• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 98
  • 39
  • 28
  • 25
  • 24
  • 8
  • 6
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 276
  • 68
  • 53
  • 50
  • 48
  • 44
  • 43
  • 43
  • 35
  • 34
  • 32
  • 31
  • 31
  • 26
  • 24
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Bundle Security: Verifying Confidentiality and Integrity for the Interplanetary Overlay Network

Lindner, Patricia J. 11 June 2019 (has links)
No description available.
42

Private Interests in the Public Domain: Provacy and Confidentiality in Observational Health Research

Emerson, Claudia I. A. 09 1900 (has links)
The expectation of privacy and confidentiality in health care presents a unique dilemma for public health interests. A great deal of observational health research such as epidemiological studies, disease surveillance, and quality assurance depends on access and use of personal information in the absence of individual consent. Understandably, this raises concerns about personal privacy since sensitive disclosures of information can result in harm such as stigma, discrimination, and loss of socio-economic goods. However, the issue has been largely framed and discussed as a dichotomy: the privacy interest of the individual versus the social interest in research. to individualist paradigm informed by a traditional liberal conception of privacy that emphasizes autonomy drives this dichotomy and inevitably leads to an intractable conflict. In this thesis, I attempt to re-frame the issue by moving away from individualism in shifting the focus towards confidentiality which is relational and founded on trust. I argue that confidentiality is broader than the concern for individual privacy and is thus capable of capturing other relevant interests, such as collective and social interests. I advance a broad conception of confidentiality grounded in a mixed deontic-consequentialist moral framework that can account for respect for persons and social interests. / Thesis / Doctor of Philosophy (PhD)
43

Article IV: Confidentiality Provisions

Pearson, Graham S., Sims, N.A. January 2000 (has links)
Yes
44

Confidentiality Among 18- to 24-Year-Old College Students: Exploring Strategies for Optimal Health Care Service Delivery

Tshireletso, Tapedza 20 September 2017 (has links)
No description available.
45

Telecommunication Network Security

Adeka, Muhammad I., Shepherd, Simon J., Abd-Alhameed, Raed January 2015 (has links)
Yes / Our global age is practically defined by the ubiquity of the Internet; the worldwide interconnection of cyber networks that facilitates accessibility to virtually all ICT and other elements of critical infrastructural facilities, with a click of a button. This is regardless of the user’s location and state of equilibrium; whether static or mobile. However, such interconnectivity is not without security consequences. A telecommunication system is indeed a communication system with the distinguishing key word, the Greek tele-, which means "at a distance," to imply that the source and sink of the system are at some distance apart. Its purpose is to transfer information from some source to a distant user; the key concepts being information, transmission and distance. These would require a means, each, to send, convey and receive the information with safety and some degree of fidelity that is acceptable to both the source and the sink. Chapter K begins with an effort to conceptualise the telecommunication network security environment, using relevant ITU-T2* recommendations and terminologies for secure telecommunications. The chapter is primarily concerned with the security aspect of computer-mediated telecommunications. Telecommunications should not be seen as an isolated phenomenon; it is a critical resource for the functioning of cross-industrial businesses in connection with IT. Hence, just as information, data or a computer/local computer-based network must have appropriate level of security, so also a telecommunication network must have equivalent security measures; these may often be the same as or similar to those for other ICT resources, e.g., password management. In view of the forgoing, the chapter provides a brief coverage of the subject matter by first assessing the context of security and the threat-scape. This is followed by an assessment of telecommunication network security requirements; identification of threats to the systems, the conceivable counter or mitigating measures and their implementation techniques. These bring into focus various cryptographic/crypt analytical concepts, vis a vis social engineering/socio-crypt analytical techniques and password management. The chapter noted that the human factor is the most critical factor in the security system for at least three possible reasons; it is the weakest link, the only factor that exercises initiatives, as well as the factor that transcends all the other elements of the entire system. This underscores the significance of social 2*International Telecommunications Union - Telecommunication Standardisation Sector 12 engineering in every facet of security arrangement. It is also noted that password security could be enhanced, if a balance is struck between having enough rules to maintain good security and not having too many rules that would compel users to take evasive actions which would, in turn, compromise security. The chapter is of the view that network security is inversely proportional to its complexity. In addition to the traditional authentication techniques, the chapter gives a reasonable attention to locationbased authentication. The chapter concludes that security solutions have a technological component, but security is fundamentally a people problem. This is because a security system is only as strong as its weakest link, while the weakest link of any security system is the human infrastructure. A projection for the future of telecommunication network security postulates that, network security would continue to get worse unless there is a change in the prevailing practice of externality or vicarious liability in the computer/security industry; where consumers of security products, as opposed to producers, bear the cost of security ineffectiveness. It is suggested that all transmission devices be made GPS-compliant, with inherent capabilities for location-based mutual authentication. This could enhance the future of telecommunication security. / Petroleum Technology Development Fund
46

Access to Government Micro-data for SME Internationalization Research

Niroui, Fariba January 2012 (has links)
International entrepreneurship (IE) is “a combination of innovative, proactive and risk-seeking behaviour that crosses national borders and is intended to create value in organizations”. The IE literature has been concerned with entrepreneurial behaviour in multiple countries and cross-border studies of entrepreneurship and international activities of small and medium-sized enterprises (SME). Due to the potential for SMEs to serve as significant sources of export, considerable research has been conducted regarding their internationalization. However, despite attempts to integrate concrete frameworks of international entrepreneurship, some primary issues have not been adequately addressed and IE researchers are faced with challenges including insufficient micro-data for advancing quality research. The main objective of this thesis is to study and explore the limitations on researchers to access governmental data regarding small firms operating internationally and use it for scientific purposes. Despite company data being compiled and publicly available in some countries, such as Germany, other countries, including Canada, have not made any such efforts in a coherent way. There is a significant disconnect in the Canadian context between internationalization and firms’ data. This shortcoming may stem from various sources, including the legal framework in Canada for accessing data and a lack of sufficient financial support and expertise to gather and integrate such data. Furthermore, the type of data available to the research community through statistical institutions were identified and analyzed, as were access methods. With the increasing interest of researchers in accessing data gathered by the government, the formation of anonymized records or anonymized micro-datasets has acquired great importance. Therefore, the primary approach is to explore the extent to which data regarding firms’ characteristics and internationalization activities are currently available to the research community, as well as to ensure the confidentiality of official statistics, most notably in the Canadian context. The research resulted in the confirmation of data availability in Canada through government and statistical organizations. The latter bodies can provide researchers and research organizations access to some data but limitations arise in providing micro-datasets to researchers due to confidentiality issues; these constraints were identified and further analyzed. Moreover, this research has studied methods to overcome these limitations and assess the shortcomings in micro-data in order to advance quality research. Methods and recommendations were introduced and studied to allow researchers access to essential data and information while maintaining confidentiality.
47

Access to Government Micro-data for SME Internationalization Research

Niroui, Fariba January 2012 (has links)
International entrepreneurship (IE) is “a combination of innovative, proactive and risk-seeking behaviour that crosses national borders and is intended to create value in organizations”. The IE literature has been concerned with entrepreneurial behaviour in multiple countries and cross-border studies of entrepreneurship and international activities of small and medium-sized enterprises (SME). Due to the potential for SMEs to serve as significant sources of export, considerable research has been conducted regarding their internationalization. However, despite attempts to integrate concrete frameworks of international entrepreneurship, some primary issues have not been adequately addressed and IE researchers are faced with challenges including insufficient micro-data for advancing quality research. The main objective of this thesis is to study and explore the limitations on researchers to access governmental data regarding small firms operating internationally and use it for scientific purposes. Despite company data being compiled and publicly available in some countries, such as Germany, other countries, including Canada, have not made any such efforts in a coherent way. There is a significant disconnect in the Canadian context between internationalization and firms’ data. This shortcoming may stem from various sources, including the legal framework in Canada for accessing data and a lack of sufficient financial support and expertise to gather and integrate such data. Furthermore, the type of data available to the research community through statistical institutions were identified and analyzed, as were access methods. With the increasing interest of researchers in accessing data gathered by the government, the formation of anonymized records or anonymized micro-datasets has acquired great importance. Therefore, the primary approach is to explore the extent to which data regarding firms’ characteristics and internationalization activities are currently available to the research community, as well as to ensure the confidentiality of official statistics, most notably in the Canadian context. The research resulted in the confirmation of data availability in Canada through government and statistical organizations. The latter bodies can provide researchers and research organizations access to some data but limitations arise in providing micro-datasets to researchers due to confidentiality issues; these constraints were identified and further analyzed. Moreover, this research has studied methods to overcome these limitations and assess the shortcomings in micro-data in order to advance quality research. Methods and recommendations were introduced and studied to allow researchers access to essential data and information while maintaining confidentiality.
48

CRM-system och utmaningar för dataskydd inom detaljhandel

Radvärn, Johan January 2021 (has links)
The purpose of this study is to investigate what new challenges CRM systems, Customer Relationship Management, have for the protection of personal data and security in retail. Today's IT development offers companies effective solutions for acquiring new customers and for retaining current customers. IT solutions such as data collection, data storage and analysis of data in real time are just a few examples of what a successfully implemented IT system can offer. CRM systems are the overall IT system solution that companies use, or show interest in using, to be competitive and ultimately achieve higher profits. The method chosen for this study is the research philosophy of pragmatism because it enables the use of different research methods which give a more accurate result. The study is mainly based on surveys and interviews and therefore both qualitative and quantitative methods are used. This study has examined four important variables, ie Privacy, Confidentiality, Integrity and Data Protection, to interpret and explain how these significantly affect the protection of personal data in the retail trade. Another result that emerged from the study is that the overall goal of CRM systems is to develop a strong and long-term customer relationship that minimizes costs and improves efficiency to meet and meet customer needs. Finally, the results of the study show that there is a great deal of awareness about the protection of personal data among consumers and in doing so it is concluded that the lack of protection of personal data among companies will lead to consumers choosing to leave companies. / Syftet med denna studie är att undersöka vilka nya utmaningar CRM-system, Customer Relationship Management, har för skyddet av personliga data och säkerhet inom detaljhandeln. Dagens IT-utveckling erbjuder företagen effektiva lösningar för att skaffa nya kunder samt för att behålla aktuella kunder. IT-lösningar såsom datainsamling, datalagring och analys av data i realtid är bara några exempel på vad ett lyckat implementerat IT-system kan erbjuda. CRM-system är den övergripande IT-systemlösningen som företagen använder, eller visar intresse för att använda, för att vara konkurrenskraftiga och slutligen uppnå högre vinster. Metoden som valts för denna studie är pragmatismens forskningsfilosofi eftersom den möjliggör användningen av olika forskningsmetoder vilka ger ett mer rättvisande resultat. Studien bygger huvudsakligen på undersökningar och intervjuer och därför används både kvalitativa och kvantitativa metoder. Denna studie har undersökt fyra viktiga variabler, det vill säga Privacy, Confidentiality, Integrity och Data Protection för att tyda och förklara hur dessa på ett väsentligt sätt påverkar skyddet av personliga data inom detaljhandeln. Ett till resultat som framkommit av studien är att det övergripande målet med CRM-system är att utveckla en stark och långsiktig kundrelation som minimerar kostnaderna och förbättrar effektiviteten för att möta och tillgodose kundens behov. Slutligen visar resultaten från studien att det finns stor medvetenhet kring skyddet av personliga data hos konsumenterna och därvid dras slutsatsen att det bristande skydd av personliga data hos företagen kommer att leda till att konsumenterna väljer att lämna företagen
49

Tystnadsplikt och en “professionell sköld” : - En kvalitativ studie om kuratorers och prästers upplevelser av att arbeta under tystnadsplikt.

Albihn, Ellen, Bäckström Östrand, Moa January 2023 (has links)
Syftet med denna kvalitativa studie är att undersöka yrkesverksamma kuratorers och prästers upplevelser och erfarenheter av att arbeta under tystnadsplikt. Utgångspunkten är att synliggöra och diskutera prästernas absoluta tystnadsplikt jämfört med kuratorernas tystnadsplikt som har vissa undantag. Empirin har samlats in genom semistrukturerade intervjuer med sex respondenter, tre från respektive yrkesgrupp. Empirin har sedan analyserats utifrån Hochschilds teori om emotionellt lönearbete samt Lazarus och Folkmans teori om coping. Studiens resultat visar att de olika typerna av tystnadsplikt både har för- och nackdelar och där stor vikt läggs vid de förväntningar som fanns innan de yrkesverksamma tog sig an rollen som kurator respektive präst. Båda yrkesgrupperna är nöjda med hur deras tystnadsplikt är utformad och de har funnit strategier för att hantera problem och känslor som kan uppstå relaterat till deras respektive tystnadsplikt. / The purpose of this qualitative study is to investigate the experiences of professional curators and priests in working under confidentiality. The starting point is to make visible and discuss the priests' absolute confidentiality compared to the curators' confidentiality, which has certain exceptions. The empirical data has been collected through semi-structured interviews with six respondents, three from each professional group. The empirical data has then been analyzed based on Hochschild's theory of emotional labor and Lazarus and Folkman's theory of coping. The results of the study show that the different types of confidentiality both have advantages and disadvantages, and where great emphasis is placed on the expectations that existed before the professionals took on the role of curator or priest. Both professional groups are satisfied with how their confidentiality is designed and they have found strategies to deal with problems and feelings that may arise related to their respective confidentiality.
50

Avaliação do processo de consentimento de participantes de pesquisa clínica / Evaluation of the consent process of clinical research participants

Nascimento, Talita Garcia do 25 August 2017 (has links)
O consentimento informado consiste em um processo capaz de informar o participante de pesquisa sobre as intervenções médicas previstas a serem aplicadas no decorrer do estudo e faz com que este participe ativamente no processo de tomada de decisão. O Termo de Consentimento Livre e Esclarecido (TCLE) caracteriza-se por ser um documento explicativo, de forma escrita, no qual são abordadas informações referentes ao projeto de pesquisa, com o objetivo de garantir a voluntariedade do indivíduo. A qualidade do TCLE em pesquisa clínica é determinada pelo grau de compreensão que os participantes desenvolvem durante o processo de consentimento informado. O objetivo deste estudo consiste em avaliar o processo de consentimento dos participantes de pesquisa clínica. Trata-se de um estudo híbrido, com coleta prospectiva. Para o seu desenvolvimento dividiu-se nas seguintes fases: Elaboração e validação do formulário, Treinamento da Equipe de Entrevistadores, Estudo Piloto, Coleta de Dados e Avaliação da Legibilidade dos TCLEs. Foi realizada análise descritiva dos dados e comparação entre as variáveis por meio de análises univariadas. Dos 70 participantes que compuseram a amostra, 83% eram mulheres, a média de idade foi de 46,7 anos (S ±13.99 anos), 55,7% eram brancos, 45,75% casados, 52,9% analfabetos ou com ensino fundamental, 49,3% economicamente ativos e renda média de 1496,2 reais. Dos participantes, 35,7% desconheciam o tipo de estudo que participavam 38,6% não sabiam contar sobre a pesquisa que participavam, 64,7% não receberam informações referentes a outros tipos de tratamento, 62,7% não tinham informações sobre indenização, 66,2% não leram todo o TCLE antes de assinar, 86,8% relataram que o documento foi fácil de ser lido, 62,2% acharam o documento longo. Após o cálculo do ILFK dos 12 TCLEs analisados, 100% apresentaram valor de 0 a 30, considerado como leitura muito difícil. É de suma importância incentivar o desenvolvimento de estudos nacionais que avaliem a percepção dos participantes de pesquisa quanto aos seus direitos e a criação de instrumentos que possibilitem essa verificação na população brasileira / Informed consent consists a process that is able to inform, the research participant, of the planned medical interventions to be apply during the course of the study, and actively participate in the decision-making process. The Informed Consent Form (ICF) characterized by being an explanatory document, in written form, in which information about the research project is addressed, with the purpose of guaranteeing the individual\'s willingness. The quality of ICF in clinical research determined by the degree of understanding that participants develop during the informed consent process. The objective of this study is to evaluate the consent process of clinical research participants. It is a hybrid study, with prospective collection. For its development, it divided into the following phases: Elaboration and validation of the form, Training of the Team of Interviewers, Pilot Study, Data Collection and Evaluation of the Readability of ICF. A descriptive analysis of the data and a comparison between the variables performed using univariate analyses. Of the 70 participants, 83% were women, mean age was 46,7 years (S ± 13.99 years), 55,7% were white, 45,75% married, 52,9% illiterate or basic education, 49,3% economically active and average income of 1496,2 Reais. Of the participants, 35,7% didn\'t know the type of study they participated in, 38,6% didn\'t know about the research they participated, 64,7% didn\'t receive information regarding other types of treatment, 62,7% didn\'t have information about compensation, 66,2% didn\'t read the entire ICF before signing, 86,8% reported that the document was easy to read, 62,2% found the document long. After the ILFK calculation of the 12 ICF analysed, 100% presented values from 0 to 30, considered as very difficult reading. It is extremely important to encourage the development of national studies that evaluate the perception of research participants regarding their rights and the creation of instruments that enable such verification in the Brazilian population

Page generated in 0.1054 seconds