• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 121
  • 118
  • 29
  • 26
  • 15
  • 10
  • 7
  • 6
  • 6
  • 6
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 414
  • 49
  • 46
  • 45
  • 41
  • 41
  • 38
  • 37
  • 33
  • 32
  • 32
  • 31
  • 24
  • 23
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

µL

Hsueh, Hsi-Chuan 08 July 2002 (has links)
Abstract The age of knowledge-based economy industry is coming. The advantages in competition among enterprises lie in the differences of their intangible assets. The old laws on intelligent property right have been failed to keep pace with the advancement of science and technology, rapid circulation of information as well as development of economy. Hence, the range of intelligent property tends to be extended gradually. Among the newly emerged laws on intelligent property right, the Trade Secret Law has the greatest influence on the industrial circles. Since the promulgation of the law, it has brought about new impacts on the existing labor-administration relationship. The Trade Secret Law of the Republic of China, with reference to the legislation of the United States and our Patent Law, was promulgated by the President on January 17, 1996 after they were passed in the third reading in the legislative session of the Legislative Yuan. The Law consists of only 16 articles, including the definition of trade secret; ownership, transfer and authorization of trade secret, obligations of confidentiality of trade secret, infringement of trade secret, relief for infringement, civil responsibilities for infringement of trade secrete, range of claim for damages, etc. All of those regulations are just made in principle, especially, they are not detailed enough to explain the ownership of property right. According to the existing Trade Secret Law, the trade secret is divided into technical information and business information. The definition of the technical information is more explicit, while the definition of business information is ambiguous. For instance, whether the strategic resources of a company such as list of customers, report of failed experiments, marketing and pricing policies, ideas of advertisements, secret of salary, etc. can be regarded as trade secrets or not? There are little practical examples related to trade secrets in Taiwan or foreign countries, so it still waits for the accumulation of legal precedents and supplements of the court to form a common and clear-cut awareness. Besides, the trade secrets are classified into three major types based on the reason of their occurrence: employment, engagement and share. The trade secret accomplished by employees can be further divided into trade secrets researched or developed in or out of the performance of their duties. The clarification of definition of duty related or non-duty related trade secrete, the core of the Trade Secret Law, shall have great concern with the ownership of the property right. But, the standard and concepts for distinguishing the duty related trade secret from the non-duty related trade secret are lacking. For this reason, I discusses in this paper if the strategic information of a company can be deemed as a trade secret based on the definition of trade secret by clarifying the concepts of duty related or non-duty related trade secrets. I also took examples from literatures and raised 12 questions for the purpose of study to start a series of discussion on a whole. In experimental study, the interviews of business owners and enterprise operators coming from engineers of basic level, researchers, lawyers and former officials of Ministry of Justice, and people engaged in information technology, traditional industries, logistic industry, and service industry, government employees, as well as people of all walks of life were conducted in order to collect information. After completion of the interviews, I made a comment from a professional angle and then made induction and arrangement of those collected information. From induction of the experimental study, the conclusion and suggestions I obtained give a new explanation on some problems: If the strategic information can be regarded as a trade secret? The clarification of duty and non-duty related trade secret, standards for payment of reasonable remunerations, reasonable time limit on transfer and authorization for use, etc. This study is a little different from the discussion in the past literatures. I hope that the results of this study will be helpful to the interpretation of relevant laws and regulations or any judgement to be passed by the court or any amendment of laws in the future. Keywords: (1) Trade secret; (2) duty; (3) non-duty
12

Le spectacle du secret : Marivaux, Gautier, Barbey d'Aurevilly, Stendhal et Zola /

Meyer, Arielle. January 2003 (has links)
Th. doct.--Université de Genève, 1999. / Bibliogr. p. [245]-253. Index.
13

Rational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponents

Gidney, Craig 22 March 2012 (has links)
In secret sharing we are asked to split a secret into several shares in such a way that a minimum number of shares is necessary and sufficient to reconstruct the secret. Rational secret sharing considers secret sharing in the context of adversarial players who want to learn the secret but, secondarily, want to prevent other players from learning the secret. We present protocols, and bounds on the effectiveness of any protocol, for recombining secret shares in the presence of players who do not want others to learn the secret (rationality), may not want to learn the secret themselves (maliciousness), may be colluding, may have unbounded computational capacity, may be able to synchronize sends (asynchronous/synchronous broadcast), and/or may be able to recognize the secret independently (conspicuousness). We propose four protocols and analyze their security against players and coalitions who are each rational or malicious. We also prove three results that show protocols using only asynchronous broadcast are less secure than what can be achieved by protocols using synchronous broadcast.
14

Jesus' intentionality in revealing his identity as examined through his use of miracles and parables in light of the eschatological timeline an exegesis of Mark 4:10-13 and Mark 8:17-18 /

Martin, Julie M., January 1998 (has links)
Thesis (M.A.)--Gordon-Conwell Theological Seminary, 1998. / Includes bibliographical references (leaves 70-77).
15

A comparative study of the Book of Mormon secret combinations and the American Mafia organization.

Morley, Ray G. January 1972 (has links)
Thesis (M.R.E.)--B.Y.U. Dept. of Church History and Doctrine.
16

A comparative study of the Book of Mormon secret combinations and the American Mafia organization

Morley, Ray G. January 1972 (has links)
Thesis (M.R.E.)--B.Y.U. Dept. of Church History and Doctrine. / Electronic thesis. Also available in print ed.
17

L'enfant en situation d'apprentissage scolaire confronté au secret de filiation : Transmission et processus de symbolisation / Non communiqué

Mazars, Christine 15 December 2015 (has links)
L’entrée à la « grande école » représente un passage : de l’école maternelle à l’école élémentaire, il s’agit symboliquement pour l’enfant de se séparer davantage de ses parents et d’entrer sur la voie des apprentissages. Or, quelquefois le développement de troubles comportementaux est corrélé à ce passage. Parmi les enfants qui présentent de tels troubles certains sont soumis à un secret de filiation. La situation d’apprentissage, en encensant le savoir, fait flamber la problématique de l’enfant concernant ses origines et génère un conflit intrapsychique qui se traduit dans le comportement explosif. L’enfant doute d’être le rejeton de ses parents et il les soupçonne de dissimuler « la vérité ». Il est partagé entre le désir et l’interdit de savoir. Les parents font obstacle à la transmission de ce savoir car leur relation avec l’enfant s’est fondée sur un mensonge par omission et ils craignent d’être désavoués si l’enfant apprenait qu’ils ont menti. Malgré les mots tus et les non-dits, la relation aux savoirs scolaires n’est pas entachée ; au contraire, les enfants sont avides de connaissances. Mais face au silence de sa famille, la résistance de l’enfant s’érige dans son corps et son langage subversifs : à l’école, la relation aux autres est investie sur un mode agressif, revendicatif et le mensonge est presque une seconde nature. Toutefois, révéler le secret de filiation n’a pas les effets escomptés pour l’école ; c’est-à-dire la disparition du trouble du comportement. L’enfant ne renonce pas facilement aux bénéfices secondaires que lui procurait son symptôme. D’autre part, le fonctionnement psychique de l’enfant s’était clivé à partir de la dichotomie entre famille, lieu du secret, et école, lieu du savoir ; un temps de latence est donc logiquement nécessaire, suite à la révélation du secret, pour que l’enfant puisse réaliser un travail de réélaboration psychique de sa place dans la généalogie et l’histoire familiale. Pourtant, le risque d’une rupture entre institution scolaire et famille est constamment présent avec le spectre d’une exclusion de l’école, voire d’une déscolarisation. / Entry to “Grade School” represents a passage : from Pre-School to Elementary School. It is symbolic for the child to be separated from his parents. Sometimes, the development of behavioral troubles is correlated to this passage. Among children who show such troubles, some face to a “secret of filiation”. The situation of apprenticeship, by praising the knowledge, lights the fire of his own origins and leads an intrapsychic conflict. Child doubts to be the “offspring” of the parents and suspects them to hide “the Truth”. He is torn between the desire and the prohibition of Knowledge. Parents interfere with this transmission of knowledge because their relationship, with the child, is based on a lie by omission. They are feared to be disowned by their child if he knew that they were lying. Despite the “silent an unspoken words”, the desire of knowledge is not questioned. Children are hungering for knowledge. But, in front of the family silence, the resistance of the child is erecting in his body and in his subversive language : in school, the relationship with the other is invested on an aggressive stance and the lie is almost a second nature. However, exposing the “secret of filiation” does not having the desired effects. That is : there is no disappearance of behavioral troubles. On the one hand, the child does not give up easily on his problem. On the other hand, his psychic functioning was cleft from the dichotomy between the family as a place of secret, and the school, as a place of knowledge ; latency is therefore necessary, following the exposure of the secret, so that the child can realise a psychic reorganization from his place in genealogy and family history. However, the risk of rupture between school institution and family constantly exists with the spectrum of school exclusion.
18

秘密社會之動員: 1796-1805年白蓮敎運動之個案硏究. / Mi mi she hui zhi dong yuan: 1796-1805 nian Bailian jiao yun dong zhi ge an yan jiu.

January 1991 (has links)
朱耀光. / Thesis (M.A.)--香港中文大學, 1991. / Manuscript (computer printout). / Includes bibliographical references (leaves 152-163). / Zhu Yaoguang. / Thesis (M.A.)--Xianggang Zhong wen da xue, 1991. / 序言 --- p.i / 撮要 --- p.iv / Chapter 第一篇 --- 十九世紀中國:一個巨型的社會現象 / Chapter 第一章 --- 導論 --- p.1 / Chapter 第二章 --- 秘密社會之定義及類型 --- p.4 / Chapter 第三章 --- 十九世紀中國秘密社會運動 --- p.11 / Chapter 第二篇 --- 研究秘密社會運動之方法與理論 / Chapter 第四章 --- 研究方法 --- p.16 / Chapter 一. --- 資料來源 / Chapter 二. --- 個案分析 / Chapter 第五章 --- 社會運動之理論 --- p.21 / Chapter 一. --- 宏觀角度:運動之興起 / Chapter 1. --- 滿漢矛盾理論 / Chapter 2. --- 階级鬥爭理論 / Chapter 3. --- 政治效率理論 / Chapter 4. --- 救贖信仰理論 / Chapter 二. --- 微觀角度:個人之參與 / Chapter 1. --- 政治動機理論 / Chapter 2. --- 本土政治理論 / Chapter 三. --- 資源動員之分析架構 / Chapter 第三篇 --- 中國秘密社會之動員:白蓮教運動之個案硏究 / Chapter 第六章 --- 十九世紀中國秘密社會之動員模式 --- p.48 / Chapter 一. --- 结構性資源之分配模式 / Chapter 二. --- 秘密社會之組織性資源 / Chapter 三. --- 秘密社會之催發性資源 / Chapter 第七章 --- 白蓮教運動之歴史背景 --- p.73 / Chapter 一. --- 發展源流 / Chapter 二. --- 意識形態 / Chapter 三. --- 組織結構 / Chapter 第八章 --- 1796´ؤ1805年白蓮教運動之個案分析 --- p.79 / Chapter 一. --- 資源動員之過程 / Chapter 1. --- 運動的冒起:資源之累積 / Chapter 2. --- 運動的擴張:資源之競爭 / Chapter 3. --- 運動的回落:資源之轉化 / Chapter 4. --- 運動的沉寂:資源之喪失 / Chapter 二. --- 社會後果之分析 / Chapter 1. --- 資源管理模式之調整 / Chapter 2. --- 資源分配模式之調整 / Chapter 三. --- 小結 / Chapter 第九章 --- 總結 --- p.139 / Chapter 一. --- 研究成果之撮要 / Chapter 二. --- 硏究成果之反思 / 注釋 --- p.149 / 參考書目 --- p.163
19

The second government: images of triads in Hong Kong

Cheung, Ching, Jocelyn., 張靜. January 1995 (has links)
published_or_final_version / Criminology / Master / Master of Social Sciences
20

A comparative study of triad societies and the Mafia past, present and future /

Mak, Man-kee. January 1988 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1988. / Also available in print.

Page generated in 0.0591 seconds