• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 122
  • 118
  • 29
  • 26
  • 15
  • 10
  • 7
  • 6
  • 6
  • 6
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 416
  • 49
  • 46
  • 45
  • 41
  • 41
  • 38
  • 37
  • 33
  • 32
  • 32
  • 31
  • 25
  • 23
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
381

Shillelaghs, Shovels, and Secrets: Irish Immigrant Secret Societies and the Building of Indiana Internal Improvements, 1835-1837

Perry, Jay Martin January 2009 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / In the 1830s, Indiana undertook an ambitious internal improvements program, building the state’s first railroad and multiple canals. To complete the projects, Indiana used Irish immigrant laborers. The Irish laborers developed a reputation for brawling amongst themselves, highlighted by a riot involving 600 laborers working on the Wabash and Erie Canal in 1835. Multiple volumes of Indiana history identify the Wabash and Erie riot as a one-time event inspired by Protestant and Catholic animosity imported from Ireland. A review of the historical record, however, contradicts these long-held assumptions. Inspired by Irish traditions of faction fighting and peasant secret societies, Irish immigrant laborers formed secret societies that used violence against competitors in hopes of securing access to internal improvement jobs for their own membership. The rival secret societies, the Corkonians and the Fardowns, organized based on their provincial origins in Ireland. Examples of Corkonian and Fardown violence occurred throughout the country. In Indiana, a pattern of Corkonian and Fardown conflict resulted in skirmishes on at least three different construction sites between 1835 and 1837. In contrast to the traditional narrative, the Corkonians and Fardowns were both pioneers of the first wave of large-scale Irish Catholic immigration whose rivalry centered on job protection and economic grievances.
382

Law Enforcement Intelligence Recruiting Confidential Informants within “Religion-Abusing Terrorist Networks”

Ucak, Hursit 30 April 2012 (has links)
This study examines the motivation factors that make some individuals (terrorists) confidential informants. The study is based on the assumptions of Maslow’s hierarchy of needs and Herzberg’s motivation-hygiene theories. Accordingly, main assumption of the present study is that some individuals with unsatisfied needs in religion-abusing terrorist (RAT) networks choose to become confidential informants to satisfy their predominant needs. The main hypothesis for the purpose of this study is “The individuals’ decision-making processes to cooperate with law enforcement intelligence (LEI) as a confidential informant is affected by some motivation factors during recruitment process.” The present study tests 27 hypotheses in order to answer two main research questions. To meet its objectives the present study uses quantitative research methodology, constructs a cross-sectional research design, and employs secondary data analysis to test the hypotheses of the research questions. A dataset was formed based on official records of Turkish National Police by including all confidential informants within eight different RAT networks in Turkey. First, individual effect of each motivation factor on being a confidential informant is tested and discussed in detail. Then two group specific multivariate models for being an informant in Al-Qaeda and Turkish-Hezbollah are illustrated, compared and contrasted. Both bivariate and multivariate statistical analyses not only revealed the extent of individual effects of motivations among RAT groups, but also helped us to build fitting multivariate models that explain the probability of being informants in certain RAT networks. By doing so, the present study aims to make contributions to the literature and practice on this relatively unexplored phenomenon. Findings indicate that while some motivation factors are common among all RAT networks, the strength and direction of their effects vary among different RAT networks.
383

Osvícenství a jeho vliv na duchovní a národní formování lidí v českých zemích 18. a 19. století / The Enlightenment and its Impact on the National and Spiritual Formation of People in the Czech Lands during 18th and 19th Century

Karasová, Ivana January 2014 (has links)
This master thesis deals with the spiritual progress pointing to a national self-awareness in the Enlightenment era from the beginning until 1848. The Enlightenment is an European phenomenon, which is characterized by a change of thinking, and self-awareness. This idea of tolerance and human emancipation contributed to the reforms of fundamental social, political and ecclesiastical changes. These changes result not only from a philosophical influences, but also from royal reforms during the reign of Maria Theresa and Joseph II in particular. The Teresian enlightened Catholicism and Josephinian reformism fully started the journey from the Enlightenment to liberalism. Powered by TCPDF (www.tcpdf.org)
384

L'encadrement juridique de la gestion électronique des données médicales. / Legal framework for the electronic management of medical data

Etien-Gnoan, N'Da Brigitte 18 December 2014 (has links)
La gestion électronique des données médicales consiste autant dans le simple traitement automatisé des données personnelles que dans le partage et l'échange de données relatives à la santé. Son encadrement juridique est assuré, à la fois, par les règles communes au traitement automatisé de toutes les données personnelles et par celles spécifiques au traitement des données médicales. Cette gestion, même si elle constitue une source d'économie, engendre des problèmes de protection de la vie privée auxquels le gouvernement français tente de faire face en créant l'un des meilleurs cadres juridiques au monde, en la matière. Mais, de grands chantiers comme celui du dossier médical personnel attendent toujours d'être réalisés et le droit de la santé se voit devancer et entraîner par les progrès technologiques. Le développement de la télésanté bouleverse les relations au sein du colloque singulier entre le soignant et le soigné. L'extension des droits des patients, le partage de responsabilité, l'augmentation du nombre d'intervenants, le secret médical partagé constituent de nouveaux enjeux avec lesquels il faut, désormais compter. Une autre question cruciale est celle posée par le manque d'harmonisation des législations augmentant les risques en cas de partage transfrontalier de données médicales / The electronic management of medical data is as much in the simple automated processing of personal data in the sharing and exchange of health data . Its legal framework is provided both by the common rules to the automated processing of all personal data and those specific to the processing of medical data . This management , even if it is a source of economy, creates protection issues of privacy which the French government tries to cope by creating one of the best legal framework in the world in this field. However , major projects such as the personal health record still waiting to be made and the right to health is seen ahead and lead by technological advances . The development of e-health disrupts relationships within one dialogue between the caregiver and the patient . The extension of the rights of patients , sharing responsibility , increasing the number of players , the shared medical confidentiality pose new challenges with which we must now count. Another crucial question is posed by the lack of harmonization of legislation increasing the risks in cross-border sharing of medical
385

智慧財產權管理策略研究-以模具業及其關連高科技產業為例 / Study on Strategy of Intellectual Property Rights Management: Taiwan Mold and Die Industry and Its Related High-tech Industry

廖文璋, Johann Liaw, V. C. Unknown Date (has links)
台灣模具產業具有交期短、品質好、價格具有競爭力、製程安排彈性大等優勢,因此在高科技產業供應鍊中扮演關鍵性的角色。唯近年來,台灣許多高科技產業的外移,造成模具業產值最近連續三年呈現下降與核心技術外流,成為模具業所面臨的嚴重考驗。如何留住核心技術人才,加強研發新的關鍵技術並將研發成果取得智慧財產權相關法律保護,並以必要的組織、制度、人才、措施等妥善加以管理,已經成為模具業以及關連高科技產業必須面對的重要課題之一。 本研究以策略管理的角度切入,探討由策略前提所形成之策略,與智慧財產權管理實際運作下,對「台灣模具業及其關連高科技產業的智慧財產權管理發展現況及當前問題」提出適當建議與解決之道。 研究對象為台灣五家經營績效良好之模具業者及關連高科技業者。模具業者包含金屬沖壓、塑膠射出成型、與壓鑄模具業者;關連高科技業者則包含連接器、筆記型電腦、與行動電話業者。其中三家模具業者尚未擁有專利保護,而兩家關連高科技業者之專利保護已有相當成效。本研究主要發現如下: 一、不同的企業規模,對改善技術能力作法有其差異: (一)共同研發新技術:中小企業傾向與國內研發機構共同研發,並取得新技術之全部或部份智慧財產權或取得授權使用新技術;大型企業則傾向自行研發為主。 (二)自國外引進新技術:中小企業傾向委託財團法人或智財科技服務公司從技術先進國家引進技術;大型企業則傾向自行引進技術為主。 (三)向技術相對落後國家移轉技術方面: 1.中小企業傾向透過財團法人或智財科技服務公司之協助移轉技術,對於較單純之案件可自行為之。 2.大型企業可自行為之或採上述方法,委託專業之單位或公司為之。 3.台灣企業對大陸投資之子公司,大部分並未針對技術移轉收取權利金,僅由子公司之獲利盈餘分配取得回饋,尤以持股比例較大者最為普遍。 二、國內模具業及關連高科技產業智慧財產權管理現況為: (一)制定「營業秘密管理辦法」,規範各業務或利害關係人之營業秘密保護要項: 1.影響製造精度之技術 2.訪客參訪流程與動線 3.與供應商相關之營業秘密 4.顧客之營業秘密 5.矯正預防措施單 (二)制訂「專門技術管理辦法」,加強專門技術保護 1.規範「提案改善制度」 2.培養技術專家 3.掌握專門技術人力資源,塑造: (1)尊重專業 (2)對等報酬 (3)生涯規劃等制度完善之企業文化。 (三)專利管理制度: 1.建立提案與獎勵制度: 對創新提案、申請專利、專利核准、與達成技術移轉等階段均核發獎金,以鼓勵員工技術創新。 2.專利維護: 對專利佈局同時重質與量之提升,專利權之維護,則以成本效益為主要考量,以具市場價值者為優先申請與維護對象。 (四)技術授權考量有二: 1.視技術生命週期採行不同之授權策略,如導入與成長期採技術引進、成熟期採交互授權、衰退期技術則對外移轉。 2.以對子公司持股比例,調整技術移轉之權利金分配,持股較高則以盈餘分配取代權利金,持股較低則傾向依市場機制收取權利金。 由本研究之策略意涵得知,個案公司目前所採行之策略,均能適當地反映出其目前所處環境。如鴻海精密以綿密之專利佈局保護其技術,鉅祥、竣盟、谷崧則實施營業秘密與專門技術管理,神達機構則是專利保護與營業秘密管理兼具。 由此可知,模具業及關連高科技產業之智慧財產權管理作法具有多種不同之形式,專利保護並非模具業與關連高科技產業智慧財產權管理之唯一解答。尤其對中小企業而言,注重營業秘密與專門技術保護,塑造良好的企業文化、工作環境,設計合理對等報酬、制度完備的人力資源管理措施,亦不失為智慧財產權管理的良好解決方案之一。 目前大型之關連高科技企業非常重視智慧財產權,並已發展出一套以專利保護為主軸的管理制度。展望未來,模具業與關連高科技產業之連動性將逐漸加深,模具業者今後亦必須加快建立智慧財產權管理制度之腳步。 / Taiwan's mold & die industry plays a very important role of the supply chain for the high-tech industry around the world due to its advantages of short delivery time, good quality, competitive price and production flexibility, etc. However, in recent years, the continuing migration of the high-tech industry is resulting in production decreases and movement of core technology out of Taiwan. How should we keep the core technology, human and financial resources left in Taiwan; what can be done to strengthen research and development (R & D) on new and core technology; how can the core technology be protected by patents managed by a sever system. This is a matter of great urgency and an important issue that Taiwan’s mold & die industry and its related high-tech industry are facing. In view of the above, this study offers Taiwan's mold & die industry and its related high-tech industry some suggestions and solutions for the problems that they faced, based on their current Intellectual Property Rights (IPR) management development situation. This study was researched from the strategy management view and included five (5) outstanding mold & die manufacturers and their related high-tech companies in Taiwan. These mold & die manufacturers are in the metal stamping die, plastic injection mold and die casting mold industries; these high-tech companies are in the connectors, notebook computer and cellular phone (telecommunication) industries. Three of the companies, the mold & die manufacturers, do not hold any patents, while the other two high-tech companies are well protected by their patents. The main finding of this research is as follows: 1.The strategy of technical improvement for companies of various sizes is different: 1) R & D for new technology- Small and medium companies prefer to cooperate with other local R & D institutes in developing, researching, and obtaining full or partial intellectual property rights protection; or obtaining the rights to use the new technology (invention). On the other hand, large companies tend to do the R & D in-house. 2) Technology transfer from overseas– Small and medium companies prefer to transfer the technology from high-tech orientated countries through local R&D institutes or an IPR service provider. However, large companies prefer to transfer the new technology by themselves. 3) Technology transfer to developing countries– (1) Small and medium companies tend to transfer the technology to developing countries through local R&D institutes or IPR service provider except in the case of simple projects. (2) Large companies tend to transfer their technology out by themselves or through a professional agency. 2.The IPR management situation of Taiwan’s mold & die industry and its related high-tech industries– 1) Establish “Trade Secret Management Regulations” to prevent the following trade secrets from being disclosed: (1) Technology that will influence the accuracy of machining. (1)-1 On site know-how – Limiting the visitors touring sensitive areas. (1)-2 Trade secrets of suppliers. (1)-3 Trade secrets of customers. (1)-4 Corrective action reports. 2) Establish “ Know-how Management Regulations” to: (1) Regulate “Proposal improvement systems” (2) Train and develop technical specialists (3) Retaining knowledgeable human resources by (3)-1 Professional appreciation (respect) (3)-2 Equal award (return) (3)-3 Good and complete system, employees’ career planning and enterprise culture. 3) IPR management system: (1) Establish a proposal and reward system: Encourage employees’ technology inventions by rewarding them for their proposals, applications, and completion of technical transfer for IPR. (2) Patent protection: Consider not only the number of patents, but also the quality of patents. 4) Technology transfer policy Different policy for different technique life cycle. From this research, we realized that companies apply different strategies in response to their recent situation. For example, “Hong Hai” is applying the practice of IPR management in protecting his technology; G-Shank, Giant Union and Coxon are applying the practice of trade secret and know-how management; MiTac is applying the practice of both IPR management and trade secret management. From the above, we also realize that patent protection is not the only solution for IPR management in the mold & die industry and it’s related high-tech industries. Trade secret management and know-how protection, a good corporate culture, good business and human resource management, an improved working environment, reasonable and rewarding work are also the major solutions for IPR management. For the time being, large high-tech companies highly respect IPR and have developed a good management system, especially for patent protection. Therefore, due to the close relationship between the mold & die industry and high-tech industries, speeding up the development of IPR management becomes an urgent issue for the mold & die industry.
386

Partage de secret et théorie algorithmique de l'information

Kaced, Tarik 04 December 2012 (has links) (PDF)
Notre travail sur le partage de secret se base sur les points de vue de la Théorie de l'Information de Shannon et de la Complexité de Kolmogorov. Nous allons expliquer comment ces trois sujets sont intimement liés. Les inégalités d'information jouent un rôle central dans cette thèse: ce sont les inégalités pour l'entropie de Shannon, qui correspondent également aux inégalités valides pour la complexité de Kolmogorov. La Théorie Algorithmique de l'Information introduite par Kolmogorov formalise l'idée d'aléatoire pour les chaînes de caractères. Ce sont là deux raisons justifiant à elles seules la notion de partage de secret algorithmique dans le cadre de la Théorie Algorithmique de l'information (si l'on sait partager un secret aléatoire, on peut partager n'importe quel secret). Originalement étudié par sa définition combinatoire, le partage de secret a été plus tard généralisé par une formulation dans le langage de la théorie de l'information. Cette étape a permis l'utilisation des inégalités d'information, et s'est révélée très importante dans la caractérisation de l'efficacité des schémas de partage de secret. L'étude de ces inégalités n'en est qu'à ses débuts. Nous y contribuons en introduisant la notion d'inégalité essentiellement conditionnelle, qui montre une fois de plus que ces inégalités ne sont pas encore complètement comprises.
387

Living Under Security Certificates: Experiences of Securitization of Detainees and their Families

Wadhawan, Subhah 06 December 2018 (has links)
Security and race have historically been entangled in the politics of nation-building, whereby national security discourses have constructed the ‘public’ whom it should protect as ‘white’ while demonizing persons of colour as a threat to that public. In the current war against terrorism, these racialized discourses, underwritten by a colonial logic, have materialized through the symbolic and literal displacement of Muslim persons. Under this imperative of national security, both existing and novel legislations have either been suspended, contorted, or implemented to be used against Muslims, or anyone who visibly appears Muslim. Security certificates are one of such judicial tools. This thesis seeks to explore the experiences of securitization, analyzing how this legislation strips the subjects of the security certificate program of their legal rights and social connectedness. To explore this, I interviewed three of the five men from the ‘Secret Trial Five’ cases and some of their family members. I investigate how securitization manifests in the lives of those who have been securitized, exploring the practices that are used to maintain and reinforce the othering and the displacement of Muslim populations.
388

Journalistic monitoring and privilege in the era of new telecommunications technologies under the Convention on Human Rights and Fundamental Freedoms and the Constitution of the Republic of Poland / Vigilancia y privilegio periodístico en la era de las nuevas tecnologías de las telecomunicaciones bajo la Convención de Derechos Humanos y Libertades Fundamentales y la Constitución de la República de Polonia

Podkowik, Jan 10 April 2018 (has links)
The digital age has reconfigured the security services, especially the forms of mass surveillance aimed at preventing various threats to society. However, this scenario may become problematic from the perspective of protecting the freedom of the media and journalistic privilege. The author of this article offers an overview of the scope of the protection of the journalistic privilege pursuant to the European Convention for the Protection of Human Rights and Fundamental Freedoms, as well as its management in Poland from the developments prepared by its Constitutional Court. / La era digital ha reconfigurado los servicios de seguridad, sobre todo las formas de vigilancia masiva que buscan prevenir distintas amenazas para la sociedad. No obstante, este escenario puede convertirse en problemático desde la perspectiva de la protección de la libertad de los medios de comunicación y del privilegio periodístico. El autor del presente artículo nos ofrece un panorama sobre los alcances de la tutela del privilegio periodístico en el Convenio Europeo para la Protección de los Derechos Humanos y de las Libertades Fundamentales, así como sobre su tratamiento en Polonia a partir de los desarrollos realizados por su Tribunal Constitucional.
389

Réflexion critique sur la relativisation du droit à la protection de l’enfant : les distinctions de traitement du signalement des situations de compromission dans la Loi sur la protection de la jeunesse et dans la législation encadrant la profession d’avocat

Ouimet, Marie-France 12 1900 (has links)
No description available.
390

De l'omphalos de la Terre à la cité céleste d'Apollon: études sur la doctrine de la Tétractys dans le pythagorisme ancien / From Earth's Omphalos to Apollo's celestial city: a study on the doctrine of Tetractys in ancient pythagoreanism to Plato

Viltanioti, Irini Fotini 29 November 2010 (has links)
La doctrine pythagoricienne de la Tétractys est sans doute une des questions les plus délicates de l’histoire de la philosophie. Elle représente non seulement une des théories essentielles de l’arithmologie, mais aussi, ainsi que la doxographie ancienne en témoigne, « le plus grand secret et le fondement de la philosophie pythagoricienne ». Armand Delatte, dans ses classiques Etudes sur la littérature pythagoricienne, a souligné l’importance véhiculée par ce philosophème. Dans la première partie, « méthodologique », de notre étude, nous traitons du lien entre Platon et la pensée pythagoricienne, en prenant comme fil conducteur trois notions essentielles: le silence voué des initiés de l’ordre et la pratique du secret ;l’expression énigmatique et « symbolique » ;la pratique de l’allégorie (hyponoia), indissolublement associée, elle, à celle du mythe. La deuxième partie de notre travail est centrée sur le témoignage le plus ancien au sujet de la Tétractys, à savoir sur la fameuse maxime des Acousmatiques :« Qu’est-ce que l’oracle des Delphes ?La Tétractys, c'est-à-dire l’harmonie où se trouvent les Sirènes ». En outre, en modérant, d’une certaine manière, l’ « ésotérisme historique » de l’Ecole de Tübingen, dont nous nous prenons des distances quant à certains points (comme, par exemple, l’importance de la méthode allégorique), nous tentons, dans la troisième et dernière partie de notre étude, de lire certains passages mythiques de Platon comme des allégories susceptibles d’être comprises et de trouver leur cohérence à la lumière de la tradition indirecte, voire de la théorie platonicienne sur les nombres, théorie intimement liée à la doctrine pythagoricienne de la Tétractys. Dans cet ordre d’idées, à partir de la République et du Timée jusqu’au Phèdre et au Gorgias, la mathématisation platonicienne de la réalité se verrait intégrée aux mythes, dont la somptuosité poétique ne serait qu’une image de l’enchantement philosophique entraînant l’élévation de l’âme vers l’Un – Bien. Bien qu’ayant toujours présents à l’esprit les dangers auxquels notre étude s’expose, nous n’avons pas toujours su les éliminer. Nous ne méconnaissons aucunement ses lacunes et ses faiblesses. Nous considérons en revanche que son avantage réside en ce qu’elle tente de contribuer à éclairer d’une lumière nouvelle certains aspects méconnus. C’est sans doute là que se situe le danger, mais aussi son intérêt. <p> <p> / Doctorat en Philosophie / info:eu-repo/semantics/nonPublished

Page generated in 0.0482 seconds