• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 138
  • 19
  • 9
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • 6
  • 4
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 206
  • 206
  • 62
  • 61
  • 53
  • 43
  • 33
  • 32
  • 29
  • 28
  • 28
  • 26
  • 26
  • 24
  • 23
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

An analysis of administrative discretion and its use to implement FERPA policy at Southeast Missouri State University

Jones, Carnell, January 2004 (has links)
Thesis (Ed. D.)--University of Missouri-Columbia, 2004. / Typescript. Vita. Includes bibliographical references (leaves 176-179). Also available on the Internet.
132

An analysis of administrative discretion and its use to implement FERPA policy at Southeast Missouri State University /

Jones, Carnell, January 2004 (has links)
Thesis (Ed. D.)--University of Missouri-Columbia, 2004. / Typescript. Vita. Includes bibliographical references (leaves 176-179). Also available on the Internet.
133

Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /

Krutisch, Dorothee, January 2004 (has links)
Thesis (doctoral)--Universiẗat Saarbrücken, 2003. / Includes bibliographical references (p. 241-255).
134

Workplace privacy in the internet age : recommendations for a policy framework in Sri Lanka /

Mahanamahewa, Sri Warna Prathiba. January 2005 (has links) (PDF)
Thesis (Ph.D.) - University of Queensland, 2006. / Includes bibliography.
135

Symmetric private information retrieval via additive homomorphic probabilistic encryption /

Lincoln, Laura Beth. January 2006 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2006. / Typescript. Includes bibliographical references (p. 171-175).
136

Personal Privacy Protection within Pervasive RFID Environments

Hedefine, Eeva Kaarina January 2006 (has links) (PDF)
No description available.
137

Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption

Skolmen, Dayne Edward January 2016 (has links)
Cloud Computing has advanced to the point where it may be considered an attractive proposition for an increasing number of South African organisations, yet the adoption of Cloud Computing in South Africa remains relatively low. Many organisations have been hesitant to adopt Cloud solutions owing to a variety of inhibiting factors and concerns that have created mistrust in Cloud Computing. One of the top concerns identified is security within the Cloud Computing environment. The approaching commencement of new data protection legislation in South Africa, known as the Protection of Personal Information Act (POPI), may provide an ideal opportunity to address the information security-related inhibiting factors and foster a trust relationship between potential Cloud users and Cloud providers. POPI applies to anyone who processes personal information and regulates how they must handle, store and secure that information. POPI is considered to be beneficial to Cloud providers as it gives them the opportunity to build trust with potential Cloud users through achieving compliance and providing assurance. The aim of this dissertation is, therefore, to develop a framework for Cloud Computing adoption that will assist in mitigating the information security-related factors inhibiting Cloud adoption by fostering a trust relationship through compliance with the POPI Act. It is believed that such a framework would be useful to South African Cloud providers and could ultimately assist in the promotion of Cloud adoption in South Africa.
138

The effect of Wikileaks on freedom of expression globally

Ndeley, Martha Ebenyne 29 May 2014 (has links)
LL.M. (International Law) / Before 2006, there had been some movement to expose conspiracy and injustices in government and corporate life but the emergence of Julian Assange and wikileaks would set a new standard in this kind of investigative probe into what the political leaders and heads of major corporations did behind the scenes. Assange’s initial revelations and release of incriminating documents was about to launch his debut as an ‘international man of mystery’ as people who are globally and politically curious will forever wonder what else he would reveal to the world. The first target of his disclosures was Africa then the United States but his actions would unleash a wave of leaks with corporate and government conspiracy at a volume that the world as we know it was previously unaccustomed to. Although some doubted the authenticity of his disclosures, and others criticized his methods, none doubted his right to freedom of expression as enshrined in national, regional and international instruments. Assange’s organization proposes that governments and corporations should be transparent in their dealings, and policies. Although tumultuous at first, leaks from Assange have helped expose some corrupt practices that would not otherwise have come to light. The impact of wikileaks on freedom of expression in the world has been massive and far reaching, the viral way in which the leaks spread are evidence to the fact that people have always been curious about this kind of conspiracy theories and are eager for transparency. It shows also that it is unwise to underestimate the impact that an event in one country could trigger globally. But what does it really mean to global stability and freedom of expression when one man chooses to go against conventional methods and probe into the powers that be? How will this change how the world does business in the area of what people are allowed to freely say or disclose without persecution and how this disclosure affect the laws that govern this kind of freedom of expression?
139

A code of practice for practitioners in private healthcare: a privacy perspective

Harvey, Brett D January 2007 (has links)
Whereas there are various initiatives to standardize the storage, processing and use of electronic patient information in the South African health sector, the sector is fragmented through the adoption of various approaches on national, provincial and district levels. Divergent IT systems are used in the public and private health sectors (“Recommendations of the Committee on …” 2003). Furthermore, general practitioners in some parts of the country still use paper as a primary means of documentation and storage. Nonetheless, the use of computerized systems is increasing, even in the most remote rural areas. This leads to the exposure of patient information to various threats that are perpetuated through the use of information technology. Irrespective of the level of technology adoption by practitioners in private healthcare practice, the security and privacy of patient information remains of critical importance. The disclosure of patient information whether intentional or not, can have dire consequences for a patient. In general, the requirements pertaining to the privacy of patient information are controlled and enforced through the adoption of legislation by the governing body of a country. Compared with developed nations, South Africa has limited legislation to help enforce privacy in the health sector. Conversely, Australia, New Zealand and Canada have some of the most advanced legislative frameworks when it comes to the privacy of patient information. In this dissertation, the Australian, New Zealand, Canadian and South African health sectors and the legislation they have in place to ensure the privacy of health information, will be investigated. Additionally, codes of practice and guidelines on privacy of patient information for GPs, in the afore-mentioned countries, will be investigated to form an idea as to what is needed in creating and formulating a new code of practice for the South African GP, as well as a pragmatic tool (checklist) to check adherence to privacy requirements.
140

Email security policy implementation in multinational organisations with special reference to privacy laws

Dixon, Henry George January 2003 (has links)
In 1971, scientist Ray Tomlinson sent what is now considered the first email message. It was considered as “nothing short of revolutionary … deserv[ing] a spot in the list of great communication inventions such as the printing press, telegraph and telephone” (Festa, 2001). Whereas email was first used exclusively in the military (Arpanet) and in academic circles, it has now become almost ubiquitous, used widely for private, as well as for business correspondence. According to a Berkeley study (Berkeley, 2000), there were approximately 440 million corporate and personal [e-] mailboxes worldwide in 2001, of which more than a third was corporate mailboxes. As a result of the extensive use of email in the corporate environment, Information Officers have to ensure that the use of email adds business value. In an “always on” market place, the efficiency, immediacy and cost effectiveness of email communication are immediately evident. A study by Ferris Research, quoted by Nchor (2001), shows that there is “an overall productivity gain of US$9000 per employee as they send and receive emails to get projects done.” However, the use of email in the corporate envi-ronment also poses business risks that need to be uniquely addressed. Among these “key business risks” (Surfcontrol, 2001) are security risks, viruses, legal liability, pro-ductivity loss and bandwidth abuse. To address the risks mentioned above and to protect the business value of email, spe-cific policies have to be implemented that address email usage. Information Security Policies are defined in most corporate environments. In a study done by Elron Soft-ware (2001), 83% of respondents who have abused email have company policies regu-lating email usage. There appears to be a gap between policy conception and policy implementation. Various factors inhibit effective policy implementation – ethical, legal and cultural. The implementation of corporate policy becomes especially complex in multinational environments where differing information law Email usage is ubiquitous in the modern business environment, but few companies adequately manage the risks associated with email.

Page generated in 0.0402 seconds