• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 69
  • 47
  • 36
  • 35
  • 19
  • 6
  • 6
  • 5
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 240
  • 240
  • 119
  • 85
  • 56
  • 47
  • 47
  • 45
  • 43
  • 40
  • 36
  • 29
  • 28
  • 27
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

När hjälp och stöd blir till bojor och hinder : En kvalitativ studie om socialsekreterares arbete med att återintegrera våldsutsatta kvinnor med skyddade personuppgifter i samhället.

Björndahl, Linda, Saxe, Cecilia January 2017 (has links)
In the society of today there is a gender power order where men are parent of women. This superiority tends to permeate and affect institutions and organizations of the society. The responsibility of abused women in Sweden lies with the social services and is controlled by the social services act. Together with the national guidelines and common advice of the social board the idea is for the business to form strategies and actions to provide help and support for abused women. The purpose of our investigation is to see how social workers are working to reintegrate women who live with protected personal data in the society based on the right to be self sufficient and independent. A qualitative study using semi-structured interviews were conducted. The empirical data, based on six social secretary experience, evaluated through a thematic analysis and linked to previous research and theoretical perspectives SOC and gender power. The conclusions we have reached are that the work is affected by both experience, way of work, as well as guidelines and limitations in the legislation. The activities offered are helping women in the acute phase but the long termed work have several limitations mainly for protected women. / I dagens samhälle råder en könsmaktsordning där män är överordnade kvinnor. Överordningen tenderar även att genomsyra samhällets institutioner och organisationer. Ansvaret för våldsutsatta kvinnor i Sverige ligger på socialtjänsten och regleras i socialtjänstlagen. Tillsammans med Socialstyrelsens nationella riktlinjer och allmänna råd utformas strategier och insatser för att ge hjälp och stöd till våldsutsatta kvinnor. Syftet med undersökning var att titta på hur socialsekreterare arbetar för att återintegrera kvinnor med skyddade uppgifter i samhället, utifrån rätten att vara självförsörjande och självständig. En kvalitativ studie med semistrukturerade intervjuer genomfördes. Det empiriska materialet, baserat på sex socialsekreterares erfarenheter, utvärderades genom en tematiskanalys och kopplades till tidigare forskning och de teoretiska perspektiven KASAM och könsmaktsordningen. Våra slutsatser är att socialsekreterarnas arbete påverkas av såväl erfarenhet, arbetsformer, riktlinjer samt begränsningar i lagstiftningen. Erbjudna insatser hjälper de våldsutsatta kvinnorna i den akuta fasen men i det långsiktiga arbetet återfinns åtskilliga begränsningar främst för skyddade kvinnor.
132

Gestionnaire de vie privée : un cadre pour la protection de la vie privée dans les interactions entre apprenants

Selmi, Mouna 02 1900 (has links)
L’évolution continue des besoins d’apprentissage vers plus d’efficacité et plus de personnalisation a favorisé l’émergence de nouveaux outils et dimensions dont l’objectif est de rendre l’apprentissage accessible à tout le monde et adapté aux contextes technologiques et sociaux. Cette évolution a donné naissance à ce que l’on appelle l'apprentissage social en ligne mettant l'accent sur l’interaction entre les apprenants. La considération de l’interaction a apporté de nombreux avantages pour l’apprenant, à savoir établir des connexions, échanger des expériences personnelles et bénéficier d’une assistance lui permettant d’améliorer son apprentissage. Cependant, la quantité d'informations personnelles que les apprenants divulguent parfois lors de ces interactions, mène, à des conséquences souvent désastreuses en matière de vie privée comme la cyberintimidation, le vol d’identité, etc. Malgré les préoccupations soulevées, la vie privée en tant que droit individuel représente une situation idéale, difficilement reconnaissable dans le contexte social d’aujourd’hui. En effet, on est passé d'une conceptualisation de la vie privée comme étant un noyau des données sensibles à protéger des pénétrations extérieures à une nouvelle vision centrée sur la négociation de la divulgation de ces données. L’enjeu pour les environnements sociaux d’apprentissage consiste donc à garantir un niveau maximal d’interaction pour les apprenants tout en préservant leurs vies privées. Au meilleur de nos connaissances, la plupart des innovations dans ces environnements ont porté sur l'élaboration des techniques d’interaction, sans aucune considération pour la vie privée, un élément portant nécessaire afin de créer un environnement favorable à l’apprentissage. Dans ce travail, nous proposons un cadre de vie privée que nous avons appelé « gestionnaire de vie privée». Plus précisément, ce gestionnaire se charge de gérer la protection des données personnelles et de la vie privée de l’apprenant durant ses interactions avec ses co-apprenants. En s’appuyant sur l’idée que l’interaction permet d’accéder à l’aide en ligne, nous analysons l’interaction comme une activité cognitive impliquant des facteurs contextuels, d’autres apprenants, et des aspects socio-émotionnels. L'objectif principal de cette thèse est donc de revoir les processus d’entraide entre les apprenants en mettant en oeuvre des outils nécessaires pour trouver un compromis entre l’interaction et la protection de la vie privée. ii Ceci a été effectué selon trois niveaux : le premier étant de considérer des aspects contextuels et sociaux de l’interaction telle que la confiance entre les apprenants et les émotions qui ont initié le besoin d’interagir. Le deuxième niveau de protection consiste à estimer les risques de cette divulgation et faciliter la décision de protection de la vie privée. Le troisième niveau de protection consiste à détecter toute divulgation de données personnelles en utilisant des techniques d’apprentissage machine et d’analyse sémantique. / The emergence of social tools and their integration in learning contexts has fostered interactions and collaboration among learners. The consideration of social interaction has several advantages for learners, mainly establishing new connections, sharing personal experiences and receiving assistance which may improve learning. However, the amount of personal information that learners disclose in these interactions, raise several privacy risks such as identity theft and cyberbullying which may lead to serious consequences. Despite the raised concerns, privacy as a human fundamental right is hardly recognized in today’s social context. Indeed, the conceptualization of privacy as a set of sensitive data to protect from external intrusions is no longer effective in the new social context where the risks come essentially from the self-disclosing behaviors of the learners themselves. With that in mind, the main challenge for social learning environments is to promote social interactions between learners while preserving their privacy. To the best of our knowledge, innovations in social learning environments have only focused on the integration of new social tools, without any consideration of privacy as a necessary factor to establish a favorable learning environment. In fact, integrating social interactions to maintain learners’ engagement and motivation is as necessary as preserving privacy in order to promote learning. Therefore, we propose, in this research, a privacy framework, that we called privacy manager, aiming to preserve the learners’ privacy during their interactions. Considering social interaction as a strategy to seek and request peers’ help in informal learning contexts, we analyze learners’ interaction as a cognitive activity involving contextual, social and emotional factors. Hence, our main goal is to consider all these factors in order to find a tradeoff between the advantages of interaction, mainly seeking peer feedback, and its disadvantages, particularly data disclosure and privacy risks. This was done on three levels: the first level is to help learners interact with appropriate peers, considering their learning competency and their trustworthiness. The second level of protection is to quantify potential disclosure risks and decide about data disclosure. The third level of protection is to analyze learners’ interactions in order to detect and discard any personal data disclosure using machine learning techniques and semantic analysis.
133

Nová média shromažďující informace o svém publiku a vztah uživatelů k bezpečnosti dat: kvalitativní studie / New media gathering users data and the attitude of users towards internet security: qualitative study

Laube, David January 2015 (has links)
The theoretical part of the thesis analyzes the topic of new media and how it works with the privacy of its users. On the examples of applications such as Facebook, or Google services, I refer to the intensive and extensive kind of private information, that are stored on the provider's servers. All these data are not just gathered, but also analyzed and evaluated. Private companies use data of its users in such extension like never before. New media and their activities raises new questions about possible misuse of such data. In this thesis I mention a few examples that are somehow related to the topic of privacy and personal data protection. In the practical part I use the tools of qualitative research to explore how the issue of online privacy and data security is perceived by different user groups and how they explain their behavior. I examined whether the privacy issue is an important one and if their online activity in this context is somehow particularly regulated or restricted. For research I chose two groups of respondents - younger users up to 37 years of age and older aged 55 +. I get information from the respondents in the form of semi-structured interview. These were analyzed and I created new conclusions from it.
134

När hjälp och stöd blir till bojor och hinder : En kvalitativ studie om socialsekreterares arbete med att återintegrera våldsutsatta kvinnor med skyddade personuppgifter i samhället.

Björndahl, Linda, Saxe, Cecilia January 2017 (has links)
In the society of today there is a gender power order where men are parent of women. This superiority tends to permeate and affect institutions and organizations of the society. The responsibility of abused women in Sweden lies with the social services and is controlled by the social services act. Together with the national guidelines and common advice of the social board the idea is for the business to form strategies and actions to provide help and support for abused women. The purpose of our investigation is to see how social workers are working to reintegrate women who live with protected personal data in the society based on the right to be self sufficient and independent. A qualitative study using semi-structured interviews were conducted. The empirical data, based on six social secretary experience, evaluated through a thematic analysis and linked to previous research and theoretical perspectives SOC and gender power. The conclusions we have reached are that the work is affected by both experience, way of work, as well as guidelines and limitations in the legislation. The activities offered are helping women in the acute phase but the long termed work have several limitations mainly for protected women. / I dagens samhälle råder en könsmaktsordning där män är överordnade kvinnor. Överordningen tenderar även att genomsyra samhällets institutioner och organisationer. Ansvaret för våldsutsatta kvinnor i Sverige ligger på socialtjänsten och regleras i socialtjänstlagen. Tillsammans med Socialstyrelsens nationella riktlinjer och allmänna råd utformas strategier och insatser för att ge hjälp och stöd till våldsutsatta kvinnor. Syftet med undersökning var att titta på hur socialsekreterare arbetar för att återintegrera kvinnor med skyddade uppgifter i samhället, utifrån rätten att vara självförsörjande och självständig. En kvalitativ studie med semistrukturerade intervjuer genomfördes. Det empiriska materialet, baserat på sex socialsekreterares erfarenheter, utvärderades genom en tematiskanalys och kopplades till tidigare forskning och de teoretiska perspektiven KASAM och könsmaktsordningen. Våra slutsatser är att socialsekreterarnas arbete påverkas av såväl erfarenhet, arbetsformer, riktlinjer samt begränsningar i lagstiftningen. Erbjudna insatser hjälper de våldsutsatta kvinnorna i den akuta fasen men i det långsiktiga arbetet återfinns åtskilliga begränsningar främst för skyddade kvinnor.
135

L'identité personnelle et les réseaux sociaux / Personal identity and social networks

Mahabir, Laetitia-Amanda 14 January 2014 (has links)
L'identité des personnes dans l'espace numérique n'est pas définissable d'une seule manière, et son mode d'expression est multiple. En effet, un individu peut disposer de plusieurs identités dans le numérique et jouer des rôles sociaux différents suivant les contextes sociaux auxquels il est confronté. Mais quels peuvent être les effets de l'usage de ces masques identitaires ? L'identité des personnes dans le cadre des réseaux sociaux renvoie au questionnement de soi, et des autres. Le versant individualiste et le versant communautaire de cette identité constituent la trame de la construction identitaire de l'utilisateur. Aussi, il apparaît que la richesse mais aussi la complexité des réseaux tiennent au fait que le droit confond individu et identité. Le droit repose en effet sur une conception essentialiste de l'identité, par laquelle chacun est acteur de sa propre trajectoire. Mais l'individu ne vit pas seul, il vit en groupe et il est saisi dans un réseau de relations sociales. Aussi, concevoir une identité personnelle en marge de la réalité numérique revient à distinguer la personne de la notion de présence en ligne qui est éminemment déclarative et performative. Cela amène à reconsidérer la place de l'identité dans l'espace numérique. Pour appréhender la question de la construction de l'identité personnelle dans les réseaux sociaux, il faudra aborder les différentes approches qui visent à assurer à chacun une identité qui soit conforme à ses désirs. Il sera également nécessaire d'adapter les mesures existantes à la réalité virtuelle, afin d'établir un régime de l'identité personnelle plus sécurisé et respectueux des droits de la personnalité de chaque utilisateur. / The identity of people in the digital space cannot be defined in one way. Its mode of expression is multiple. In fact, an individual can have several identities in the digital environment. It can also play different social roles according to social contexts that it faces. But what are effects of using identity masks ? The individual's identity within the social networks refers to the self-questioning, and others. The individualistic side and the community side of this identity are the foundation of the building of user's identity. Moreover, it appears that the wealth and the complexity of networks are the result of the confusion made by the law between individual and identity. In fact, the law is based on an essentialist conception of identity, by which each player has its own trajectory. But the individual does not live alone, he lives in a group and it is part of a network of social relations. The identity is made in the interaction of a claimed identity for oneself and assigned by others. Also, develop a personal identity on the fringes of the digital reality is to distinguish the person of the concept of online presence which is eminently declarative and performative.All this leads to reconsider the place of identity in the digital space. To understand the question of the construction of personal identity in social network, different approaches will be detailed. Those approaches are aimed to ensure everyone an identity according his wishes. Also, it will be necessary to adapt the existing measures to the virtual reality, in order to establish a more secure regime of personal identity, in respect of the rights of each user's personnality.
136

La RFID et le droit / RFID and law

Goulvestre, Ann-maël 05 July 2013 (has links)
L'acronyme anglais RFID « Radio Frequency Identification » désigne en français l'identification par radiofréquence, une technologie qui permet d'identifier et de localiser sans contact des objets ou des personnes grâce à une micro-puce qui dialogue par ondes radio avec un lecteur, sur des distances allant de quelques centimètres à une dizaine de mètres. Déjà présente dans notre quotidien, via les cartes d'accès à certains bâtiments notamment, la RFID est appelée à se développer de manière exponentielle dans les années à venir pour concrétiser à terme le futur Internet des objets.À l'instar de toute innovation technologique, la RFID nécessite un environnement juridique pour pouvoir s'épanouir à la fois économiquement et socialement. C'est pourquoi la présente étude se propose d'exposer les diverses problématiques juridiques afférentes à la RFID. Pour assurer le succès d'une technologie émergente, il est nécessaire que les individus aient confiance en elle, sans quoi le marché ne pourra pas démarrer. Afin de générer cette confiance, la sécurité est primordiale, avant tout d'un point de vue technique mais également sur le plan juridique.L'objectif de cette thèse sera d'étudier le cadre juridique applicable à la technologie RFID, à la fois du point de vue de son contenant, le système, et de son contenu, les données. Quels sont les défis juridiques soulevés par cette technologie ? Existe-t-il des textes applicables à la RFID, et quels sont-ils ? Comment le juriste intègre-t-il cette technologie émergente au cadre juridique existant ? La réflexion est menée afin d'apprécier la nature des rapports entretenus entre la RFID et le droit, et leur éventuelle perfectibilité. / The acronym RFID stands for Radio Frequency Identification, a wireless technology that provides the ability to automatically identify and locate tags attached to objects, as well as the person who is actually carrying them. The technology relies on storing and retrieving data, through radio waves by using devices called RFID tags. Those tags are already prevalent in our everyday lives to grant building access control for example. And this is only the beginning, as RFID technology is expected to be one of the main brick of the Internet of things. Like any other new technology, RFID needs a suitable legal framework to get benefits to both consumers and businesses. This work is thus intended to bring up RFID from a legal perspective. Indeed, one of the new technology key successes lies on the way the consumers will grasp it. When looking for economic profits, it is then essential to focus on public perception and consumer confidence related to this technology. And this would not come along without security concern which represents actually the main challenge to face, most of all from a technical perspective, but also from a legal one.For this reason, the proposed work aims at exposing the legal framework which could be applied both to its container (the RFID system) and its content (the RFID data). It is worth analysing the way the legal practitioner can deal with this technology and all its related issues. Are there any specifics legislations on this subject? And if so, what are they? A critical assessment is undertaken to appreciate the substance of the relationships existing between RFID and law, and potential improvement that come along.
137

Pracovněprávní aspekty zaměstnávání HIV pozitivních osob / Labour law aspects of employment of HIV positive persons

Kubová, Karolína January 2019 (has links)
Labour law aspects of employment of HIV positive persons Abstract This thesis describes and analyses problematics of employment of HIV positive persons. The main focus is on the labour law aspects which are specific or problematic regarding HIV positive persons. The text is divided into three chapters. First chapter provides general information about HIV and AIDS and creates a basis for the whole thesis. The description is focused mainly on the medicinal aspects of HIV and AIDS (its progression, treatment, its spreading, means of contagion). Information about perception of the disease in society is also provided. Second chapter revolves around aspects of employment relationships and agreements on work performed outside an employment relationship with HIV positive persons, as well as with employment of HIV positives in security and armed forces. One of the main themes of this chapter is assessment of medical fitness of job applicants and employees in relation with their HIV positivity. Other discussed topics are termination of employment relationships on grounds of employees state of health and personal data protection regarding HIV status of employees. Third chapter analyses matters of discrimination of HIV positive persons in employment relationships. It aims to answer a question whether HIV can be...
138

A necessidade de proteção dos dados pessoais nos arquivos de consumo: em busca da concretização do direito à privacidade

Pezzi, Ana Paula Jacobus 30 August 2007 (has links)
Made available in DSpace on 2015-03-05T17:18:00Z (GMT). No. of bitstreams: 0 Previous issue date: 30 / Nenhuma / O objetivo do presente trabalho é a análise jurídica da proteção de dados pessoais nos arquivos de consumo como forma de concretização do direito à privacidade. O direito à privacidade evoluiu juntamente com a mudança histórica de um Estado Liberal para um Estado Social. Sua compreensão, que partiu de um enfoque negativo, o direito de estar só, agregou um enfoque positivo, que compreende a exigência de ações concretas para sua efetividade. Em razão do impacto informático, esse duplo aspecto está relacionado, de um lado, com o resguardo dos dados e, de outro, pelo direito de acesso, retificação e de esquecimento. A partir desse contexto, se estabelece a necessidade de proteção de dados pessoais para afirmar o livre desenvolvimento da personalidade, principalmente após o deslocamento da pessoa para o centro das relações jurídicas. O trabalho se norteia pela aplicação dos valores positivados na Constituição, fundada no princípio da dignidade humana, que irradia seus efeitos em todo o ordenamento jurídico, o que / This study aims to legally analyze the protection of personal data in consumer files as a way to render privacy law. The right to privacy evolved with the historic change from a liberal State to a social State. Its comprehension, which began with a negative focus, the right to be alone, has gained a positive focus, which comprises the requirement for concrete action to be effective. As a result of the impact of information technology, this double aspect is characterized on the one side by the right to keep data, and on the other by the right to access, rectification and elimination. From this context the need has been established for the protection of personal data to affirm the free development of the personality, mainly after the shifting of the person to the core of legal relations. This work is guided by the application of positive values in the Constitution, based on the principle of human dignity, which irradiates its effects throughout the legal order, which is reflected in the alteration of private le
139

L’utilisation des technologies de l’information et de la communication à l’hôpital face au droit / The use of information and communication technologies in hospitals

Tilman, Laora 28 September 2017 (has links)
L’utilisation des TIC à l’hôpital prend une place de plus en plus importante et son développement ne cesse de croître. Le cadre juridique applicable se révèle cependant complexe à appréhender, composé à la fois de textes de droit commun et de textes plus spécifiques, le tout formant un ensemble pas toujours cohérent. Pour accompagner au mieux l’utilisation des TIC à l’hôpital, le législateur doit trouver le juste équilibre entre cadre propice pour le développement de ces pratiques, protection des droits fondamentaux et sécurisation des pratiques. Or, à l’heure actuelle, le cadre juridique applicable à l’utilisation des TIC à l’hôpital ne permet pas d’assurer cet équilibre délicat. Les pouvoirs publics ont donc un rôle stratégique à jouer dans la sécurisation de l’utilisation des TIC à l’hôpital. Une impulsion nationale doit être donnée en la matière, afin d’assurer la cohérence des projets développés, au travers d’une gouvernance forte. Le cadre juridique doit, quant à lui, être rénové afin d’accompagner l’innovation dans le numérique en santé et assurer la sécurité juridique nécessaire à la bonne utilisation des TIC. Dans ce contexte, les hôpitaux ont un rôle essentiel à jouer afin de sécuriser leurs pratiques / The use of ICT has become increasingly important in hospitals. However, the legal framework structuring its use is very complex to grasp. Indeed, it is made up of general laws as well as specific ones and makes this framework sometimes unconsistent. To provide an optimal legal framework for the ICT to expand safely, the legislator needs to strike the right balance between protecting fundamental rights and securing practices. As the current legal framework does not provide this delicate balance, public authorities have a strategic role to play to ensure a secure use of ICT within hospitals. To guarantee the development of consistent projects, a strong governance has to set up a national leadership. The legal framework needs to be rehabilitated to support digital innovation in Healthcare and to ensure a legal protection required for an appropriate use of ICT. Hospitals have then a key role to play in securing their practices
140

Coleta de dados em redes sociais: privacidade de dados pessoais no acesso via Application Programming Interface / Collection of data from social networks: privacy of personal data through access of the Application Programming Interface / Colecta de datos en redes sociales: privacidad de datos personales en el acceso vía Application Programming Interface

Rodrigues, Fernando de Assis [UNESP] 03 March 2017 (has links)
Submitted by Fernando de Assis Rodrigues (fernando@elleth.org) on 2017-03-08T18:31:59Z No. of bitstreams: 79 final.pdf: 41703816 bytes, checksum: f59b8e221e9bc15e9bc0f2579244c6c6 (MD5) 1.png: 295336 bytes, checksum: 459beda12600ba335b293bc6ab407543 (MD5) 2.png: 4275028 bytes, checksum: 61d7e2aeba17cbb6bc721cd955357559 (MD5) 3.png: 4278867 bytes, checksum: 78190c57f8aa4cae32be9ff4e3c2b8b9 (MD5) 4.png: 3413913 bytes, checksum: d98179cd8a1720ec3a2ffe941f2617e0 (MD5) 5.png: 2572352 bytes, checksum: 094e37b003e0099dd78a1ec54ed78cdd (MD5) 6.png: 36209 bytes, checksum: 9e5d19706c8131e6c8d169b779114605 (MD5) 7.png: 13916308 bytes, checksum: 23c1db3f0340ac1e79a86f73bf8b64d9 (MD5) 8.png: 10016221 bytes, checksum: eae1e977ef51ebdf0f46990ee85f830a (MD5) 10.png: 4823750 bytes, checksum: fddce1fe56bc6e50d5aefc7d88a5599b (MD5) 11.png: 15076 bytes, checksum: 8f025ab18b9c12128f26be839fb7e7c6 (MD5) 12.png: 2034468 bytes, checksum: 73296cbf213f9e58b0e812bb82d65854 (MD5) 13.png: 2124812 bytes, checksum: 84a03f6e7edfd66fa4bdd6ede8f8d5e9 (MD5) 14.png: 2198512 bytes, checksum: dfec659b294b885f1d853c6a475a8fee (MD5) 15.png: 2053157 bytes, checksum: 0feab30e0c892b45939f17644d3000cf (MD5) 16.png: 70960 bytes, checksum: a675706ca5e284a01544b772aa354c35 (MD5) 17.png: 501763 bytes, checksum: 9f41bb83cac460cc7aeb618a3b81c623 (MD5) 18.png: 30898 bytes, checksum: 4cad6424be9272a63ad826682ac2cedc (MD5) 19.png: 227247 bytes, checksum: 1df7ea50df51d979d740bd21a78f7192 (MD5) 20.png: 176546 bytes, checksum: 29eca9e49b3ec71fa6438ffa2a90665f (MD5) 21.png: 171097 bytes, checksum: 20e944c37814c57bdb330bcca624142f (MD5) 22.png: 64778 bytes, checksum: eb66e18acd5f0942a332e7ad57b3a475 (MD5) 23.png: 911367 bytes, checksum: f733bd8baeffd584a71cc153e87f3fc0 (MD5) 24.png: 443014 bytes, checksum: dad199a0357cf118c1e834e32f29a656 (MD5) 25.png: 133262 bytes, checksum: d9a29c70f3e1bfaa17682dc06d7a94a8 (MD5) 26.png: 97345 bytes, checksum: 7c4f87d60bfddef584a1e31929b125e3 (MD5) 27.png: 121518 bytes, checksum: b648bdf82f061549b8615a276c35e86b (MD5) 28.png: 3907801 bytes, checksum: bce8b22ee075dd30de8903a89a482a44 (MD5) 29.png: 110594 bytes, checksum: 98d4617ddfc62e5186b2ea50750e145f (MD5) 30.png: 65675 bytes, checksum: d6d0ec7e29b63b3d8f3bbf93b33fe392 (MD5) 31.png: 77259 bytes, checksum: 7c650862e389ee010ebf227394b78ae5 (MD5) 32.png: 224392 bytes, checksum: 0f153cc54827e1e125950ba15a93a064 (MD5) 33.compressao.png: 2342753 bytes, checksum: 243f5209f09cf7b998f6a5e579e4b289 (MD5) 34.png: 13209736 bytes, checksum: a3fca0c436e0167e5292cb47683263c6 (MD5) 35.png: 331900 bytes, checksum: 230d44f9fbbd1d1f1b8e16ef4a90bef4 (MD5) 36.png: 7795486 bytes, checksum: ff219f75dea53645c3c8c506aee4f92c (MD5) 37.png: 53430944 bytes, checksum: 497a9784729f29b143815938b3d4d6dd (MD5) 38.png: 5733799 bytes, checksum: 665d395bae6b16fe105fde18c13bfad8 (MD5) 39.png: 219532 bytes, checksum: 5827b2cc4fdf0f8a4bf716aec8a1c5fa (MD5) 40.png: 127177 bytes, checksum: e152cddfffc9c805a89e5e50b8a1817c (MD5) 41.png: 1124665 bytes, checksum: 29d9fd8d9ee671f2b00643f986ed4ee6 (MD5) 42.png: 2383771 bytes, checksum: 3bf368dce4ef03e41b1b9b321ebf5d6b (MD5) 43.png: 2048283 bytes, checksum: d8c1afc1ff4926f26f87d6da2c340189 (MD5) 44.compressao.png: 4545708 bytes, checksum: 1a244e7d2a77739f25582a39ee0dca43 (MD5) 1.png: 91444 bytes, checksum: 97a9b0c6327395ecf131b7f08f852afe (MD5) 2.png: 93204 bytes, checksum: c4f43e7beace7624decc69d5c0bbd763 (MD5) 3.png: 136229 bytes, checksum: decbc71a5c674b502a19bb7ec3a4af39 (MD5) 4.png: 51275 bytes, checksum: 3fd73b126e99f2b7dd130af0bb44bdf2 (MD5) 5.png: 55362 bytes, checksum: 25c62c2e04a6487ff397321ace683cfe (MD5) 6.png: 30359 bytes, checksum: e5a89fc989ad68634201c273405d87cd (MD5) 1.ods: 14748 bytes, checksum: 5c53786fb4f59d40cfc67e265b3ccdbb (MD5) 2.ods: 12277 bytes, checksum: 85d3262eda8d0d19f2b9e68ca6a2ff60 (MD5) 3.ods: 29902 bytes, checksum: 21dce0898e77df8191be437bcf168491 (MD5) 4.ods: 26020 bytes, checksum: 75044d4b95e66473d1c38e29e2c1ddd9 (MD5) 5.ods: 25161 bytes, checksum: 64743c83195cdf34938b5e3142210535 (MD5) 6.ods: 23147 bytes, checksum: 67873780574e4a0c15048d1c18e8092c (MD5) 7.ods: 24872 bytes, checksum: 58b0b7758825e8bc80ec319f90cb30ed (MD5) 8.ods: 23642 bytes, checksum: 7e718def249e8b5c1ba5298d3e6101ae (MD5) 9.ods: 14540 bytes, checksum: b0af9d51d96c085aca53e416c8dc06e6 (MD5) 10.ods: 21679 bytes, checksum: eb531d5e51df06f11e0ae669a881e85f (MD5) 11.ods: 19560 bytes, checksum: 71de1352ca73f10c2cf6d738cd1cec4d (MD5) 12.ods: 14605 bytes, checksum: 31b8d0e606a2af909074980cd9a4a9c1 (MD5) 13.ods: 14233 bytes, checksum: a92806c87118d17b424acccb1f049816 (MD5) 14.ods: 17135 bytes, checksum: ba4d33d3045b7031dad15157a31d90be (MD5) 15.ods: 14245 bytes, checksum: 0a1b4b52bad09fc2dcf67639b1b6ba5b (MD5) 16.ods: 15790 bytes, checksum: 8cf6f938d822bb16cc84be8a422fc1c2 (MD5) 17.ods: 16843 bytes, checksum: c497070bd4d369d226a70c9e5d74c77e (MD5) 18.ods: 25388 bytes, checksum: b1871bedff625da6193de7545d19c4e7 (MD5) 19.ods: 67252 bytes, checksum: 8ebaf944dcae9d220b845680ca31188f (MD5) 20.ods: 27473 bytes, checksum: 923c1755f09c370ccb30729f2710f714 (MD5) 21.ods: 31513 bytes, checksum: 7d25175b6369b25e8b1dab068e610ba7 (MD5) 22.ods: 27301 bytes, checksum: 1064d84b82091b5f6d43cfc17b1d4636 (MD5) 23.ods: 38229 bytes, checksum: 290c7fe1ccbd28e18b5722899702bfed (MD5) 24.ods: 48098 bytes, checksum: 620ed74459343bc06f7eb6ed0d7679ec (MD5) 25.ods: 24148 bytes, checksum: 3cd42fc255ecea838588e3aae8dc19c4 (MD5) 26.ods: 26550 bytes, checksum: 4b6997336ee92c6def97e4909e858b7c (MD5) 27.ods: 27015 bytes, checksum: a20630e9c67be416d0e99f8fcbfe2384 (MD5) 28.ods: 20340 bytes, checksum: ce513515d2d38bb74a6234d7b748ab26 (MD5) 29.ods: 25812 bytes, checksum: 8f94b034213b8a281a25c1bc26e1e543 (MD5) / Rejected by LUIZA DE MENEZES ROMANETTO (luizamenezes@reitoria.unesp.br), reason: Solicitamos que realize uma nova submissão seguindo as orientações abaixo: Foram submetidos 79 arquivos, apenas 1 arquivo deve ser submetido em formato PDF. O arquivo PDF não deve estar protegido e a dissertação/tese deve estar em um único arquivo, inclusive os apêndices e anexos, se houver. Corrija estas informações e realize uma nova submissão contendo o arquivo correto. Agradecemos a compreensão. on 2017-03-13T17:21:20Z (GMT) / Submitted by Fernando de Assis Rodrigues (fernando@elleth.org) on 2017-03-14T01:09:45Z No. of bitstreams: 1 final.pdf: 41703816 bytes, checksum: f59b8e221e9bc15e9bc0f2579244c6c6 (MD5) / Approved for entry into archive by LUIZA DE MENEZES ROMANETTO (luizamenezes@reitoria.unesp.br) on 2017-03-17T19:30:40Z (GMT) No. of bitstreams: 1 rodrigues_fa_dr_mar.pdf: 41703816 bytes, checksum: f59b8e221e9bc15e9bc0f2579244c6c6 (MD5) / Made available in DSpace on 2017-03-17T19:30:40Z (GMT). No. of bitstreams: 1 rodrigues_fa_dr_mar.pdf: 41703816 bytes, checksum: f59b8e221e9bc15e9bc0f2579244c6c6 (MD5) Previous issue date: 2017-03-03 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / O desenvolvimento das redes sociais é tema de estudos de várias áreas do conhecimento, e com o aumento do uso da Internet em atividades profissionais e de entretenimento, surgiram as redes sociais online: serviços com o intuito de proporcionar uma interface de relacionamento entre indivíduos. Algumas destas redes possuem milhões de usuários, que consentiram acordo aos Termos de Uso. Os Termos de Uso destes serviços contém a delimitação dos processos de coleta de dados por agentes externos, criando um efeito em cascata de identificação do usuário, e pode potencializar atividades prejudiciais à privacidade. O estudo procura verificar se processos sistematizados de coleta de dados sobre documentos que contém características das interfaces de coleta das Application Programming Interfaces (APIs), e os Termos de Uso podem auxiliar a identificação de atividades potencialmente prejudiciais à privacidade dos usuários (referenciados) e revelar pré-requisitos de conhecimentos sobre as tecnologias envolvidas neste processo, conceitos prévios à identificação das características, e áreas profissionais envolvidas no entendimento das informações sobre tecnologias voltadas às APIs e condições dos Termos de Uso. O objetivo é propor um modelo de dados orientado a análise sobre questões de privacidade de dados pessoais, a partir da identificação das características da coleta de dados de referenciados via API, para auxiliar na identificação de potenciais ações e atividades prejudiciais à privacidade, realizadas na coleta de dados. O universo de pesquisa está delimitado aos serviços disponíveis na Internet que utilizam APIs como interfaces de interoperabilidade de seus conteúdos, e a amostra foi definida em três APIs: do Facebook, do Twitter e do LinkedIn. A metodologia adotada é a análise exploratória, de caráter qualitativo, com métodos combinados a partir da exploração das características técnicas das APIs e da leitura dos documentos disponíveis, sendo segmentada pelas perspectivas: Áreas Profissionais envolvidas, Tecnologias de Coleta e Pré-requisitos de Conhecimento. Para realização, propõe-se três ciclos: o primeiro, com a identificação das características das estruturas de coletas de dados e das funcionalidades apresentadas pelas APIs; o segundo ciclo propõe uma modelagem de dados, a partir da coleta das características das estruturas existentes (Modelagem Direta), e; o terceiro ciclo, uma Modelagem de Segunda Ordem, com informações específicas sobre a privacidade de dados de referenciados para a análise de aspectos de privacidade de dados compartilhados a terceiros. Ao final, apresenta uma lista de critérios para o acompanhamento e a avaliação das informações dos documentos de referência e Termos de Uso das redes sociais, como forma de identificar possíveis relações entre a ausência de dados. Nas considerações, sustentamos que este ambiente é complexo e ofuscado aos referenciados, porém o modelo de dados e os instrumentos elaborados podem auxiliar a minimizar a complexidade dos documentos de referência sobre a interoperabilidade de conjuntos de dados a agentes externos e no entendimento dos Termos de Uso. / The development of social networks is a topic of study for several areas, and with the increased use of the Internet in professional and leisure activities, online social networks have emerged: services with the goal of providing an interface between individuals. Some of these networks have millions of users, who agree and give their consente to the Terms of Use. The Terms of Use of these services contain the delimitation of the processes of data collection by external agents, creating a cascading effect of user identification and can enhance activities which are detrimental to user privacy. This study looks to verify if the systematic data collection processes for documents which contain characteristics of the Application Programming Interfaces (APIs) data collection and the Terms of Use can help in identifying activities potentially harmful to user privacy (referenced) and reveal prerequisites of knowledge about the technology involved in this process, concepts prior to identifying characteristics and professional areas involved in understanding the technology of the API and the Terms of Use. The objective is to propose an analysis based data model on personal privacy data issues, from the identification of the characteristics of the collection of data from the referenced API to assisting in identifying potential actions and activities which are detrimental to privacy obtained through the data collection process. The research universe is limited to the services available on the Internet that use APIs as interoperability interfaces of their content and the sample was defined in three APIs: from Facebook, Twitter and LinkedIn. The methodology adopted was exploratory analysis, in qualitative form, with combined methods based on the exploitation of the technical characteristics of APIs and the reading of available documents, being segmented by the perspectives: professional areas involved, collection technology and knowledge prerequisites. To conduct this study, three cycles are proposed: first, with the identification of the characteristics of the structure of data collection and the functionalities presented by the APIs; second, propose a model of the data from the collection of the characteristics of existing structures (Direct Model); and third, a model of Second Order, with specific information about referenced data privacy for the analysis of data privacy aspects to share with third parties. In the end, present a list of criteria for the monitoring and evaluation of the information of referenced documents and the Terms of Use of social networks, as a way of identifying possible relationships between the absence of data. In the considerations, we maintain the idea that this environment is complex and obfuscated to those referenced, but the data model and the instruments developed can help to minimize the complexity of referenced documents about the interoperability of datasets to external agents and understanding the Terms of Use. / El desarrollo de las redes sociales es tema de estudio de varias áreas del conocimiento, y con el aumento del uso de la Internet en actividades profesionales y de entretenimiento, surgieron las redes sociales en línea: servicios con el fin de proporcionar una interface de relacionamiento entre individuos. Algunas de estas redes poseen millones de usuarios, los cuales dieron su consentimiento al acuerdo de los Términos de Uso. Los Términos de estos servicios engloban la delimitación de los procesos de colecta de datos por agentes externos, creando un efecto en cascada de identificación del usuario, y puede potencializar actividades perjudiciales para la privacidad. El estudio pretende verificar si procesos sistematizados de colecta de datos sobre documentos que contienen características de las interfaces de colecta de las Application Programming Interfaces (APIs), y los Términos de Uso, pueden auxiliar en la identificación de actividades potencialmente perjudiciales para la privacidad de los usuarios (referenciados) y revelar prerrequisitos de conocimientos sobre las tecnologías involucradas en este proceso, conceptos previos a la identificación de las características, y áreas profesionales que participan en el entendimiento de las informaciones sobre tecnologías direccionadas a las APIs y condiciones de los Términos e Uso. El objetivo es proponer un modelo de datos orientado al análisis sobre cuestiones de privacidad de datos personales, a partir de la identificación de las características de la colecta de datos referenciados vía API, para auxiliar en la identificación de potenciales acciones y actividades perjudiciales para la privacidad, realizadas en la colecta de datos. El universo de pesquisa está delimitado a los servicios disponibles en la Internet que utilizan APIs como interfaces de interoperabilidad de sus contenidos, y la muestra fue definida en tres APIs: de Facebook, de Twitter y de LinkedIn. La metodología adoptada es un análisis exploratorio, de carácter cualitativo, con métodos combinados a partir de la exploración de las características técnicas de las APIs y de la lectura de los documentos disponibles, siendo segmentada por las perspectivas: Áreas Profesionales involucradas, Tecnologías de Colecta y Prerrequisitos de Conocimiento. Para la realización, se proponen tres ciclos: i. con la identificación de las características de las estructuras de colectas de datos y de las funcionalidades presentadas por las APIs; ii. ciclo, propone un modelaje de datos, a partir de la colecta de las características de las estructuras existentes (Modelaje Directo), y; iii. ciclo, un Modelaje de Segundo Orden, con informaciones específicas sobre la privacidad de los datos de referenciados para el análisis de aspectos de privacidad de datos compartidos con terceros. Finalmente, presenta una lista de criterios para el acompañamiento y la evaluación de las informaciones de los documentos de referencia y Términos de Uso de las redes sociales, como forma de identificar posibles relaciones entre la ausencia de datos. En las consideraciones, sustentamos que este ambiente es complejo y confuso para los referenciados, no obstante el modelo de datos y los instrumentos elaborados pueden contribuir a minimizar la complejidad de los documentos de referencia sobre la interoperabilidad de conjuntos de datos a agentes externos y en el entendimiento de los Términos de Uso.

Page generated in 0.1547 seconds