• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 69
  • 47
  • 35
  • 35
  • 19
  • 6
  • 6
  • 5
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 239
  • 239
  • 118
  • 84
  • 55
  • 47
  • 47
  • 45
  • 42
  • 39
  • 36
  • 29
  • 28
  • 27
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A desk-top information manager

Bocca, Jorge B. January 1985 (has links)
No description available.
2

Peering Through the Cloud—Investigating the Perceptions and Behaviors of Cloud Storage Users

Wu, Justin Chun 01 October 2016 (has links)
We present the results of a survey and interviews focused on user perceptions and behaviors with respect to cloud storage services. In particular, we study behaviors such as which services are used, what types of data are stored, and how collaboration and sharing are performed. We also investigate user attitudes toward cloud storage on topics such as payment, privacy, security, and robustness. We find that users are drawn to cloud storage because it enables robust, ubiquitous access to their files, as well as enabling sharing and collaborative efforts. However, users' preferred medium for file sharing continues to be email, due to its ubiquity and role as "lowest common denominator." Privacy and security are of great concern to users, and though users vocally describe feeling "safe" on the cloud, this is because they actively filter the content they store in cloud services. Payment is a sensitive issue, with users exhibiting a strong aversion to any form of direct payment, preferring even disliked alternative funding mechanisms such as targeted advertising. Finally, the cloud serves as an important backup location for users, although space limitations prevent them from using it as a full backup solution.
3

Ochrana osobních údajů při podnikání / Personal data protection while carrying on business

Hricová, Kateřina January 2016 (has links)
Personal data protection is only one of many specific fields of administrative law. In everyday life, personal data and their protection are quite wide area that deserves our full attention and it's possible to study it extensively. This diploma thesis deals specifically with personal data protection while processing them. First of all, it defines the right to privacy and the term personal data. Further, it deals with basic legal requirements concerning personal data processing based on Act no. 101/2000 Coll., on the protection of personal data, including transfer of personal data to other countries and its recent development in Safe Harbor principles that are rules for transfer of personal data into United States of America. Besides personal data being a unique tool to distinguish individuals from each other, they are a very useful and valuable tool in business too. Therefore the most common way of personal data processing is while carrying on a business. At the end of this thesis, some specific situations were chosen to demonstrate how entrepreneurs process personal data of their customers and other persons they come into contact with. Then the basic obligations of data processing are analyzed with respect to real situations.
4

Personlig integritet som informationspolitik : debatt och diskussion i samband med tillkomsten av Datalag (1973:289) / Privacy as information policy : debate and discussion concerning the first Swedish data protection law, Datalag (1973:289)

Söderlind, Åsa January 2009 (has links)
The dissertation explores the field of information policy in a historic setting in Sweden, namely the early 1970s. At the time the question of privacy in relation to databanks, data systems and personal records was intensively discussed in all public media, starting in the fall of 1970 when a large-scale population census was carried out in Sweden. The political discussions and public debate resulted in the first Swedish data protection law, Datalag (1973:289), and was counted as one of the first of this type of national legislation in the world. The focus of the empirical study lies in the analysis of the lines of arguments, political reasoning and debates concerning privacy, data protection, information and technology in documents such as official reports, committee reports, proposals and parliamentary records and publications that were produced in the policy process preceding the new legislation. The public debate itself is investigated through the editorials and reports in the daily press of the time. A combination of discourse analysis and agenda-setting theory, as it is presented and used by the political scientist John W Kingdon, constitutes the theoretical framework of the thesis. The study is introduced with a discussion concerning discourse and language use in politics, and here Norman Faircloughs CDA, Critical Discourse Analysis, has been the main inspiration. Kingdon’s agendasetting model contributes with an interesting theoretical perspective on the social and political context of the discourses under study. The research questions also draw upon library and information science and theoretical work within the area of information policy, with issues concerning notions of information and technology, for example information as a public good versus private good in the market, and information as a free or restricted/protected resource. The main findings of the study imply that the political discussion and debate on databanks and privacy were heavily influenced by a public-oriented discourse focusing mainly on governmental authorities’ own use of information systems holding personal data. The new legislation, datalag (1973:289) could also be seen as a tool that sanctions governmental authorities’ extensive use and dependence on new data technologies and automatic data-processing in building up the welfare state and the growing public sector. The discourse was also based on a mixed notion of the new technology, perceiving data technology mainly as the “big machine” which contains a vast amount of personal information. This, at a time when the technology itself was transforming rapidly from bulky machines to personal computers. The practical effects of this discourse could be seen, for example, in the serious underestimation of the overall use of automatic data-processing in society as a whole, the use of which the legislation was set to regulate. When it comes to agenda-setting the public debate together with the activities of different actors in parliament had a major influence on the outcome of the work of the commission of inquiry that was set up. The public debate affected how the problem area of databanks and privacy was considered, but the commission formulated the actual legislation independently, without interference or adjustments by the social democratic government. / <p>Akademisk avhandling som med tillstånd av samhällsvetenskapliga fakulteten vid Göteborgs universitet för vinnande av doktorsexamen framläggs till offentlig granskning kl. 13.15 fredagen den</p><p>11 september 2009 i hörsalen C204, Högskolan i Borås, Allégatan 1 Institutionen Biblioteks- och Informationsvetenskap/Bibliotekshögskolan, Högskolan i Borås och Göteborgs universitet</p>
5

Privacy and ICTs in a changing world: differing European approaches to uses of personal data in the criminal justice sector

Caruana, Mireille M. January 2013 (has links)
There is an inherent and inevitable tension between police powers and human rights. Adequate police powers are necessary to allow the police to fulfil their tasks; but exercise of such powers will necessarily interfere with the right of respect for private life and must therefore be proportionate to the aim to be achieved. The fundamental argument underlying this thesis is that privacy is valuable, either in its own right, or as a necessary prerequisite for sustaining more fundamental rights. Yet privacy also has costs: the greater the individual 'sphere of privacy', the narrower the scope for obta ining and utilising personal data for societal ends e.g. in this context the suppression or punishment of criminality. It is necessary, therefore, at an early stage in the thesis to undertake a contextual overview of expressions of the concept and value of privacy in Western liberal democracies. Establishing why privacy and privacy rights may be worthy of defence, both for individuals as well as for society as a whole, provides a framework for determining what must necessarily fall within the scope of privacy for that value to be realised . This thesis advocates an approach based on the identification and application of a general underlying principle of privacy and the shaping of the future evolution of the law in line with such a principle. New police information systems or new forms of personal data processing for police purposes do not emerge into an informational vacuum; on the contrary, they merge with and draw upon existing systems of data collection and processing, which are themselves evolving, e.g. computer records of people's bank transactions, their telephone calls, their activity on the Internet, their medical conditions, their education and employment histories etc. The thesis thus provides an overview of the pan-European police information systems already deployed, or planned to be deployed, with the aim of creating for the reader a cognitive map of a complex interaction of systems within which personal data is already collected, stored, shared and/or exchanged on a daily basis, exploring along the way the data protection regimes within those structures. The central themes of the thesis rest upon analysis of the influence of the CoE Recommendation R(87)15 on Regulating the Use of Personal Data in the Police Sector which provides a sector-specific application of the data protection principles established in the CoE Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data. To provide the reader with context for interpreting the empirical research findings, the thesis traces the history of the drafting of Recommendation R(87}15, based on research amongst materials drawn from the CoE's archives in Strasbourg. The findings of the empirical research - resulting from analysis of responses to a questionnaire deployed to Data Protection Authorities or Ministries of Justice in all member States of the CoE, exploring the implementation or otherwise of R(87}15 in each State - provide, for the first time, in a snap-shot, a census of where European legislation stands as regards processing of personal data for police purposes, as the European Union progresses beyond the first pillar/third pillar dichotomy in the post-Lisbon Treaty era. To further inform this analysis, the questionnaire findings were supplemented by in-depth semistructured interviews with domain experts from national data protection authorities, or law enforcement authorities, in select States. ii Based on the forgoing analysis, the thesis outlines aspects of the current legal regime that should be updated or improved, primarily in the context of the reform of the EU data protection framework, with a special focus on data processing in the police and criminal justice sector. This analysis identifies the extent to which the principles of Recommendation R(87)15 have been adopted, adapted, strengthened, weakened or abandoned in the current EU reform proposals. The provisions of Recommendation R(87)15, especially those which reinforce the principles of necessity, proportionality and purpose-specification/limitation are "an inalterable necessary minimum," 1 even for police and security forces. Yet it is argued that this "necessary minimum" is too minimal, and that changed circumstances make it advisable to further strengthen and expand the provisions of Recommendation R(87)15. The thesis concludes that the central question to be asked when restrictions on a fundamental right are concerned is: "How much limitation of a fundamental right is permissible in a democratic constitutional state in which fundamental rights are a constitutive element?" As such it is a modest contribution to the big questions facing our societies regarding the kind of society we want to build, and the kind of policies we need to put in place to reach our goals.
6

Personalized Marketing : An invasion of privacy or an approved phenomenon? An empirical study of how organizations can respond to consumers’ concern over the threats of online privacy.

Birgisdottir, Johanna, Amin, Hiral January 2012 (has links)
The authors of this study analysed the increasing use of personalized marketing and consumer concerns regarding the access to personal information. The purpose was to find out how companies could react to these concerns. Several theoretical concepts were explored, such as Personal Data, Personalized Marketing, Privacy Concerns, Privacy Policies, Consumer Trust and Consumer Behaviour. Facebook Inc. was analysed as an example to address the problem. An online survey was conducted on university students and two interviews were performed with representatives from the Data Inspection Board in Sweden. The main findings were that individuals seem to approve of personalized marketing but are concerned about their privacy. Companies should therefore inform their consumers on how personal data is used for personalized marketing and respect their rights and take governmental regulations into consideration.
7

Le phénomène de circulation des données à caractère personnel dans le cloud : étude de droit matériel dans le contexte de l'Union européenne / The flow of personal data in the cloud : a study of substantive law within the European Union context

Tourne, Elise 11 June 2018 (has links)
Le régime juridique applicable à la collecte et à l’exploitation par les fournisseurs de services de cloud computing des données à caractère personnel de leurs utilisateurs constitue une source d’interrogation pour ces derniers. De fait, aucun régime juridique organisé ne permet aujourd’hui de réguler de manière globale, au niveau de l’Union européenne, le phénomène de circulation des données à caractère personnel dans le cloud, que ce soit de manière directe ou indirecte. Il apparaît, dès lors, nécessaire de s’interroger sur la manière dont le droit s’est organisé en conséquence et d’analyser les traitements complémentaires et/ou alternatifs actuellement offerts par le droit, certes moins structurellement organisés et mosaïques, mais plus pragmatiques, réalistes et politiquement viables. Historiquement, le phénomène de circulation a été presque exclusivement traité via le droit spécifique à la protection des données à caractère personnel découlant de l’Union européenne. Ce droit, souvent considéré par opposition au droit à la libre circulation des données, constituait initialement une émanation du droit à la protection de la vie privée avant d’être consacré en tant que droit fondamental de l’Union européenne. Le traitement offert par le droit à la protection des données, s’il cible directement les données au cœur du phénomène de circulation dans le cloud, ne couvre que partiellement ledit phénomène. De surcroît, malgré l’entrée en vigueur du Règlement 2016/679 relatif à la protection des personnes physiques à l’égard du traitement des données à caractère personnel et à la libre circulation de ces données, il possède une efficacité contestable, ne proposant pas de solution harmonisée au sein de l’Union européenne et étant dépendant de la bonne volonté et des moyens financiers, organisationnels et humains des Etats Membres. Les traitements alternatifs ou complémentaires au droit à la protection des données qui existent au sein de l’Union européenne, qui peuvent être répartis entre outils techniques, contractuels et législatifs, n’offrent qu’une appréhension indirecte du phénomène de circulation via un encadrement de son environnement cloud. Individuellement, ils ne permettent d’appréhender qu’un aspect très réduit du phénomène de circulation, de surcroît avec une efficacité plus ou moins grande. En outre, les outils techniques et contractuels n’ont pas la légitimité attachée aux outils législatifs. Néanmoins, associés les uns aux autres, ils permettent de cibler le phénomène de circulation des données de manière plus globale et efficace. / The legal framework applicable to the gathering and processing by cloud service providers of the personal data of their users raises questions for such users. De facto, there does not now exist an organized legal framework allowing for the regulation, at the European Union level and as a whole, of the flow of personal data in the cloud, whether directly or indirectly. It thus seems necessary to question the way law organized itself consequently and analyze the complementary and/or alternative treatments offered by law, which are less structurally organized and are mosaical, but are more pragmatic, realistic and politically sustainable. Historically, the flow of personal data has been dealt almost exclusively via the specific right to the protection of personal data, which derives from the European Union. Such right, often considered in opposition to the right to the free circulation of data, was initially an emanation of the right to privacy before being established as a fundamental right of the European Union. The treatment provided by the right to the protection of personal data, if it targets directly the data within the flow phenomena, only partly covers such phenomena. In addition, despite the entry into force of the Regulation 2016/679 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, its effectiveness is questionable, not offering any harmonized solution within the European Union and being highly dependent on the goodwill and the financial, organizational and human means of the Member States. The complementary and/or alternative treatments to the right to the protection of personal data that exist within the European Union, which may be allocated among technical, contractual and regulatory tools, only approach the data flow phenomena indirectly by providing a framework to its environment. Individually, they only target one very limited aspect of the data flow phenomena, with more or less effectiveness. Furthermore, technical and contractual tools have not the legitimacy attached to the regulatory tools. However, associated one with another, they allow a more global and efficient targeting of the data flow phenomena.
8

Právní úprava prostředí internetu se zaměřením na ochranu dítěte / Legal regulation of internet with a focus on the child protection

Meixnerová, Eva January 2018 (has links)
Legal regulation of internet with a focus on the child protection This thesis deals with the legal protection of child online, specifically protection from inappropriate content and protection of privacy, respectively personal data protection. In introductory chapter, I briefly introduce the history of internet expansion in Czech Republic and summarize the results of EU Kids Online research. In second chapter, I firstly deal with the definition of the word child and follow with description of legal regulation of child's status in international conventions and Czech law (civil and penal code, administrative law, procedural law and media law including liability of information society service provider). The third chapter is dedicated to phenomena of inappropriate content. I briefly describe individual categories (violence and hazardous elements in computer games, pornographic content and parodies of child content) and then I evaluate how they are affected by legal regulation or if they are regulated by other means. In the most extended fourth chapter, I focus on privacy protection (personal data protection) of the child on the internet. The first part of chapter consists of three chosen judicial cases from Czech Republic that connect children, the internet and the privacy. The second part reviews...
9

A vision for global privacy bridges: Technical and legal measures for international data markets

Spiekermann-Hoff, Sarah, Novotny, Alexander January 2015 (has links) (PDF)
From the early days of the information economy, personal data has been its most valuable asset. Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil". Most of this business is done without the knowledge and active informed consent of the people. But as data breaches and abuses are made public through the media, consumers react. They become irritated about companies' data handling practices, lose trust, exercise political pressure and start to protect their privacy with the help of technical tools. As a result, companies' Internet business models that are based on personal data are unsettled. An open conflict is arising between business demands for data and a desire for privacy. As of 2015 no true answer is in sight of how to resolve this conflict. Technologists, economists and regulators are struggling to develop technical solutions and policies that meet businesses' demand for more data while still maintaining privacy. Yet, most of the proposed solutions fail to account for market complexity and provide no pathway to technological and legal implementation. They lack a bigger vision for data use and privacy. To break this vicious cycle, we propose and test such a vision of a personal information market with privacy. We accumulate technical and legal measures that have been proposed by technical and legal scholars over the past two decades. And out of this existing knowledge, we compose something new: a four-space market model for personal data.
10

L'usurpation d'identité numérique sur Internet : Etude comparée des solutions françaises, mexicaines et nord-américaines / Digital Identity Theft on the Internet : comparative research between the of Mexico , France and the US law / Usurpación de identidad digital : un estudio comparativo de soluciones francesas, mexicanas y norteamericanas

Solis Arredondo, Cynthia 22 January 2018 (has links)
L'identité numérique des personnes est devenue une des plus importantes valeurs immatérielles dans la vie quotidienne, la réputation personnelle, académique, le profil et le déroulement de la carrière professionnelle, mais encore plus que ça, la liberté d'être sur la toile sans avoir peur de l'usurpation de notre identité est l'inspiration de ce travail de thèse. Dans le monde numérique les frontières n'existent plus, les interactions avec les personnes de tout le monde sont de plus en plus courantes, le commerce électronique, les réseaux sociaux, les démarches administratives en ligne, l’échange d’information entre pays et gouvernements, et aussi les rapports romantiques dans les applications mobiles, c’est aussi la raison d’être une étude de droit comparé entre le droit mexicain, français et américain. Dans la première partie nous développons les éléments de l’identité numérique, les données personnelles comprises dans l’ensemble de ce concept qui est à la fois mal compris et en conséquence mal protégé mais aussi très importante dans le développement de l’économie numérique. La deuxième partie, comprend les interprétations de l’identité numérique dans le domaine du droit pénal du droit administratif et du droit civil et commercial. Il y a notamment des différences entre l’interprétation qui fait le droit pénal de l’identité en tant que bien juridique protégé ; en comparaison avec les interprétations du droit administratif qui protège l’identité numérique en tant que donnée personnelle, la mise en œuvre de la reconnaissance internationale du droit à la protection des données à caractère personnel et devient la régulation qui définit les règles de leur traitement, ainsi qui impose les sanctions au traitement illicite et de l’autre côté le droit civil qui d’une part reconnait le droit de la personnalité et le droit à l’image. La troisième partie est dédiée à l’étude de l’identité numérique comme source d’évolution du droit, ainsi qu’aux atteintes à l’ensemble des éléments qui font partie de cette identité. Le droit est toujours derrière l’innovation et malgré tout, à côté de l’évolution de l’humanité, des inventions, de la technologie et du développement, il existe l’évolution des actes illicites et de moyens de commission des délits dans l’endroit numérique. Même si le phénomène de l’usurpation d’identité n’est pas nouveau, il a surmonté dans le monde dans les cinq dernières années grâce aux nouvelles technologies qui permettent de créer, modifier, altérer, falsifier, reproduire et diffuser les données personnelles, photos et identifiants de façon très rapide et au niveau mondial, ce qui permet de vendre dans le marché noir plein de données personnelles pour après faire différents types d’utilisation illicite, notamment l’usurpation d’identité. Ainsi comme la nouvelle technologie sert à la sophistication des activités illicites, il existe un travail des entreprises de sécurité informatique pour lutter de façon technique contre les atteintes aux systèmes d’information, aux réseaux et à l’information, en particulier les atteintes aux données personnelles, donc, à la fin de cette partie on fait une étude des outils numériques crées à cet effet. / The digital identity has become one of the most important immaterial values in everyday life, the personal and academic reputation, the professional profile, but even more than that, the freedom to be on the web without to be afraid of the usurpation of our identity is the inspiration of this thesis work. In the digital world, borders no longer exist, interactions with people around the world are becoming more common, e-commerce, social networks, online procedures, information exchange between countries and governments, and also personal relationships in mobile applications, this is also the reason for being a comparative law study between Mexican, French and American law. In the first part, we develop the elements of digital identity, the personal data included in the whole of this concept which is both misunderstood and therefore poorly protected but also very important in the development of the digital economy. The second part, understands the interpretations of digital identity in the field of criminal law administrative law and civil and commercial law. In particular, there are differences between the interpretation of the criminal law of identity as protected legal property; in comparison with interpretations of the administrative law that protects the digital identity as personal data, the implementation of international recognition of the right to the protection of personal data and becomes the regulation that defines the rules of their treatment, thus imposing sanctions on the unlawful treatment and on the other side the civil right which a party recognizes the right of the personality and the right to the personal image. The third part is dedicated to the study of digital identity as a source of evolution of the law, as well as to the attacks on all the elements that are part of this identity. Law is always behind innovation and yet, alongside the evolution of humanity, inventions, technology and development, there is the evolution of illicit acts and means of committing crimes in the world digital environment. Even though the phenomenon of identity theft is not new, it has overcome in the world in the last five years thanks to new technologies that allow to create, modify, alter, falsify, reproduce and disseminate personal data, photos and identifiers in a very fast and global way, which allows to sell in the deep web full of personal data for later to make different types of illegal use, including identity theft. As the new technology is used for the sophistication of illicit activities, there is a work of computer security companies to fight technically against attacks on information systems, networks and information, especially data breaches of personal data, so at the end of this part we do a study of digital tools created for this purpose.

Page generated in 0.0898 seconds