• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 138
  • 19
  • 9
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • 6
  • 4
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 206
  • 206
  • 62
  • 61
  • 53
  • 43
  • 33
  • 32
  • 29
  • 28
  • 28
  • 26
  • 26
  • 24
  • 23
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

An investigation of issues of privacy, anonymity and multi-factor authentication in an open environment

Miles, Shaun Graeme 20 June 2012 (has links)
This thesis performs an investigation into issues concerning the broad area ofIdentity and Access Management, with a focus on open environments. Through literature research the issues of privacy, anonymity and access control are identified. The issue of privacy is an inherent problem due to the nature of the digital network environment. Information can be duplicated and modified regardless of the wishes and intentions ofthe owner of that information unless proper measures are taken to secure the environment. Once information is published or divulged on the network, there is very little way of controlling the subsequent usage of that information. To address this issue a model for privacy is presented that follows the user centric paradigm of meta-identity. The lack of anonymity, where security measures can be thwarted through the observation of the environment, is a concern for users and systems. By an attacker observing the communication channel and monitoring the interactions between users and systems over a long enough period of time, it is possible to infer knowledge about the users and systems. This knowledge is used to build an identity profile of potential victims to be used in subsequent attacks. To address the problem, mechanisms for providing an acceptable level of anonymity while maintaining adequate accountability (from a legal standpoint) are explored. In terms of access control, the inherent weakness of single factor authentication mechanisms is discussed. The typical mechanism is the user-name and password pair, which provides a single point of failure. By increasing the factors used in authentication, the amount of work required to compromise the system increases non-linearly. Within an open network, several aspects hinder wide scale adoption and use of multi-factor authentication schemes, such as token management and the impact on usability. The framework is developed from a Utopian point of view, with the aim of being applicable to many situations as opposed to a single specific domain. The framework incorporates multi-factor authentication over multiple paths using mobile phones and GSM networks, and explores the usefulness of such an approach. The models are in tum analysed, providing a discussion into the assumptions made and the problems faced by each model. / Adobe Acrobat Pro 9.5.1 / Adobe Acrobat 9.51 Paper Capture Plug-in
162

A sociological study of employees' perceptions of electronic surveillance in public FET institutions in the Eastern Cape Province, South Africa

Jonas, Randolph Patrick January 2014 (has links)
The perceptions of employees regarding electronic surveillance in the workplace were studied using a mixed method approach. The change that permeates society and organisations have not escaped public FET institutions in South Africa. These changes such as computerisation of work and the employment of electronic surveillance, have implications for management, control, privacy, productivity and trust in the workplace. Yet, public FET institutions are not performing to the expected standards. Surveillance of work and employees at these institutions are interventions of management to ensure organisational goals are achieved. Despite the prevalence of electronic surveillance in the workplace, employee perceptions and their lived experiences thereof are seldom reported. Published research barely focuses on employees’ perceptions of electronic surveillance in the workplace, and instead offers a perfunctory look at the perceptual dimensions. Employees’ perceptions reflects their lived experiences in the workplace and yield a foundational understanding of workplace dynamics and organisational behaviour. The perceptions of employees regarding electronic surveillance were viewed through the lens of quantitative and qualitative analysis to give statistical and thick descriptions respectively to augment better understanding. The study therefore provides a descriptive account of employees’ perceptions of electronic surveillance and its effects. Specifically the study examined employee perceptions of electronic surveillance as a control measure of management, as an intrusion of employee privacy and impacting on the trust relationship and productivity. An extensive review of the literature provided the basis for the research questions and eight hypotheses were proposed. A survey, by means of an electronic questionnaire, was conducted to test the hypotheses using a random sample of employees at three public FET institutions in the Eastern Cape Province, South Africa. The results are presented followed by a discussion, conclusions and limitations. Suggestions and recommendations for future research are also indicated. The central thesis of the study is presented, namely that electronic surveillance is experienced as a measure of management to control workers and that privacy as well trust, as an element of the employment relationship, are influenced by it. Further findings indicated that there are no statistically significant differences in the responses of the three job categories namely lecturers, managers and administration and support staff. Interviews were also conducted and the data from the interviews reported the depth and breadth of the perceptions of a small sample of employees who related their experiences and situations in terms of the key themes of electronic surveillance as control and an intrusion of their right to privacy, trust and productivity. The findings indicate that acceptance of electronic surveillance is contingent upon contextual factors and the meaning people assign to their situations. Privacy concerns were limited to personal information, fairness and dignity. The link between electronic surveillance and control and discipline is reported in the responses. The findings indicate that perceptions of electronic surveillance as managerial control is related to the lived experiences of employees. Employees voiced positive perceptions of electronic surveillance in cases where management clearly communicates the purpose to the employees. The study of the subjective experiences of employees in workplaces under electronic surveillance thus helped to illuminate the intricacies of employment relationships in the changing world of work. The study findings widen the knowledge base on organisational behaviour and is essential for human resources management and organisational development interventions. Human rights and ethics are part of the sense making process when employees construct social reality. Management and control is redefined in various terms and has implications for change management strategies and organisational development practises in globalising and network society. The study raises the critical question whether electronic surveillance as an adjunct for bureaucratic control is still relevant in a changing world of work where good faith, trust and confidence are still highly valued. The insights into the role of trust in the employment relationship is important for managing public institutions in complex settings. Management must be aware of the differences in the lived experiences of employees when dealing with workplace issues.
163

Das Privatleben Prominenter als Verfassungsproblem : ein Rechtsvergleich mit Frankreich und England unter Einbezug von Internetpublikationen /

Straky, Randolf. January 2006 (has links) (PDF)
Univ., Diss.--Mannheim, 2005. / Literaturverz. S. 237 - 261.
164

Electronic communication in the workplace : employer vs employee legal rights

Barnardt, Gerard Louis 04 1900 (has links)
Thesis (LLM)--University of Stellenbosch, 2004. / ENGLISH ABSTRACT: The monitoring of electronic communication is likely to face all employers sooner or later. The rapid advancement in technology aimed at helping to monitor electronic communication, makes it easier than ever before for employers to monitor the electronic communications of their employees. There are important questions to consider when dealing with the topic of monitoring electronic communication. Examples include "mayan employer legally monitor electronic communications?" and "how does monitoring affect the employee's right to privacy?" This thesis is an attempt to answer these and other related questions by analysing, inter alia, South African legislation, the Constitution and case law, as well as comparing the law as it applies in the United Kingdom and the United States of America. The analysis and conclusion offered in this thesis aim to provide theoretical consideration to academics and practical application for employers that are faced with the reality of monitoring electronic communications. / AFRIKAANSE OPSOMMING: Alle werkgewers sal waarskynlik die een of ander tyd met die monitering van elektroniese kommunikasie gekonfronteer word. Die snelle voortuitgang in tegnologie wat daarop gemik is om te help met die monitering van elektroniese kommunikasie, maak dit vir werkgewers makliker as ooit tevore om sodanige kommunikasies van hulle werknemers te monitor. Daar is egter belangrike vrae wat oorweeg moet word wanneer die onderwerp van monitering van elektroniese kommunikasie ter sprake kom. Voorbeelde hiervan is "mag 'n werknemer regtens elektroniese kommunikasies monitor?" en "hoe raak monitering die werknemer se reg tot privaatheid?" Hierdie tesis is 'n poging om hierdie en ander verwante vrae te beantwoord deur die ontleding van, onder andere, Suid-Afrikaanse wetgewing, die Grondwet en die reg soos deur hofuitsprake ontwikkel, sowel as vergelyking van die reg soos wat dit van toepassing is in die Verenigde Koninkryk en die Verenigde State van Amerika. Die ontleding en gevolgtrekking wat in hierdie tesis aangebied word, is gemik op die verskaffing van teoretiese oorweging aan akademici en praktiese toepassing vir werkgewers wat met die realiteit van die monitering van elektroniese kommunikasies gekonfronteer word.
165

The Protection of Privacy in the Workplace: A Comparative Study

Gondwe, Mimmy 12 1900 (has links)
Thesis (LLD )--Stellenbosch University, 2011. / ENGLISH ABSTRACT: The importance of privacy lies in the fact that it represents the very idea of human dignity or the preservation of the ‘inner sanctum’. Not surprisingly, however, operational concerns of employers and technological developments combine continuously to challenge the preservation of privacy in the workplace. Employees the world over are exposed to numerous privacy invasive measures, including drug testing, psychological testing, polygraph testing, genetic testing, psychological testing, electronic monitoring and background checks. Hence, the issue at the heart of this dissertation is to determine to what extent privacy is protected in the South African workplace given advancements in technology and the implications (if any) for the right to privacy as such. A secondary aim of the dissertation is to attempt to provide a realistic balance between the privacy concerns of employees and the operational needs of employers in this technological age. As such the main focus of dissertation falls within the sphere of employment law. In order to provide an answer to the research issue discussed above, the dissertation addresses five ancillary or interrelated issues. First, the broad historical development of the legal protection of privacy is traced and examined. Second, a workable definition of privacy is identified with reference to academic debate and comparative legislative and judicial developments. Third, those policies and practices, which would typically threaten privacy in the employment sphere are identified and briefly discussed. Fourth, a detailed evaluation of the tension between privacy and a number of selected policies and practices in selected countries is provided. More specifically, the dissertation considers how these policies and practices challenge privacy, the rationale for their existence and, if applicable, how these policies and practices – if necessary through appropriate regulation – may be accommodated while simultaneously accommodating both privacy and the legitimate concerns of employers. The selection of these practices and policies is guided by two considerations. At the first level the emphasis is on those challenges to privacy, which can be traced back to technological developments and which, as such, foster new and unique demands to the accommodation of privacy in the workplace. The secondary emphasis is on those policies, which are representative of the fundamental challenges created by new technologies to privacy. To effectively address the above issues the dissertation uses the traditional legal methodology associated with comparative legal research, which includes a literature review of applicable law and legal frame work and a review of relevant case law and a comparative study of selected foreign jurisdictions. / AFRIKAANSE OPSOMMING: Geen opsomming / Fulbright Foundation / Stellenbosch University / Mellon Foundation / NFR
166

Whistleblower protection programs compromise the reported taxpayer's privacy

Andonie, Luisa 25 April 2017 (has links) (PDF)
The United States Whistleblower Program’s inadequate protections have placed the privacy and confidentiality rights of United States taxpayers in a vulnerable state. By using the United States Whistleblower Program as an example, this paper seeks to illustrate the risk of eroding the confidentiality and privacy rights of the taxpayer, which is a risk that other national and international governments should likewise attempt to mitigate in their own whistleblower protection programs.
167

American Courts and Privacy of the Body

Bason, Jim 08 1900 (has links)
The right to be let alone has been developing throughout history to offset the seemingly relentless encroachments by government in efforts to regulate "morality," and by governmental and/or business uses of technological advancements to control the individuals privacy. Thus, the espoused constitutional right of privacy has come to be the way for individuals (and groups) to stave off society's attempts to control or divert the individual from his right to be let alone. This work examines both state and federal court cases in an attempt to show that privacy has come to be a basic, constitutional right to be used against society's intrusions in areas of personal and sexual privacy.
168

The Burner Project: Privacy and Social Control in a Networked World

Shade, Molly 05 1900 (has links)
As mobile phones become increasingly ubiquitous in today’s world, academic and public audiences alike are curious about the interaction between mobile technologies and social norms. To investigate this phenomenon, I examined how individuals use technology to actively manage their communication behaviors. Through a three-month research project on usage patterns of Burner, a mobile application, this thesis explores the relationships among technology, culture, and privacy. Burner is a service that equips individuals with the means to create, maintain, and/or dissolve social ties by providing temporary, disposable numbers to customers. The application offers a way to communicate without relying on a user’s personal phone number. In other words, Burner acts as a “privacy layer” for mobile phones. It also provides a valuable platform to examine how customers use the application as a strategy for communication management. This thesis represents a marriage of practice and theory: (1) As an applied enterprise, the project was constructed as a customer needs assessment intending to examine how the service was situated in the lives of its users. The findings have successfully been applied to my client’s company strategy and have led to a more informed customer approach. (2) As an academic endeavor, this research contributes to existing scholarship in anthropology, computer-mediated communication, privacy, and design. The results provide rich fodder for discussions about the impact of mobile communication and services.
169

Coming Soon From a Screen Near You: The Camera’s Gaze in the Age of Surveillance

Unknown Date (has links)
Within the past thirty years, privacy concerns among American citizens are rising with counter-terrorist surveillance going beyond targeting people of interest. These concerns are reflected in American cinema where many contemporary films have explored surveillance in society. The textual analyses presented in the thesis will focus on three such films, Strange Days (1995), Southland Tales (2005), and Nightcrawler (2014). Throughout this thesis, I examine how each of these films offers a unique, reflexive take on surveillance, adhering to generative mechanisms that evoke differing attitudes about surveillance through their form. My analysis draws on Laura Mulvey and Patricia Pisters’ theories on the gaze to understand the politics of looking in contemporary surveillance cinema and highlight how cinematic scopophilia evolved into a networked perspective. My analysis suggests that the politics of surveillance cinema is reflected in these films as their differences mirror the changing perception of surveillance and the gaze over time. / Includes bibliography. / Thesis (M.A.)--Florida Atlantic University, 2016. / FAU Electronic Theses and Dissertations Collection
170

Conflito entre o direito à privacidade e os direitos à informação e à liberdade de expressão: uma solução possível / Conflict between the right to privacy and the right to information and freedom of expression and the right to information and freedom of expression

Kallajian, Manuela Cibim 07 March 2018 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-04-11T11:51:38Z No. of bitstreams: 1 Manuela Cibim Kallajian.pdf: 1500984 bytes, checksum: 2125d7520ca65bfcf362dbd27df720a6 (MD5) / Made available in DSpace on 2018-04-11T11:51:38Z (GMT). No. of bitstreams: 1 Manuela Cibim Kallajian.pdf: 1500984 bytes, checksum: 2125d7520ca65bfcf362dbd27df720a6 (MD5) Previous issue date: 2018-03-07 / The solution to the conflict between the right to privacy and the rights to information and freedom of expression is often sought by doctrine and jurisprudence. The present study presents a way to solve the conflict between such rights from the legal hermeneutics. For this purpose, the right to privacy, the right to information and the right to freedom of expression were analyzed separately, under the perspective of personality rights and fundamental rights, both in national and in comparative law. Common hypotheses have been suggested where the right to privacy conflicts with the rights to information and freedom of expression in order to examine how doctrine and case law address the issue by upraising the main weighting criteria used. After finding that it is an apparent conflict of norms, the solution to the deadlock is presented through the technique of weighting indicating the main criteria for weighing, which should serve as parameters for the judicial decision, always aiming at the principle of dignity of human person / A solução para o conflito entre o direito à privacidade e os direitos à informação e à liberdade de expressão é frequentemente buscada pela doutrina e pela jurisprudência. O presente estudo apresenta uma forma de solver o choque entre tais direitos a partir da hermenêutica jurídica. Para tanto, foram analisados o direito à privacidade, o direito à informação e o direito à liberdade de expressão separadamente, sob a perspectiva de direitos da personalidade e de direitos fundamentais, tanto no âmbito nacional quanto no direito comparado. Foram indicadas hipóteses comuns em que o direito à privacidade entra em conflito com os direitos à informação e à liberdade de expressão com o objetivo de analisar como a doutrina e a jurisprudência enfrentam a questão, levantando-se os principais critérios de ponderação utilizados. Após a conclusão de que se trata de um aparente conflito de normas, apresenta-se a solução para o impasse através da técnica da ponderação com a indicação dos principais critérios de sopesamento que devem servir de parâmetros para a decisão judicial, sempre com vistas ao princípio da dignidade da pessoa humana

Page generated in 0.1342 seconds