• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 17
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

L’adoption du projet de loi n°21 et les effets sur la psychothérapie au Québec : une étude descriptive

Allard, Fannie 09 1900 (has links)
Depuis l’arrivée de la psychologie dans les universités québécoises en 1872, la psychologie n’a cessé d’évoluer. Alors qu’autrefois aucune loi ne régissait la pratique de la psychothérapie et l’usage du titre de psychothérapeute, le gouvernement du Québec a adopté en 2009, le projet de loi 21. Ce mémoire retrace l’histoire de la psychologie au Québec ainsi que l’histoire de l’Ordre des psychologues du Québec en portant une attention particulière aux changements légaux concernant la règlementation de la pratique de la psychothérapie et l’usage de titres réservés. Afin de dresser un portrait de la psychothérapie au Québec deux ans après l’adoption de la Loi 28 (mieux connue sous le nom de projet de loi 21), trois banques de données de l’Ordre des psychologues ont été utilisées ( 1) «Membres», 2) «Psychothérapeutes» et 3) «Signalement psychothérapie»). De ces trois banques de données, deux sont construites à partir de formulaires remplis par les psychologues et psychothérapeutes. Des 8509 psychologues, 870 psychothérapeutes, et 524 dossiers de pratique illégale (usurpation de titres professionnels et/ou pratique illégale de la psychothérapie) inclus dans l’étude, des différences statistiquement significatives ont été remarquées pour ce qui est du sexe, de l’âge et de la langue maternelle. Toutefois, l’effet de taille était petit. Les différences les plus importantes étaient observables au niveau de la scolarité et de l’exercice de la psychothérapie. Les dispositions de la Loi modifiant le Code des professions et d’autres dispositions législatives dans le domaine de la santé mentale et des relations humaines n’étant en vigueur que depuis deux ans, il serait intéressant de suivre l’évolution de la psychothérapie et de la pratique illégale de la psychothérapie au Québec dans les prochaines années. / Since its first appearance in Quebec universities in 1872, the field of psychology in the province of Quebec has not stopped evolving. While there were previously no laws regulating both the practice of psychotherapy and the use of the title of Psychotherapist, the government of Quebec introduced a new law in 2009: Bill 21. The present thesis draws a historical portrait of the field of psychology in the province of Quebec as well as the history of l’Ordre des psychologues du Québec placing a particular focus on the legal changes affecting the practice of psychotherapy as well as the use of reserved titles. The Ordre des psychologues du Québec’s databases were used to paint a picture of psychotherapy in Quebec two years after the adoption of the Law 28 (better known as Bill 21). Out of the three databases that were used, two of them consisted of forms filled out by Psychologists and Psychotherapists. Of the 8509 Psychologists, 870 Psychotherapists, and 524 cases of illegal practice (consisting of the illegal use of professional titles and/or the illegal practice of psychotherapy) included in this study, statistically significant differences were found in terms of sex, age and language. However, the size effect was small, suggesting that the differences were of limited clinical significance. Significant differences were observed in terms of education and the practice of psychotherapy. Because the provisions of the Loi modifiant le Code des professions et d’autres dispositions législatives dans le domaine de la santé mentale et des relations humaines have only been in effect for two years, it will be interesting to follow the evolution of psychotherapy as well as the illegal practice of psychotherapy in Quebec in the upcoming years.
12

Usucapião da propriedade possível em terras públicas: O direito de superfície como instrumento de funcionalização da propriedade para efetivação do direito à moradia em áreas de exclusão social / The possible adverse possession of the property on public land: The surface right as a funcionalization instrument of the property for realization of the right to housing in areas of social exclusion

Pedro Pontes de Azevêdo 11 June 2015 (has links)
A presente tese apresenta a usucapião superficiária de bens públicos como uma alternativa para assegurar o direito fundamental à moradia em áreas de exclusão social. Para chegar a tal desiderato, encontra-se supedâneo jurídico-normativo na função social da propriedade, especialmente no tocante à sua observância em terras públicas. Utiliza-se, ainda como suporte teórico à tese, a noção contemporânea de que a propriedade hodierna é um instituto plural, complexo, tomando emprestadas as ideias de Salvatore Pugliatti. Além disso, diante dos contornos atuais do Direito Civil-Constitucional, também é importante como lastro a análise da posse com função social, que em muitos casos pode até ser priorizada no confronto com o direito de propriedade meramente formal. Na construção da tese, foram utilizadas duas premissas. A primeira apoia-se na possibilidade do reconhecimento da posse em bens públicos, fundamentando-se especificamente nos regimes legais que a admitem, como a Lei 11.977/2009, por exemplo. Já a segunda se consubstancia na interpretação de que a vedação constitucional à usucapião de bens públicos não é absoluta, obstando apenas a aquisição da propriedade plena destes bens por particulares. A partir destes fundamentos são analisados os requisitos e as consequências do modelo de usucapião superficiária de imóveis públicos para fins de moradia, com ênfase particular quanto ao animus da posse. Conclui-se, ao final, que essa nova modalidade aquisitiva da propriedade superficiária pode ser um importante instrumento para a regularização fundiária em áreas de exclusão social, conferindo segurança jurídica aos moradores e transformando em ativo um amplo estoque fundiário que hodiernamente se apresenta como capital morto, conforme defende Hernando de Soto.
13

Usucapião da propriedade possível em terras públicas: O direito de superfície como instrumento de funcionalização da propriedade para efetivação do direito à moradia em áreas de exclusão social / The possible adverse possession of the property on public land: The surface right as a funcionalization instrument of the property for realization of the right to housing in areas of social exclusion

Pedro Pontes de Azevêdo 11 June 2015 (has links)
A presente tese apresenta a usucapião superficiária de bens públicos como uma alternativa para assegurar o direito fundamental à moradia em áreas de exclusão social. Para chegar a tal desiderato, encontra-se supedâneo jurídico-normativo na função social da propriedade, especialmente no tocante à sua observância em terras públicas. Utiliza-se, ainda como suporte teórico à tese, a noção contemporânea de que a propriedade hodierna é um instituto plural, complexo, tomando emprestadas as ideias de Salvatore Pugliatti. Além disso, diante dos contornos atuais do Direito Civil-Constitucional, também é importante como lastro a análise da posse com função social, que em muitos casos pode até ser priorizada no confronto com o direito de propriedade meramente formal. Na construção da tese, foram utilizadas duas premissas. A primeira apoia-se na possibilidade do reconhecimento da posse em bens públicos, fundamentando-se especificamente nos regimes legais que a admitem, como a Lei 11.977/2009, por exemplo. Já a segunda se consubstancia na interpretação de que a vedação constitucional à usucapião de bens públicos não é absoluta, obstando apenas a aquisição da propriedade plena destes bens por particulares. A partir destes fundamentos são analisados os requisitos e as consequências do modelo de usucapião superficiária de imóveis públicos para fins de moradia, com ênfase particular quanto ao animus da posse. Conclui-se, ao final, que essa nova modalidade aquisitiva da propriedade superficiária pode ser um importante instrumento para a regularização fundiária em áreas de exclusão social, conferindo segurança jurídica aos moradores e transformando em ativo um amplo estoque fundiário que hodiernamente se apresenta como capital morto, conforme defende Hernando de Soto.
14

Proposition de nouveaux mécanismes de protection contre l'usurpation d'identité pour les fournisseurs de services Internet / Proposal for new protections against identity theft for ISPs

Biri, Aroua 25 February 2011 (has links)
De plus en plus d’organisations sont informatisées et plus une organisation est grande, plus elle peut être la cible d’attaques via Internet. On note également que les internautes utilisent de plus en plus Internet pour faire des achats sur des sites de commerce électronique, pour se connecter à l’administration en ligne, pour voter de manière électronique, etc. Par ailleurs, certains d’entre eux ont de plus en plus d'équipements électroniques qui peuvent être raccordés à Internet et ce dans divers sites (domicile, voiture, lieu de travail, etc.). Ces équipements forment ce qu’on appelle un réseau personnel qui permet la mise en place de nouvelles applications centrées sur l’internaute. Les fournisseurs de services Internet peuvent ainsi étoffer leurs offres de services en présentant une offre de sécurisation de ce genre de réseau. Selon le rapport du cabinet « Arbor Networks » intitulé « Worldwide Infrastructure Security Report », les menaces identifiées comme les plus sévères sont relatives aux attaques de déni de service distribué. Ce type d’attaque a pour but de rendre indisponible un service en empêchant les utilisateurs légitimes de l'utiliser. Il utilise la technique de l’usurpation d’identité qui consiste en la création de paquets (de type IP, ARP, etc.) avec une adresse source forgée et ce dans le but d’usurper un système informatique ou d’usurper l’identité de l’émetteur. La technique de l’usurpation d’identité permet ainsi de rendre un service indisponible, d’écouter, de corrompre, de bloquer le trafic des internautes ou de nuire au bon fonctionnement des protocoles de routage et des réseaux personnels des clients. De plus, la technique de l’usurpation d’identité est également utilisée pour des activités interdites par la loi « Hadopi » en rigueur en France comme le téléchargement illégal. De ce fait, les fournisseurs de services Internet se doivent de prémunir leurs clients des attaques basées sur la technique de l’usurpation d’identité. Ces dits fournisseurs comptent sur les protocoles de routage qu’ils déroulent pour participer au bon acheminement des données de leurs clients. Cependant, le protocole intra-domaine OSPF et le protocole inter-domaine BGP sont vulnérables aux attaques utilisant la technique de l’usurpation d’identité qui peuvent conduire à l’acheminement des paquets vers des destinataires non légitimes ou au déni de service. Nous proposons donc deux mécanismes dédiés respectivement au protocole intra-domaine OSPF et au protocole inter-domaine BGP. D’une part, afin de protéger les routeurs OSPF contre les attaques utilisant la technique d’usurpation d’identité, nous avons préconisé le stockage de l’identité et du matériel cryptographique dans un coffre-fort électronique que sont les cartes à puce. Les cartes déroulent ensuite un algorithme de dérivation de clés avec les cartes des routeurs voisins ainsi qu’avec celle du routeur désigné. Les clés dérivées entre les cartes à puce servent à signer les messages OSPF et à authentifier le niveau MAC. Nous avons décrit par la suite la plateforme du démonstrateur et les scénarios de tests adoptés pour évaluer les performances de notre prototype et les comparer avec ceux du logiciel Quagga sur la base de trois critères : le temps requis pour traiter une annonce d'état de liens, le temps de convergence ainsi que le temps de re-calcul d’une table de routage après un changement. Ces temps augmentent peu avec l’introduction de la carte à puce implémentant les fonctions de sécurité proposées. Ainsi, cette solution permet de renforcer la sécurité du protocole OSPF avec un impact raisonnable sur les performances. D’autre part, afin de protéger les routeurs BGP contre les attaques utilisant la technique d’usurpation d’identité, nous avons préconisé la « clustérisation » des domaines Internet et la sécurisation des liens entre les clusters ainsi qu’au sein de chacun d’eux grâce aux paradigmes de « web of trust » et de la cryptographie sans certificats […] / More and more organizations are computerized and more an organization is great, plus it can be the target of Internet attacks. Moreover, some of them have a growing number of electronic equipments that can be connected to the Internet from various locations (home, car, workplace, etc.). These devices form a so-called personal area network that allows the development of new applications centered on users. The ISPs can then expand their service offerings by providing a secure supply of such networks. According to the report of the firm “Arbor Networks”, entitled "Worldwide Infrastructure Security Report ", the most severe threats are related to distributed denial of service. This type of attack aims to make available a service by preventing legitimate users from using it. It uses the technique of identity theft that involves the creation of packages (like IP, ARP, etc.) with a forged source address and that in order to usurp the Identity of the issuer or of the computer system. Thus, the technique of identity theft allows to render a service unavailable, to listen, to corrupt, to block traffic from Internet users or to undermine the legitimate operation of routing protocols and personal networks. Moreover, the technique of identity theft is also used for prohibited activities by "HADOPI" law in France and related to illegal downloading issues. Thus, the ISPs have a duty to protect their customers from attacks based on the technique of identity theft. The mechanisms of protection against spoofing attacks for access networks are crucial for customer adoption of new applications offered by Internet service providers. This part of the doctoral thesis is part of the European project “MAGNET Beyond" whose vision is to put into practice the concept of personal networks, with the ultimate objective to design, develop, prototype and validate the concept. In the context of user equipment’s access to the network of an Internet services provider from a public place, we proposed a cross-layer protocol based on the principles of information theory. This protocol fixes the security hole not addressed by other proposals that is the attack of identity theft that occurs at the beginning of communication and thus protects users against the middle man attacks. We proposed that the person who wants to have secure access to the Internet must be on a specific circle has been called "RED POINT" so that the attacker is not able to be on the same circle at the same time. The proposed cross-layer protocol can be divided into three phases: the phase of checking the position of the user, the extraction phase of the shared secret of the physical layer and the phase of the derivation of the shared key at the MAC layer. We subsequently validated our solution through a formal tool AVISPA and presented the results of its implementation. In a private context, communication between devices convey users' personal data which may be confidential, so we must prevent equipment not belonging to the legitimate user to access its network. Thus, we proposed two mechanisms of protection against attacks based on spoofing so that illegitimate equipment is unable to impersonate legitimate equipment. The first phase will be dedicated to personal networks and the second will be dedicated to the particular case of medical networks. Regarding the mechanism dedicated to personal networks, we have proposed the use of a protocol based on out-of-band channel in order to provide certificates to user equipments. We derive bilateral key for personal network’s equipments of the same site and between equipments at remote sites. Concerning the particular case of medical networks, we proposed to cover their deployment phases and their operational phases. This proposal was submitted to the IEEE 802.15.6 working group that conducts research for the standardization of medical networks […]
15

Dynasty and collegiality : representations of imperial legitimacy, AD 284-337

FitzGerald, Taylor Grace January 2017 (has links)
This thesis investigates representations of dynastic legitimacy and imperial power in the later Roman Empire (AD 284-337). It explores the continuity and change in expressions of dynastic legitimacy by, for and about the emperors of this period, which were presented in coinage, panegyrics, and other literary and material evidence. I argue that familial relationships were used throughout this period to make legitimation claims or to counter claims made by rivals, rejecting the notion of clear breaks between the third century, the Tetrarchy and the reign of Constantine. The Tetrarchy’s creation of familial links through adoption and marriage led to a web of inter-familial relationships that they and later emperors used in promoting their own claims to imperial legitimacy. At the same time, the presentation of these imperial colleges as harmonious co-rulership relied heavily on the adaptation of pre-existing strategies, which in turn would be adapted by the emperors of the early fourth century. This thesis proceeds roughly chronologically, focusing on the regimes of individual emperors and their collaborators when possible. Chapter 1 examines the creation of the Tetrarchy as an extended ‘family’ and the adaptation of ideologies of third-century co-rulership. Chapter 2 explores the changes in the Second Tetrarchy, with an especial focus on the ‘Iovian’ family of Galerius and Maximinus Daza. Chapter 3 looks at Maxentius’ claims to both ‘retrospective’ and ‘prospective’ dynastic legitimacy. Chapter 4 examines Licinius’ legitimacy both as a co-ruler and brother-in-law of Constantine, and as the beginning of a new ‘Iovian’ dynasty. Chapter 5 delves deeper into the different claims to dynastic legitimacy made by Constantine over the course of his thirty-year reign. Taken together, these chapters offer a new approach by arguing against the dichotomy between ‘dynasty’ and ‘collegiality’ that tends to dominate scholarship of this period. Instead they focus on the similarities and continuities between the representations of imperial families and imperial colleges in order to understand how perceptions of dynastic legitimacy evolved in the third and fourth centuries.
16

Constructing Legitimacy: Patrimony, Patronage, and Political Communication in the Coronation of Henry IV

Favorito, Rebecca 20 December 2016 (has links)
No description available.
17

IMUNIDADE DE EXECUÇÃO CONTRA ESTADOS ESTRANGEIROS NAS AÇÕES TRABALHISTAS

Martins Júnior, Lázaro Alves 20 December 2011 (has links)
Made available in DSpace on 2016-08-10T10:46:45Z (GMT). No. of bitstreams: 1 LAZARO ALVES MARTINS JUNIOR.pdf: 977344 bytes, checksum: a62a188f9b3cb28c468092d2e9472547 (MD5) Previous issue date: 2011-12-20 / The present study aims to analyze the institution of diplomatic immunity procedural matters and the elements that give them footstool, confronting him with the interpretation that leads to its partial exemption for labor law formed in the primeval bodies in the field of enforcement actions against foreign states with local representatives. Boasting the Foreign States sovereignty and therefore valid legislation in their domestic sphere that extends to the territories requiring compliance with diplomatic immunities to the right of diverse country, perquire is the reason for the immunity from enforcement of foreign States, which maintain with retaining legal and logical to see repealed by idiosyncratic understanding within the Labour Court, one of the segments of national jurisdiction, moving away from the literal interpretation of national legislation in force in relations, forgetting the rules of classical hermeneutics, as well as and especially ignoring the laws of those sovereign countries that has not violating fundamental human rights domestically and internationally. It is considered that the Judiciary, under pressure from the defense will be negative adjudication, advancing into the field reserved for the legislative branch that shows silent for reasons of political nature, printing the current understanding wife who defends post-positivist activism justice to the phenomenon of judicialization of social issues. It appears that the understanding implemented by labor justice of first instance and the core of this study empirically equivalent to a placebo and no treatment generates isonomic court plan among workers in violation of his rights by their employers as uniquely allows the attachment of assets will not affect activities diplomatic, legal entities of the external public, not extending this understanding to processes that involve national federal entities bearing the same status before the absolute inalienability and immunity from seizure of their property of any kind. Analysis and construction of the study is based on the literature and case law, having as a basis for inafastabilidade theory of state sovereignty and the consequent effect of its legal system while consistent with the fundamental precepts of acceptance supra. The conclusion is not appropriate to assert depart without sufficient legal basis, implementing the immunity of foreign States constitutionally elect their property as inalienable in our country when the federal entities enjoy the same privilege, the Legislature should implement regramento law that allows the recruited worker in our country by foreign States see themselves adequately compensated for, but without violating the sovereignty emanating from the independent state through its political structures, because this attack compromises the essential harmonization of diplomatic relations in today's globalized times and the usurpation of powers promotes hate among the leading powers to undue interference by the judiciary and growing in the field of legislation, contributing to the weakening of the parliament and conflicts that are causing the fading ideal legal and democratic foundation magnum stamped on national and political activism to foster ideology that favors the current panorama. / O presente estudo tem como objetivo analisar o instituto da imunidade diplomática no âmbito processual e os elementos que lhes dá supedâneo, confrontando-o com a interpretação que leva a sua parcial derrogação pela jurisprudência trabalhista formada nas instâncias primevas no campo das ações de execução contra os estados estrangeiros com representações locais. Gozando os Estados Estrangeiros de soberania e, portanto, de legislação válida em seu âmbito interno que se estende aos territórios diplomáticos exigindo a observância às imunidades perante o direito de país diverso, perquire-se o motivo da imunidade de execução dos Estados Estrangeiros, que mantêm-se com arrimo legal e lógico, se ver derrogada por entendimento idiossincrático no âmbito da Justiça Trabalhista, um dos segmentos da jurisdição nacional, se afastando da interpretação literal da legislação vigente nas relações nacionais, olvidando das regras de hermenêutica clássicas, bem como e sobretudo ignorando a legislação soberana daqueles países que não se apresenta violadora dos direitos humanos fundamentais no plano interno ou internacional. Considera-se que o Poder Judiciário, sob a pressão de lhe ser defesa a negativa da prestação jurisdicional, avança sobre campo reservado ao Poder Legislativo que se mostra omisso por razões de cunho político, imprimindo entendimento que esposa corrente pós-positivista que defende o ativismo judicial diante do fenômeno da judicialização das questões sociais. Constata-se que o entendimento implementado pela justiça laboral de primeiras instâncias e cerne deste estudo equivale empiricamente a um placebo e gera tratamento não isonômico no plano judicial entre trabalhadores prejudicados em seus direitos pelos respectivos empregadores quando permite excepcionalmente a penhora de bens não afetos as atividades diplomáticas, pessoas jurídicas de direito público externo, não estendendo este entendimento aos processos que envolvem entes federativos nacionais que ostentam a mesma natureza jurídica diante da inalienabilidade e impenhorabilidade absoluta de seus bens de qualquer espécie. A análise e construção do estudo fundamenta-se na pesquisa bibliográfica e jurisprudencial, tendo como teoria de base a inafastabilidade da soberania dos Estados e consequente vigência de seu ordenamento jurídico quando em consonância com os preceitos fundamentais de aceitação supranacional. Conclui-se não se asseverar pertinente derrogar, sem base legal suficiente, a imunidade de execução dos Estados Estrangeiros que elegem constitucionalmente seus bens como inalienáveis, quando em nosso país os entes federativos gozam do mesmo privilégio, devendo o Poder Legislativo implementar regramento legal que permita ao trabalhador recrutado em nosso país por Estados Estrangeiros ver-se indenizado por forma adequada, mas, sem violar a soberania que emana do Estado independente através de sua estruturação política, pois, esta agressão compromete a imprescindível harmonização das relações diplomáticas nos tempos globalizados hodiernos e fomenta a usurpação de competências provocando cizânia entre os Poderes com a indevida e crescente ingerência do Judiciário no campo legislativo, contribuindo para o enfraquecimento do parlamento e provocando conflitos que fazem esmorecer o ideal jurídico e democrático estampado no alicerce magno nacional e fomentam o ativismo político com ideologia que se favorece com o atual panorama.

Page generated in 0.1852 seconds