• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 8
  • 4
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 62
  • 21
  • 16
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Informační síť hlavního představitele protirakouského odboje T. G. Masaryka v době první světové války / Information network of major representative of anti-Austrian resistance T. G. Masaryk in period of the First World War

KOUTSKÝ, Tomáš January 2016 (has links)
The main goal of this diploma thesis is analysis and reconstruction of the information network of major representative of anti-Austrian resistance abroad T. G. Masaryk in the First World War. The analysis and reconstruction will be put in context of contemporary events. Emphasis will be put on foreign and domestic information sources. It will show by which way and by whom was T. G. Masaryk informed about events in Bohemia and Austria-Hungary and what meaning this information had for his activities abroad.
52

Les prévôtés, de « la drôle de guerre » à « l'étrange défaite » (1939-1940). Personnels, missions, représentations / Provost gendarmerie, from “phoney war” to “strange defeat” (1939-1940)

Sait, Aziz 29 June 2012 (has links)
Dès le déclenchement de la mobilisation générale, le 2 septembre 1939, des centaines de détachements prévôtaux sont affectés aux unités françaises et aux armées alliées. Ils sont chargés, pendant les dix mois de la campagne de 1939-1940, du maintien de l’ordre sur les deux fronts métropolitains de la zone des armées : le Nord-Est et le front des Alpes. Incluse dans le système de contrainte qui pèse sur les cinq millions de mobilisés français, la gendarmerie prévôtale est appelée à remplir plusieurs missions. Elle traque les réfractaires à la mobilisation en lutant contre la désertion, les absences illégales et les violences des militaires. Elle assure également la gestion des prisons militaires tout en effectuant les transfèrements de détenus. Comme auxiliaire du commandement militaire, la prévôté veille à l’application des mesures organisant la nation en temps de guerre. Elle régule et discipline ainsi la circulation des militaires, surveille et restreint celle des civils afin de permettre la fluidité sur les routes empruntées par les troupes. La crainte d’une action subversive aux armées, amène aussi les prévôtés à prévenir et à contrecarrer les menées défaitistes. Le déclenchement des opérations actives, le 10 mai 1940, met la gendarmerie prévôtale à l’épreuve de la guerre de mouvement. Après le choc des Ardennes et la déroute des armées du Nord, elle se réorganise pour répondre aux tâches les plus urgentes : aiguiller la retraite des troupes, enrayer la panique et lutter contre les pillage. L’objectif est double : remplir une mission « ingrate » et mettre fin à la « légende noire » des prévôtés, héritée de la Première Guerre mondiale. / From the launching of general mobilization, on september 2nd 1939, hundreds of provost detachments are appointed to french units and to allied armies. They are loaded, during the ten months of the campaign of 1939-1940, the maintaining of order in the two fronts of the zone of armies: the North-East and the Alps. Included in the system of constraint which weighs on the five millions French mobilized, the provost gendarmerie is called to complete several missions. It tracks down recalcitrant to the mobilization and it struggles against desertion, irregular absences and soldiers violence. She also assures the management of the military prisons and prisoners' transferences. As assistant helper of the military command, the provost gendarmerie watches in the application of measurements organizing the nation in times of war. It regulates and disciplines the circulation of the soldiers, watches and restrains that of the civilians to allow fluidity on roads borrowed by troops. The fear of a subversive action in armies, also leads provost gendarmerie to warn and to prevent led defeatists. The launching of active operations, on may 10th, 1940, puts the provost gendarmerie in the test of the war of movement. After the shock of Ardennes and the crushing defeat of the armies of the North, it reorganizes itself to answer the most urgent tasks: direct the retirement of troops, check panic and struggle against depredation. Objective is double: commit a "ungrateful" mission and put an end to the «black legend » of the provost gendarmes, inherited from the First World war.
53

Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763) / Military intelligence and secret actions from the war of Austrian succession to the treaty of Paris (1740-1763)

Genêt, Stéphane 13 November 2010 (has links)
Ce travail aborde la question du renseignement militaire de la guerre de succession d’Autriche (1740) au traité de Paris (1763). Le renseignement militaire est d’abord replacé dans la réflexion stratégique de la période qui l’évoque peu tout en soulignent paradoxalement l’importance pour les armées. Les différentes sources de l’information militaire constituent la seconde partie. L’espion d’armée, figure méconnue de la période joue un rôle quotidien auprès des armées d’Ancien Régime. Situé à la marge de la société civile et de la sphère militaire, attiré par le gain mais aussi par le goût de l’aventure, une reconnaissance sociale ou incité par un patriotisme naissant, l’espion prend des risques pour satisfaire un commanditaire. La troisième partie s’intéresse au secret militaire, difficile à préserver et dévoilé dans une logique de réseau, à différentes échelles et selon des organisations plus ou moins complexes. L’espion s’inscrit dans un rapport personnel avec un supérieur dont il est le « client ». L’étude s’intéresse dans un dernier temps à la transmission et la protection du renseignement obtenu. Les risques sont divers (interception postale mais surtout espions ennemis). La conclusion pose la question de l’efficacité du renseignement militaire, peu décisif du fait des contraintes logistiques et de la méfiance généralisée sur les informations et sur les acteurs qui les collectent. Dans une période de structuration de l’armée et de centralisation du pouvoir politique, le renseignement militaire oppose un fonctionnement décentralisé. La nécessité d’une information fiable entraîne une militarisation des civils, transformant ces derniers en auxiliaires de renseignement. / This work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information.
54

Competitive intelligence with specific reference to the challenges facing the Competitive Intelligence Professional in South Africa

Odendaal, Bernardus Johannes 09 February 2005 (has links)
Natural tension exists between decision-makers and intelligence professionals. The main problems involve control over the gathering, interpretation, presentation, and the use of intelligence products in the decision-making process. Competitive intelligence (CI) professionals are rarely in a management position, and few managers and decision-makers have the necessary understanding of the value of intelligence products and thus intelligence is often misused or discarded. This situation results in intelligence failures and inappropriate strategic decisions by management. The methodology for the study was to determine the perceptions of CI professionals with regard to the current state of affairs of the CI function in the private sector. The study was conducted among members (n=74) of the South African Association of Competitive Intelligence Professionals. An overview of the development of CI within the South African context was also done, and interviews with key personalities practising CI in South Africa were conducted. The results indicated that many issues and challenges still face the CI professional in the South African environment, such as control over intelligence and the way in which it is used. There is a worrying tendency of third parties gathering intelligence, resulting in a situation where plausible denial is possible. Management perception/ignorance of the capabilities of intelligence in the decision-making process still needs to be addressed. There is also a need for recognition among CI professionals with regard to standards and representation. The CI field is still almost exclusively a male-dominated industry, with high barriers of entry in terms of academic qualifications. The conclusions are that a greater understanding of the requirements and needs of decision-makers, with regard to intelligence products, should be created. Decision-makers also need to understand the limits of intelligence products, and that intelligence products can only be compiled from information that has been gathered in a legal and ethical way. CI professionals have the responsibility to develop an indigenous body of knowledge as a means of making CI an accepted business practice and an indispensable tool in management decision-making. / Dissertation (M (Security Studies))--University of Pretoria, 2006. / Political Sciences / unrestricted
55

Modeling of Advanced Threat Actors: Characterization, Categorization and Detection

Villalón Huerta, Antonio 05 June 2023 (has links)
Tesis por compendio / [ES] La información y los sistemas que la tratan son un activo a proteger para personas, organizaciones e incluso países enteros. Nuestra dependencia en las tecnologías de la información es cada día mayor, por lo que su seguridad es clave para nuestro bienestar. Los beneficios que estas tecnologías nos proporcionan son incuestionables, pero su uso también introduce riesgos que ligados a nuestra creciente dependencia de las mismas es necesario mitigar. Los actores hostiles avanzados se categorizan principalmente en grupos criminales que buscan un beneficio económico y en países cuyo objetivo es obtener superioridad en ámbitos estratégicos como el comercial o el militar. Estos actores explotan las tecnologías, y en particular el ciberespacio, para lograr sus objetivos. La presente tesis doctoral realiza aportaciones significativas a la caracterización de los actores hostiles avanzados y a la detección de sus actividades. El análisis de sus características es básico no sólo para conocer a estos actores y sus operaciones, sino para facilitar el despliegue de contramedidas que incrementen nuestra seguridad. La detección de dichas operaciones es el primer paso necesario para neutralizarlas, y por tanto para minimizar su impacto. En el ámbito de la caracterización, este trabajo profundiza en el análisis de las tácticas y técnicas de los actores. Dicho análisis siempre es necesario para una correcta detección de las actividades hostiles en el ciberespacio, pero en el caso de los actores avanzados, desde grupos criminales hasta estados, es obligatorio: sus actividades son sigilosas, ya que el éxito de las mismas se basa, en la mayor parte de casos, en no ser detectados por la víctima. En el ámbito de la detección, este trabajo identifica y justifica los requisitos clave para poder establecer una capacidad adecuada frente a los actores hostiles avanzados. Adicionalmente, proporciona las tácticas que deben ser implementadas en los Centros de Operaciones de Seguridad para optimizar sus capacidades de detección y respuesta. Debemos destacar que estas tácticas, estructuradas en forma de kill-chain, permiten no sólo dicha optimización, sino también una aproximación homogénea y estructurada común para todos los centros defensivos. En mi opinión, una de las bases de mi trabajo debe ser la aplicabilidad de los resultados. Por este motivo, el análisis de tácticas y técnicas de los actores de la amenaza está alineado con el principal marco de trabajo público para dicho análisis, MITRE ATT&CK. Los resultados y propuestas de esta investigación pueden ser directamente incluidos en dicho marco, mejorando así la caracterización de los actores hostiles y de sus actividades en el ciberespacio. Adicionalmente, las propuestas para mejorar la detección de dichas actividades son de aplicación directa tanto en los Centros de Operaciones de Seguridad actuales como en las tecnologías de detección más comunes en la industria. De esta forma, este trabajo mejora de forma significativa las capacidades de análisis y detección actuales, y por tanto mejora a su vez la neutralización de operaciones hostiles. Estas capacidades incrementan la seguridad global de todo tipo de organizaciones y, en definitiva, de nuestra sociedad. / [CA] La informació i els sistemas que la tracten són un actiu a protegir per a persones, organitzacions i fins i tot països sencers. La nostra dependència en les tecnologies de la informació es cada dia major, i per aixó la nostra seguretat és clau per al nostre benestar. Els beneficis que aquestes tecnologies ens proporcionen són inqüestionables, però el seu ús també introdueix riscos que, lligats a la nostra creixent dependència de les mateixes és necessari mitigar. Els actors hostils avançats es categoritzen principalment en grups criminals que busquen un benefici econòmic i en països el objectiu dels quals és obtindre superioritat en àmbits estratègics, com ara el comercial o el militar. Aquests actors exploten les tecnologies, i en particular el ciberespai, per a aconseguir els seus objectius. La present tesi doctoral realitza aportacions significatives a la caracterització dels actors hostils avançats i a la detecció de les seves activitats. L'anàlisi de les seves característiques és bàsic no solament per a conéixer a aquests actors i les seves operacions, sinó per a facilitar el desplegament de contramesures que incrementen la nostra seguretat. La detección de aquestes operacions és el primer pas necessari per a netralitzar-les, i per tant, per a minimitzar el seu impacte. En l'àmbit de la caracterització, aquest treball aprofundeix en l'anàlisi de lestàctiques i tècniques dels actors. Aquesta anàlisi sempre és necessària per a una correcta detecció de les activitats hostils en el ciberespai, però en el cas dels actors avançats, des de grups criminals fins a estats, és obligatòria: les seves activitats són sigiloses, ja que l'éxit de les mateixes es basa, en la major part de casos, en no ser detectats per la víctima. En l'àmbit de la detecció, aquest treball identifica i justifica els requisits clau per a poder establir una capacitat adequada front als actors hostils avançats. Adicionalment, proporciona les tàctiques que han de ser implementades en els Centres d'Operacions de Seguretat per a optimitzar les seves capacitats de detecció i resposta. Hem de destacar que aquestes tàctiques, estructurades en forma de kill-chain, permiteixen no només aquesta optimització, sinò tambié una aproximació homogènia i estructurada comú per a tots els centres defensius. En la meva opinio, una de les bases del meu treball ha de ser l'aplicabilitat dels resultats. Per això, l'anàlisi de táctiques i tècniques dels actors de l'amenaça està alineada amb el principal marc públic de treball per a aquesta anàlisi, MITRE ATT&CK. Els resultats i propostes d'aquesta investigació poden ser directament inclosos en aquest marc, millorant així la caracterització dels actors hostils i les seves activitats en el ciberespai. Addicionalment, les propostes per a millorar la detecció d'aquestes activitats són d'aplicació directa tant als Centres d'Operacions de Seguretat actuals com en les tecnologies de detecció més comuns de la industria. D'aquesta forma, aquest treball millora de forma significativa les capacitats d'anàlisi i detecció actuals, i per tant millora alhora la neutralització d'operacions hostils. Aquestes capacitats incrementen la seguretat global de tot tipus d'organitzacions i, en definitiva, de la nostra societat. / [EN] Information and its related technologies are a critical asset to protect for people, organizations and even whole countries. Our dependency on information technologies increases every day, so their security is a key issue for our wellness. The benefits that information technologies provide are questionless, but their usage also presents risks that, linked to our growing dependency on technologies, we must mitigate. Advanced threat actors are mainly categorized in criminal gangs, with an economic goal, and countries, whose goal is to gain superiority in strategic affairs such as commercial or military ones. These actors exploit technologies, particularly cyberspace, to achieve their goals. This PhD Thesis significantly contributes to advanced threat actors' categorization and to the detection of their hostile activities. The analysis of their features is a must not only to know better these actors and their operations, but also to ease the deployment of countermeasures that increase our security. The detection of these operations is a mandatory first step to neutralize them, so to minimize their impact. Regarding characterization, this work delves into the analysis of advanced threat actors' tactics and techniques. This analysis is always required for an accurate detection of hostile activities in cyberspace, but in the particular case of advances threat actors, from criminal gangs to nation-states, it is mandatory: their activities are stealthy, as their success in most cases relies on not being detected by the target. Regarding detection, this work identifies and justifies the key requirements to establish an accurate response capability to face advanced threat actors. In addition, this work defines the tactics to be deployed in Security Operations Centers to optimize their detection and response capabilities. It is important to highlight that these tactics, with a kill-chain arrangement, allow not only this optimization, but particularly a homogeneous and structured approach, common to all defensive centers. In my opinion, one of the main bases of my work must be the applicability of its results. For this reason, the analysis of threat actors' tactics and techniques is aligned with the main public framework for this analysis, MITRE ATT&CK. The results and proposals from this research can be directly included in this framework, improving the threat actors' characterization, as well as their cyberspace activities' one. In addition, the proposals to improve these activities' detection are directly applicable both in current Security Operations Centers and in common industry technologies. In this way, I consider that this work significantly improves current analysis and detection capabilities, and at the same time it improves hostile operations' neutralization. These capabilities increase global security for all kind of organizations and, definitely, for our whole society. / Villalón Huerta, A. (2023). Modeling of Advanced Threat Actors: Characterization, Categorization and Detection [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/193855 / Compendio
56

Glaset är hotfullt : Trettio år av hotbilder i svenska nyhetsmedier / The glass is threatful : 30 years of "threat reporting" in Swedish news media

Fällman, Liz, Ekman Isholt, Mikael January 2024 (has links)
The purpose of this paper is to study how the discourse on risk, threat and national security has developed over time within the context of Swedish print news media. The articles we look at are from 1992-2023, and originate from four of Sweden’s largest national newspapers (Dagens Nyheter, Aftonbladet, Expressen, Svenska Dagbladet). By mapping out when and where something or someone is described as a “threat to national security”, and by whom, we want to analyze how the perceived threats against Sweden as a nation has changed and been communicated over time. Other than the foundational theory package that is media logic, our theoretical framework includes Ulrich Beck’s concept of risk and risk society, Noam Chomsky and Edward S. Herman’s propaganda model and the theory of securitization as laid out by the Copenhagen school. Earlier works we have built upon include (among many others) Bakir & Kitzinger’s extensive research on mediated risk, as well as Westberg’s interesting analysis of Sweden’s COVID-19 strategy and its elements of public shaming. Our study is a quantitative content analysis of a body of 301 articles, with occasional qualitative dives into specific parts of the material to give further context. The media archive and search engine Retriever was used to find every article from the four papers within the chosen timespan containing the phrases “hot mot rikets säkerhet”. (threat to national security) and “hot mot Sveriges säkerhet” (threat to Sweden’s security). The contents of the articles were encoded into several categories pertaining to our four questions, and graphed out to see patterns of frequency over time. We found a clear and dramatic increase in “threat reporting” from all four newspapers starting in 2017, peaking in 2019 and continuing at a higher level than before. A whole two-thirds of the 301 articles were published in or after 2017. The 2019 peak largely centers on the case of several imams accused of being security threats, which Expressen wrote the most about using the phrases in question. Expressen generally appears the most (103 articles), and Aftonbladet the least (40). Islamism was most commonly pointed out as a threat overall, followed by terrorism and extraparliamentary political action. In almost half of the articles, the Swedish Security Service (SÄPO) was the source designating something or someone as a threat. The most common countermeasure after investigation was deportation of the (foreign) threat in question, consistent with there being more articles that point to an individual as the threat (121) rather than another state actor (68).
57

Back to the Motherland : Repatriation and Latvian Émigrés 1955-1958

Zalkalns, Lilita January 2014 (has links)
This thesis is about a remarkable experience lived through by Latvian émigrés in the mid-1950s. They were the targets of a Soviet repatriation campaign, operated by the KGB, which not only envisioned their repatriation to the Soviet Latvian homeland, but also anticipated the destruction of their émigré society as they knew it. The purpose of this thesis is to portray and analyze this repatriation campaign and the émigré Latvian reactions to it. By looking at the activities of the Committee For Return to the Motherland in East Berlin, the contents of the Latvian language repatriation newspaper Par atgriešanos Dzimtenē (For Return to the Motherland), and the reactions to the campaign in contemporary émigré press, this study shows how highly developed strategies and tactics were implemented in order to elicit certain behaviors from émigrés, and how émigrés advanced their own counter-strategies to offset the effects of the campaign. More specifically, this study examines the standardized narratives in Par atgriešanos Dzimtenē that were meant for émigré self-identification and emulation. This thesis proposes that the repatriation campaign was a highly complex Soviet propaganda effort. The publicly announced goal of repatriation included several parallel goals, aims, and purposes and encompassed many types of activities. Above all, deception was used to cover the actions undertaken against émigrés and to mislead host country governments and agencies. This thesis concludes that notwithstanding the Soviet superiority in organization and resources, a small, unprotected, and internally divided community could withstand the concerted efforts of Soviet propaganda if the group’s sense of mission was sufficiently strong and firm. / Denna avhandling behandlar de lettiska flyktingarna från andra världskriget och deras erfarenheter av ofrivilliga kontakter med Sovjetlettland vid mitten av 1950-talet, då flyktingarna blev måltavla för en sovjetisk repatrieringskampanj. Målet för denna kampanj var repatriering, dvs att få flyktingarna att återvända till hemlandet, det av Sovjet ockuperade Lettland. Ett annat mål var att splittra flyktingarnas sammanhållning. Avhandlingen beskriver och analyserar den sovjetiska repatrieringskampanjen och de lettiska flyktingarnas reaktioner. Studien bygger på källmaterial från kampanjverkamheten Committee For Return to the Motherland, som hade sin bas i Östberlin, samt från artiklar i den lettiskspråkiga tidskriften Par atgriešanos Dzimtenē (For Return to the Motherland) som riktade sig till de lettiska flyktingarna. Flyktingarnas reaktioner studeras genom en rad lettiska tidningar som utgavs i Väst. Min avhandling visar hur väl utvecklade strategier användes i syfte att framkalla önskade reaktioner från flyktingarna, samt vilka motåtgärder flyktingar själva utvecklade mot repatrieringskampanjen. Mer specifikt analyseras standardberättelser i Par atgriešanos Dzimtenē som var avsedda för flyktingarnas självidentifiering och igenkännande. Avhandlingen pekar på att den sovjetiska repatrieringskampanjen var en mycket komplex propagandaverksamhet. Utöver det offentligt tillkännagivna kampanjmålet fanns flera parallella målsättningar och avsikter som omfattade en stor mängd skiftande aktiviteter. En strategi som användes aktivt var vilseledning, bl a för att dölja verksamheter riktade mot flyktingarna, och för att förvilla statsledningar och myndigheter i de nationer där flyktingarna vistades. Avhandlingens slutsats är att trots den sovjetiska överlägsenheten i organisation och resurser kunde en liten oförsvarad och inom sig splittrad lettisk gemenskap motstå de samordnade ansträngningar från den sovjetiska propagandan.
58

Mezinárodněprávní aspekty získávání informací zpravodajskými službami / International legal aspects of obtaining information by intelligence service

Hanžl, Pavel January 2015 (has links)
This diploma thesis deals with intelligence gathering and its international law aspects. The main research question of this diploma thesis is as follows: is the intelligence gathering legal from the point of view of international law? In light of recent scandals and accusations of secret services of illegal espionage, it is very important to find an answer to this question. There are almost no relevant Czech academic sources about this issue and foreign sources are rather contradictory. Included in the main research question are number of additional issues, such as: are there differences in legality between intelligence gathering during peacetime or wartime? What are the international law sources regarding espionage? Is the work of secret services affected by international law? Is international law relevant to espionage? As part of the introduction the diploma thesis outlines various intelligence gathering methods and defines relevant terms. The diploma thesis also addresses the issue of compatibility of espionage with the international law principle of non-intervention and state sovereignty. Next, three current approaches to the question of legality of espionage are presented to the reader and one new approach is introduced. Furthermore, the international implications of the unlawful behavior of...
59

Le contentieux du transfert de connaissances dans les relations entre l'Union européenne et la Chine / Knowledge transfer litigation and arbitration in European Union – China relationships

Quiniou, Matthieu 25 November 2015 (has links)
Face à la mutation des modalités des échanges internationaux et à l'accentuation du commerce de biens intellectuels entre entreprises de traditions différentes, des réajustements des modèles contractuels et un réordonnancement des modes de règlement des différends semblent inévitables. La nature juridique incertaine des connaissances secrètes, en Chine et dans l’Union européenne est un obstacle à la formalisation de leur transfert et par conséquent à la définit ion d’un cadre de résolution des différends adapté. Si les propositions de lois et de direct ive se multiplient pour définir cette notion et son régime, l’approche retenue est souvent limitée à la dimension délictuelle de la divulgation de la connaissance. La recherche menée, tout en tenant compte des atteintes portées au secret, se focalise principalement sur le transfert volontaire de connaissances. Pour répondre aux besoins des acteurs du commerce international, ces opérations ne peuvent plus être limitées aux seuls contrats de « communication de savoir - faire ». Si les notions de « bien intellectuel » et de « possession intellectuelle »permettent de justifier théoriquement d’autres formes contractuelles, les droits chinois et européen se réfèrent aux cessions et licences de connaissances. Ces opérations, souvent insérées dans un ensemble contractuel complexe et réalisées entre parties de cultures différentes,peuvent engendrer des différends variés. Lorsque ces différends apparaissent,le degré de confidentialité assuré devant les juridictions nationales étudiées ne permet pas de répondre aux attentes légitimes des parties. Les différences de cultures processuelles des parties et la culture chinoise du règlement amiable des différends invitent aussi à éviter le recours aux juridictions nationales. Les combinaisons entre médiat ion et arbitrage, par leur grande flexibilité procédurale, peuvent fournir un cadre de résolut ion adapté aux exigences tant économiques que culturelles des parties. Dans cet esprit, la thèse propose la mise en place d’un Règlement de M²arb avec un médiateur–expert, garant de la confidentialité du processus de résolut ion des différends. / Facing the evolution of international trade and the development of intellectual proper ty trade between companies from different backgrounds, contractual model readjustments and a reordering of dispute resolution systems seems unavoidable. The unsettled legal status of secret knowledge in China and in the EU can be an obstacle to the formalization of their transfer and therefore inhibits the definition of a suitable framework for resolving disputes. Legislators and scholars are currently debating proposals of laws and directives to elaborate this concept and its regime, but only address issues liketor t and disclosure of secret information. Legal scholarship to date has mainly been focused on the voluntary transfer of knowledge and has taken intoaccount the damage caused to secrets. To meet the needs of business operators, these operations should not be limited to "know-how communication contracts” (contrats de communication de savoir - faire). The concepts of “ intellectual good” and " intellectual ownership" theoretically justifyother types of contracts, while Chinese and European laws refer to assignment and license of trade secret . These operations, often provided for in a complexs et of contracts between parties from different cultural backgrounds, can lead to a wide variety of disputes. When disputes occur, national courts do not always provide a level of protect ion of confidential information that meets parties’ expectations. Differences in procedural cultures as well as the Chinese culture of amicable dispute settlement prevent the parties from relying on national courts. The combinations between mediation and arbitration, by their procedural flexibility, can provide a suitable dispute resolution framework taking into account economic and cultural considerations. Therefore, this thesis proposes M² arb Rules that introduce a mediator-expert with a mission of securing knowledge confidentiality during the dispute resolution process.
60

Konkurenční zpravodajství firmy / Competitive Intelligence of company

Donthová, Veronika January 2008 (has links)
This diploma work analyses existing competitive intelligence of the firm. Contains analysis of competitive intelligence awareness and its utilization like competitive advantage in Czech consulting companies. The work includes proposal for competitive intelligence strategy or recommendation and complementation of existing strategy.

Page generated in 0.0605 seconds