• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 80
  • 28
  • 26
  • 25
  • 10
  • 7
  • 6
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 219
  • 44
  • 41
  • 32
  • 31
  • 22
  • 21
  • 20
  • 19
  • 18
  • 18
  • 18
  • 18
  • 18
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

"Utan samverkan hade vi som varit femma, sexa på bollen hela tiden..." : En studie om aktörers upplevelser av samverkan i sociala insatsgrupper / "Without cooperation we would have been fifth, sixth on the ball all the time..." : A study of actors experiences of cooperation in social intervention teams

Arvidsson, Lisa, Svehagen, Filippa January 2023 (has links)
Syftet med denna studie är att undersöka aktörers upplevelser av samverkan i sociala insatsgrupper (SIG). Frågeställningarna är; Hur organiseras arbetet och samverkan i sociala insatsgrupper, Hur uppleves samverkansarbetet av de involverade aktörerna och Vilka faktorer hämmar respektive gynnar samverkan. Studien är en kvalitativ forskningsstudie och har genomförts genom semi-strukturerade intervjuer med totalt sju respondenter. Respondenterna är verksamma aktörer inom sociala insatsgrupper i olika kommuner i Sverige. De aktörer som har intervjuats har varit socialsekreterare, samordnare/koordinatorer och socialpedagoger. Analysen av data har gjorts genom tematisk analys och genom den framkom tre teman för resultatet av studien. Dessa teman var; Uppkomsten av SIG-samverkan, Samverkans mål och mening och Faktorer som hämmar samverkan. / The purpose of this study is to examine actors’ experiences of cooperation in social intervention teams (SIT). The questions are as following; How is the work and the cooperation in social intervention teams organized, How do the actors experience the cooperation andWhat factors could stunt or favour the cooperation. The study has a qualitative research approach and has been implemented through semi structured interviews with a total of seven respondents. The respondents of this study have been social welfare secretaries, coordinators and social educationists. The analyze of data has been made through a thematic analyze method. The thematic analyze resulted in three themes for the study. The themes were; The emergence of SIT-cooperation, The goal and meaning of cooperation and Factors that stunt cooperation.
162

Secrecy and Fear in Confessional Discourse: Subversive Strategies, Heretical Inquisition, and Shifting Subjectivities in Vernacular Middle English and Anglo-French Poetry

Moreno, Christine M. 20 December 2012 (has links)
No description available.
163

Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel

Ho, Zuleita, Jorswieck, Eduard, Engelmann, Sabrina 21 October 2013 (has links) (PDF)
In heterogeneous dense networks where spectrum is shared, users' privacy remains one of the major challenges. On a multi-antenna relay-assisted multi-carrier interference channel, each user shares the spectral and spatial resources with all other users. When the receivers are not only interested in their own signals but also in eavesdropping other users' signals, the cross talk on the spectral and spatial channels becomes information leakage. In this paper, we propose a novel secrecy rate enhancing relay strategy that utilizes both spectral and spatial resources, termed as information leakage neutralization. To this end, the relay matrix is chosen such that the effective channel from the transmitter to the colluding eavesdropper is equal to the negative of the effective channel over the relay to the colluding eavesdropper and thus the information leakage to zero. Interestingly, the optimal relay matrix in general is not block-diagonal which encourages users' encoding over the frequency channels. We proposed two information leakage neutralization strategies, namely efficient information leakage neutralization (EFFIN) and local-optimized information leakage neutralization (LOPTIN). EFFIN provides a simple and efficient design of relay processing matrix and precoding matrices at the transmitters in the scenario of limited power and computational resources. LOPTIN, despite its higher complexity, provides a better sum secrecy rate performance by optimizing the relay processing matrix and the precoding matrices jointly. The proposed methods are shown to improve the sum secrecy rates over several state-of-the-art baseline methods.
164

Le secret des affaires / Confidentiality in business law

Garinot, Jean-Marie 17 November 2011 (has links)
En dépit de son importance pratique, le secret des affaires n’est guère pris en compte par le droit français. Bien que mentionné par quelques textes épars, il ne peut être qualifié de notion juridique. Face aux lacunes de notre législation, les tribunaux sont contraints d’appliquer le droit commun pour protéger les informations économiques sensibles : or, l’article 1382 du Code civil, comme les textes réprimant le vol et le recel, ne sont pas adaptés. Pourtant, comme en témoignent certains systèmes juridiques étrangers, la protection du secret est nécessaire ; il convient donc d’en rechercher les fondements. Bien que justifiée, la sauvegarde des renseignements confidentiels doit toutefois être conciliée avec les autres intérêts en présence, tels que les droits particuliers à l’information, les principes directeurs du procès, la transparence financière ou encore la liberté du travail. Le but de cette étude est donc de cerner la notion de secret des affaires, puis de proposer des modalités de protection, en respectant les intérêts des tiers. / Despite its practical relevance, business secrecy remains barely recognized under French law. Even if various texts refer to that concept, it cannot be considered as a legal concept under French law. In order to face the defects of our law, courts are bound to apply ordinary law to guarantee the protection of sensitive business information. However, applying article 1382 of the French civil code (torts) as well as referring to the concepts of robbery or handling (criminal law) are inappropriate solutions. Nevertheless, some foreign legal systems have demonstrated that protecting business secrecy was necessary. Therefore, our study will seek the grounds of that need for protection. Protecting confidential data, although justified, must be compatible with other key principles: individual rights to information, civil trial practice standards, financial transparency or freedom of work. Thus, the purpose of that study is to delimitate the concept of business secrecy before suggesting new measures to protect it while preserving third parties beneficiaries.
165

Le rôle de la banque dans la lutte contre le blanchiment d’argent : étude comparative entre le droit Libanais et le droit Canadien

Tayrouz, Rita 04 1900 (has links)
No description available.
166

Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel

Ho, Zuleita, Jorswieck, Eduard, Engelmann, Sabrina January 2013 (has links)
In heterogeneous dense networks where spectrum is shared, users' privacy remains one of the major challenges. On a multi-antenna relay-assisted multi-carrier interference channel, each user shares the spectral and spatial resources with all other users. When the receivers are not only interested in their own signals but also in eavesdropping other users' signals, the cross talk on the spectral and spatial channels becomes information leakage. In this paper, we propose a novel secrecy rate enhancing relay strategy that utilizes both spectral and spatial resources, termed as information leakage neutralization. To this end, the relay matrix is chosen such that the effective channel from the transmitter to the colluding eavesdropper is equal to the negative of the effective channel over the relay to the colluding eavesdropper and thus the information leakage to zero. Interestingly, the optimal relay matrix in general is not block-diagonal which encourages users' encoding over the frequency channels. We proposed two information leakage neutralization strategies, namely efficient information leakage neutralization (EFFIN) and local-optimized information leakage neutralization (LOPTIN). EFFIN provides a simple and efficient design of relay processing matrix and precoding matrices at the transmitters in the scenario of limited power and computational resources. LOPTIN, despite its higher complexity, provides a better sum secrecy rate performance by optimizing the relay processing matrix and the precoding matrices jointly. The proposed methods are shown to improve the sum secrecy rates over several state-of-the-art baseline methods.
167

Securing Wireless Communication via Information-Theoretic Approaches: Innovative Schemes and Code Design Techniques

Shoushtari, Morteza 21 June 2023 (has links) (PDF)
Historically, wireless communication security solutions have heavily relied on computational methods, such as cryptographic algorithms implemented in the upper layers of the network stack. Although these methods have been effective, they may not always be sufficient to address all security threats. An alternative approach for achieving secure communication is the physical layer security approach, which utilizes the physical properties of the communication channel through appropriate coding and signal processing. The goal of this Ph.D. dissertation is to leverage the foundations of information-theoretic security to develop innovative and secure schemes, as well as code design techniques, that can enhance security and reliability in wireless communication networks. This dissertation includes three main phases of investigation. The first investigation analyzes the finite blocklength coding problem for the wiretap channel model which is equipped with the cache. The objective was to develop and analyze a new wiretap coding scheme that can be used for secure communication of sensitive data. Secondly, an investigation was conducted into information-theoretic security solutions for aeronautical mobile telemetry (AMT) systems. This included developing a secure coding technique for the integrated Network Enhanced Telemetry (iNET) communications system, as well as examining the potential of post-quantum cryptography approaches as future secrecy solutions for AMT systems. The investigation focused on exploring code-based techniques and evaluating their feasibility for implementation. Finally, the properties of nested linear codes in the wiretap channel model have been explored. Investigation in this phase began by exploring the duality relationship between equivocation matrices of nested linear codes and their corresponding dual codes. Then a new coding algorithm to construct the optimum nested linear secrecy codes has been invented. This coding algorithm leverages the aforementioned duality relationship by starting with the worst nested linear secrecy codes from the dual space. This approach enables us to derive the optimal nested linear secrecy code more efficiently and effectively than through a brute-force search for the best nested linear secrecy codes directly.
168

Universal homophonic coding

Stevens, Charles Cater 11 1900 (has links)
Redundancy in plaintext is a fertile source of attack in any encryption system. Compression before encryption reduces the redundancy in the plaintext, but this does not make a cipher more secure. The cipher text is still susceptible to known-plaintext and chosen-plaintext attacks. The aim of homophonic coding is to convert a plaintext source into a random sequence by randomly mapping each source symbol into one of a set of homophones. Each homophone is then encoded by a source coder after which it can be encrypted with a cryptographic system. The security of homophonic coding falls into the class of unconditionally secure ciphers. The main advantage of homophonic coding over pure source coding is that it provides security both against known-plaintext and chosen-plaintext attacks, whereas source coding merely protects against a ciphertext-only attack. The aim of this dissertation is to investigate the implementation of an adaptive homophonic coder based on an arithmetic coder. This type of homophonic coding is termed universal, as it is not dependent on the source statistics. / Computer Science / M.Sc. (Computer Science)
169

Sekretess och tystnadsplikt inom offentlig och privat hälso- och sjukvård : ett skydd för patientens personliga integritet

Sandén, Ulrika January 2012 (has links)
This thesis focuses on the protection of the patient’s privacy in health care in Sweden. It is crucially important that the patient has confidence in the health care and that patient data are kept secret from other persons and authorities. A patient who is unsure about secrecy and confidentiality may choose not to provide data that could prove necessary for health care personnel to arrive at an accurate diagnosis. Some individuals might even avoid seeking medical help from fear that data may be spread to outsiders. Inadequate protection of sensitive data may lead to the confidence of citizens in health care eventually eroding or vanishing completely. Protection of patient privacy is thus of fundamental importance in this area. In the area of health care, the intention of the legislator is that the regulations regarding secrecy in public health care and confidentiality in private health care will guarantee protection of patient privacy. Secrecy in public health care is regulated mainly in Chapter 25, Section 1 of the Swedish Public Access to Information and Secrecy Act (2009:400). In private health care, confidentiality is regulated mainly in Chapter 6, Section 12, first paragraph, and Section 16 of the Swedish Act on Patient Safety (2010:659). The overall purpose of the thesis is to examine and analyse the legislator’s intentions and the juridical construction regarding the rules of secrecy and confidentiality, from the perspective of patient privacy. The starting point of the thesis is that the patient’s privacy should be strongly protected. One of the main conclusions is that the legal construction cannot be considered to be in accordance with the legislator’s intention that the regulation of patient privacy protection should constitute a strong protection for the patient’s privacy, be comprehensible, clear and easy to apply for health care personnel, as well as being the same in both public and private health care.
170

The economics of trade secrets : evidence from the Economic Espionage Act

Searle, Nicola C. January 2010 (has links)
This thesis reports on the economic analysis of trade secrets via data collected from prosecutions under the U.S. Economic Espionage Act (EEA.) Ratified in 1996, the EEA increases protection for trade secrets by criminalizing the theft of trade secrets. The empirical basis of the thesis is a unique database constructed using EEA prosecutions from 1996 to 2008. A critical and empirical analysis of these cases provides insight into the use of trade secrets. The increase in the criminal culpability of trade secret theft has important impacts on the use of trade secrets and the incentives for would-be thieves. A statistical analysis of the EEA data suggest that trade secrets are used primarily in manufacturing and construction. A cluster analysis suggests three broad categories of EEA cases based on the type of trade secret and the sector of the owner. A series of illustrative case studies demonstrates these clusters. A critical analysis of the damages valuations methods in trade secrets cases demonstrates the highly variable estimates of trade secrets. Given the criminal context of EEA cases, these valuation methods play an important role in sentencing and affect the incentives of the owners of trade secrets. The analysis of the lognormal distribution of the observed values is furthered by a statistical analysis of the EEA valuations, which suggests that the methods can result in very different estimates for the same trade secret. A regression analysis examines the determinants of trade secret intensity at the firm level. This econometric analysis suggests that trade secret intensity is negatively related to firm size. Collectively, this thesis presents an empirical analysis of trade secrets.

Page generated in 0.0367 seconds