• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 69
  • 16
  • 11
  • 8
  • 6
  • 5
  • 5
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 146
  • 146
  • 64
  • 62
  • 46
  • 38
  • 33
  • 24
  • 24
  • 24
  • 21
  • 20
  • 16
  • 16
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

La surveillance de l'utilisation d'Internet au travail : guide des droits et obligations des employeurs

Rompré, Sophie 06 1900 (has links)
Tout employeur qui fournit l'accès Internet au sein de son entreprise a intérêt à surveiller l'usage qui en est fait par ses employés, que ce soit pour maximiser les avantages ou pour réduire les risques liés à l'utilisation d'Internet au travail. Tout employeur a d'ailleurs le droit d'exercer une telle surveillance, sous réserve toutefois des droits des personnes surveillées. La mise en place d'une surveillance de l'utilisation d'Internet au travail peut porter atteinte à la vie privée des employés ou à leur droit à des conditions de travail justes et raisonnables, et peut également porter atteinte au droit à la vie privée des tiers indirectement visés par la surveillance. Dans ce contexte, afin de s'assurer que la surveillance est exercée dans les limites de ses droits, l'employeur doit franchir deux étapes de réflexion essentielles. L'employeur doit en premier lieu déterminer le niveau d'expectative raisonnable de vie privée des personnes surveillées, lequel niveau s'apprécie à la lumière d'une série de facteurs. L'employeur doit par ailleurs respecter les critères de rationalité et de proportionnalité. Ces critères requièrent notamment que l'employeur identifie les motifs sous-jacents à la surveillance ainsi que la manière dont la surveillance sera exercée. Une fois ces deux étapes franchies, l'employeur sera en mesure d'identifier les obligations auxquelles il est soumis dans le cadre de la mise en place de la surveillance. / All employers providing Internet access to their employees should implement Internet monitoring in the workplace, to increase the benefits and reduce the risks related to Internet use at work. Employers have the right to implement this kind of monitoring subject, however, to the rights of employees and third parties. The implementation of Internet monitoring within the workplace can affect employees' privacy and the right to fair and reasonable conditions of employment, as well as the rights of third parties who may be indirectly subject to monitoring. In this context, the employer should go through two steps of reasoning. The employer should first determine the level of reasonable expectation of privacy of all individuals monitored, which level is assessed in the light of numerous factors. The employer must also meet the criteria of rationality and proportionality. These criteria require that the employer identifies the reasons behind monitoring, and how monitoring will be exercised. After these two steps, the employer will be able to identify the obligations to which he is submitted through the implementation of Internet monitoring.
112

Facebook et les dispositifs de traçabilité vus sous l’angle du droit canadien

Abdelkamel, Abdelmadjid 04 1900 (has links)
Aujourd’hui, on parle du Web social. Facebook par exemple, porte bien la marque de son époque ; il est devenu le réseau social le plus convoité dans le monde. Toutefois, l’entreprise a été souvent critiquée en raison de sa politique qui porte atteinte à la vie privée des personnes. Par le truchement de ses modules sociaux, Facebook a le potentiel de collecter et d’utiliser des informations considérables sur les internautes à leur insu et sans leur consentement. Ce fait est malheureusement méconnu de la majorité d’entre eux. Certes, l’entreprise doit vivre économiquement et l’exploitation des renseignements personnels constitue pour elle une source de revenu. Toutefois, cette quête de subsistance ne doit pas se faire au détriment de la vie privée des gens. En dépit des outils juridiques dont le Canada dispose en matière de protection de la vie privée, des entreprises du Web à l’image de Facebook réussissent à les contourner. / Today we talk about the social Web. Facebook for example bears the mark of its time, as it becomes the most coveted social networking Web site in the world. However, the company has been criticized due to its policy that violates people's privacy. Through its social plugins, Facebook has the potential to collect considerable amounts of information about users without their knowledge and without their consent, a fact which is unknown to most of them. Certainly, the company must ensure its economic stability through these activities. However, this quest for subsistence should not be to the detriment of people's privacy. Canada has legal tools for the protection of privacy that allow users to deal with this kind of threat. However, Web companies such Facebook succeed to circumvent the law.
113

Les enjeux juridiques concernant les nouveaux modèles d’affaires basés sur la commercialisation des données

Chevalier, Michael 12 1900 (has links)
Cet essai est présenté en tant que mémoire de maîtrise dans le cadre du programme de droit des technologies de l’information. Ce mémoire traite de différents modèles d’affaires qui ont pour caractéristique commune de commercialiser les données dans le contexte des technologies de l’information. Les pratiques commerciales observées sont peu connues et l’un des objectifs est d’informer le lecteur quant au fonctionnement de ces pratiques. Dans le but de bien situer les enjeux, cet essai discutera d’abord des concepts théoriques de vie privée et de protection des renseignements personnels. Une fois ce survol tracé, les pratiques de « data brokerage », de « cloud computing » et des solutions « analytics » seront décortiquées. Au cours de cette description, les enjeux juridiques soulevés par chaque aspect de la pratique en question seront étudiés. Enfin, le dernier chapitre de cet essai sera réservé à deux enjeux, soit le rôle du consentement et la sécurité des données, qui ne relèvent pas d’une pratique commerciale spécifique, mais qui sont avant tout des conséquences directes de l’évolution des technologies de l’information. / This essay is submitted as part of a master's thesis in Information Technology Law. This thesis discusses different business models that have the common feature of commercializing data in the context of Information Technologies. One of the goals of this thesis is to inform the reader about the workings of the studied business practices, as they are not widely known. First, in order to situate the issues, this essay will consider the theoretical concepts of Privacy and Personal Information Protection. Once the review of Data Protection and Privacy has been established, this thesis will further explore Data Brokerage, Cloud Computing and Analytic Solutions as practices. Over the course of this description, the legal issues raised by each aspect of the aforementioned practices will be studied. Finally, the last chapter of the thesis will be dedicated to two issues that are not limited to the scope of a specific business practice, but are direct consequences of the evolution of Information Technologies: the role of Consent and Data Security.
114

Redéfinir la notion de donnée personnelle dans le contexte des nouvelles technologies de l'Internet / Redefining Personal Information in the Context of the Internet

Gratton, Eloïse 30 October 2012 (has links)
Vers la fin des années soixante, face à l’importance grandissante de l’utilisation des ordinateurs par les organisations, une définition englobante de la notion de donnée personnelle a été incorporée dans les lois en matière de protection de données personnelles (« LPDPs »). Avec Internet et la circulation accrue de nouvelles données (adresse IP, données de géolocalisation, etc.), il y a lieu de s’interroger quant à l’adéquation entre cette définition et cette réalité. Aussi, si la notion de donnée personnelle, définie comme étant « une donnée concernant un individu identifiable » est toujours applicable à un tel contexte révolutionnaire, il n’en demeure pas moins qu’il importe de trouver des principes interprétatifs qui puissent intégrer ces changements factuels. La présente thèse vise à proposer une interprétation tenant compte de l’objectif recherché par les LPDPs, à savoir protéger les individus contre les risques de dommage découlant de la collecte, de l’utilisation ou de la divulgation de leurs données. Alors que la collecte et la divulgation des données entraîneront surtout un risque de dommage de nature subjective (la collecte, un sentiment d’être sous observation et la divulgation, un sentiment d’embarras et d’humiliation), l’utilisation de ces données causera davantage un dommage objectif (dommage de nature financière, physique ou discriminatoire). La thèse propose plusieurs critères qui devraient être pris en compte pour évaluer ce risque de dommage ; elle servira de guide afin de déterminer quelles données doivent être qualifiées de personnelles, et fera en sorte que les LPDPs soient le plus efficaces possibles dans un contexte de développements technologiques grandissants. / In the late sixties, with the growing use of computers by organizations, a very broad definition of personal information as “information about an identifiable individual” was elaborated and has been incorporated in data protection laws (“DPLs”). In more recent days, with the Internet and the circulation of new types of information (IP addresses, location information, etc), the efficiency of this definition may be challenged. This thesis aims at proposing a new way of interpreting personal information. Instead of using a literal interpretation, an interpretation which takes into account the purpose behind DPLs will be proposed, in order to ensure that DPLs do what they are supposed to do: address or avoid the risk of harm to individuals triggered by organizations handling their personal information. While the collection or disclosure of information may trigger a more subjective kind of harm (the collection, a feeling of being observed and the disclosure, embarrassment and humiliation), the use of information will trigger a more objective kind of harm (financial, physical, discrimination, etc.). Various criteria useful in order to evaluate this risk of harm will be proposed. The thesis aims at providing a guide that may be used in order to determine whether certain information should qualify as personal information. It will provide for a useful framework under which DPLs remain efficient in light of modern technologies and the Internet.
115

Facebook et les dispositifs de traçabilité vus sous l’angle du droit canadien

Abdelkamel, Abdelmadjid 04 1900 (has links)
Aujourd’hui, on parle du Web social. Facebook par exemple, porte bien la marque de son époque ; il est devenu le réseau social le plus convoité dans le monde. Toutefois, l’entreprise a été souvent critiquée en raison de sa politique qui porte atteinte à la vie privée des personnes. Par le truchement de ses modules sociaux, Facebook a le potentiel de collecter et d’utiliser des informations considérables sur les internautes à leur insu et sans leur consentement. Ce fait est malheureusement méconnu de la majorité d’entre eux. Certes, l’entreprise doit vivre économiquement et l’exploitation des renseignements personnels constitue pour elle une source de revenu. Toutefois, cette quête de subsistance ne doit pas se faire au détriment de la vie privée des gens. En dépit des outils juridiques dont le Canada dispose en matière de protection de la vie privée, des entreprises du Web à l’image de Facebook réussissent à les contourner. / Today we talk about the social Web. Facebook for example bears the mark of its time, as it becomes the most coveted social networking Web site in the world. However, the company has been criticized due to its policy that violates people's privacy. Through its social plugins, Facebook has the potential to collect considerable amounts of information about users without their knowledge and without their consent, a fact which is unknown to most of them. Certainly, the company must ensure its economic stability through these activities. However, this quest for subsistence should not be to the detriment of people's privacy. Canada has legal tools for the protection of privacy that allow users to deal with this kind of threat. However, Web companies such Facebook succeed to circumvent the law.
116

La surveillance de l'utilisation d'Internet au travail : guide des droits et obligations des employeurs

Rompré, Sophie 06 1900 (has links)
Tout employeur qui fournit l'accès Internet au sein de son entreprise a intérêt à surveiller l'usage qui en est fait par ses employés, que ce soit pour maximiser les avantages ou pour réduire les risques liés à l'utilisation d'Internet au travail. Tout employeur a d'ailleurs le droit d'exercer une telle surveillance, sous réserve toutefois des droits des personnes surveillées. La mise en place d'une surveillance de l'utilisation d'Internet au travail peut porter atteinte à la vie privée des employés ou à leur droit à des conditions de travail justes et raisonnables, et peut également porter atteinte au droit à la vie privée des tiers indirectement visés par la surveillance. Dans ce contexte, afin de s'assurer que la surveillance est exercée dans les limites de ses droits, l'employeur doit franchir deux étapes de réflexion essentielles. L'employeur doit en premier lieu déterminer le niveau d'expectative raisonnable de vie privée des personnes surveillées, lequel niveau s'apprécie à la lumière d'une série de facteurs. L'employeur doit par ailleurs respecter les critères de rationalité et de proportionnalité. Ces critères requièrent notamment que l'employeur identifie les motifs sous-jacents à la surveillance ainsi que la manière dont la surveillance sera exercée. Une fois ces deux étapes franchies, l'employeur sera en mesure d'identifier les obligations auxquelles il est soumis dans le cadre de la mise en place de la surveillance. / All employers providing Internet access to their employees should implement Internet monitoring in the workplace, to increase the benefits and reduce the risks related to Internet use at work. Employers have the right to implement this kind of monitoring subject, however, to the rights of employees and third parties. The implementation of Internet monitoring within the workplace can affect employees' privacy and the right to fair and reasonable conditions of employment, as well as the rights of third parties who may be indirectly subject to monitoring. In this context, the employer should go through two steps of reasoning. The employer should first determine the level of reasonable expectation of privacy of all individuals monitored, which level is assessed in the light of numerous factors. The employer must also meet the criteria of rationality and proportionality. These criteria require that the employer identifies the reasons behind monitoring, and how monitoring will be exercised. After these two steps, the employer will be able to identify the obligations to which he is submitted through the implementation of Internet monitoring.
117

The personal information management behaviour of academics : implications for librarians' support

Newton-Smith, Carol Jean Unknown Date (has links)
The aim of this study was to better understand how academics manage their personal information and therefore to have a basis for planning for appropriate support by librarians. There did not appear to be any current relevant research but from a review of previous studies, in which the predominant management strategy included a card personal index, a model was drawn up and validated by a number of academics would be using electronic personal indexes to manage their personal collections. The research methods selected for this study were in-depth interviews and a questionnaire survey. The main findings were that academics do not use a personal index (card or electronic) to manage their personal collections and they also use a language different from that of librarians to describe their activities of personal information management. Academics manage their information by organising their personal collection according to their working subject framework. to expand their collections they work outwards from items of known quality or follow the advice of colleagues to locate such items. To become aware of the new material in the library (or elsewhere), academics prefer to browse new journals and books, rather than use a subject index. Databases are used for confirmation of reference details and citation indexes are used to work outwards from documents of known quality. The output of references is by the use of word processing software with a few academics using bibliographic software just for this function. The conclusion of the study were that academics manage their personal information in a dissimilar way to that expected by librarians. Academics are managing ideas not documents and their methods of personal information management reflect the need to manage these ideas and the associated connective thought process. Librarians can better assist academics by designing library services that facilitate academics' ideas management. Suggestions for improved support include the development of services that enable browsing, the linking of ideas between research publications in different disciplines and the provision of a service to confirm reference details.
118

Traque-moi si je le veux : à la recherche d'un cadre juridique entourant la publicité comportementale

Jetté, Virginie 08 1900 (has links)
No description available.
119

L'efficacité du régime de responsabilité civile comme mesure de contrainte au respect de l'obligation de sécurité des renseignements personnels

Lafont, Isabelle 11 1900 (has links)
No description available.
120

Conhecimento e Internet = busca, exploração e a familiaridade / Knowledge and the Internet : search, exploration and the familiarity

Figueira Filho, Fernando Marques, 1981- 19 August 2018 (has links)
Orientador: Paulo Lício de Geus / Tese (doutorado) - Universidade Estadual de Campinas, Instituto de Computação / Made available in DSpace on 2018-08-19T00:13:49Z (GMT). No. of bitstreams: 1 FigueiraFilho_FernandoMarques_D.pdf: 2794727 bytes, checksum: a731af5c0a52a8d8ee1e3dcb39119b01 (MD5) Previous issue date: 2011 / Resumo: A Internet parece estar realizando o sonho de muitos visionários ao angariar parcela crescente do conhecimento humano e tornar seu acesso mais fácil. Entretanto, o modelo de interação para busca e exploração desse conhecimento é ainda similar àquele utilizado, por exemplo, por bibliotecários para consultar acervos de livros e publicações. Usuários entram com uma consulta constituída por palavras-chave e recebem como resposta uma lista de resultados que contém os termos utilizados na consulta. A exploração do conhecimento disponível através desse modelo apresenta dois problemas. Primeiro, os sistemas de busca são implementados sob o pressuposto que o conjunto de palavras-chave capaz de filtrar documentos relevantes é familiar ao usuário. No entanto, a heterogeneidade dos usuários da Internet frente ao imenso volume de informação disponível implica em diferentes níveis de familiaridade dos usuários com o conhecimento disponível. Segundo, a interpretação dos resultados retornados pelo sistema, de acordo com esse modelo, é delegada ao indivíduo, de modo que o usuário torna-se responsável por analisar e sintetizar o conteúdo filtrado para cumprir com os seus objetos de busca. Isto torna-se um problema em atividades de busca de longo prazo, que visam explorar o conhecimento para fins de aprendizado, revisão bibliográfica, dentre outras. A presente tese baseia-se em arcabouços teóricos das ciências sociais e em estudos empíricos para caracterizar e propor soluções para esses problemas. Os resultados mostram que a exploração do conhecimento na Internet depende de um conjunto de artefatos externos aos sistemas de busca atuais. Também mostram que a interação dos usuários com esses artefatos e com agentes humanos é parte integrante das atividades cognitivas desempenhadas para exploração do conteúdo disponível na Internet. Diferentes níveis de familiaridade demandam alternativas ao modelo de interação consulta-resposta e sugerem a integração de tecnologias da web social no desenvolvimento de sistemas de informação que visam suportar tarefas de busca exploratórias / Abstract: The Internet seems to be accomplishing the dream of visionaries by collecting part of the growing human knowledge and making its access easier. However, the interaction model for search and exploration of this knowledge is still similar to the one used, for example, by librarians to query over collections of books and publications. Users formulate queries that are constituted by keywords and receive a list of results in return, which contains the terms used in the entered query. The exploration of the available knowledge through this model presents two main problems. First, search systems are implemented under the assumption that the set of keywords to filter relevant documents is familiar to the user. But the heterogeneity of Internet users when faced to the huge amount of available information implies in different levels of familiarity of these same users regarding the available knowledge. Second, the interpretation of results returned by the system, according to this model, is delegated to the individual, and the user becomes responsible for analyzing and synthesizing the filtered content in order to meet his/her search goals. This becomes a problem in the case of long term search activities, that aims at exploring knowledge for purposes of learning, bibliography review and so on. This thesis is based on theoretical frameworks of the social sciences and on empirical studies to characterize and come up with solutions to those problems. The findings show that knowledge exploration on the Internet depends on a set of artifacts that are external to the search systems currently available. They also show that the user interaction with these artifacts and also with human agents is a fundamental part of the cognitive activities performed for knowledge exploration on the Internet. Different levels of familiarity demand alternatives to the query-response model and suggest the integration with social web technologies to develop information systems that support exploratory search tasks / Doutorado / Ciência da Computação / Doutor em Ciência da Computação

Page generated in 0.1468 seconds