web Systems

Wild, Stefan 12 June 2017 (has links) (PDF)
Web systems have become an integral part in daily life of billions of people. Social is a key characteristic today’s web projects need to feature in order to be successful in the social age. To benefit from an improved user experience, individual persons are continually invited to reveal more and more personal data to web systems. With a rising severity of attacks on web systems, it is evident that their security is inadequate for the amount of accumulated personal data. Numerous threat reports indicate that social media has become a top-ranking attack target, with climbing impacts, with ramifications beyond single individuals and with a booming black market to trade leaked personal data. To enhance information security in managing personal data by web systems for the mutual benefit of individual persons, companies and governments, this dissertation proposes a solution architecture and three research contributions. While the solution architecture establishes the foundation for a more secure management of personal data by web systems, the research contributions represent complementary components for protecting personal data against unwanted data disclosure, tampering and use without the actual data owner’s intent or knowledge. Not only do these components enable seamless integration and combination, but they also contribute to assure quality and maintainability. The dissertation concludes with discussing evaluation results and providing an outlook towards future work.
204

Le difficile équilibre entre sécurité et protection des données : comparaison des cadres juridiques français et grec sous l'influence du droit européen / The difficult balance between security and data protection : comparison of French and Greek legal frameworks under the influence of European law

Tsaousis, Georgios 09 April 2014 (has links)
Confronté à sa propre violence, voire aux forces de la nature, l’homme n’a cessé d’exprimer un besoin, celui d’être rassuré et protégé. Ainsi le droit à la sécurité est dès la création des sociétés organisées un principe primordial de leur existence. Depuis les attentats du 11 septembre 2001 la question de la sécurité préoccupe fortement l’actualité politico-médiatique. La mise en place de politiques de sécurité performantes est un objectif qui excite les foules, un facteur qui renforce l’exécutif. Cet objectif est caractérisé comme « besoin social impérieux ». Toutefois sur le plan purement textuel le droit à la sécurité n’apparaît pas d’une façon explicite comme norme constitutionnelle. La sécurité usant des techniques les plus avancées exige, sur le plan juridique, une adaptation du droit à l’ère numérique. Les systèmes de vidéosurveillance, les téléphones portables, la toile et les fichiers automatisés constituent les nouvelles armes de l’appareil policier. A ce titre le traitement des données représente le noyau dur des nouvelles orientations de sécurité. Toutefois l’utilisation des nouvelles technologies pour des raisons liées au maintien du bon ordre nécessite également un autre devoir: le respect des libertés fondamentales préoccupation manifeste du droit. Pour autant, la surestimation des politiques de sécurité et la prolifération des mesures sécuritaires sont susceptibles d’entraîner une certaine dégradation ou un affaiblissement du droit à la protection des données principe fondamental du droit de l’UE dès l’adoption du traité de Lisbonne. Face à ce défi, le droit cherche un juste équilibre entre vie privée et sécurité. Certes, l’équation est ancienne, mais ses modes de résolutions évoluent en raison des innovations technologiques, qui se rient des frontières et mettent à mal le principe de souveraineté territorial inhérent à l’Etat. Les droits nationaux, supportent également mal cette abolition des frontières. La comparaison, des ordres juridiques grecs et français, avec certes leurs différences, en sont de belles illustrations notamment dans le cadre de l’UE où la sécurité nationale en demeurant de la seule responsabilité des Etats membres crée des disparités entre les législations nationales. Dans cet environnement les AAI de protection des données des pays comparés se trouvent à la marge, captives dans des cadres juridiques précis. Seule le juge reste pour faire le contrepoids face aux abus des services policiers. Dans l’état actuel des traités constitutifs, la protection des données traitées à des fins policières par la juridiction luxembourgeoise est impossible. Ainsi la Cour EDH constitue la seule juridiction européenne dotée d’opérer une conciliation des deux exigences fondamentales: maintien de l’ordre public et protection des données. En effet, elle n’exerce qu’un contrôle de proportionnalité des mesures appliquées. Ainsi, l’établissement d’un juste équilibre au moins au sein de l’UE conduit in fine le droit à s’orienter vers la mise en œuvre d’une approche unique des politiques de sécurité à travers d’une éventuelle révision des traités. / Confronted by his own violence and the forces of nature, man has consistently expressed the need to be protected. Since the creation of organized societies, the right of security has been a fundamental principle of his existence. Since the attacks of September 11th, 2001, the question of security is being brought up constantly in the media. The implementation of effective security policies is an exciting objective, a factor that strengthens the executive power. This objective has been characterized as a "pressing social need". However, in the purely textual level, the right of security does not appear explicitly as a constitutional norm. Security using the most advanced techniques requires, legally, the adaptation of law to the digital era. CCTV systems, mobile phones, the word-wide-web and automatic archiving constitute the new weapons of the police apparatus. As such, data processing forms the core of the new security guidelines. Nevertheless, using new technologies for reasons related to the maintenance of public order also requires another duty: respect for fundamental freedoms, law's obvious concern. However, the overestimation of security policies and the proliferation of security measures may cause some degradation and loss of the right of data protection, a fundamental principle of EU law since the adoption of the Lisbon Treaty. Faced with this challenge, law seeks the right balance between privacy and security. Of course, the equation is old, but the ways to solve it evolve due to technological advances that laugh at borders and undermine the state's inherent principle of territorial sovereignty. National laws also handle poorly the abolition of frontiers. Comparison between Greek and French legal systems, albeit with their differences, is a beautiful illustration of this fact, notably within the EU where national security, remaining the sole responsibility of the member states, creates disparities between national laws. In this environment the Independent Administrative Authorities of data protection of the compared countries remain at the margin, trapped in specific legal frameworks. Only the judge remains to the counterweight police abuse. In the current state of the constitutive treaties, protection of processed data for police purposes by the Luxembourg court is impossible. And the ECHR is the only european court capable of providing a balance between the two basic requirements: maintenance of public order and data protection. Indeed, it only exercises a proportionality test of the applied measures. Thus, establishment of a balance at least within the EU ultimately leads law towards the implementation of a unique approach to security policies through a possible revision of the Treaties.
205

Vie privée des mineurs en ligne : protection des données personnelles. Étude comparée entre le droit canadien, américain et celui de l’Union européenne

Alvarez Bautista, Diana Paola 06 1900 (has links)
Cette recherche s’intéresse à un sujet d’actualité portant sur la vie privée des mineurs en ligne, plus particulièrement sur la protection des données personnelles. Depuis l’avènement des nouvelles technologies de l’information et des communications (NTIC) et la venue du web 2.0, la protection des données personnelles demeure question d’actualité en plus d’être fort complexe. Cette question demeure encore plus criante lorsqu’il s’agit de mineurs. La présente recherche s’intéresse d’abord à l’utilisation d’Internet par les mineurs, à la notion de vulnérabilité du mineur et de l’insuffisance des règles actuelles. Elle s’intéresse également à la distinction conceptuelle entre « mineur » et « enfant » avant de s’arrêter plus longuement aux principales formes d’infractions qui portent atteinte à la vie privée et à l’intégrité des mineurs. Plus loin dans ce mémoire, on s’intéresse aux dispositions législatives et réglementaires au Canada, aux États-Unis et au sein de l’Union européenne. Dans la dernière partie on montre les différences significatives entre le Canada, les États-Unis et l’Union européenne. Dans la conclusion de ce mémoire, nous revenons sur les faits saillants de cette recherche comparative en insistant sur le fait qu’il est complexe de protéger les données personnelles des mineurs et qu’il existe des différences importantes dans les législations et les règlements en vigueur sur le plan national et international. / This research study addresses a current concern regarding the privacy of minors online, more specifically the protection of personal data. Since the emergence of new information and communication technologies (NICT) and the introduction of Web 2.0, the protection of personal data remains a relevant and very complex issue. This issue is even more critical when it comes to minors. This research study first looks at Internet use by minors, the notion of a minor person’s vulnerability and the limitations of the current rules. It also examines the conceptual distinction between "minor" and "child" before focusing on the main aspect of violation of a minor's privacy and integrity. Later in this master’s thesis, the legislative and regulatory provisions in Canada, the United States and the European Union are examined. The final section highlights the significant differences between Canada, the United States and the European Union. In the conclusion for this dissertation, we will look back at the highlights of this comparative study, emphasizing that the task of protecting the personal data of minors is complex and that there are significant disparities in the laws and regulations in force at the national and international levels.
206

Inovace procesů zpracování osobních údajů u státní organizace / Innovation Processes Personal Data for the State Organization

Cahová, Veronika January 2009 (has links)
Master's thesis "Innovation processes personal data for the state organization," deals with the protection of personal data for processing, both in paper, as well as electronic form. The main topic is security policy, the assessment of security risks resulting proposals for the introduction of innovative processes aimed to prevent possible leakage and misuse of personal data.
207

Enhancing Security in Managing Personal Data by Web Systems

Wild, Stefan 12 June 2017 (has links)
Web systems have become an integral part in daily life of billions of people. Social is a key characteristic today’s web projects need to feature in order to be successful in the social age. To benefit from an improved user experience, individual persons are continually invited to reveal more and more personal data to web systems. With a rising severity of attacks on web systems, it is evident that their security is inadequate for the amount of accumulated personal data. Numerous threat reports indicate that social media has become a top-ranking attack target, with climbing impacts, with ramifications beyond single individuals and with a booming black market to trade leaked personal data. To enhance information security in managing personal data by web systems for the mutual benefit of individual persons, companies and governments, this dissertation proposes a solution architecture and three research contributions. While the solution architecture establishes the foundation for a more secure management of personal data by web systems, the research contributions represent complementary components for protecting personal data against unwanted data disclosure, tampering and use without the actual data owner’s intent or knowledge. Not only do these components enable seamless integration and combination, but they also contribute to assure quality and maintainability. The dissertation concludes with discussing evaluation results and providing an outlook towards future work.
208

GDPR:s effekter på användares skydd avpersonliga data på internet

Höber, Christoffer, Marklund, Josef January 2020 (has links)
Personliga data samlas in när vi besöker internetsidor och tillgång till personliga data har snabbt fåttavgörande betydelse för alltfler företags värdeskapande. Därför har metodutveckling för tillgång tillpersonliga data blivit en central del i företags konkurrenskraft. Det medför emellertid stora och riskerför individers personliga integritet. För att motverka sådana risker infördes 2018 den europeiskadataskyddsförordningen (GDPR). Vår analys visar att GDPR ger ett stort tolkningsutrymme för hurföretag informerar om datainsamling via cookie-notifikationer. Utformningen varierar därför kraftigtoch designas ofta för att styra användare mot att acceptera datainsamling. Vår analys visar att eneffekt av GDPR är att antalet cookie-notifikationer ökat avsevärt och att individers medvetenhet omoch oro inför hur personliga data samlas in och används har ökat efter GDPR:s införande. Däremotpekar våra resultat på att GDPR inte haft några betydande effekter på användares beteende när detgäller att aktivt skydda sina personliga data. De viktigaste skälen till att GDPR inte haft några effekterpå användarnas beteende för att skydda sina personliga data är att det är alltför tidskrävande och svårt.Vår analys visar därför att det så kallade “informerade samtycket” till insamling av personliga datainte effektivt uppnås trots GDPR:s införande. Vår slutsats för fortsatt forskning är att det är angelägetmed fördjupad forskning kring obalanser mellan individer, företag och reglerande myndigheterkopplat till hur personliga data samlas in, sammanställs och används. / The collection of personal data has become a crucial part of companies value creation. Because ofthat, the development of methods to get access to power over the personal data has become a centralpart in the competitiveness between companies. This has resulted in risks and concerns concerningindividual privacy. To counteract these risks, the European Union introduced the General dataProtection Regulation (GDPR). Our analysis shows that one effect of the GDPR is an increased usageof cookie-notifications when informing users of data collection. Our analysis also shows that theregulation has room for interpretation for how the companies inform the user about data collectionpractices. That has resulted in varied design methods in cookie-notifications that often steer userstowards an acceptance of collection of personal data. Because of the increased usage of cookienotificationsusers awareness and privacy concerns has drastically increased. However, our findingsshow that the regulation hasn’t had an effect on user behavior, specifically connected to protectingtheir personal data online. The main reasons for this are that it takes a lot of effort and time tocomprehend how that is done practically. Therefore, our analysis shows that “informed consent” isnot effectively achieved in the current methods, despite it being required in the regulation. Ourconclusion is therefore that future research should focus on the imbalance between individuals,companies and regulatory instances when addressing the problems with collection and usage of personal data.
209

Freeconomics in the light of EU VAT Directive : Are free digital services supplied in exchange for personal data VAT taxable?

Sampaoli, Alessandro January 2020 (has links)
The digital economy is growing exponentially. Companies such as Facebook and Instagram base their business model on supplying services completely free of charge to billions of users.  This model of business is called “Freeconomics”. These companies generate huge profits from the exploitation of personal data provided by Users. The peculiarity of this way of doing business, although this may seem absurd, is that the company's profit is directly proportional to the number of non-paying users. Such situations have given rise to discussions regarding the powerlessness of the tax system of states to levy tax on such profits. Regarding the indirect taxation, the question is even more difficult if one considers free digital services and personal data. Unfortunately, this flow of “digital” consumption remains completely out of a VAT assessment. Exclude a priori those transactions from being assessed for VAT purposes only because it could be arduous to assess the consumption would result in a violation of the principle of neutrality. Accordingly, issues related to the distortion of competition could also arise. The author of this thesis examines the assumption that between the Companies and the Users take place a reciprocal exchange of benefits in kind characterized by a synallagmatic relationship (quid pro quo) in the form of barter. The results of the analysis indicate that the transactions characterized by the supply of free digital services to Users in exchange for personal data - as described in the Business Reference Model - actually fall within the scope of Article 2 (1)(c) of the EU VAT Directive and therefore must be subject to indirect taxation.
210

Blodspår i arkiven : Om integritet, personuppgifter och DNA-släktforskning i brottsutredningar / Bloodlines in the archives : About integrity, personal data and DNA genealogy in criminal investigation

Petersson, Rebecka, Persson, Cecilia January 2021 (has links)
In 2004 there was a double homicide in a Swedish town called Linköping, a small amount of DNA was found at the scene. Despite a largescale investigation, this murder would go unsolved for 16 years. In 2020 a Swedish genealogist was hired by the Swedish police and through an American commercial DNA database he was able to find the man that had gone unfound for so long. This was made possible through a change of Swedish laws in connection with the European Union’s Data Protection Regulation (GDPR), a regulation that protect the integrity of the personal data of Europeans. We have investigated how the evolution of these two legal frameworks coincides with each other, making this rather paradoxical situation possible. We have also investigated how this rather invasive technology is viewed by Swedish genealogists. These websites with their immense databases, and the technological developments in DNA technology, have changed genealogy. But they have also changed the genealogist, the foremost user of the archives today. We wanted to find out how.The investigation was conducted on three analytical levels: the legal/political, the medial and the individual level. On the legal/political level the material consists of legal texts, transcribed protocols from the Swedish Riksdag, but also two different reports on the legal status of using genetic genealogy as a method of criminal investigation. On the medial level the material consists of commercials for genealogy databases, documentaries and talk shows concerning the investigation of the murder in Linköping. On the individual level the material consists of surveys and interviews with genealogists. Follow us as we alongside police and genetic genealogists follow the bloodlines running through the archives. This is a two years master's thesis in Archival science.

Page generated in 0.0744 seconds