• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 284
  • 55
  • 51
  • 25
  • 19
  • 18
  • 17
  • 10
  • 7
  • 7
  • 5
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 587
  • 587
  • 233
  • 228
  • 183
  • 149
  • 105
  • 95
  • 81
  • 77
  • 75
  • 74
  • 71
  • 68
  • 68
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

The Protection of Pharmaceutical Patents and Data under TRIPS and US-Jordan FTA: Exploring the Limits of Obligations and Flexibilities: A Study of the Impacts on the Pharmaceutical Sector in Jordan

Abughanm, Saad 26 March 2012 (has links)
In 2000, Jordan signed the Agreement on Trade-related Aspects of Intellectual Property Rights (the TRIPS Agreement) and a free trade agreement with the US (USJFTA). Both commitments have required Jordan to comply with various obligations, including full compliance with the minimum standards for the protection of intellectual property rights (IPRs) under the TRIPS Agreement and TRIPS-Plus IP standards set out under the terms of the USJFTA. Enticed by views that strong IP protection would create prosperity in the Kingdom by promoting technological innovation and inducing transfer and dissemination of technology to Jordanians, Jordan implemented the provisions of TRIPS and the USJFTA to the letter. However, Jordan focused little attention on important “TRIPS flexibilities”. In particular, Jordan has qualified parallel importation and limited the grounds of compulsory licenses. In addition, Jordan provides pharmaceutical testing data with data exclusivity. This thesis focuses on the Jordanian experience in the pharmaceutical sector. It argues that strong patent protection has not been conducive to the promotion of technological innovation and the transfer and dissemination of technology. Moreover, this protection has resulted in adverse outcomes such as increased drug prices, unavailability of essential medicines in some public hospitals for serious diseases, and a dwindling local pharmaceutical industry, in part, as a consequence of its inability to access advanced, patented technology on reasonable commercial terms. The thesis also investigates the legitimacy of establishing certain grounds of compulsory licensing by Jordan, even in light of the TRIPS-Plus obligations under the USJFTA. It advocates that such grounds contribute to the promotion of technical innovation, lead to the transfer of advanced technology, and above all improve access to affordable medicines. Finally, the thesis explores Jordan’s obligations to protect pharmaceutical testing data under TRIPS and USFTA arguing that neither of these two instruments requires data exclusivity as claimed by Pharmaceutical Research and Manufacturers of America (PhRMA) and some developed countries.
232

Advance passenger information passenger name record : privacy rights and security awareness

Banerjea-Brodeur, Nicolas Paul January 2003 (has links)
An in-depth study of Advance Passenger Information and Passenger Name Record has never been accomplished prior to the events of September 11 th. It is of great importance to distinguish both of these concepts as they entail different legal consequence. API is to be understood as a data transmission that Border Control Authorities possess in advance in order to facilitate the movements of passengers. It is furthermore imperative that harmonization and inter-operability between States be achieved in order for this system to work. Although the obligations seem to appear for air carriers to be extraneous, the positive impact is greater than the downfalls. / Passenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation. / The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
233

Geo-immersive Surveillance and Canadian Privacy Law

Hargreaves, Stuart Andrew 09 January 2014 (has links)
Geo-immersive technologies digitally map public space for the purposes of creating online maps that can be explored by anyone with an Internet connection. This thesis considers the implications of their growth and argues that if deployed on a wide enough scale they would pose a threat to the autonomy of Canadians. I therefore consider legal means of regulating their growth and operation, whilst still seeking to preserve them as an innovative tool. I first consider the possibility of bringing invasion of privacy actions against geo-immersive providers, but my analysis suggests that the jurisprudence relies on a reasonable expectation of privacy approach that makes it virtually impossible for claims to privacy in public to succeed. I conclude that this can be traced to an underlying philosophy that ties privacy rights to an idea of autonomy based on shielding the individual from the collective. I argue instead considering autonomy as relational can inform a dialectical approach to privacy that seeks to protect the ability of the individual to control their exposure in a way that can better account for privacy claims made in public. I suggest that while it is still challenging to craft a private law remedy based on such ideas, Canada’s data protection legislation may be a more suitable vehicle. I criticize the Canadian Privacy Commissioner’s current approach to geo-immersive technologies as inadequate, however, and instead propose an enhanced application of the substantive requirements under Schedule 1 of PIPEDA that is consistent with a relational approach to privacy. I suggest this would serve to adequately curtail the growth of geo-immersive technologies while preserving them as an innovative tool. I conclude that despite criticisms that privacy is an inadequate remedy for the harms of surveillance, in certain commercial contexts the fair information principles can, if implemented robustly, serve to regulate the collection of personal information at source in a fashion that greatly restricts the potential for those harms.
234

Geo-immersive Surveillance and Canadian Privacy Law

Hargreaves, Stuart Andrew 09 January 2014 (has links)
Geo-immersive technologies digitally map public space for the purposes of creating online maps that can be explored by anyone with an Internet connection. This thesis considers the implications of their growth and argues that if deployed on a wide enough scale they would pose a threat to the autonomy of Canadians. I therefore consider legal means of regulating their growth and operation, whilst still seeking to preserve them as an innovative tool. I first consider the possibility of bringing invasion of privacy actions against geo-immersive providers, but my analysis suggests that the jurisprudence relies on a reasonable expectation of privacy approach that makes it virtually impossible for claims to privacy in public to succeed. I conclude that this can be traced to an underlying philosophy that ties privacy rights to an idea of autonomy based on shielding the individual from the collective. I argue instead considering autonomy as relational can inform a dialectical approach to privacy that seeks to protect the ability of the individual to control their exposure in a way that can better account for privacy claims made in public. I suggest that while it is still challenging to craft a private law remedy based on such ideas, Canada’s data protection legislation may be a more suitable vehicle. I criticize the Canadian Privacy Commissioner’s current approach to geo-immersive technologies as inadequate, however, and instead propose an enhanced application of the substantive requirements under Schedule 1 of PIPEDA that is consistent with a relational approach to privacy. I suggest this would serve to adequately curtail the growth of geo-immersive technologies while preserving them as an innovative tool. I conclude that despite criticisms that privacy is an inadequate remedy for the harms of surveillance, in certain commercial contexts the fair information principles can, if implemented robustly, serve to regulate the collection of personal information at source in a fashion that greatly restricts the potential for those harms.
235

SCRIPSIT : a model for establishing trustable privacies in online public spaces.

Rodda, Paul Trevor-John. January 2004 (has links)
This dissertation proposes a model supporting the creation of trustable privacies in public online spaces, with the model demonstrating the potential for supporting trustable data handling in the qualitative domain. Privacy and trust, from the pivotal perspective of the individual were identified as crucial intangibles in the qualitative research and personal trust domains. That both privacy and trust depend heavily upon credible mechanisms for privacy became clear during the literature review and interview processes. Privacy, in its many forms, is a concept requiring greatly varying degrees of anonymity, confidentiality and control (Rotenberg, 2001; Lessig, 1998) and this was position was validated by literature and by qualitative comments by academic interviewees. Facilitation of secondary users including academics, public and private organisations, communities, casual information browsers is a goal of this research. This goal of facilitation is supported by the model proposed, and is discussed in Chapter 6, where future work is discussed. The core requirement to address confidentiality, ethics, privacy, ownership and control of data (Corti, 2000) is satisfied by the model as proposed and discussed. Expected outcomes of this research project are summarised as: • Proposed model for the creation of trustable privacies in public spaces. [Primary outcome] • Promotion of collaboration amongst domains and disciplines through improved universal access to archived data [Secondary outcome] • Identification of application domains outside of the initially identified domain set [Secondary outcome]. Self-Contained ReposItory ProcesSIng Template (SCRIPSIT) describes a model supporting a decentralised, trustable set of structures and mechanisms. SCRIPSIT has its eponymous origin in the Latin word scripsit, meaning "he or she wrote". / Thesis (M.A.)-University of KwaZulu-Natal, Durban, 2004.
236

Quantifying steganographic embedding capacity in DCT-based embedding schemes.

Zawilska, Anna. January 2012 (has links)
Digital image steganography has been made relevant by the rapid increase in media sharing over the Internet and has thus experienced a renaissance. This dissertation starts with a discussion of the role of modern digital image steganography and cell-based digital image stego-systems which are the focus of this work. Of particular interest is the fact that cell-based stego-systems have good security properties but relatively poor embedding capacity. The main research problem is stated as the development of an approach to improve embedding capacity in cell-based systems. The dissertation then tracks the development of digital image stego-systems from spatial and naïve to transform-based and complex, providing the context within which cell-based systems have emerged and re-states the research problem more specifically as the development of an approach to determine more efficient data embedding and error coding schemes in cell-based stego-systems to improve embedding capacity while maintaining security. The dissertation goes on to describe the traditional application of data handling procedures particularly relating to the likely eventuality of JPEG compression of the image containing the hidden information (i.e. stego-image) and proposes a new approach. The approach involves defining a different channel model, empirically determining channel characteristics and using them in conjunction with error coding systems and security selection criteria to find data handling parameters that optimise embedding capacity in each channel. Using these techniques and some reasoning regarding likely cover image size and content, image-global error coding is also determined in order to keep the image error rate below 1% while maximising embedding capacity. The performance of these new data handling schemes is tested within cell-based systems. Security of these systems is shown to be maintained with an up to 7 times improvement in embedding capacity. Additionally, up to 10% of embedding capacity can be achieved versus simple LSB embedding. The 1% image error rate is also confirmed to be upheld. The dissertation ends with a summary of the major points in each chapter and some suggestions of future work stemming from this research. / Thesis (M.Sc.Eng.)-University of KwaZulu-Natal, Durban, 2012.
237

Personal information security : legislation, awareness and attitude.

Parbanath, Steven. 01 October 2013 (has links)
Ecommerce refers to the buying and selling of products and services electronically via the Internet and other computer networks (Electronic Commerce 2011). The critical components of ecommerce are a well designed website and a merchant account for payment by the customer (Ecommerce critical components 2008). Merchants that sell their products and services via the Internet have a competitive edge over those that do not. It is therefore becoming common practice for both small and large business to transact electronically. With the vast opportunities, new risks and vulnerabilities are introduced. Consumers are reluctant to transact electronically because of the fear of unauthorized access and interception of confidential information (Online Banking Concerns 2011). Other fears include the changing of data with malicious intent, denial of use, hacking, deliberate disclosure of confidential information and e-mail associated risks (Safeena, Abdulla & Date 2010). The use of technology such as encryption and decryption has not adequately addressed these problems because fraudsters have found new and sophisticated methods of attaining consumer information illegally. Phishing is one such method. Phishing results in identity theft and financial fraud when the fraudster tricks the online users into giving their confidential information like passwords, identity numbers, credit card number and personal information such as birthdates and maiden names. The fraudster will then use the information to impersonate the victim to transfer funds from the victim‟s account or use the victim‟s information to make purchases (Srivastava 2007). Since 2002, many laws passed in South Africa have attempted to allay fears so that consumers can conduct business electronically with confidence. The following legislation aims to protect consumers: - The Electronic Communications and Transactions Act (Republic of South Africa 2002). - The Consumer Protection Act (Republic of South Africa 2008). - The Protection of Personal Information Bill which is expected to be passed in 2011 (Republic of South Africa 2009). This research aims to examine the extent to which these legislation can address the security concerns of consumers. The researcher is also interested in ascertaining how knowledgeable consumers are on these legislation and what their attitudes are towards their personal information security. / Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2011.
238

The Protection of Pharmaceutical Patents and Data under TRIPS and US-Jordan FTA: Exploring the Limits of Obligations and Flexibilities: A Study of the Impacts on the Pharmaceutical Sector in Jordan

Abughanm, Saad 26 March 2012 (has links)
In 2000, Jordan signed the Agreement on Trade-related Aspects of Intellectual Property Rights (the TRIPS Agreement) and a free trade agreement with the US (USJFTA). Both commitments have required Jordan to comply with various obligations, including full compliance with the minimum standards for the protection of intellectual property rights (IPRs) under the TRIPS Agreement and TRIPS-Plus IP standards set out under the terms of the USJFTA. Enticed by views that strong IP protection would create prosperity in the Kingdom by promoting technological innovation and inducing transfer and dissemination of technology to Jordanians, Jordan implemented the provisions of TRIPS and the USJFTA to the letter. However, Jordan focused little attention on important “TRIPS flexibilities”. In particular, Jordan has qualified parallel importation and limited the grounds of compulsory licenses. In addition, Jordan provides pharmaceutical testing data with data exclusivity. This thesis focuses on the Jordanian experience in the pharmaceutical sector. It argues that strong patent protection has not been conducive to the promotion of technological innovation and the transfer and dissemination of technology. Moreover, this protection has resulted in adverse outcomes such as increased drug prices, unavailability of essential medicines in some public hospitals for serious diseases, and a dwindling local pharmaceutical industry, in part, as a consequence of its inability to access advanced, patented technology on reasonable commercial terms. The thesis also investigates the legitimacy of establishing certain grounds of compulsory licensing by Jordan, even in light of the TRIPS-Plus obligations under the USJFTA. It advocates that such grounds contribute to the promotion of technical innovation, lead to the transfer of advanced technology, and above all improve access to affordable medicines. Finally, the thesis explores Jordan’s obligations to protect pharmaceutical testing data under TRIPS and USFTA arguing that neither of these two instruments requires data exclusivity as claimed by Pharmaceutical Research and Manufacturers of America (PhRMA) and some developed countries.
239

Asmens duomenų teisinė apsauga tvarkant duomenis policijos informacinėse sistemose / Legal Protection of Personal Data while Processing them in Police Information Systems

Jucius, Žilvinas 20 March 2006 (has links)
Considering the fact, that unlawful administration of personal record may entail particularly severe results for the privacy, invulnerability of the individual, whose record is being administrated, these problems are even more relevant. The highest vulnerability of privacy exists in the sphere of IT. The privy of information and security of personal data is safeguarded by laws implementation and refining of the legal basis, related to this issue, by amplification of security supervision, by information to and lecturing of the society, by the usage of technologic devices. The article analyses the prospects of using CCTV in public places which, authors regard, could have a certain influence on the improvement of public security in the territory of coverage.
240

Dropbox & Co, alles schon ge-cloud?

Syckor, Jens 06 November 2014 (has links) (PDF)
Cloudspeicherdienste sind zu einem Standard für den Austausch großer Datenmengen in virtuellen Gemeinschaften geworden, sowohl im privaten Umfeld als auch im öffentlichen Bereich. Einfache Bedienbarkeit sowie nahtlose Integration in Applikationen, Betriebssystemen und Endgeräten sind wesentliche Bausteine dieses Siegeszuges.

Page generated in 0.5884 seconds