• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • 1
  • Tagged with
  • 7
  • 7
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Organizational Use of Social Networking in Employment Actions

Lile, Cameron R. 01 May 2015 (has links)
This study examined federal court cases related to the use of social media websites (e.g., Facebook, Twitter, MySpace, LinkedIn) in various employment practices (e.g., selection, promotion, employee monitoring, layoffs). Court cases were identified using various online databases in an attempt to create an exhaustive list of cases to be used to better understand the role that social media has played in organizational settings and the legal implications of its use. The results of this study show that there were a significant number of cases involving termination and Facebook, and organizations prevailed in court significantly more than the defendant did. The results of this study provide organizations, employees, and applicants with a better understanding of how organizational social media use has been perceived in the court of law, thereby allowing people and employers to make better decisions regarding social media use.
2

Bažnyčios (konfesijų) nustatyta tvarka sudarytų santuokų teisinė prigimtis ir teisinės pasekmės: lyginamasis tyrimas / The Legal Nature and the Legal Implications of Marriages Established in Accordance with Church’s (Denominations) Regulations: a Comparative Study / Das rechtliche Wesen und die rechtlichen Folgen der Ehen, die in der von der Kirche (Konfession) festgelegten Ordnung abgeschlossen wurden: vergleichende Untersuchung

Romanovskaja, Kristina 10 February 2011 (has links)
Magistro baigiamajame darbe lyginamuoju aspektu kalbama apie bažnyčios (konfesijų) nustatyta tvarka sudarytų santuokų teisinę prigimtį bei teisines pasekmes. Lyginimui su Lietuvos Respublika yra pasirinktas Lenkijos Respublikos bažnytinių santuokų teisinis reguliavimas. Ši valstybė yra pasirinkta dėl to, kad joje, kaip ir Lietuvoje, religija visuomenėje vaidina svarbų vaidmenį, istorinis katalikybės vaidmuo Lietuvoje ir Lenkijoje yra labai panašus, abu kraštai yra vadinami katalikiškais. Darbe yra nurodomas santuokos sudarymo formos. Aptariama bažnytinės santuokos samprata, jos santykis su civiline santuoka. Yra apžvelgiamas bažnytinių santuokos statusas skirtingais Lietuvos ir Lenkijos istorijos laikotarpiais. Daug dėmesio yra skiriama bažnytinių santuokų pripažinimo sąlygoms, nurodoma, kokių materialinių santuokos sudarymo sąlygų reikia laikytis sudarant bažnytinę santuoką tam, kad ji sukeltų tokias pačias teisines pasekmes kaip ir civilinė santuoka. Taip pat aptariami procedūriniai reikalavimai, keliami bažnytinėms santuokoms. Yra apžvelgiami minėtų valstybių teisės aktai, reglamentuojantys bažnytinių santuokų kelią į pripažinimą. Darbe bandoma nustatyti, kokių problemų Lietuvoje ir Lenkijoje kyla pripažįstant bažnytines santuokas. Yra analizuojamos jų teisinės pasekmės, atsiradimo laikas. Aptariama bažnyčios nustatyta tvarka sudarytų santuokų pabaiga bei joms taikoma jurisdikcija. Magistro baigiamojo darbo pabaigoje pateikiamos apibendrintos išvados bei pasiūlymai dėl... [toliau žr. visą tekstą] / -. / In der Magisterarbeit werden im vergleichenden Aspekt das rechtliche Wesen und die rechtlichen Folgen der Ehen, die in der von der Kirche (Konfession) festgelegten Ordnung abgeschlossen wurden, behandelt. Zum Vergleich mit der Republik Litauen wurde die rechtliche Regelung der kirchlichen Ehen in der Republik Polen herangezogen. Dieser Staat wurde deswegen gewählt, weil dort, wie auch in Litauen, die Religion eine wichtige Rolle in der Gesellschaft spielt, die historische Rolle des Katholizismus in Litauen und Polen sehr ähnlich ist und beide Länder als katholische Länder genannt werden. In der Arbeit werden die Formen des Eheabschlusses angeführt. Der Begriff der kirchlichen Ehe und ihr Verhältnis zur Zivilehe werden behandelt. Ein Übersicht des Status der kirchlichen Ehen in verschiedenen Zeiträumen der Geschichte von Litauen und Polen wird angeführt. Eine große Aufmerksamkeit wird den Bedingungen der Anerkennung der kirchlichen Ehen geschenkt, es wird angegeben, welche materielle Bedingungen zum Abschluss einer kirchlichen Ehe eingehalten werden müssen, damit sie dieselben rechtlichen Folgen wie eine Zivilehe hat. Ausserdem werden Vorschriften für Prozeduren des Abschlusses einer kirchlichen Ehen behandelt. Eine Übersicht von Rechtsakten der genannten Staaten, welche die Anerkennung der kirchlichen Ehen regeln, wird gemacht. Es wird versucht, in der Arbeit festzustellen, welche Probleme bei der Anerkennung der kirchlichen Ehen in Litauen und Polen entstehen. Die... [der volle Text, siehe weiter]
3

Are value-added models for high-stakes teacher accountability arbitrary and capricious?

Melhem, Leila Melanie 29 November 2012 (has links)
Value-added models are complex statistical formulas that aim to isolate the effect a teacher has on student learning. States and districts across the nation are adopting laws and policies that will evaluate teachers, in part, using the results provided by value-added models. In many states and districts, these evaluations will be used to inform high-stakes decisions about teacher salary and retention. However, value-added models are imperfect tools for assessing teacher effectiveness, and many scholars have argued that they are not appropriate for use in high-stakes decisions. This Article provides a brief history of the use of value-added models in public education and summarizes the major criticisms of using value-added models. In this context, the Article analyzes and evaluates the extent to which substantive due process claims brought by teachers adversely affected by the results of value-added models will be successful. The Article concludes that while the system as a whole is rationally related to the objective of improving the overall effectiveness of the teaching workforce, in certain cases, individual teachers will be able to successfully claim that the results of their value-added model led to a termination that was arbitrary and capricious. Finally, the paper offers some recommendations to states and school districts on how to implement an evaluation system using value-added models to avoid substantive due process violations. / text
4

Emergencias medicas em consultorio odontologico : implicações eticas e legais para o cirurgião dentista / Medical emergency in dental office : ethical and legal implications for the dentist

Caputo, Isamara Geandra Cavalcanti 13 August 2018 (has links)
Orientador: Eduardo Daruge Junior / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Odontologia de Piracicaba / Made available in DSpace on 2018-08-13T01:19:57Z (GMT). No. of bitstreams: 1 Caputo_IsamaraGeandraCavalcanti_M.pdf: 1294241 bytes, checksum: 2d36f854727c093fdc1742419a0a20a7 (MD5) Previous issue date: 2009 / Resumo: A Odontologia como profissão da área da saúde, têm mostrado uma enorme evolução em seus procedimentos, materiais e técnicas a fim de promover a reabilitação do complexo maxilo-mandibular. Independente de sua evolução, e infinitos horizontes que pode alcançar, ela não está livre de riscos que podem acontecer no seu dia-dia. O Cirurgião-Dentista (CD), em seu cotidiano laborativo está intimamente ligado com o risco de ocorrer em seu consultório uma emergência médica. Mesmo não sendo comuns, essas emergências podem acontecer em ambiente odontológico. Podem acometer qualquer indivíduo, antes, durante ou após a intervenção odontológica. Desta maneira além dos acometimentos relativos à saúde de seus pacientes o CD também está às vistas com as implicações legais que estas emergências geram para o profissional. Neste contexto, o CD tem que se ater a toda responsabilidade que tem para com o paciente, no sentido promoção de saúde, e no sentido legal. O CD deve estar preparado para todos os eventos que possam a vir a acontecer em seu ambiente de trabalho. Uma avaliação do estado geral de saúde de seus pacientes, adoção de medidas preventivas e jurídicas, dá maior segurança no atendimento. Em vista destes fatos, o presente estudo visou obter dados sobre as ocorrências de emergências médicas nos consultórios odontológicos na cidade de Ribeirão Preto - SP, se os CDs estão preparados para este tipo de atendimento, bem como, se conhecem as implicações éticas e legais as quais estão submetidos, além de oferecer aos profissionais uma orientação legal para esses possíveis acontecimentos, elucidando as implicações éticas e legais as quais estão impostos / Abstract: The Odontology as health profession has shown an enormous development in yours, and its procedures, materials and techniques in order to promote the rehabilitation of complex maxillo madibular. Independently of its development, and infinite horizons that can be achieved, it is not free of risk which may occur in their day-day. The Surgeon-Dentist, in their day work is closely linked with the risk of occur in your office A medical emergency. Even not being common, such emergencies may occur in the dental office. May tackle any individual, before, during or after the dentistry intervention. In this way higher than the events allied to the health of their patients the dentist is also engaged with the legal implications that these emergencies generate to professional. In this context, the dentist has to know to the entire responsibility for the patient, to health promotion, and in the sense legally. The dentist must be prepared for all the events that can happen in their workplace. An assessment of the general state of health of their patients, the adoption of the preventive and legal measures, gives greater security in service. In view of those facts, this study aimed at obtaining the occurrence of medical emergencies in the dental office in the city of Ribeirao Preto - SP, if the dentists are prepared for this type of care, as well as, if you know the ethical and legal implications which are submitted, in addition to offer professional legal guidance for such possible events, elucidating the ethical and legal implications which are subordinates / Mestrado / Odontologia Legal e Deontologia / Mestre em Biologia Buco-Dental
5

Treitering in Suid-Afrikaanse openbare skole en die regs-en onderwysbestuursimplikasies daarvan vir leerderveiligheid (Afrikaans)

Wentzel, Jan Andries 22 October 2008 (has links)
Navorsingsresultate toon dat treitering ‘n ernstige probleem is wat wêreldwyd voorkom, ook in Suid-Afrika en dat die getal slagoffers wat daardeur geraak word skrikwekkend hoog is. Die doel van hierdie studie is om die regsimplikasies van treitering van leerders deur mede-leerders in Suid-Afrikaanse openbare skole vir die onderwysbestuur en onderwysreg te ondersoek en te beskryf. Met die term “onderwysbestuur” word verwys na onderwys op nasionale vlak, provinsiale vlak en skolevlak. Die regsimplikasies vir die onderwysreg is hoofsaaklik daarin geleë dat daar nuwe kennis tot die onderwysreg toegevoeg word. Dit is aksiomaties dat regsimplikasies onlosmaaklik verbonde is aan regsreëls. Daar kan slegs sprake wees van regsimplikasies van ‘n aangeleentheid as daar regsreëls is wat die aangeleentheid beheer en rig – in die geval van hierdie studie, die regsreëls wat die bestuur en hantering van treitering in Suid-Afrikaanse openbare skole rig en beheer. Die regsreëls wat die bestuur en hantering van treitering in Suid-Afrikaanse openbare skole rig en beheer, is deel van die Handves, internasionale kinderregte-ooreenkomste, wetgewing, die gemene-reg, deliktereg, die strafreg en regspraak. Om die navorser in staat te stel om die regsreëls in ge-noemde regsbronne te identifiseer, is ‘n deeglike kennis van die fenomeen “treitering” noodsaaklik. Om die regsimplikasies van hierdie regsreëls te bepaal, beteken dat hierdie regsreëls binne die konteks van “treitering” as fenomeen geïnterpreteer moet word. Daar moet dus beskryf word hoe hierdie regsreëls toepassing vind met betrekking tot treitering. Die interpretasie van hierdie regsreëls binne die konteks van treitering geskied deur middel van semi-gestruktureerde onderhoude met geïdentifiseerde respondente wat geïdentifiseer is op grond van hul kennis van spesifieke regsdissiplines en die praktyk soos byvoorbeeld menseregte en kinderregte, die gemenereg, die deliktereg, die strafreg, die onderwysreg asook die regspraktyk en onderwysregspraktyk. Die beskrywing van die regsimplikasies vir die onderwysbestuur en onderwysreg is hoofsaaklik gegrond op die response (bevindinge) van die respondente, maar die regsimplikasies word uitgebrei deur die response van die respondente te verbind aan veelvuldige bronne van informasie. Hierdie aanvullende informasie wat aangewend word vir ryker beskrywing (“thick description”) lei ook die navorser tot die identifisering of beskrywing van verdere implikasies wat nie noodwendig in die respondente se response na vore gekom het nie. Die regsimplikasies van die treitering van leerders deur mede-leerders is omvattend en het implikasies vir die onderwysbestuur op nasionale vlak, provinsiale vlak, distriksvlak en skolevlak en wel ten opsigte van die volgende afdelings van die Suid-Afrikaanse reg: fundamentele regte, wet-gewing, die deliktereg en strafreg. ENGLISH: Research results indicate that bullying is a serious problem worldwide, South Africa included, and that the number of victims affected is alarmingly high. The purpose of this study is to investigate and describe the legal implications that bullying of learners by fellow learners in South African public schools has for education management and education law. “Education management” refers to education at national, provincial and school levels. The legal implications for education law lie mainly in the fact that new information is being added to the body of education law. It is axiomatic that legal implications are inextricably bound to legal rules. One can only speak of legal implications if there are legal rules that control and direct them – in the case of this study it is the legal rules that control and direct the management and operation of bullying in South African public schools. The legal rules that control and direct the management and operation of bullying in South African public schools are part of the Bill of Rights, international children’s rights conventions, legislation, common law, law of delict, case law and criminal law. A thorough knowledge of the phenomenon “bullying” was necessary to enable the researcher to identify the legal rules contained in the legal sources mentioned. In order to determine the legal implications of these legal rules, it was necessary to interpret these legal rules within the context of the phenomenon “bullying”. It was therefore necessary to describe how these legal rules are applied with regard to bullying. The interpretation of these legal rules within the context of bullying was done by means of semi-structured interviews with identified respondents who were identified on grounds of their knowledge of specific law disciplines and practice such as human rights and children’s rights, common law, the law of delict, criminal law, education law and legal practices and education law practices. The description of the legal implications for education management and education law is based mainly on the responses (findings) of the respondents, but the legal implications are extended by linking the responses of the respondents with many other sources of information. This supplementary information, which is used to enrich the description (thick description), also led the researcher to identifying or describing additional implications that were not necessarily evident from the responses of the respondents. The legal implications of the bullying of learners by fellow learners, are comprehensive and have implications for education management at national level, provincial level, district level and school level, especially in terms of the following sections of South African law: fundamental rights, legis-lation, the law of delict and criminal law. / Thesis (PhD)--University of Pretoria, 2008. / Education Management and Policy Studies / unrestricted
6

Cyber Security Risks and Opportunities of Artificial Intelligence: A Qualitative Study : How AI would form the future of cyber security

Kirov, Martin January 2023 (has links)
Cybercriminals' digital threats to security are increasing, and organisations seek smarter solutions to combat them. Many organisations are using artificial intelligence (AI) to protect their assets. Statistics show that the adoption of AI in cyber security worldwide has grown steadily over the past few years, demonstrating that more and more companies are searching for more effective methods than traditional ones. At the same time, some are cautious about its implementation. Previous research shows this is a topic of discussion in the cyber security branch. Researchers seek to understand further how AI is used, uncovering how it may benefit security and the challenges organisations face. Sweden is a country known for its high level of technological advancement and innovation, and it has seen a particularly significant increase in the integration of AI in cyber security practices. Using semi-structured interviews as the primary research method, a diverse range of companies, were interviewed regarding their viewpoints on the topic, both those implementing AI-based cyber security solutions and those who do not. The research objectives were to examine how companies in Sweden understand and perceive AI in cyber security, identify their perceived risks associated with any potential opportunities with AI adoption, and explore possible future developments in the field. Through in-depth interviews, participants discussed their experiences, concerns, and expectations surrounding the topic, showing anywhere from mixed to negative opinions from companies not utilising AI cyber security. This study shows how more research is needed to advance our understanding of AI cyber security and how it is implemented in companies. The study concludes that when showing interest in strengthening their security with the help of AI, organisations should consider the ethical and legal issues as well as the importance of choosing the right AI solutions. Professionals recommend AI implementation for companies wishing to increase cyber security defences in the rising and ever-changing cyber threats landscape. / Cyberbrottslingarnas digitala hot mot säkerheten ökar, och organisationer söker smartare lösningar för att bekämpa dem. Många organisationer använder artificiell intelligens (AI) för att skydda sina tillgångar. Statistik visar att användningen av AI inom cybersäkerhet världen över har ökat stadigt under de senaste åren, vilket visar att allt fler företag söker efter mer effektiva metoder än de traditionella. Samtidigt är vissa försiktiga vad gäller AI:s implementering. Tidigare forskning visar att detta är ett diskussionsämne inom cybersäkerhetsbranschen. Forskarna vill förstå mer om hur AI används, hur det kan gynna säkerheten och vilka utmaningar organisationerna står inför. Sverige är ett land som är känt för sin höga nivå av teknisk utveckling och innovation och man har sett en särskilt betydande ökning av integrationen av AI i cybersäkerhetspraxis i landet. Med hjälp av semistrukturerade intervjuer som primär forskningsmetod intervjuades en rad olika företag om deras syn på ämnet, både de som implementerar AI-baserade cybersäkerhetslösningar och de som inte gör det. Målet var att undersöka hur företag i Sverige förstår och uppfattar AI inom cybersäkerhet, att identifiera deras upplevda risker i samband med eventuella möjligheter med AI-adoption och utforska möjlig framtida utveckling inom området. Genom djupintervjuer diskuterade deltagarna sina erfarenheter, farhågor och förväntningar i ämnet, som visade allt från blandade till negativa åsikter från företag som inte använder AI i cybersäkerhet. Studien visar att det behövs ytterligare forskning för att öka vår förståelse för AI-cybersäkerhet och hur den ska implementeras i företag. Studien drar slutsatsen att organisationer som visar intresse för att stärka sin säkerhet med hjälp av AI bör ta hänsyn till etiska och juridiska frågor samt vikten av att välja rätt AI-lösningar. Experter rekommenderar att AI implementeras för företag som vill stärka sin cybersäkerhet i det ständigt ökande och föränderliga cyberhotslandskapet.
7

Cryptographic hash functions : cryptanalysis, design and applications

Gauravaram, Praveen Srinivasa January 2007 (has links)
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals such as authenticity, digital signatures, digital time stamping, and entity authentication. They are also strongly related to other important cryptographic tools such as block ciphers and pseudorandom functions. The standard and widely used hash functions such as MD5 and SHA-1 follow the design principle of Merkle-Damgard iterated hash function construction which was presented independently by Ivan Damgard and Ralph Merkle at Crypto'89. It has been established that neither these hash functions nor the Merkle-Damgard construction itself meet certain security requirements. This thesis aims to study the attacks on this popular construction and propose schemes that offer more resistance against these attacks as well as investigating alternative approaches to the Merkle-Damgard style of designing hash functions. This thesis aims at analysing the security of the standard hash function Cellular Authentication and Voice Encryption Algorithm (CAVE) used for authentication and key-derivation in the second generation (2G) North American IS-41 mobile phone system. In addition, this thesis studies the analysis issues of message authentication codes (MACs) designed using hash functions. With the aim to propose some efficient and secure MAC schemes based on hash functions. This thesis works on three aspects of hash functions: design, cryptanalysis and applications with the following significant contributions: * Proposes a family of variants to the Damgard-Merkle construction called 3CG for better protection against specific and generic attacks. Analysis of the linear variant of 3CG called 3C is presented including its resistance to some of the known attacks on hash functions. * Improves the known cryptanalytical techniques to attack 3C and some other similar designs including a linear variant of GOST, a Russian standard hash function. * Proposes a completely novel approach called Iterated Halving, alternative to the standard block iterated hash function construction. * Analyses provably secure HMAC and NMAC message authentication codes (MACs) based on weaker assumptions than stated in their proofs of security. Proposes an efficient variant for NMAC called NMAC-1 to authenticate short messages. Proposes a variant for NMAC called M-NMAC which offers better protection against the complete key-recovery attacks than NMAC. As well it is shown that M-NMAC with hash functions also resists side-channel attacks against which HMAC and NMAC are vulnerable. Proposes a new MAC scheme called O-NMAC based on hash functions using just one secret key. * Improves the open cryptanalysis of the CAVE algorithm. * Analyses the security and legal implications of the latest collision attacks on the widely used MD5 and SHA-1 hash functions.

Page generated in 0.4041 seconds