11 |
Secrets about biological parentage : experiences of concealment and revelation : a qualitative studyPettle, Sharon A. January 1999 (has links)
This qualitative study investigated the experiences of twelve adults who discovered new information about the identity of one or both parents in adolescence or later. Some had grown up in adoptive or step-families; others had been conceived using donated sperm. Participants were interviewed once about their experiences when the information was revealed, and the effect they perceived it had over time. The transcribed interviews were analysed using Interpretative Phenomenological Analysis (Smith, Jarman & Osborn, 1999). The findings indicated that for many participants the impact of unplanned revelations was considerable, and the emotional repercussions often persisted for many years. The information affected participant's perceptions of their sense of self, and who they were in relation to others. The effects of this appeared to reverberate through many parts of the family system. It was suggested that concealment may have affected early parent-child relationships and contributed to feelings of difference or not belonging. The secret was perceived to have affected family communication before the revelation, and this was often difficult afterwards. Findings were considered in relation to identity development, attachment theory and social constructionist perspectives. A tentative model of the processes by which people integrate this information was proposed. Suggestions were made regarding therapeutic work with individuals and families after revelations of this nature, and those considering the opening of such secrets. Further research in this area is indicated and is particularly relevant to families created through gamete donation.
|
12 |
Forms of trade secret protection : a comparative analysis of the United States, Canada, the European Union and RomaniaPetroiu, Marius. January 2005 (has links)
This thesis is as an attempt to overview the forms of trade secret protection presently in place in the United States, Canada, the European Union and Romania. These jurisdictions were selected because they present a diversity of legal background and a variety of forms of trade secret protection. / The introductory chapter deals with the historical and economic backgrounds of the trade secret protection. An overview of trade secret protection at international scale is also provided. The thesis compares the forms of trade secret protection available in each jurisdiction. Based on the survey, the thesis comes to an answer of the question of "What is the most appropriate form of trade secrets protection?". / The final chapter provides a number of conclusions and recommendations.
|
13 |
Wirtschaftlicher NachrichtendienstRiggenbach, Dieter. January 1966 (has links)
Issued also as thesis, Basel. / Bibliography: p. 7-12.
|
14 |
Wirtschaftlicher NachrichtendienstRiggenbach, Dieter. January 1966 (has links)
Issued also as thesis, Basel. / Bibliography: p. 7-12.
|
15 |
Forms of trade secret protection : a comparative analysis of the United States, Canada, the European Union and RomaniaPetroiu, Marius. January 2005 (has links)
No description available.
|
16 |
A study of accountability and open government in Hong Kong /Guile, Andrea Mia Saturno. January 1995 (has links)
Thesis (M.P.A.)--University of Hong Kong, 1995. / Includes bibliographical references (leaves 123-129).
|
17 |
A review of the access to information policy in Hong Kong /Ma Mei-wah Iris. January 1998 (has links)
Thesis (M.P.A.)--University of Hong Kong, 1998. / Includes bibliographical references.
|
18 |
A study of accountability and open government in Hong KongGuile, Andrea Mia Saturno. January 1995 (has links)
Thesis (M.P.A.)--University of Hong Kong, 1995. / Includes bibliographical references (leave 123-129). Also available in print.
|
19 |
A review of the access to information policy in Hong KongMa Mei-wah Iris. January 1998 (has links)
Thesis (M.P.A.)--University of Hong Kong, 1998. / Includes bibliographical references. Also available in print.
|
20 |
Möjliga säkerhetsmetoder för en multitenant OpenShift-miljö / Possible security methods for a multitenant OpenShift environmentRilegård, Daniel January 2022 (has links)
Molntjänster är ett område inom IT som har vuxit i betydelse under många år, till stor del då de ger aktörer tillgång till datorresurser som ofta skulle vara för kostsamma att underhålla själva. OpenShift är ett sådant verktyg baserat på orkesteringsverktyget Kubernetes. Dessa tillsammans med många andra bygger på så kallad kluster-arkitektur med nätverk av noder som utför olika uppgifter. En mjukvaruarkitektur kallad multitenancy som bygger på att utnyttja systemresurser optimalt genom att flera kunders applikationer körs isolerat parallellt på samma hårdvara har utvecklats. Den medför dock säkerhetsproblem då läckor mellan applikationer måste förhindras.Denna studie har baserat på diskussioner med kunniga inom OpenShift försökt kartlägga vilka säkerhetsproblemen är och de möjliga metoder som finns för att åtgärda dem. Svaret var att det huvudsakligen handlade om hur så kallade secrets hanteras på bästa sätt och några exempel på verktyg för detta gavs. Studien avslutas med en jämförelse om vilka som fungerar bäst med multitenancy som konstaterade att det är ett område där mer forskning behövs då problem finns med alla. / Cloud services is an area in IT that has grown in importance for many years, mainly as they give players access to computer resources that often would be too costly for them to maintain themselves. OpenShift is one such tool based on the orchestration tool Kubernetes. These together with many others are based on so-called cluster architecture with a network of nodes that perform various tasks. A software architecture called multitenancy that is based on utilizing system resources optimally by running several customers’ applications isolated in parallel on the same hardware has been developed. However, it creates security issues as leaks between applications must be prevented. Based on discussions with experts in OpenShift, this study has tried to identify the security issues and the possible methods available to address them. The answer was mainly related to how so-called secrets are handled in the best way and some examples of tools for this were given. The study ends with a comparison of which work best with multitenancy and found that it is an area where more research is needed as there are problems with all.
|
Page generated in 0.0397 seconds