• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 284
  • 55
  • 51
  • 25
  • 19
  • 18
  • 17
  • 10
  • 7
  • 7
  • 5
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 587
  • 587
  • 233
  • 228
  • 183
  • 149
  • 105
  • 95
  • 81
  • 77
  • 75
  • 74
  • 71
  • 68
  • 68
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
341

Electronic multi-agency collaboration : a model for sharing children's personal information among organisations

Louws, Margie January 2010 (has links)
The sharing of personal information among health and social service organisations is a complex issue and problematic process in present-day England. Organisations which provide services to children face enormous challenges on many fronts. Internal ways of working, evolving best practice, data protection applications, government mandates and new government agencies, rapid changes in technology, and increasing costs are but a few of the challenges with which organisations must contend in order to provide services to children while keeping in step with change. This thesis is an exploration into the process of sharing personal information in the context of public sector reforms. Because there is an increasing emphasis of multi-agency collaboration, this thesis examines the information sharing processes both within and among organisations, particularly those providing services to children. From the broad principles which comprise a socio-technical approach of information sharing, distinct critical factors for successful information sharing and best practices are identified. These critical success factors are then used to evaluate the emerging national database, ContactPoint, highlighting particular areas of concern. In addition, data protection and related issues in the information sharing process are addressed. It is argued that one of the main factors which would support effective information sharing is to add a timeline to the life of a dataset containing personal information, after which the shared information would dissolve. Therefore, this thesis introduces Dynamic Multi-Agency Collaboration (DMAC), a theoretical model of effective information sharing using a limited-life dataset. The limited life of the DMAC dataset gives more control to information providers, encouraging effective information sharing within the parameters of the Data Protection Act 1998.
342

General Purpose Computing in Gpu - a Watermarking Case Study

Hanson, Anthony 08 1900 (has links)
The purpose of this project is to explore the GPU for general purpose computing. The GPU is a massively parallel computing device that has a high-throughput, exhibits high arithmetic intensity, has a large market presence, and with the increasing computation power being added to it each year through innovations, the GPU is a perfect candidate to complement the CPU in performing computations. The GPU follows the single instruction multiple data (SIMD) model for applying operations on its data. This model allows the GPU to be very useful for assisting the CPU in performing computations on data that is highly parallel in nature. The compute unified device architecture (CUDA) is a parallel computing and programming platform for NVIDIA GPUs. The main focus of this project is to show the power, speed, and performance of a CUDA-enabled GPU for digital video watermark insertion in the H.264 video compression domain. Digital video watermarking in general is a highly computationally intensive process that is strongly dependent on the video compression format in place. The H.264/MPEG-4 AVC video compression format has high compression efficiency at the expense of having high computational complexity and leaving little room for an imperceptible watermark to be inserted. Employing a human visual model to limit distortion and degradation of visual quality introduced by the watermark is a good choice for designing a video watermarking algorithm though this does introduce more computational complexity to the algorithm. Research is being conducted into how the CPU-GPU execution of the digital watermark application can boost the speed of the applications several times compared to running the application on a standalone CPU using NVIDIA visual profiler to optimize the application.
343

Sledování zaměstnanců při práci / Monitoring of employees during work

Holsteinová, Lenka January 2015 (has links)
THE MONITORING EMPLOYEES AT WORK The thesis deals with the legal protection of privacy and property in connection with the employees monitoring. The legal practice solves this problematic area in a different ways, which makes this topic highly actual. The thesis is composed of six chapters, each of them describes important aspects of the employees monitoring. First two chapters are introductory and define basic terminology and legal principles related to the personal data protection. Chapter Three focuses on the privacy as a fundamental human right and points out the issue of the confrontation with other values. Possibilities to enforce the right of privacy are outlined in the last part of this chapter. Chapter Four examines relevant Czech legislation concerning employees monitoring and personal data protection in labor law relations. The means of employees monitoring are analyzed in Chapter Five, which is subdivided into five parts - camera surveillance systems, correspondence confidentiality, internet use, GPS localization and biometric identification and authentication. Chapter Six seeks to describe the relevant Czech case law and illustrates the approach to decision-making by the administrative authority. The thesis strives for the brief analysis of employees monitoring in terms of generally binding...
344

Kamerové systémy na veřejných prostranstvích - zajištění bezpečnosti nebo ohrožení soukromí? / Camera systems in public spaces - ensuring safety or endangering privacy?

Tokárová, Michaela January 2014 (has links)
of the Thesis This thesis deals with a problem of surveillance in public spaces. In the introduction it was specifies that the main aim of the thesis is to give a complex view on the topic of surveillance cameras in public areas from the constitutional law perspective. In the Czech republic, no further discussion has developer and legislatively, the issue is only regulated by the personal data protection law. And this regulation is not even complex, it only deals with CCTV kind of cameras, excluding the ones without storing the data. In the beggining of the thesis I explai right to privacy and under which conditions it can be limited. The core of the paper deals with camera systems themselves, their use, pros, cons and effecitivity. Later I describe opinions of some offices and states on the topic. Proportionality test of the constitutional court and the ECHR to balance right to privacy with the state responsibility for public safety was conducted in the last part of the thesis. The advantage of CCTV is that thez provie impression of security to the citizens. They discourage potential perpetrators and help to maitain security of individuals, property and public interests, as well as detection, prevention and conviction of criminals. It helps securing proofs for future trials. On top of that, CCTV...
345

Právní aspekty Cloud computingu. SaaS jako forma cloudových služeb / Legal aspects of Cloud computing . SaaS as a form of Cloud services

Ohnišťová, Markéta January 2016 (has links)
The thesis provides legal insight of the Cloud computing with a particular focus on a specific cloud service called software as a service (SaaS). There are discussed all cloud services and distribution models of the cloud infrastructure as well as its legal aspects. The thesis analyses legal requirements of contractual provisions for a provision of the SaaS services. The substantial part deals also with types of licenses, which can be used in relation to the provision of the SaaS services. The practical part of the thesis firstly contains above all the legal framework of data protection and its legal requirements on contractual relation between provider and customer of the cloud Services. Secondly the abovementioned part provides a comparison between contractual provisions related to the processing and protection of data between two contracts, Google Apps for Work and Microsoft Office 365. Keywords Cloud computing, cloud, software as a service (SaaS), data protection, contract
346

Towards the effective utilisation of trade-related aspects of intellectual property rights flexibilities to improve access to essential medicines in Ghana

Kuudogrme, Barbara Bangfudem January 2018 (has links)
Magister Legum - LLM / Access to medicines is an essential component of the basic human right to health and a key determinant of the importance attached to the health care system of a country. It essentially entails the availability and acceptability of the essential medicines on the market and the ability of patients to afford such medicines when needed. Globally, countries face access to medicine challenges partly because of patents which undoubtedly accounts for excessive pricing of medicine. As such, efforts have been made to ensure the accessibility of medicines through the Trade-Related Aspect of Intellectual Property Rights (TRIPS) flexibilities of the World Trade Organisation (WTO). Beyond these interventions, it is incumbent on Members of the WTO to domesticate the flexibilities of the TRIPS Agreement before their utilisation because by their very nature, they cannot be self-executed. With an estimated population of 29.6 million, about 310 000 people in Ghana are living with HIV. The country’s health facilities record 40 per cent of outpatient visits each year and about 14 550 per 100 000 of the population are infected with tuberculosis with cancer on the rise. These diseases require medicines which are mostly patented yet Ghana has access to medicine problems despite the existence of a national health insurance system. Ghana has however not fully incorporated the TRIPS flexibilities in its national legislations and therefore unable to fully utilise the flexibilities as an option to access essential medicines. Questions therefore remain as to why and how Ghana can utilise the flexibilities to improve access to medicines. Based on an examination of the WTO’s patent system and legislations of Ghana, this mini- thesis contends that, the extent of incorporation of the flexibilities are inadequate due to the existence of lacunas in the Ghanaian legislations. Furthermore, a comparative assessment with South Africa supports an understanding that conditions are not ripe for full utilisation of all the flexibilities. It further argues that the utilisation of the TRIPS flexibilities by Ghana has been rendered ineffective due to administrative, political, economic and social challenges which adversely affects the full utilisation of the flexibilities incorporated and those yet to be incorporated. It is therefore important that Ghana adopts holistic approaches taking into consideration best practices if the TRIPS flexibilities must be effectively utilised. This mini-thesis concludes that, the TRIPS flexibilities are necessary for accessing essential medicines in Ghana to promote the right to health and that a review of Ghana’s current legislations to fully incorporate the TRIPS flexibilities and addressing other non-legal challenges are the required linchpin for effective utilisation of the TRIPS flexibilities.
347

Names, pseudonyms and anonymity in online interactions: a study of name policy on news24, the daily Maverick, and 4chan.

Donald, Katherine Faye January 2017 (has links)
A research report submitted to the Faculty of Arts, University of the Witwatersrand, Johannesburg, in partial fulfilment of the requirements for the degree of Master of Arts, Johannesburg, 2017 / This research investigates real names, pseudonyms, and anonymity online. From its small beginning as a research tool, the internet has grown radically and been increasingly incorporated into people’s daily lives. Simultaneously, as the internet has grown and changed, so have its uses, and perceptions of the naming practices used on it. Attitudes towards acceptable name use online have changed over time. Social networking sites have had a strong influence on name usage policies. This research examines how these attitudes have changed, and the implications of real names, pseudonyms and anonymity for behaviour on the internet and privacy. The radically disembodied nature of online communication lends itself to disinhibition, which in turn has resulted in online communications’ reputation for trolls and abusers. Contrary to the common assumption that the use of real names offline indicates the legitimacy of using real names online, online and offline communications are radically different. Online communications have very different considerations regarding privacy, identity theft, the digital footprint, and collapsed context, many of which are not present in offline communications. This paper examines naming policies and site structure through two case studies. The first case focuses on News24 and the Daily Maverick, both of which are South African news sites. Due to the need for rational and polite discourse, these implemented real name policies in order to enforce good behaviour amongst their users. In both cases, the real name policies failed. The second case study is that of 4chan, the American image board site. 4chan does not require any login process, and its users are typically anonymous. Despite being notorious for trolls, illegal content, and its image board /b/, the site’s architecture, along with the way that posts are created and then kept alive, mean that the site can be effective at moderating the kinds of content that it deems appropriate for each of its boards. Despite the contrasting nature and purposes of the news sites and 4chan, there are lessons to be learnt from the failure of real name policies, and the architecture and set up of sites which can be used to enforce particular behaviours. Furthermore, despite the ephemeral and shifting nature of 4chan, identity and a sense of belonging remain important to its users, hinting at the importance of a sense of identity to site members and the role of this identity in ensuring that users adhere to the norms. / XL2018
348

Ochrana osobních údajů v pracovněprávních vztazích / Personal data protection in labour law relationship

Morávek, Jakub January 2013 (has links)
PERSONAL DATA PROTECTION IN LABOUR LAW RELATIONSHIP JUDr. Jakub Morávek The thesis is concerned with personnel data protection in connection with labour-law relationships. Personnel data protection issue is approached completely here and explanation of it is organically interconnected with cases of its use in labour-law relationships. Factually the thesis is output of grant-aided project GAUK No. 121009 "Personnel data protection in labour-law relationships" researcher of which the author was in the years 2009 - 2012. By no chance the name of above mentioned grant-aided project is identical with the name of the thesis. From the very beginning of the research of the project a monograph dealing with personnel data protection in the context of labour-law relationships, or more precisely thesis dealing with this topic that would be published, was planned as its output. Within four years of intense engagement in personnel data protection in labour-law relationships, in three of which the author worked on above mentioned project, almost thirty articles and papers in professional periodicals and collections,monograph anda rigorous thesis focused on personnel data protection in the process of employment relationship commencement, monograph focused on personnel data protection in the process of personnel...
349

Problematické aspekty ochrany osobních údajů / Problematic Aspects of Personal Data Protection

Všetečková, Anna January 2018 (has links)
The thesis consists of five chapters, introduction and conclusion. The author of the thesis deals with introduction to the problematics of personal data protection and its relevance in the contemporary world in the introduction of the diploma thesis as well as with demarcation of the aims of the work. In the first chapter, the basic sources of legislation in the area of personal data protection are demarcated, both in Czech and in European and international level. In the second chapter, the attention is paid to the basics of the legislation in the area of personal data protection, whereas the author deals with demarcation of basic concepts, in the second subchapter she gives an overview of basic principles of personal data processing and in the third subchapter she summarizes legal titles for personal data processing. The institute of Data Protection Officer within the meaning of General Regulation is analysed in the third chapter. The first subchapter deals with demarcation of cases where the processor is obliged to designate the Data Protection Officer. The author pays attention to the problematics of requirements for qualification of the Data Protection Officer in the second subchapter. The major theme of third and fourth subchapter is demarcation of Data Protection Officers position to the controller...
350

Perception of employees concerning information security policy compliance : case studies of a European and South African university

Lububu, Steven January 2018 (has links)
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2018. / This study recognises that, regardless of information security policies, information about institutions continues to be leaked due to the lack of employee compliance. The problem is that information leakages have serious consequences for institutions, especially those that rely on information for its sustainability, functionality and competitiveness. As such, institutions ensure that information about their processes, activities and services are secured, which they do through enforcement and compliance of policies. The aim of this study is to explore the extent of non-compliance with information security policy in an institution. The study followed an interpretive, qualitative case study approach to understand the meaningful characteristics of the actual situations of security breaches in institutions. Qualitative data was collected from two universities, using semi-structured interviews, with 17 participants. Two departments were selected: Human Resources and the Administrative office. These two departments were selected based on the following criteria: they both play key roles within an institution, they maintain and improve the university’s policies, and both departments manage and keep confidential university information (Human Resources transects and keeps employees’ information, whilst the Administrative office manages students’ records). This study used structuration theory as a lens to view and interpret the data. The qualitative content analysis was used to analyse documentation, such as brochures and information obtained from the websites of the case study’s universities. The documentation was then further used to support the data from the interviews. The findings revealed some factors that influence non-compliance with regards to information security policy, such as a lack of leadership skills, favouritism, fraud, corruption, insufficiency of infrastructure, lack of security education and miscommunication. In the context of this study, these factors have severe consequences on an institution, such as the loss of the institution’s credibility or the institution’s closure. Recommendations for further study are also made available.

Page generated in 0.1304 seconds