• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 9
  • 2
  • Tagged with
  • 41
  • 41
  • 21
  • 18
  • 13
  • 10
  • 9
  • 9
  • 9
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Rekrytering 2.0 : - En fara för arbetssökandes personliga integritet?

Almquist, Matilda, Brandt, Camilla January 2014 (has links)
This paper examines how recruiters use social media during their recruitment process. The paper focuses on the staffing industry and will further examine how recruiters are handling jobseekers personal privacy when they are using social media in a recruitment process. The paper are trying to understand the meaning of what personal integrity means and how or if recruiters show consideration to this in a recruitment process when they are using social media as a recruitment tool.   Our result demonstrates that, today recruiters use social media daily to conduct background checks on job applicants. There are no clear instructions and rules on how recruiters should handle background checks through social media. Recruiters believe that job seekers are responsible for the information contained on the their social media. Recruiters do not see anything wrong with their actions when they choose to do background checks on job applicants through social media. If we look at the factors that violates an individual's privacy, can we conclude that recruits approach could be classified as a violation of jobseekers' personal integrity.
2

Indoor Location Surveillance : Utilizing Wi-Fi and Bluetooth Signals

Hörnlund, Emil, Schenström, Rasmus January 2019 (has links)
Personal information nowadays have become valuable for many stakeholders. We want to find out how much information someone can gather from our daily devices such as a smartphone, using some budget devices together with some programming knowledge. Can we gather enough information to be able to determine a location to a target device? The main objectives of our bachelor thesis is to determine the accuracy of positioning for nearby personal devices using trilateration of short-distance communications (Wi-Fi vs Bluetooth). But also, how much and what information our devices leak without us knowing with respect to personal integrity. We collected Wi-Fi and Bluetooth data in total from four target devices. Two different experiments were executed, calibration experiment and visualization experiment. The data were collected by capturing the Wi-Fi and Bluetooth Received Signal Strength Indication(RSSI) transmitted wirelessly from target devices. We then apply a method called trilateration to be able to pinpoint a target to a location. In theory, Bluetooth signals are twice as accurate as Wi-Fi signals. In practise, we were able to locate a target device with an accuracy of 5 - 10 meters. Bluetooth signals are stable but have long response time while Wi-Fi signals have short response time but high fluctuation in the RSSI values. The idea itself, being able to determine a handheld device position is not impossible, as can be seen from our results. It may though require more powerful hardware to secure an acceptable accuracy. On the other hand, achieving this kind of results from such a cheap hardware as Raspberry Pi:s are truly amazing.
3

Personlig integritet på Internet : En studie om attityder / Privacy on the Internet : A study of attitudes

Lindholm, Sara, Nandorf, Moa January 2010 (has links)
The internet has fundamentally changed the way people communicate. With all the information that we are sharing over the internet, and the ways which companies want to use our information, the importance of keeping our private information secure has increased. This thesis aims to discover what attitudes internet users have against privacy on the internet, and what – if anything – they are doing to protect their personal privacy. We distributed an online survey to internet users in the Stockholm area, and conducted three interviews with persons in our target population. The results of these studies show that people in general are very aware of privacy concerns on the internet, but that their attitudes toward how important personal privacy on the internet is, differ somewhat. / Internet har fundamentalt förändrat sättet som vi människor kommunicerar. Med all den information som vi delar med oss av över internet, och de olika sätten som företag vill använda vår information, så har vikten av att hålla viss information skyddad/privat/säker ökat. Denna uppsats ämnar att undersöka vilka attityder internetanvändare har till personlig integritet på internet, och vad – om något – de gör för att skydda sin personliga integritet. Vi delade ut en webbaserad enkät till internetanvändare i Stockholms län, och genomförde tre intervjuer med personer i vår målgrupp. Resultaten av dessa studier visar att människor generellt är väldigt medvetna om vikten att vara privat på internet, men att deras attityder mot hur viktigt personlig integritet på internet är, varierar.
4

Health care encounters of women in abusive relationships: A process of protecting personal integrity

Fishwick, Nancy Jean January 1993 (has links)
No description available.
5

Ochrana osobnosti v civilním procesu / Protection of personal rights in civil procedure

Gumuláková, Monika January 2011 (has links)
The aim of this dissertation is to describe and analyse individual stages of a civil process for the protection of personal integrity. The civil process is a unique stream, within which there is a protection of personal rights offered to individuals. Immaterial damage caused by unauthorized interference in such important personal right such as rights of personal integrity without doubt are, is often correctly replaced only by the judicial decision. For this reason, it requires knowledge of both the substantive civil law, which underlines the protection of the rights of personal integrity, as well as civil procedure law, in which the substantive law is being implemented. The content of this dissertation is the analysis of the various parts of the judicial process from filing an action for protection of personal integrity to the court's decision, enforcement and execution in matters of protection of personal integrity. The dissertation illustrates the complex picture into the issues of civil proceedings in the matters of protection of personal integrity and quotes directly from court decisions in each of the stages of the proceedings. Given the general arrangements for the protection of personal integrity the report of judgment and decisions is one of the main sources of knowledge during the civil...
6

Från en ung kvinnas synsätt : En kvalitativ studie om personlig integritet på sociala medier / From a young woman's perspective : A qualitative study about personal integrity on social media

Ohlsson, Annie January 2016 (has links)
Even though lots of social media companies do not utilize all the information collected by the end-users today, no one knows what type of information they may want in the future. Accepting an End-User License Agreement (EULA) may imply that the company has the permission to gather any personal information, without having to ask for the end-users permission again as the information is already being stored in the database of the company. Young women is today one of the groups that is sharing, publishing and consuming the most information on social media. For that reason it is intreguing to study how young women are relating to the personal integrity on social media. The study concludes that there is a wide variation of how the women relates to integrity on the social media.
7

Öppna myndighetsdata och personlig integritet : Hur geografiska aggregeringar bevarar personlig integritet och användbarhet i öppna data

Älvgren, Ebba January 2019 (has links)
Denna studie undersöker hur myndigheter kan öppna upp data som innehåller personuppgifter genom att geografiskt aggregera datamaterial för att bevara personlig integritet. Personlig integritet definieras i denna kontext i enlighet med dataskyddsförordningen som skyddet av personuppgifter. De aggregeringar som utreddes är de arealbaserade svenska områdena SAMS, DESO och Kommuner. Även Bespoke-neighborhood-metoden k-närmaste granne utvärderades i ett spann som gick från 5 till 1280 individer. En metod skapades för att kvantifiera hur identifierbara individer är utifrån sannolikheten att uppskatta att en personuppgift tillhör en individ. Användbarheten av datamaterialet operationaliserades som hur nära rådata det var i geografisk detaljnivå. Resultatet blev att metoden ”aggregeringar av k-närmaste granne” är den mest anpassningsbara och användbara metoden för att bevara personlig integritet och användbarhet när data aggregeras.
8

Information Security in Home Healthcare

Åhlfeldt, Rose-mharie January 2001 (has links)
<p>Healthcare is very information-intensive. Hence, it has become necessary to use the support of computers in order to efficiently improve such an information-intensive organisation.</p><p>This thesis points out deficiencies in the area of information security in home healthcare regarding personal integrity and secrecy. Home healthcare is, in Sweden, performed by the municipalities. The work is based on the recommendations and common advice for processing of personal data compiled by the Data Inspection Board. Two municipalities in the Västra Götaland Region have been investigated. One of the municipalities has a manual system and the other has a computerized system for personal data management.</p><p>The work includes a field study where persons from both municipalities have been observed. It also includes interviews based on the comprehensive questions from the Data Inspection Board and questions arisen from the observations.</p><p>The work shows that a very clear need of training among personnel involved in home healthcare. It also shows the need for elaborate security measures including levels on access profiles. A weak point concerning security is also the heavy use of facsimile transmission for information distribution.</p>
9

Belastningsregister : En balansgång med den personliga integriteten

Gallardo, Wiktor January 2014 (has links)
At the time of the study, there is no law to prevent an employer from doing criminal background checks. Employers for School and childcare have to do criminal background checks before hiring but the background checks have increased significantly in other industries as well. The aim of this thesis is to analyze and explain what interest employers may have in jobseekers history and how it can affect people’s privacy. To do this I have used right dogmatic approach combined with four interviews with different employers to get their perspective on the subject. What the results tell us are that employers generally don't deliberate the purpose of using criminal background checks. Instead they do it mechanistically without much thought. Jobseekers personal integrity then gets pushed aside for. Theory says that criminal background checks become a major obstacle for ex-offenders in their getting back to life of law-abiding. Therefore it would be better if employers wrote down their reasons for background checks in some kind of policy documents. Most likely many employers will then realize that using other methods can fulfill their interest. / Vid studiens tidpunkt finns det inget lagligt hinder för att arbetsgivare får begära utdrag ur belastningsregistret ifrån arbetssökande. Inom skol och barnomsorg är detta ett krav på arbetsgivare men registerkontroll har ökat kraftigt även i andra branscher. Denna uppsats syftar till att beskriva och analysera intresseavvägningen mellan arbetsgivarens intresse av registerkontroll och arbetssökandes personliga integritet. För att besvara studiens frågeställningar har rättsdogmatisk metod tillämpats och kompletterats av fyra intervjuer med arbetsgivare ifrån olika yrkesbranscher. Vad som framgår av både teori och empiri är att arbetsgivare lägger förvånansvärt lite tanke på hanteringen av registerkontrollen. Studien resulterar i en stark uppmaning till att arbetsgivare som i dagsläget kräver utdrag ur belastningsregister se över sitt syfte med registerkontroll. Ifall där finns ett gediget syfte bör dessa antecknas i någon form av policydokument, men stor chans är att arbetsgivarens intresse kan tillgodoses på annat vis. Vi vet nämligen att registerkontroll utgör ett stort hinder för före detta kriminella att komma tillbaka till ett lagligt liv.
10

Information Security in Home Healthcare

Åhlfeldt, Rose-Mharie January 2001 (has links)
Healthcare is very information-intensive. Hence, it has become necessary to use the support of computers in order to efficiently improve such an information-intensive organisation. This thesis points out deficiencies in the area of information security in home healthcare regarding personal integrity and secrecy. Home healthcare is, in Sweden, performed by the municipalities. The work is based on the recommendations and common advice for processing of personal data compiled by the Data Inspection Board. Two municipalities in the Västra Götaland Region have been investigated. One of the municipalities has a manual system and the other has a computerized system for personal data management. The work includes a field study where persons from both municipalities have been observed. It also includes interviews based on the comprehensive questions from the Data Inspection Board and questions arisen from the observations. The work shows that a very clear need of training among personnel involved in home healthcare. It also shows the need for elaborate security measures including levels on access profiles. A weak point concerning security is also the heavy use of facsimile transmission for information distribution.

Page generated in 0.0576 seconds