• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 80
  • 28
  • 26
  • 25
  • 10
  • 7
  • 6
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 219
  • 44
  • 41
  • 32
  • 31
  • 22
  • 21
  • 20
  • 19
  • 18
  • 18
  • 18
  • 18
  • 18
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Die reg op toegang tot inligting in publieke administrasie

Roberts, Benita Valera 30 November 2005 (has links)
The Constitution of the Republic of South Africa, 1996 (Act 108 of 1996) stipulates that every person has the right of access to information held by government. To give effect to this right, legislation in the form of the Promotion of Access to Information Act, 2000 (Act 2 of 2000) was promulgated. This study explores the access to information regime that was established by die aforementioned legislation with specific reference to similar regimes in the United States of America, Australia, New Zealand and Canada. Attention is also devoted to the prerequisites and potential obstacles associated with the implementation of the Promotion of Access to Information Act, 2000. Based on the practices in other states, the conclusion was reached that the nature of information that may be requested in the South African context should be expanded, that cabinet records should only be excluded to the extent that disclosure thereof would be harmful, that frequently requested records should be made automatically available and that decision-making guidelines of government institutions should be published. As far as procedural requirements are concerned, it is proposed that information officers should acknowledge receipt of requests and that, where necessary, records should be translated to ensure that they are useful to a requester. It is further proposed that the wording of the ground of refusal regarding policy formulation and decision-making in government institutions be amended to take account of the consequences of disclosure. It is imperative that appeal and review mechanisms be accessible to members of the public and it is therefore proposed that an information commissioner be instituted to settle disputes in information related matters. Lastly it is proposed that sanctions be imposed against officials who deliberately undermine the public's right of access to information and that separate units be established in government institutions to deal exclusively with requests for access to information. / Public Administration and Management / D. Litt. et Phil. (Public Administration)
202

Capacidade quântica de sigilo erro-zero e informação acessível erro-zero de fontes quânticas. / Quantum quantum-error-zero capability and accessible error-zero information from quantum sources.

COSTA, Elloá Barreto Guedes da. 01 October 2018 (has links)
Submitted by Johnny Rodrigues (johnnyrodrigues@ufcg.edu.br) on 2018-10-01T14:15:29Z No. of bitstreams: 1 ELLOÁ BARRETO GUEDES COSTA - TESE PPGCC 2013..pdf: 53314941 bytes, checksum: 3758326a173b3852e098b78e3e03a1fc (MD5) / Made available in DSpace on 2018-10-01T14:15:29Z (GMT). No. of bitstreams: 1 ELLOÁ BARRETO GUEDES COSTA - TESE PPGCC 2013..pdf: 53314941 bytes, checksum: 3758326a173b3852e098b78e3e03a1fc (MD5) Previous issue date: 2013-11-13 / CNPq / A Teoria da Informação Quântica é uma área de pesquisa a qual considera o estudo dos limites máximos possíveis para o processamento e transmissão da informação, considerando que esta última encontra-se representada de acordo com as leis da Mecânica Quântica. Uma das maneiras de contribuir com esta área de pesquisa é no desenvolvimento de contrapartidas quânticas para os conceitos da Teoria da Informação Clássica. Graças a esta abordagem é que foi proposta a Teoria da Informação Quântica Erro-Zero, a qual considera o uso e as condições para que canais quânticos ruidosos possam transmitir informação clássica sem erros de decodificação. Apesar da proposição desta teoria e dos progressos recentes, foi identificado que o conhecimento das potencialidades, limitações e aplicações desta teoria ainda é incipiente. Na tentativa de minimizar este problema, esta tese apresenta dois novos conceitos ligados à Teoria da Informação Quântica Erro-Zero: (i) a capacidade quântica de sigilo erro-zero; e a (ii) informação acessível erro-zero de fontes quânticas. Em relação à primeira contribuição, tem-se o estabelecimento das condições necessárias para enviar informação por canais quânticos ruidosos sem que haja erros de decodificação e com sigilo absoluto, identificando uma nova capacidade de canais quânticos, estabelecendo a relação desta capacidade com a Teoria dos Grafos e identificando as situações em que esta possui caracterização de letra isolada. A segunda contribuição trata da proposição de uma medida de informação sobre fontes quânticas, a qual mensura o potencial de decodificar, sem erros, estados quânticos emitidos por estas fontes. Obter esta medida é um problema análogo ao de calcular a capacidade erro-zero de canais clássicos equivalentes e não há medida equivalente na Teoria da Informação Erro-Zero Clássica. Os conceitos propostos colaboram para o desenvolvimento da Teoria da Informação Quântica Erro-Zero em termos teóricos e práticos, uma vez que é possível considerar implementações de ambas contribuições com tecnologia existente atualmente. Além disto, intersecções da Teoria da Informação Quântica Erro-Zero junto à Criptografia, Teoria dos Grafos e Ciência da Computação são identificadas. O estabelecimento de tais contribuições colabora diretamente para a resolução de um dos desafios da Teoria da Informação Quântica, o qual trata da determinação de limites para a classe de tarefas de processamento de informação que são possíveis considerando a utilização da Mecânica Quântica. / Quantum Information Theory is a research area that investigates the limits of information processing and transmission considering the laws of Quantum Mechanics. The translation of concepts from Classical Information Theory is a widely known approach to contribute to Quantum Information Theory. Thanks to that, the Quantum Zero-Error Information Theory was proposed. This theory investigates the use and the conditions for classical information exchange through noisy quantum channels without decoding errors. Despite the recent developments, it wasidentified that the knowledge about its potentialities, limitations and applications is still incipient. In the attempt to minimize this problem, this thesis presents two new concepts related to the Quantum Zero-Error Information Theory: (i) the quantum zero-error secrecy capacity; and the (ii) zero-error quantum accessible information. Regarding the first contribution, there is the establishment of the required conditions to send information through quantum channels without decoding errors and with perfect secrecy. This proposal identifies a new capacity of quantum channels, enlightens its relation with Graph Theory, and shows the situations where this capacity has single-letter characterization. Regarding the second contribution, there is the proposal of a quantum information measurement which quantifies the error-free decoding ability of a quantum source. Obtaining such measurement is a problem equivalent to the one of determining the zero-erro capacity of an equivalent classical channel and for which there is no counterpart in Classical Zero-Error Information Theory. The concepts proposed collaborate to Quantum Zero-Error Information Theory in theoretical and practical ways, since it is possible to implement both of them using current technology. Moreover, intersections with Cryptography, Graph Theory and Computer Science were identified. These concepts contribute straightforwardly to the resolution of a challenge of Quantum Information Theory which is the determination of the limits for the tasks of information processing that can be accomplished considering the use of Quantum Mechanics.
203

Evaluation of industrial wireless communications systems’ security

Soderi, S. (Simone) 07 June 2016 (has links)
Abstract The worldwide success of wireless communications was originally fueled by the possibility to replace existing cables with wireless solutions. This phenomenon imposed the development of security engineering as a multidisciplinary field. Although wireless solutions can reduce installation costs and allow introducing new services, the end–users expect it to have the same level of security as they would normally have with wired solutions. Secure communications is an important part of the overall security of industrial wireless communications systems (IWCS). The aim of this thesis is to develop new security engineering methodologies for IWCS. The author develops countermeasures against confidentiality and integrity attacks and carries out a security analysis covering the protocol, electromagnetic and physical layer. In the first part of the thesis, Host Identity Protocol (HIP) is utilized to secure communication in an intra–vehicular network. Simulations and measurement campaigns are also conducted to evaluate the impact of the overhead on security in a tunnel, considering line–of–sight (LOS) and non–LOS (NLOS) scenarios. Electromagnetic analysis (EMA) is an important step in the development of safety–related systems. Today, the increasing usage of smaller integrated circuit also increases the susceptibility to electromagnetic (EM) interference. From near–field (NF) to far–field (FF) transformation, a method for the evaluation of the emissions leakage is investigated. The virtual EM (VEM) interface of the device–under–test (DUT) is studied, and it is described how an adversary can exploit it for denial of service (DoS) attacks. An effective jamming attack model is studied, and the theoretical calculations are validated with experiment–based results. Finally, focusing attention on physical layer security, two algorithms are developed. Active radio frequency fingerprinting (RFF) implements the exchange of a public key during the setup of secure communication. Afterwards, utilizing a jamming receiver in conjunction with the spread spectrum (SS) watermarking technique, the watermark–based blind physical layer security (WBPLSec) protocol is presented. The analysis and results indicate how the WBPLSec seems to be a valuable technique for deploying physical layer security by creating a secure region around the receiver. / Tiivistelmä Langattoman tietoliikenteen maailmanlaajuista suosiota kiihdytti alun perin mahdollisuus korvata tietoliikennejärjestelmissä käytetyt kaapelit langattomilla ratkaisuilla. Ilmiö lisäsi myös tarvetta kehittää alan turvatekniikkaa monialaisen tutkimuksen pohjalta. Vaikka langattomat ratkaisut merkitsevät pienempiä asennuskustannuksia ja tarjoavat mahdollisuuksia luoda uudenlaisia palveluja, järjestelmien loppukäyttäjät edellyttävät kuitenkin niiden turvallisuuden olevan vastaavalla tasolla kuin langallisissa verkoissa. Myös teollisuuden langattomien tietoliikennejärjestelmen turvallisuus riippuu pitkälti viestintäkanavien turvallisuudesta. Väitöksen tavoitteena on kehittää uusia menetelmiä, joilla teollisuuden langattomat tietoliikennejärjestelmät voitaisiin turvata. Väitöksessä kehitetään toimenpiteitä tietoliikennejärjestelmien luottamuksellisuuteen ja koskemattomuuteen kohdistuvia hyökkäyksiä vastaan ja toteutetaan turvallisuusarviointi, joka kattaa järjestelmän protokollakerroksen sekä sähkömagneettisen ja fyysisen kerroksen. Väitöksen ensimmäisessä osassa hyödynnetään HIP–protokollaa (Host Identity Protocol) liikennevälineen sisäisen tietoliikennejärjestelmän turvallisuuden varmistamisessa. Lisäksi siinä kuvataan simulaatiot ja mittaushankkeet, joiden tavoitteena on arvioida käytetyn protokollan turvallisuusvaikutuksia esteettömän (line–of–sight, LOS) ja esteellisen (non–line–of–sight, NLOS) näköyhteyden tapauksissa. Sähkömagneettinen analyysi on tärkeä vaihe turvajärjestelmien kehitysprosessissa. Järjestelmissä käytetään yhä enemmän pieniä integroituja piirejä, mikä voi myös altistaa ne sähkömagneettisille (electromagnetic, EM) häiriöille. Väitöksessä tutkitaan lähikenttä–kaukokenttä -muunnokseen perustuvan arviointimenetelmän avulla sähkömagneettisen vuotosäteilyn tasoa. Lisäksi perehdytään testattavan laitteen (device under test, DUT) virtuaaliseen EM–liitäntään ja kuvataan, miten vastaavaa liitäntää voidaan hyödyntää palvelunestohyökkäyksissä. Väitöksessä tutkitaan myös tehokasta häirintämallia ja validoidaan teoreettisten laskelmien tulokset kokeellisesti. Lopuksi väitöksessä keskitytään tietoliikennejärjestelmän fyysisen kerroksen turvallisuuteen ja kehitetään kaksi algoritmia. Aktiivisen radiotaajuisen tunnistusmenetelmän avulla voidaan vaihtaa julkisia avaimia turvallista tietoliikenneyhteyttä muodostettaessa. Lisäksi esitellään vesileimausmenetelmään perustuva fyysisen kerroksen salausmenetelmä, WBPLSec. WBPLSec luo vastaanottimen ympärille suoja–alueen, minkä ansiosta se vaikuttaa analyysin ja tutkimustulosten perusteella olevan tehokas menetelmä toteuttaa fyysisen kerroksen suojaus.
204

La fraude en droit de la protection sociale / Social security fraud

Zarli Meiffret Delsanto, Kristel 15 December 2016 (has links)
Le déficit des finances sociales a légitimé le développement d’un arsenal de lutte contre la fraude. La répression pénale traditionnelle, hétérogène et peu mobilisée, s’articule désormais avec une nouvelle répression administrative. Leur complémentarité offre une réponse proportionnée à la gravité des manquements constatés, sans sacrifice des droits des usagers grâce à l’emprise des principes du droit punitif. Les moyens de détection des organismes sont également adaptés pour appréhender la diversité des situations frauduleuses. Les organismes de recouvrement comme les organismes prestataires sont impliqués. Progressivement, les prérogatives générales de contrôle des acteurs convergent et sont renforcées, parfois au détriment des garanties des usagers. À ce titre, le droit du contrôle URSSAF devrait servir de modèle. Les croisements d’informations sont multipliés pour permettre une détection des fraudes et emporter, plus largement, une modernisation du fonctionnement des organismes conciliable avec les droits des usagers. Ce droit de la lutte contre la fraude est avant tout commandé par un souci de protection des finances sociales. Pour autant, la protection des ressources et les droits usagers pourraient, sous la vigilance des juges, ne plus être opposés, au prix de quelques évolutions. En particulier, une définition unitaire de la fraude sociale paraît nécessaire puisque la sécurité juridique des usagers et la cohérence du dispositif en dépendent / The profound deficit of social finance has legitimised the development of an arsenal against fraud. Traditional penal sanctions, which are partially harnessed, now interact with administrative sanctions. Their complementarity offers a proportionate response. This diversification of enforcement policy does not however bring into question the rights of users due to the influence of the principles of punitive law. The social security bodies’ means of detection are also suited to handling the variety of fraudulent situations. Debt recovery agencies as well as social security bodies providing services are involved. The provider bodies now assume their part in the monitoring of the issuing of benefits. Controls are indeed no longer just for debt recovery agencies. Gradually, the general prerogatives of controls have converged and have been reinforced, sometimes to the detriment of the guarantees of users .The legislative tools in favor of cross-referencing information have multipled to increase the means of detection. If in particular they pose legal bases that are useful in detecting network frauds, they also entail, on a wider scale, a modernisation of the functioning of the organisations that is compatible with the rights of users. Ultimately, at the cost of a few developments, ressource protection and user rights may, under the supervision of judges, no longer be opposed. In the meantime, they are reconcilable, if not completely reconciled. In particular, a single definition is necessary since the legal security of users and consistency of the mechanism depends upon it
205

Le secret sacramentel à l'épreuve du durcissement de la répression de la pédophilie : proposition de réforme du droit québécois à la lumière du droit français

Nassarah, Eric Arnaud 04 1900 (has links)
Le rapport traditionnel entre responsabilité pénale et secret sacramentel a laissé place à un nouveau rapport controversé. La modernisation, la laïcisation des sociétés, la nécessité d’adapter la justice au besoin grandissant de la société en sécurité, les implications de membres du clergé dans les scandales de pédophilie, le silence longtemps gardé par l’Église sur ces implications et sa gestion à l’interne de ces scandales et enfin le pluralisme et l’intégrisme religieux sont autant de facteurs qui ont contribué à changer le discours du droit étatique sur le secret sacramentel. Autrefois la divulgation du secret sacramentel était sujette à la poursuite en justice. Aujourd’hui, c’est plutôt la rétention de l’information criminelle qui est susceptible d’engager la responsabilité pénale du confesseur. Ce nouveau rapport qui s’est établi entre la responsabilité pénale et le secret sacramentel ne s’accorde pas au discours de l’Église catholique pour qui le secret sacramentel doit demeurer un droit absolu, passible d’excommunication en cas de violation. Le conflit est évident et la recherche de solution impérieuse. Comment résoudre l’énigme du secret sacramentel dans une société à double vitesse qui cherche à concilier transparence absolue et dignité humaine : la première appelant à la divulgation de l’information au détriment de la dignité humaine et la seconde, sa rétention, au préjudice de la sécurité du citoyen? Le cas des agressions sexuelles commises sur mineurs est celui qui, actuellement, alarme au plus haut point la société. Cette problématique du secret sacramentel aux prises avec les nouvelles exigences légales de dénonciation est commune à plusieurs aires géographiques, mais les approches de solutions ne sont pas pareilles. La recherche d’un rapport plus conciliant entre ledit secret et la responsabilité pénale pourrait passer par la comparaison de plusieurs droits positifs. Le modèle de droit français paraît moins attentatoire au droit à la liberté de religion du pénitent et du prêtre catholique en l’occurrence. Et c’est à la lumière de celui-ci que nous proposons une réforme du modèle québécois dont le droit à la protection de la jeunesse pénalise le secret sacramentel. C’est sur les théories de « gouvernance conjointe » dont l’accommodement transformatif est le corollaire, de « relevance juridique » et de pluralisme de « coopération » développées respectivement par Ayelet Shachar, Santi Romano et Mireille Delmas-Marty, que s’appuie cette thèse pour modéliser une nouvelle relation entre le droit positif québécois et le droit canonique au sujet de ce qui les oppose. Il est un impératif pour l’Église de préserver la confiance des pénitents qui se présentent au sacrement de pénitence pour éviter de faire du confesseur un agent pénal ou un délateur. Mais la sécurité des enfants au sein des communautés ecclésiales et leur confiance en une Église qui les protège et les défend en est aussi un. L’aggiornamento juridique en cours dans l’Église et qui s’appuie sur une sauvegarde du droit du délinquant, une préservation du droit de l’Église à son identité, mais aussi et surtout sur un renforcement du droit de la victime, est une contribution substantielle de l’Église à la répression et à la lutte contre l’abus sexuel des enfants et constitue une preuve de sa bonne foi. / The traditional relationship between criminal responsibility and sacramental secrecy has given way to a controversial new report. Modernization, the secularization of societies, the need to adapt justice to the growing need of society in security, the implications of members of the clergy in pedophilia scandals, the Church's long silence on these implications and its internal management of these scandals, and finally religious pluralism and religious fundamentalism have all contributed to changing the discourse of state law on Sacramental secret. Formerly the disclosure of sacramental secrecy was subject to prosecution. Today, it is rather the retention of criminal information which is liable to incur the criminal responsibility of the confessor. This new relationship between penal responsibility and sacramental secrecy does not agree with the language of the Catholic Church, for whom sacramental secrecy must remain an absolute right subject to excommunication in case of violation. The controversy is obvious and the search for a compelling solution is imperious. How to solve the enigma of sacramental secrecy in a two-speed society that seeks to conciliate absolute transparency and human dignity: the first calling for the disclosure of information to the detriment of human dignity and the second, retention, to the detriment of the safety of the citizen. The case of sexual assaults committed against minors is the one that, currently, alarm society at the highest level. This issue of sacramental secrecy facing the new legal requirements of denunciation is common to several geographical areas, but the approaches of solutions are not the same. The search for a more conciliatory relationship between the secrecy and criminal responsibility could go through the comparison of several positive rights. The model of French law appears to be less intrusive to the right to freedom of religion of the penitent and the Catholic priest in this case. And it is in light of this law that we propose a reform of the Quebec model whose right to the protection of youth penalizes the sacramental secrecy. It is on the theories of "joint governance" whose transformative accommodation is the corollary, of "legal relevance" and pluralism of cooperation respectively developed by Ayelet Shachar, Santi Romano and Mireille Delmas-Marty, that this thesis is based on modeling a new relationship between the positive law of Quebec and canon law about what is opposed to them. It is an imperative for the Church to preserve the confidence of the penitents who present themselves to the sacrament of penance in order to avoid making the confessor a criminal agent or an informer. But the safety of children in ecclesial communities and their confidence in a Church that protects and defends them is also one. The legal aggiornamento in the Church, based on a safeguarding of the right of the offender, preservation of the right of the Church to its identity, but also and above all on strengthening the right of the victim, is a substantial contribution of the Church to the repression and the fight against the sexual abuse of children and constitutes proof of its good faith.
206

Efficient information leakage neutralization on a relay-assisted multi-carrier interference channel

Ho, Zuleita K.-M., Jorswieck, Eduard A., Engelmann, Sabrina January 2013 (has links)
In heterogeneous dense networks where spectrum is shared, users privacy remains one of the major challenges. When the receivers are not only interested in their own signals but also in eavesdropping other users' signals, the cross talk becomes information leakage.We propose a novel and efficient secrecy rate enhancing relay strategy EFFIN for information leakage neutralization. The relay matrix is chosen such that the effective leakage channel (spectral and spatial) is zero. Thus, it ensures secrecy regardless of receive processing employed at eavesdroppers and does not rely on wiretaps codes to ensure secrecy, unlike other physical layer security techniques such as artificial noise. EFFIN achieves a higher sum secrecy rate over several state-of-the-art baseline methods.
207

Das Holocaust-Gedenkzentrum in Budapest – Ein ‚unmögliches‘ Museum?

Radonic, Ljiljana 14 August 2019 (has links)
No description available.
208

The feasibility of the statement of generally accepted accounting practice for small and medium enterprises / Daniël Petrus Schutte

Schutte, Daniël Petrus January 2011 (has links)
Governments are becoming increasingly aware of SMEs as economical role players. As a result many initiatives were introduced to address the unique challenges of the SME sector. One of these initiatives was the introduction of a global accounting framework for SMEs by the International Accounting Standards Board entitled the IFRS for SMEs. South Africa became the first country to formally adopt the contents thereof as the Statement of GAAP for SMEs. The adoption of a formal accounting framework by SMEs is however challenged by, amongst other factors, the informal nature of SMEs, limited global focus, the involvement of owner–managers and different classifications of SMEs worldwide. Owing to these unique attributes it is possible that SMEs have alternative informational needs and as a result the impact of environmental factors on the adoption of the Statement of GAAP for SMEs was considered. Culture is considered the most important environmental factor affecting the accounting environment. The Value Survey Model of Hofstede was utilised to determine cultural dimensions of accounting students (n = 301) in South Africa and the United Kingdom (UK). The cultural dimensions were extended to the accounting values of Gray after which a distinct set of accounting values was identified for i) the adoption of formal, global and prescriptive accounting standards, ii) based on principles iii) by an informal SME sector. The results also revealed distinct cultural differences within South Africa as well as between South Africa and the UK. Thereafter the contents of the Statement of GAAP for SMEs/IFRS for SMEs were evaluated against reporting practices of the SME sector in South Africa. Firstly, an assessment of the contents was conducted amongst SME accountants (n = 157) using a five–point Likert–type scale. Secondly, financial statements compiled by the SME sector in South Africa were analysed to determine the relevance of the contents of the illustrative financial statements contained in the Statement of GAAP for SMEs. The analysis entailed a consolidation of a sample of SME financial statements from South Africa (n = 100). The study revealed that the accounting environment of the SME sector is affected by a wide range of environmental and related factors. These factors were summarised and discussed and recommendations for future research were made. / Thesis (Ph.D. (Accounting))--North-West University, Potchefstroom Campus, 2011.
209

The feasibility of the statement of generally accepted accounting practice for small and medium enterprises / Daniël Petrus Schutte

Schutte, Daniël Petrus January 2011 (has links)
Governments are becoming increasingly aware of SMEs as economical role players. As a result many initiatives were introduced to address the unique challenges of the SME sector. One of these initiatives was the introduction of a global accounting framework for SMEs by the International Accounting Standards Board entitled the IFRS for SMEs. South Africa became the first country to formally adopt the contents thereof as the Statement of GAAP for SMEs. The adoption of a formal accounting framework by SMEs is however challenged by, amongst other factors, the informal nature of SMEs, limited global focus, the involvement of owner–managers and different classifications of SMEs worldwide. Owing to these unique attributes it is possible that SMEs have alternative informational needs and as a result the impact of environmental factors on the adoption of the Statement of GAAP for SMEs was considered. Culture is considered the most important environmental factor affecting the accounting environment. The Value Survey Model of Hofstede was utilised to determine cultural dimensions of accounting students (n = 301) in South Africa and the United Kingdom (UK). The cultural dimensions were extended to the accounting values of Gray after which a distinct set of accounting values was identified for i) the adoption of formal, global and prescriptive accounting standards, ii) based on principles iii) by an informal SME sector. The results also revealed distinct cultural differences within South Africa as well as between South Africa and the UK. Thereafter the contents of the Statement of GAAP for SMEs/IFRS for SMEs were evaluated against reporting practices of the SME sector in South Africa. Firstly, an assessment of the contents was conducted amongst SME accountants (n = 157) using a five–point Likert–type scale. Secondly, financial statements compiled by the SME sector in South Africa were analysed to determine the relevance of the contents of the illustrative financial statements contained in the Statement of GAAP for SMEs. The analysis entailed a consolidation of a sample of SME financial statements from South Africa (n = 100). The study revealed that the accounting environment of the SME sector is affected by a wide range of environmental and related factors. These factors were summarised and discussed and recommendations for future research were made. / Thesis (Ph.D. (Accounting))--North-West University, Potchefstroom Campus, 2011.
210

Confidentialité et prévention de la criminalité financière : étude de droit comparé / Confidentialy and financial crime prevention

Bègue, Guillaume 16 June 2016 (has links)
La tendance contemporaine vers plus de transparence dans la vie des affaires illustre une désaffection générale pour toute forme de confidentialité. Toutefois, cette dernière bénéficie de traductions juridiques dont les sources lui confèrent une indéniable légitimité. Cette observation doit amener à reconnaître l'existence d'un "principe de confidentialité". La rencontre des normes sur la prévention de la criminalité financière avec le principe de confidentialité est source d'insécurité juridique, non seulement pour les professionnels assujettis aux obligations de lutte anti-blanchiment et contre le financement du terrorisme, mais également pour tous les individus dont les données son traitées dans ce cadre. Ces deux blocs de normes aux logiques contradictoires tendant pourtant vers des objectifs communs : le respect des droits fondamentaux. Néanmoins, les excès liés à l'utilisation potentiellement illicite des outils juridiques offerts par l'un, et les défauts des dispositions constituant l'autre, font obstacle à l'application efficace et mesurée du droit. Cette étude se propose d'analyser ces principes antagonistes pour mieux envisager leur équilibre latent au moyen de solutions préservant leurs intérêts propres et concourant à l'amélioration de la sécurité juridique. Dans cette optique, l'exercice de droit comparé permet de parfaire l'interprétation des obligations de vigilance tout en plaidant la réhabilitation du principe de confidentialité. Il témoigne de l'émergence d'un véritable "droit du blanchiment", et en particulier de son volet préventif qui occupe désormais une place prépondérante dans le domaine de la régulation bancaire et financière. / The recent trend towards transaprency in business highlights a more global disenchantment with the concept of secrecy. The concept of secrecy benefits from various legal expressions whose origins give it as undisputable legitimacy. This observation leads us to recognise the existence of a "Principle of confidentiality". The clash betxeen the rules of Financial Crime prevention and this principle of confidentiality is causing legal uncertainty not only for professional subject to Anti-money laundering and counter-terrorism financing regulations but also gor persons whose data is being processed. These two sets of conflicting rules nevertheless share a common goal, namely to ensure respect for fundamental rights. Notwithstanding this, both the risk of abuse of legal instruments offered by one set for illegitimate purposes and the shortcomings attached to the other set potentially hinder the efficient and reasonable use of Law. This study aims at analysing antagonistic principles to reach a certain balance by applying solutions which preserve their respective interests and contribute to legal certainty. In this regard, the comparative law analysis helps better interpret customer due diligence measures whilst rehabilitating the arguments in favour of the principle of confidentiality. This shows the development of e genuine AML/CFT Law and in particular its preventive aspects that form a major part of the Banking and Financial Regulations.

Page generated in 0.2352 seconds