• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 138
  • 19
  • 9
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • 6
  • 4
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 206
  • 206
  • 62
  • 61
  • 53
  • 43
  • 33
  • 32
  • 29
  • 28
  • 28
  • 26
  • 26
  • 24
  • 23
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

The OECD cryptography policy guidelines and their implementation /

Jeppson, Jonas. January 2000 (has links)
The Organization for Economic Co-operation and Development (OECD) issued on 27 March 1997 a recommendation concerning cryptography policy guidelines in an attempt to foster international co-operation and harmonization. Information is becoming increasingly valuable in society. Globalization of markets, improvements in information and communication technology and the shift to a knowledge-based economy has, furthermore, created an enormous potential for electronic commerce. Conservative estimates predict electronic commerce will have a turnover of more than US $400 billion by 2002. The increasing importance of information and communications has, however, made the information society vulnerable. Cryptography plays an important part in securing transactions in electronic commerce and moreover, in establishing a secure electronic environment in the information society. Fear of privacy infringements and lack of secure methods for electronic transactions has until now been holding electronic commerce back. Cryptographic methods are an essential part in securing electronic commerce. Law enforcement agencies and national security organizations fear, however, that widespread use of strong encryption will impede their work substantially. This thesis analyzes the advantages and disadvantages of strong encryption and how the balance of the conflicting interests has been dealt with in the OECD Cryptography Policy Guidelines. Moreover, shows the thesis how the OECD Cryptography Policy Guidelines have been implemented and makes suggestions on how the guidelines should be implemented.
122

Advance passenger information passenger name record : privacy rights and security awareness

Banerjea-Brodeur, Nicolas Paul January 2003 (has links)
An in-depth study of Advance Passenger Information and Passenger Name Record has never been accomplished prior to the events of September 11 th. It is of great importance to distinguish both of these concepts as they entail different legal consequence. API is to be understood as a data transmission that Border Control Authorities possess in advance in order to facilitate the movements of passengers. It is furthermore imperative that harmonization and inter-operability between States be achieved in order for this system to work. Although the obligations seem to appear for air carriers to be extraneous, the positive impact is greater than the downfalls. / Passenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation. / The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
123

E-Mail privacy : does the government have the right to intercept and or monitor private e-mail communications?

Majola, Zanele Precious. January 2003 (has links)
Section 14 of the Constitution provides for the right to privacy, which includes the right not to have the privacy of communications infringed. The right is also protected at common law - a breach of a person's privacy constitutes an iniura. E-mail communications are therefore protected by both, the common law and the Constitution. The question that this work seeks to answer is, whether the Government has the right to intercept and/or monitor private e-mail communications. The right to privacy is not absolute, case law and legislation show that this right can be limited. At common law, a valid defence will negate the unlawfulness of the invasion. In terms of the Constitution, the right to privacy can only be limited in accordance with the limitation clause section 36. For each case, courts will have to balance, the government's interest in combating crime and that of the citizen to the privacy of their e-mail communications. In seeking to answer the question, this work considers the protection afforded by the common law and the Constitution. It also considers statutes which limit the right to privacy, including whether these statutes are applicable to e-mail communications and if they are, whether they constitute a justifiable limitation of the right, for example: the Regulation of Interception of Communications and Provision of Communication-Related Information Act and the Criminal Procedure Act - which was enacted when the 'cyber-world' was non-existent. All statutes, applicable to e-mail communications, provide for some form of requirements or guidelines before communications can be intercepted or/ and monitored. The right to privacy is also protected in foreign jurisdictions and is not absolute. There is protection only against unreasonable invasions of privacy. In conclusion, both statutory law and common law permit the government, within limitations, to intercept or/ and monitor private e-mail communications. Where there are guidelines, regulating this power, the circumstance under which and when it can be exercised. This will amount to a reasonable and justifiable limitation and therefore the right will not be violated. / Thesis (LL.M.)-University of Natal, Durban, 2003.
124

SCRIPSIT : a model for establishing trustable privacies in online public spaces.

Rodda, Paul Trevor-John. January 2004 (has links)
This dissertation proposes a model supporting the creation of trustable privacies in public online spaces, with the model demonstrating the potential for supporting trustable data handling in the qualitative domain. Privacy and trust, from the pivotal perspective of the individual were identified as crucial intangibles in the qualitative research and personal trust domains. That both privacy and trust depend heavily upon credible mechanisms for privacy became clear during the literature review and interview processes. Privacy, in its many forms, is a concept requiring greatly varying degrees of anonymity, confidentiality and control (Rotenberg, 2001; Lessig, 1998) and this was position was validated by literature and by qualitative comments by academic interviewees. Facilitation of secondary users including academics, public and private organisations, communities, casual information browsers is a goal of this research. This goal of facilitation is supported by the model proposed, and is discussed in Chapter 6, where future work is discussed. The core requirement to address confidentiality, ethics, privacy, ownership and control of data (Corti, 2000) is satisfied by the model as proposed and discussed. Expected outcomes of this research project are summarised as: • Proposed model for the creation of trustable privacies in public spaces. [Primary outcome] • Promotion of collaboration amongst domains and disciplines through improved universal access to archived data [Secondary outcome] • Identification of application domains outside of the initially identified domain set [Secondary outcome]. Self-Contained ReposItory ProcesSIng Template (SCRIPSIT) describes a model supporting a decentralised, trustable set of structures and mechanisms. SCRIPSIT has its eponymous origin in the Latin word scripsit, meaning "he or she wrote". / Thesis (M.A.)-University of KwaZulu-Natal, Durban, 2004.
125

'Privacy in the workplace' : striking a balance between the privacy concerns of employees and the operational requirements of employers.

Kondiah, Sarisha Shanel. 04 November 2013 (has links)
The value underlying privacy lies in the fact that it mirrors the very idea of human dignity and the protection of the personal realm. However operational requirements of employers and advancements in science and technology continuously challenge the notion of privacy in the workplace. Employees all over the world are victims of a number of privacy invasive measures including, but not limited to drug testing, background checks, HIV/AIDS testing and polygraph testing. Present day advancements in technology and science make the recognition and protection of the right to privacy even more urgent. The concept of privacy in the workplace has grown in importance as technology has enabled sophisticated forms of testing and monitoring of employees. As a result of these advancements a deep tension has arisen between two conflicting sets of principles. Consequently the rationale for this study is to strike a balance between the employee’s right to privacy and the employers right to conduct his or her business as he or she deems fit. This will be done through an analysis of a number of practices adopted by the employer in the workplace of which contribute to the infringement. Further the admissibility of such evidence procured by the employer through these practices will be interrogated. This is a significant issue as scientific and technological advancements have a very tangible impact on the wellbeing of employees. / Thesis (LL.M.)-University of KwaZulu-Natal, Durban, 2012.
126

A familiar villain: surveillance, ideology and popular cinema

Brown, Felicity Adair Unknown Date (has links)
This thesis examines the representations of surveillance in mainstream cinema. Using ideology critique it will show how filmic illustrations of monitoring depoliticize the relationship between surveillance and structural relations of power.In order to provide a foundation for this inquiry, a political economy critique of surveillance will be undertaken in four areas. Focusing on the workplace, consumer surveillance, urban policing and intelligence gathering, this thesis will contextualise surveillance as historically relevant and intimately connected with modern constructs such as the nation-state, military power and capitalist economic organisation. In recent years, the role of surveillance has been intensified in response to the challenges posed by globalization, the restructuring of capitalism in the 1980's and 90's and the declining legitimacy of nation-state governments. These developments are both aided by, and in turn promote, pervasive networks of surveillance. Driven by risk management and other forms of economic reasoning as organisational logic, developments in information communication technologies accelerate surveillance capabilities rendering them more invasive and intense. In this way, surveillance can be conceived of as complicit with prevailing relations of power on a macro, sociological level.In order to show how mainstream cinematic representations of surveillance ideologically obscure this relationship, this thesis begins with an overview of 30 popular films. It then moves to a comparison of four recent Hollywood portrayals of surveillance with the four areas of political economy critique identified above. This analysis will reveal that these films have a tendency to focus on sentimental themes such as individual heroism, antagonist versus protagonist struggles and romantic subplots, in a way which deflects attention from collective experience with surveillance webs. More pertinently, the narrative structures of these films feature dichotomies between malevolent and benevolent monitoring, aligning legitimate and benign surveillance with the state. At the same time, the accompanying imagery of surveillance devices fetishizes monitoring, deterministically glorifying technology as a powerful and omniscient force. The overall effect is to depoliticize monitoring as a natural part of the fabric of everyday life.
127

Detecting and resolving redundancies in EP3P policies

Salim, Farzad. January 2006 (has links)
Thesis (M.Comp.Sc.)--University of Wollongong, 2006. / Typescript. Includes bibliographical references: leaf 98-102.
128

Moderne Fahndungstechnologien im Spannungsfeld mit dem Privatleben : sicherheits- und kriminalpolizeiliche Informationseingriffe im Lichte der Rechtsprechung des Europäischen Gerichtshofs für Menschenrechte /

Proschak, Christian-A. January 2005 (has links)
Thesis (doctoral)--Universität Salzburg, 2004. / Includes bibliographical references (p. 230-238).
129

Protecting privacy in recorded conversations

Cunningham, Scot. January 2007 (has links)
Thesis (M.A.)--Northern Kentucky University, 2007. / Made available through ProQuest. Publication number: AAT 1447118. ProQuest document ID: 1414135101. Includes bibliographical references (p. 87-90)
130

Software agents, surveillance, and the right to privacy a legislative framework for agent-enabled surveillance /

Schermer, Bart Willem, January 1900 (has links)
Thesis (doctoral)--Universiteit Leiden, 2007. / Description based on print version record. Includes bibliographical references (p. [231]-241).

Page generated in 0.0728 seconds