• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 120
  • 19
  • 16
  • 8
  • 8
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 2
  • 1
  • Tagged with
  • 254
  • 58
  • 49
  • 48
  • 35
  • 31
  • 30
  • 30
  • 29
  • 28
  • 24
  • 23
  • 22
  • 22
  • 21
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Liberdade de informação e proteção ao sigílo de fonte: desafios constitucionais na era da informação digital / Freedom of information and the protection of the reporters privilege: constitucional challenges in the age of digital information

Rodrigo Vidal Nitrini 20 May 2013 (has links)
Este trabalho procura debater a liberdade constitucional de informação sob um viés não usual ao direito constitucional brasileiro. Seu ponto de partida é a proteção ao sigilo de fonte para jornalistas profissionais, consagrada pelo texto constitucional. Essa regra parece pressupor uma distinção possível e clara entre jornalistas e demais cidadãos. Mas como compreendê-la em um cenário atual no qual: a) as condições tecnológicas permitem que qualquer cidadão, a um custo baixo ou quase inexistente, publique informações para um número indistinto de pessoas, e; b) o Supremo Tribunal Federal tenha reconhecido que o Estado não pode exigir a obtenção de um diploma de ensino superior para diferenciar a categoria de jornalistas? Logo, o pano de fundo deste trabalho é a possibilidade de o Estado diferenciar jornalistas de demais cidadãos com relação à concessão de prerrogativas para o exercício da liberdade de informação. Nos Estados Unidos, esse é um debate relevante ao menos desde a década de 1970. São apresentados seus principais aspectos: por um lado, a jurisprudência de sua Suprema Corte, que se negou sistematicamente a diferenciar direitos próprios à liberdade de imprensa (Press Clause) em comparação com a liberdade de expressão (Speech Clause); por outro, as abordagens funcional e institucional à liberdade de imprensa, composta respectivamente por autores favoráveis e críticos àquela linha jurisprudencial. Ao final, a partir de uma perspectiva crítica e da adoção de fundamentos jurídicos, busca-se analisar a regra constitucional do sigilo de fonte e propor parâmetros interpretativos para sua aplicação. / This paper seeks to debate the constitutional freedom of information under an aspect not common to Brazilian constitutional law. The departure point is the reporters privilege, constitutionally protected for professionals by law. That rule seems assume a possible and clear distinction between journalists and other citizens. But how to understand it under a scenario where: a) the technological conditions allow any citizen, with very cheap or barely existing costs, to publish information for an indistinct number of people, and; b) the Supreme Federal Court has recognized that the State may not license journalists by a college degree diploma? Thus, the background subject of this paper is the possibility that the State differentiates journalists from other citizens in regard to the concession of prerogatives for the exercise of the freedom of information. In the United States, this has been a relevant debate at least since de 1970s. The main aspects are presented: on one hand, the Supreme Courts case law that has systematically denied to differentiate exclusive rights deriving from the Press Clause in comparison to the Speech Clause; on the other hand, the functional and institutional approaches to freedom of the press, respectively representing the authors favorable and critics to that judicial construction. Finally, taking on from a critic perspective and adopting legal fundaments, it seeks to analyze the constitutional rule of the reporters privilege and to propose interpretative standards for it.
182

Whistleblower protection programs compromise the reported taxpayer's privacy

Andonie, Luisa January 2017 (has links)
The United States Whistleblower Program’s inadequate protections have placed the privacy and confidentiality rights of United States taxpayers in a vulnerable state. By using the United States Whistleblower Program as an example, this paper seeks to illustrate the risk of eroding the confidentiality and privacy rights of the taxpayer, which is a risk that other national and international governments should likewise attempt to mitigate in their own whistleblower protection programs.
183

In-house lawyer under the new German legislation

Mayer, Bernd R., Zeibig, Nicola January 2017 (has links)
Recently professional regulations regarding in-house lawyers have undergone a serious change that will profoundly change their occupational profile. This paper illustrates the legislative process that led to the new regulatory framework. It further discusses the potential problems arising from the cornerstones of professional conduct on the one hand and the typical daily tasks of in-house lawyers on the other hand.
184

Company-internal studies from the public prosecutor's perspective: a critical analysis of "10 years after Siemens"

Wimmer, Renate January 2017 (has links)
The processing of the "Siemens case" has not only triggered an unexpected compliance shaft in Germany but has also meant that in the meantime internal investigations are commissioned in nearly all the major public investigations for corruption or other economic crimes by the companies concerned. A critical analysis of "10 years after Siemens" shows that this trend has led to a variety of open legal issues and a different handling in the judicial practice. A legal regulation is likely to be inevitable in the long run.
185

Privilegium víry jako určité řešení rozporu mezi nově přijatou vírou a setrváním v manželství / Privilege of the faith

Fiřt, Josef January 2014 (has links)
This thesis aims to explore a historical development of legal rules (according to CIC 1983, as well as non-codex cannons ) with respect to the Privileges of the Faith, i.e. the ancient Privilegium Paulinum and the more recent Privilegium Petrinum. The thesis provides a comparison of the common elements and differences between both legal institutes, and furthermore an identification of the major causes leading to changes in the canonical regulations. Based on practical examples of the application of these legal institutes, it concludes by discussing a potential future development of their application (de lege ferenda).
186

Relationships between White Privilege, Organizational Belongingness, Racial Stereotypes, and Motivation to Lead

Vaughan-Bonterre, Scott Alexander 01 January 2017 (has links)
Despite changes in the law and efforts by organizational diversity practitioners to expand leadership opportunities for people of color, there is still a sharp contrast in the ratio of white leaders to leaders of color. While much research exists regarding the diversity disparity in leadership, there is little research on factors that influence the motivation to lead. The purpose of this correlational study was to test critical race and leader categorization theories by comparing how the independent variables of white privilege, organizational belongingness, and racial stereotypes affected the dependent variable of motivation to lead of black American versus white American survey respondents. It was hypothesized that the independent variables correlated stronger for white Americans than for black Americans in predicting the motivation to lead. A self-selected sample of 179 adults, drawn from various industries in the United States, completed a voluntary, online survey. A quantitative, cross-sectional survey was designed to operationalize study variables and was adapted from existing instruments. Pearson correlations and a multiple linear regression aided in statistically understanding the variables' relationships. Results indicated that effects of white privilege and racial stereotypes had a statistically significant relationship with motivation to lead for black Americans, and organizational belongingness did not. Results also indicated that effects of racial stereotypes had a significant relationship with motivation to lead for the white American population while the other variables did not. This study has implications for positive social change by not only adding a sharper focus on the factors necessary for leaders of color to be successful, but also providing diversity practitioners a north star to change the leadership landscape.
187

A War Over Uncertain Privileges: Alienation, Insecurity, and Violence in Post-2008Hollywood War Cinema

Peters, Paul Donald 24 September 2020 (has links)
No description available.
188

Frankenstein Unmasked : A Critical Analysis of “Otherness” in Frankenstein and its Significance for Establishing an Anti-Oppressive Education

Kourie, Nagham January 2023 (has links)
This essay analyzes the theme of “Otherness” in Mary Shelley's Frankenstein through three different lenses: queer readings, feminist readings, and disability studies, which will offer multiple perspectives of the “Otherness” present in the novel. The essay will engage with critics such as Benjamin Bagocius, Fuson Wang, and Colleen Hobbs. The aim of this essay is to utilize analyzed passages in Upper Secondary classrooms to cultivate critical thinking among students on issues of oppression and privilege in order to foster Anti-Oppressive education. The essay begins by introducing the concept of “Otherness” and its significance in Frankenstein. It then delves into the three different lenses and their perspectives on the theme of “Otherness.” Through these different readings, the essay demonstrates the complex and multi-layered nature of “Otherness” in Frankenstein. Furthermore, the essay argues that this analysis can be used to establish an Anti-Oppressive education in the Upper Secondary classroom. By critically examining how oppression and privilege operate in the novel, students can learn to recognize and challenge oppressive systems in society.  The essay then moves into a discussion of why an Anti-Oppressive education is necessary. Specifically, it briefly critiques the Swedish curriculum for addressing oppression in a way that increases tolerance towards marginalized groups, rather than recognizing privilege and challenging the systemic roots of oppression.
189

Prevention of Privilege Abuse on NoSQL Databases : Analysis on MongoDB access control / Förebyggande av Privilegier Missbruk på NoSQL-databaser : Analys på MongoDB-åtkomstkontroll

Ishak, Marwah January 2021 (has links)
Database security is vital to retain confidentiality and integrity of data as well as prevent security threats such as privilege abuse. The most common form of privilege abuse is excessive privilege abuse, which entails assigning users with excessive privileges beyond their job function, which can be abused deliberately or inadvertently. The thesis’s objective is to determine how to prevent privilege abuse in the NoSQL database MongoDB. Prior studies have noted the importance of access control to secure databases from privilege abuse. Access control is essential to manage and protect the accessibility of the data stored and restrict unauthorised access. Therefore, the study analyses MongoDB’s embedded access control through experimental testing to test various built-in and advanced privileges roles in preventing privilege abuse. The results indicate that privilege abuse can be prevented if users are granted roles composed of the least privileges. Additionally, the results indicate that assigning users with excessive privileges exposes the system to privilege abuse. The study also underlines that an inaccurate allocation of privileges or permissions to users of databases may have profound consequences for the system and organisation, such as data breach and data manipulation. Hence, organisations that utilise information technology should be obliged to protect their interests and databases from others and their members through access control policies. / Datasäkerhet är avgörande för att bevara datats konfidentialitet och integritet samt för att förhindra säkerhetshot som missbruk av privilegier. Missbruk av överflödig privilegier, är den vanligaste formen av privilegier missbruk. Detta innebär att en användare tilldelas obegränsad behörighet utöver det som behövs för deras arbete, vilket kan missbrukas medvetet eller av misstag. Examensarbetets mål är att avgöra hur man kan förhindra missbruk av privilegier i NoSQL-databasen MongoDB. Tidigare studier har noterat vikten av åtkomstkontroll för att säkra databaser från missbruk av privilegier. Åtkomstkontroll är viktigt för att hantera och skydda åtkomlighet för de lagrade data samt begränsa obegränsad åtkomst. Därför analyserar arbetet MongoDBs inbäddade åtkomstkontroll genom experimentell testning för att testa olika inbyggda och avancerade priviligierade roller för att förhindra missbruk av privilegier. Resultaten indikerar att missbruk av privilegier kan förhindras om användare får roller som har färre privilegier. Dessutom visar resultaten att tilldelning av användare med obegränsade privilegier utsätter systemet för missbruk av privilegier. Studien understryker också att en felaktig tilldelning av privilegier eller behörigheter för databasanvändare kan få allvarliga konsekvenser för systemet och organisationen, såsom dataintrång och datamanipulation. Därför bör organisationer som använder informationsteknologi ha som plikt att skydda sina tillgångar och databaser från obehöriga men även företagets medarbetare som inte är beroende av datat genom policys för åtkomstkontroll.
190

RBAC Attack Exposure Auditor. Tracking User Risk Exposure per Role-Based Access Control Permissions

Damrau, Adelaide 01 May 2023 (has links) (PDF)
Access control models and implementation guidelines for determining, provisioning, and de-provisioning user permissions are challenging due to the differing approaches, unique for each organization, the lack of information provided by case studies concerning the organization’s security policies, and no standard means of implementation procedures or best practices. Although there are multiple access control models, one stands out, role-based access control (RBAC). RBAC simplifies maintenance by enabling administrators to group users with similar permissions. This approach to managing user permissions supports the principle of least privilege and separation of duties, which are needed to ensure an organization maintains acceptable user access security requirements. However, if not properly maintained, RBAC produces the problem of role explosion. What happens when security administrations cannot maintain the increasing number of roles and their assigned permissions provisioned to the organization users? This paper attempts to solve this problem by implementing a scalable RBAC system and assigning each permission a risk value score determined by the severity of risk it would expose the organization to if someone had unauthorized access to that permission. Using RBAC’s role and permission design, each user will be assigned a risk value score determined by the summation of their roles’ risk based on permission values. This method allows security administrators to view the users and roles with the highest level of risk, therefore prioritizing the highest risk users and roles when maintaining user roles and permissions.

Page generated in 0.0486 seconds