• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 3
  • 1
  • Tagged with
  • 17
  • 8
  • 7
  • 7
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Tarifinio prekių klasifikavimo įtaka antidempingo muitų surinkimui / Influence of the tariff goods classification for the collection of antidumping customs duties

Zabalevičius, Justas 03 June 2014 (has links)
Šiame magistro baigiamajame darbe nagrinėjama tema „Tarifinio prekių klasifikavimo įtaka antidempingo muitų surinkimui“. Darbo tikslas – išanalizuoti tarifinio klasifikavimo taisykles ir principus bei jų taikymą praktikoje, siekiant atskleisti galimus antidempingo muitų netaikymo atvejus Lietuvos muitinėje. Darbo tikslas nurodo bendrą magistrinio darbo kryptį bei orientuojasi į problemos analizę teorine ir taikomąja prasme. Todėl darbe į tarifinio prekių klasifikavimo ir antidempingo muitų nustatymo vertinimą sritį žvelgiu per muitinės kontrolės prizmę. / The topic "Influence of the tariff goods classification for the collection of anti-dumping customs duties" is presented in this Master's concluding thesis. The goal of the work is to analyze the rules and principles of the tariff classification and their application in practice in order to disclose the possible non-application cases of anti-dumping customs duties in the Customs Department of Lithuania. The goal of the work indicates the general trend of the Master's work and is orientated towards the analysis of this problem in terms of theoretical and application aspects. Therefore, I am looking at the assessing sphere of the tariff goods classification and determination of anti-dumping customs duties through the control of the Customs Duties.
12

Essai sur la pratique hellénique du droit constitutionnel intermédiaire / Essay on the hellenic practice of intermediary constitutional law

Matiatos, Christoforos 13 March 2015 (has links)
Ce travail étudie, dans ses aspects juridiques, le processus des ruptures de continuité constitutionnelle et des dépassements de ces ruptures, au cours de l'histoire de l'État hellénique moderne. Processus par lequel un régime en place disparaît et un autre apparaît. Processus dans lequel la légitimation précède la légalisation. Processus qui réserve un sort varié à l'ordre constitutionnel antérieur et qui s'achève par l'élaboration d'un ordre nouveau. Ce processus s'étend sur une période que l'on pourrait qualifier d' « intermédiaire». La durée de celle-ci peut varier, et il arrive qu'elle soit d'une certaine longueur. Cela fut parfois le cas en Grèce. Mais cette période a son « droit », qui trouve une place dans le droit constitutionnel général, malgré les particularités qui le singularisent. / This work studies, in its legal aspects, the process of breaches of constitutional continuity and the way out of them, in the course of the history of the modern Greek State. Process by which a regime in power disappears and another appears. Process in which legitimation precedes legalization. Process that reserves a varied fate to the former constitutional order and ends with the establishment of a new order. This process extends over a period that could be called "intermediate". Its duration varies, and it happens to be of a certain length. This was sometimes the case in Greece. But this period has its "law" that has a place in the general Constitutional Law in spite of its peculiarities that make it particular.
13

An Exploration of Wireless Networking and the Management of Associated Security Risk

Collins, Helen Loretta 01 January 2015 (has links)
The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded the minimally accepted practices and standards for wireless networking. The security risk assessment and management model established the theoretical framework. The sample was 114 participants from small to medium IT organizations comprised of security engineers, managers, and end users. Data collection was via an online survey. Data analysis included both descriptive and inferential statistical methods. The results revealed that greater than 80% of participants conducted appropriate risk management and review assessments. This study underscored the need for a more comprehensive approach to managing IT security risks. IT managers can use the outcome of this study as a benchmark for evaluating their current risk assessment procedures. Experiencing security breaches in organizations may be inevitable. However, when organizations and industry leaders can greatly reduce the cost of a data breach by developing effective risk management plans that lead to better security outcomes, positive social change can be realized.
14

Managing Security Objectives for Effective Organizational Performance Information Security Management

Gutta, Ramamohan 01 January 2019 (has links)
Information is a significant asset to organizations, and a data breach from a cyberattack harms reputations and may result in a massive financial loss. Many senior managers lack the competencies to implement an enterprise risk management system and align organizational resources such as people, processes, and technology to prevent cyberattacks on enterprise assets. The purpose of this Delphi study was to explore how the managerial competencies for information security and risk management senior managers help in managing security objectives and practices to mitigate security risks. The National Institute of Standards and Technology framework served as the foundation for this study. The sample was made up of 12 information security practitioners, information security experts, and managers responsible for the enterprise information security management. Participants were from Fortune 500 companies in the United States. Selection was based on their level of experience and knowledge of the topic being studied. Data were collected using a 3 round Delphi study of 12 experts in information security and risk management. Statistical analysis was performed on the collected data during a 3 round Delphi study. The mean, standard deviation, majority agreement, and ranges were used to determine the final concensus for this research study. Findings of this study included the need for managerial support, risk management strategies, and developling the managerial and technical talent to mitigate and respond to cyberattacks. Findings may result in a positive social change by providing information that helps managers to reduce the number of data breaches from cyberattacks, which benefits companies, employees, and customers.
15

A Comprehensive and Comparative Examination of Healthcare Data Breaches: Assessing Security, Privacy, and Performance

Al Kinoon, Mohammed 01 January 2024 (has links) (PDF)
The healthcare sector is pivotal, offering life-saving services and enhancing well-being and community life quality, especially with the transition from paper-based to digital electronic health records (EHR). While improving efficiency and patient safety, this digital shift has also made healthcare a prime target for cybercriminals. The sector's sensitive data, including personal identification information, treatment records, and SSNs, are valuable for illegal financial gains. The resultant data breaches, increased by interconnected systems, cyber threats, and insider vulnerabilities, present ongoing and complex challenges. In this dissertation, we tackle a multi-faceted examination of these challenges. We conducted a detailed analysis of healthcare data breaches using the VERIS (Vocabulary for Event Recording and Incident Sharing) dataset. We delve into the trends of these breaches, investigate the attack vectors, and identify patterns to inform effective mitigation strategies. We conducted a spatiotemporal analysis of the VERIS and the Office of Civil Rights (OCR) datasets. We explored the geographical and temporal distribution of breaches and focused on the types of targeted assets to decipher the attackers' motives. Additionally, we conducted a detailed analysis of hospitals' online presence, focusing on their security and performance features. By comparing government, non-profit, and private hospitals in the U.S., we examined their security practices, content, and domain attributes to highlight the differences and similarities in the digital profiles of these hospital types. Furthermore, we expand our scope to include a comparative sector-based study investigating data breaches across various critical sectors. This broader view provides a contextual understanding of the healthcare sector's unique vulnerabilities compared to other sectors. Overall, this dissertation contributes fundamental insights into healthcare data breaches and hospitals' digital presence and underscores the urgent need for enhanced understanding and implementation of robust security measures in this vitally important sector, striving for a balance between technological advancement and data security.
16

Les droits de l'enfant : étude du droit français et du droit positif marocain à travers la source du droit musulman / The Rights of the Child : study of French law and Moroccan positive law through the source of Islamic law

El Qotni, Hanane 22 January 2013 (has links)
A partir d’idées purement théoriques sur l’enfance, fruits d’un bouleversement sociétal en occident au temps des Lumières, il a fallu des siècles pour accomplir le trajet conduisant à la reconnaissance juridique des droits de l’enfant : La Convention internationale des droits de l’enfant de 1989 marque l’aboutissement et le point de départ d’une nouvelle vision de l’enfant. Ainsi, les droits de l’enfant deviennent un enjeu politique et juridique pour tous les États qui l’ont ratifié dont la France et le Maroc. Si pour la France, la ratification de la CIDE a été le prolongement de réformes entamées au niveau interne, il s’agit pour le Maroc d’une première prise de conscience. Néanmoins, la reconnaissance des droits de l’enfant ne s’arrête pas au stade de la ratification symbolique du texte international. Les États parties doivent rendre effective les dispositions de la CIDE que ce soit au niveau de la norme ou en pratique. La mise en œuvre du texte international dont son applicabilité directe devant le juge, sa concrétisation dans le quotidien de l’enfant, l’adoption de sa philosophie et de sa nouvelle logique constitue les preuves de cette reconnaissance. En effet, c’est à ce stade là que les divergences entre les deux systèmes juridiques étudiés s’opèrent. Entre débordements et manquements, omniprésence et occasionalité, chaque contexte et chaque système juridique appréhende la question des droits de l’enfant, notamment son effectivité en dépend de son histoire, de son processus socioculturel, de son système politique et également de sa situation socioéconomique. De cette manière, la CIDE devient un outil parmi d’autre et non pas un objectif en soi. Au final ce sont les droits de l’enfant qu’on veut réaliser et non pas le compromis des États signataires de la Convention. / From purely theoretical ideas on the childhood, the fruits of a societal upheaval in west in the time of the Lights, were needed centuries to carry out the route leading to the legal recognition of children rights: the International Convention on the Rights of the Child of 1989 marks the outcome and the starting point of a new vision of the child. So, children rights became a political and legal stake for all the States which ratified it among which France and Morocco. If for France, the ratification of the CIDE was the continuation of reforms begun at the internal level, it is a question for Morocco of a first awarenessNevertheless, the recognition of children rights does not stop at the stage of the symbolic ratification of the international text. Involved states have to make effective the capacitieS of the CIDE whether it is at the level of the standard or in practice. The implementation of the international text among which its direct applicability in front of the judge, its realization in the everyday life of the child, the adoption of its philosophy and its new logic establishes the proofs of this gratitude. Indeed, it is at this stage that the differences between both studied legal systems take place.Between overflowing and breaches, omnipresence and occasionality, every context and every legal system dreads the question of children rights, in particular its effectiveness depends on its history, sociocultural process, political system and also its socioeconomic situation. In this way, the CIDE becomes a tool among of the other one and not the objective in itself. In the end it is the children rights which we want to realize and not the compromise agreed by the states who signed up the convention.
17

Les clauses contractuelles et non-concurrence : approche de droit des affaires / Contractual clauses of non-compete : from a Business Law perspective

Dufour, Maxime 08 December 2016 (has links)
Dans notre monde actuel, les entreprises utilisent, pour se prémunir de toute atteinte et protéger au maximum leurs intérêts économiques, des techniques contractuelles élaborées par la pratique telles que les clauses de non-concurrence, les clauses de confidentialité, les clauses de non-réaffiliation et les clauses de non sollicitation.Ces clauses occupent de multiples champs de l’activité contractuelle en mêlant le droit des contrats, le droit des affaires et le droit du travail. Elles visent à interdire au cocontractant, d’exercer une activité professionnelle, de divulguer des informations secrètes, ou encore d’embaucher certains collaborateurs. Ainsi, elles viennent limiter une liberté fondamentale, plus spécialement la liberté du commerce et de l’industrie. Dès lors, il semble nécessaire d’élaborer un régime juridique commun à toutes ces clauses afin de préserver d’un coté la protection de l’activité économique des entreprises et de l’autre la sauvegarde de la liberté économique des contractants soumis à de telles clauses. L’intérêt d’un régime commun est d’anticiper les conditions de validité et de mise en œuvre des ce type de clauses. De cette façon, la prévisibilité ne ferait plus défaut aux contractants. L’élaboration de ce droit commun passe par deux étapes. La première est relative à l’identification des clauses limitatives de concurrence. Il s’agit de saisir leur autonomie par rapport aux contrats dans lesquels elles peuvent être insérées et d’en tirer les conséquences au niveau leur validité. La seconde est relative à la mise en œuvre de ces clauses. Leur application est délicate car dépendante pour une grande partie de la précision de leur contenu. En cas de non-respect, un vaste choix de remèdes est offert au contractant déçu pour venir sanctionner le manquement contractuel constaté. / In the modern world, to guard themselves from damage and to protect at best their economical interests, companies use contractual techniques developed by usage such as non-compete clauses,confidentiality clauses, non-reaffiliation clauses and non-solicitation clauses. These clauses cover many fields of contractual legality, mixing contract law, labor law and business law. Their aim is to prohibit the co-contractor to practice a professional activity, to disclose secret information, or even to employ specific colleagues, or contributors. Thus, they are brought to restrict a fundamental freedom, specifically the freedom of trade and of industry. As a result, it appears necessary to formulate a common legal system for all these clauses so as to preserve on one side the protection of the economic activity of the companies et on the other side the safeguard of the economic freedom of the co-contractors subject to these clauses. The benefit of a common legal system is the anticipation of the conditions of validity and implementation of this type of clause. In this way, the cocontractants will not lack in foresight. The development of this common right is in two steps. This includes confirming their autonomy relative to the contracts in which they may be inserted and draw the necessary conclusions regarding their validity. The second step is relative to the implementation of these clauses. Their application is sensitive because it depends for the most part on the precision of their content. In case of a breach of contract, a large array of legal remedies is available to the aggrieved contractor to penalize the breach of contract.

Page generated in 0.0542 seconds