Spelling suggestions: "subject:"secret""
71 |
Lojalitetsplikt i uthyrningsbranschen : - En uppsats om lojalitetsförhållandet mellan kundföretag och inhyrd arbetskraftAndersson, Frida January 2014 (has links)
During the last part of the 20th century many companies has started to build their organizations on knowledge and information instead of manufacturing of products. Today it is easier to communicate and spread information. At the same time the numbers of untraditional employments like temporary employments and workers from staffing agencies are increasing. Many organizations have higher employee turnover now than before. This allows more people to have access to confidential information, whose spreading might cause great damage for the employer. This essay aims to look into the protection of confidential information for the client against offenses from staffing agency workers that are working within the clients’ organization. Protection of confidential information is included in the duty of loyalty in terms of confidentiality, protection of trade secrets and competition clauses. Duty of loyalty lies within the employment contract between the agency employer and the staffing agency. Therefore the agency employer has no duty to be loyal against the client. For the agency worker to be able to perform the required work duties he or she might be provided with confidential information. Spreading of this information could cause damage for the client. Can the rules of justice that regulates duty of loyalty be applied on the relationship between the client and the agency worker? What are the consequences of the rules that exist today? This essay is written with a juridical method and with sociology of law perspective. Other parts of the duty of loyalty is not included as well as the duty of loyalty for the employer. The conclusion is that the staffing agency is responsible for indemnity towards the client if an agency employer reviles confidential information about the clients’ organization. Some rules of justice can be interpreted as an expression that duty of loyalty lays between the client and the agency worker. For example, the agency worker is bound by confidentiality in terms of the conditions at the clients’ organization. Suggestions of changes in the regulations about protection of confidential information will force the agency worker to pay indemnity to the client if he or she reviles confidential information. In staffing agencies there are twice as many immigrants than in the regular labor market. The rules of duty of loyalty can contribute to a holdback for immigrants that are working in staffing agencies. Immigrants will be at bigger risk of standing outside the general labor market than people born in Sweden because of static discrimination. / Företag har under senare delen av 1900-talet gått från traditionell varuproduktion till att allt mer bygga sin verksamhet på information och kunskap. Den tekniska utvecklingen har gjort det lättare att överföra och sprida kunskap i samhället vilket ökar sårbarheten hos företagen. Icke- traditionella anställningar såsom tidsbegränsade anställningar och inhyrd arbetskraft ökar och företag har en högre personalomsättning nu än tidigare. Fler personer får tillgång till företagsspecifik information och spridning av den skulle kunna skada arbetsgivaren. I min uppsats undersöker jag skyddet av hemlig information för arbetsgivare som hyr in arbetskraft från ett personaluthyrningsföretag. Skydd för hemlig information ingår i den så kallade lojalitetsplikten i form av tystnadsplikt, skydd för företagshemlighet och konkurrensklausuler. Lojalitetplikt föreligger i anställningsavtalet mellan uthyrd arbetstagare och uthyrningsföretaget men arbetstagarens arbetsprestation utförs hos kunden. Kan regleringar kring lojalitetsplikt tillämpas på förhållandet mellan kund och inhyrd arbetstagare? Vad blir konsekvenserna av de regler som finns idag? Uppsatsen är skriven med juridisk metod som har sin utgångspunkt i rättskälleläran samt med rättssociologisk angreppssätt. Andra delar av lojalitetsplikt såsom upplysningsskyldighet, bisysslor eller kritikrätt behandlas inte i uppsatsen, ej heller lojalitetsplikt för arbetsgivaren. Slutsatsen är att uthyrningsföretaget står för den uthyrde arbetstagarens handlingar mot kundföretaget eftersom det föreligger lojalitetsförpliktelser i uthyrningsavtalet mellan kund och uthyrare. Uthyraren står för exempelvis skadestånd om en arbetstagare röjer eller utnyttjar en företagshemlighet hos kunden. Vissa regleringar ger uttryck för att det föreligger lojalitetsplikt mellan kund och inhyrd arbetstagare. Exempelvis är den uthyrda arbetstagaren bunden av tystnadsplikt vad det gäller förhållanden hos kunden. I ett förslag från regeringen på kommande ändringar i lagstiftningen kommer den inhyrde arbetstagaren bli direkt skadeståndsansvarig vid röjande eller utnyttjande av företagshemlighet hos kunden. I uthyrningsbranschen finns dubbelt så stor andel utlandsfödda arbetstagare som på arbetsmarknaden generellt. På grund av hur regleringen kring lojalitetsplikt ser ut idag kan den bidra till inlåsningseffekter för utlandsfödda arbetstagare som arbetar i uthyrningsbranschen. Skilda villkor för svensk- och utlandsfödda såsom statisk diskriminering på arbetsmarknaden gör att utlandsfödda arbetstagare löper större risk än svenskfödda arbetstagare att få stå utanför den traditionella arbetsmarknaden.
|
72 |
Fast Actively Secure OT Extension for Short SecretsAjith, S January 2017 (has links) (PDF)
Oblivious Transfer (OT) is one of the most fundamental cryptographic primitives with wide-spread application in general secure multi-party computation (MPC) as well as in a number of tailored and special-purpose problems of interest such as private set intersection (PSI), private information retrieval (PIR), contract signing to name a few. Often the instantiations of OT require prohibitive communication and computation complexity. OT extension protocols are introduced to compute a very large number of OTs referred as extended OTs at the cost of a small number of OTs referred as seed OTs.
We present a fast OT extension protocol for small secrets in active setting. Our protocol when used to produce 1-out-of-n OTs outperforms all the known actively secure OT extensions. Our protocol is built on the semi-honest secure extension protocol of Kolesnikov and Kumaresan of CRYPTO'13 (referred as KK13 protocol henceforth) which is the best known OT extension for short secrets. At the heart of our protocol lies an efficient consistency checking mechanism that relies on the linearity of Walsh-Hadamard (WH) codes. Asymptotically, our protocol adds a communication overhead of O( log ) bits over KK13 protocol irrespective of the number of extended OTs, where and refer to computational and statistical security parameter respectively. Concretely, our protocol when used to generate a large enough number of OTs adds only 0:011-0:028% communication overhead and 4-6% runtime overhead both in LAN and WAN over KK13 extension. The runtime overheads drop below 2% when in addition the number of inputs of the sender in the extended OTs is large enough.
As an application of our proposed extension protocol, we show that it can be used to obtain the most efficient PSI protocol secure against a malicious receiver and a semi-honest sender.
|
73 |
Våga gå vilse – ett sätt att upptäcka det obekanta : Filmskaparens förhållande till konst och vetenskapOlofson, Christina January 2017 (has links)
Syftet med uppsatsen är att undersöka och synliggöra filmskaparens förhållande till konst och forskning. Under åtta år i olika perioder har filmprojektet Kropparnas Arkiv, pågått som jag parallellt med uppsatsen har slutfört. Filmen väver samman konst och forskning i ett möte mellan konstnär och forskare. Såväl i samtal med filmkollegor som inför nya filmprojekt framträder frågan, hur kan man söka det man inte vet vad det är? Detta kom nu att bli min forskningsfråga. Syftet är att efterforska och reflektera över hur den konstnärliga processen kan fördjupas inom mitt filmskapande. Jag har valt att intervjua tre kvinnor, en konstnär, en skådespelare tillika regissör och en forskare. Mitt urval gör inte anspråk på att vara representativt. Att skådespelaren, regissören och konstnären har beröringspunkter med mig, filmskaparen kan kanske vara mer uppenbart än att forskaren har det. Men är det verkligen så? Målet är att få syn på om det finns likheter, olikheter, vad som skiljer eller vad som förenar de tre intervjuade, i det här sammanhanget kallade informanter, med filmskaparen. Svaren från de intervjuade har jag sorterat under teman som –val eller urskiljning–praktisk nyfikenhet eller kreativitet och slutligen att framkalla det oväntade. I min undersökning använder jag mig av kvalitativa metoder, analyserar svaren och teoretiserar kring dem. Den fenomenologiska hermeneutiken tillika toposläran har varit ryggraden i min undersökning. Det är oundvikligt att Aristoteles och hans tankegångar är fundamentet till teorier och reflektioner som jag tillämpar i uppsatsen. Min ambition är att kunna ta med mig den konstnärliga blicken in i vetenskapsvärlden, att kunna ge en dubbel blick på den vetenskapliga terrängen, ett sätt som jag menar kan förmera och bidra till att vidga mitt seende. Hur och på vilket sätt finns det beröringspunkter och likheter mellan film, konst och forskning–humanismen och naturvetenskapen? Att svara på min forskningsfråga har varit en metod för att synliggöra en process, knappt mätbar men ändå synlig för den som vill se. Frågan skapar en process som speglar de intervjuades förhållningsätt till olika problemställningar inom deras arbetsområde och hur de går vidare i sökandet. Utmärkande för alla är gränser, både att skapa och att överskrida. För att spränga gränser är det nödvändigt att bryta tankebanor och begränsningar, något som alla informanterna gör. Det bekanta behövs för att utforska det obekanta. / Fear not going astray – discover the unknown A filmmaker’s take on art and science The purpose of this essay is to examine and make visible the filmmaker’s relation to art and scientific research regarding the investigation of new knowledge. Can art and science meet, and in what way do they connect? I have finished Secrets of Animal Anatomy (aka Kropparnas Arkiv), a film project I was working on for eight years. I finished it while I was writing on this essay. The film combines art and science in a meeting between an artist and a scientist. During the process, the question arose: how can you search for something when you don’t even know what it is you are searching for?. It is not wholly new, but has been implicit in discussions with colleagues and in film projects. This became my scientific question. My aim is to investigate how to make the artistic process of filmmaking and film deeper, by reflecting upon and investigating this question. I have chosen to interview three women – one artist, one actor-director, and one scientist. The selection is not meant to be representative. It may seem obvious that the actor, director and artist have more in common with each other than with the scientist, but is this necessarily true? Using this question as a starting point, I aim at finding out differences and similarities between the three interviewees and the filmmaker. I have categorised the interviewees’ answers under different themes like “Choice or distinguishing”, “Curiosity in practice or creativity”, and “To evoke the unexpected”. In my investigation, I employ qualitative methods; I analyse the answers and then theorise. Phenomenological hermeneutics, or Topos theory, has been the backbone of my study. It is undoubtedly so, that Aristotle and his thinking is the foundation of the theories and thoughts that I apply in this essay. My ambition is to bring the artistic vision to the scientific world, and to view the terrain of science with a double gaze, which I believe can contribute to an understanding both wider and deeper. Is there a strong connection and strong similarities between film, art, and science, and are these three entities prerequisites for one another – humanities and science? Answering my question has been a method to make visible a method, barely measurable yet visible for those willing to see it. The question gives rise to a process, reflecting the interviewees’ stance on different problems within the scope of their work, and how they proceed in their search. What they all have in common is boundaries, creating them and transcending them. In order to break boundaries, it is necessary to create new lines of thought and transcend limitations. This is something common to all informants. The known is necessary to examine the unknown.
|
74 |
Crown servants and unauthorised disclosures : whistleblowing, executive accountability and the public interestSavage, Ashley Christian January 2012 (has links)
The unauthorised disclosure of official information has caused embarrassment to successive governments regardless of political affiliation. At times, the disclosure of highly important documents pertaining to national security has reportedly caused immeasurable harm to the defence of the realm and damaged international cooperation. The protection of national security may however be used as a shield behind which malpractice can occur. Use of the Official Secrets Acts to prosecute Crown Servants for the unauthorised disclosure of information damaging to the reputation of government has proved controversial. Crown servants operate in an environment whereby a relationship of trust and loyalty is paramount to the running of government in a democratic society. Crown servants, however, remain in a unique position to witness acts of malpractice or maladministration. When other checks and balances fail, the Crown servant is faced with the unenviable prospect of allowing the malpractice to continue or to blow the whistle. This thesis provides an assessment of the existing officially prescribed mechanisms for Crown servants to blow the whistle and the position of the Crown servant as a journalistic source. It considers Crown servants in the Civil Service and is extended to provide two distinct case studies of servants in the UK intelligence community and members of the UK armed forces. This thesis critically evaluates the available whistleblower procedures alongside the current mechanisms used to hold the government and its departments to account, concluding that there are significant gaps in the current processes. Comparative analysis of other jurisdictions is used to bolster understanding with the objective of providing a number of key recommendations to provide strong, viable, alternatives to unauthorised disclosures.
|
75 |
La confidentialité de l'arbitrage / Confidentiality of arbitrationAl Allaf, Yamen 05 October 2015 (has links)
Étant le mode naturel de règlement des litiges dans le commerce international, l’arbitrage a pour avantage de maintenir le secret des affaires. D’abord, les débats arbitraux sont tenus à huis clos. La contractualisation de l’arbitrage traduit la volonté des parties d’un débat privé. Ensuite, les éléments produits au cours du procès sont couverts par la confidentialité. Enfin, la sentence arbitrale ne doit être publique qu’avec le consentement des parties. La confidentialité s’oppose notamment à un principe fondamental du droit processuel : la publicité des débats. La confidentialité, pourtant enracinée dans l’esprit des acteurs de l’arbitrage, est aujourd’hui remise en cause par des préconisations qui élèvent la voix pour ouvrir les portes des tribunaux arbitraux afin de répondre aux besoins de transparence jaillie de l’ordre public, et pour s’harmoniser avec l’époque de mondialisation et de technologie omniprésente. Compte tenu de la judiciarisation, juridictionnalisation, et la marchandisation auxquelles s’expose l’arbitrage actuel, la pondération entre ces impératifs enchevêtrés est-elle possible ? A la lumière de tous ces défis, nous mènerons l’étude sur la confidentialité d’un arbitrage de nature mixte (juridictionnelle et contractuelle), afin de savoir si cette confidentialité est l’essence même de ce mode si particulier de résolution des litiges / Arbitration is the natural dispute settlement mechanism of the international business as it presents the advantage of binding commercial secrecy. The contractualisation of the Arbitration reflects the parties’ willingness to keep the proceedings private. Firstly, arbitral discussions are heard in closed session. Then, any evidences produced during the trial are covered by the confidentiality. At last, the arbitral award may not be public without the consent of the parties. The confidentiality goes against the open-court principle which is a basic rule of Procedural law. Confidentialy is deeply rooted in the Arbitration community. However, this principle is nowadays questioned. Some are raising their voice to open the doors of the Arbitration Courts to submit those jurisdictions to transparency, globalization and ubiquous technology. Considering that modern Arbitration is going through judicialisation, jurisdictionalisation and commoditisation, the question is now raised of a balance between those new tangled and inter-related imperatives. In the context of all these challenges, we are going to undertake a study on the confidentialy of an Arbitration having a hybrid nature (jurisdictional and contractual) in order to know if that confidentialy is the very essence of that peculiar dispute settlement mechanism
|
76 |
Harry Potter and the Battle against Racism in EFL classrooms : A study of how racism is portrayed in Harry Potter and the Chamber of Secrets - novel and movie, with a CRT perspective in pedagogical settings.Berggren, Ebba January 2017 (has links)
This essay’s aim is to investigate how Rowling uses her novel Harry Potter and the Chamber of Secrets to criticize racism in her magical world and ours. A secondary aim concerns how Rowling’s critical stance creates ways to resist racism for readers in the EFL classroom. Therefore, a comparison from a Critical Race Theory (CRT) perspective is made with focus on certain sequence comparisons between the novel and the film. Teachers need to highlight problems like racism in classrooms and fantasy novels and movies are exceptional tools to raise awareness and teach critical thinking to students.
|
77 |
Secure introduction for enterprise secrets : An evaluation frameworkWeltman, Ulf January 2021 (has links)
A dependency on secrets is inherent in most IT systems, especially as they become increasingly complex and interdependent. Vast amounts of research have explored how to protect the confidentiality, integrity and authenticity of secrets through means such as encryption and authentication. These means are in themselves supported by secrets, and introducing those secrets is an area that has seen less exploration. Secrets are protected by secrets, and the secret at the top needs to be provided by one of the numerous methods with various advantages and disadvantages. This work follows a design science research approach to design a framework for comparing those methods of secure introduction, demonstrated through scenarios and practical exercises.
|
78 |
The influence of yakuwarigo and gendered language on character portrayals : A case study of the Japanese translation of Harry Potter and the Chamber of Secrets by JK RowlingAhmad, Ramiar January 2021 (has links)
The book Harry Potter and the Chamber of Secrets, written by the prolific author J.K.Rowling, is a popular piece of fiction that has been adapted into a film as well as severalvideogames. The book has also been translated from its original English into dozens oflanguages, including Japanese. Translations can differ from their original counterparts,especially when the languages in question differ in their syntax and cultural norms. Thesedifferences can potentially alter the original author’s intended character portrayals.This project aimed to evaluate the effect of gendered language and yakuwarigo on charactervoices in the Japanese translation of Harry Potter and the Chamber of Secrets. Fourcharacters – Hermione, Hagrid, Dumbledore, and McGonagall – were evaluated bymeans of their spoken dialogue in the book. The English lines of dialogue and their Japanesecounterparts were extracted from the book and analysed.The results of the dialogue-analysis show that the dialogue in the Japanese version of thebook was more gendered, and exhibited typical signs of role language. These findingswere corroborated through the use of separate questionnaires for Japanese and Englishparticipants. The questionnaires asked participants to determine the gender and role ofcharacters purely on the basis of certain lines in the book, with no external contextprovided. Japanese participants managed to identify both the gender and role of charactersmore accurately.
|
79 |
Fourteen by Seventy: A Memoir of Secrets and ConsequenceBailey, Amy 31 July 2019 (has links)
No description available.
|
80 |
THE IMPACT OF TRADE SECRETS LAW ON AUDITOR SHARING AMONG PEER COMPANIESZhao, XIN, 0000-0003-2521-5940 January 2021 (has links)
This study examines the impact of U.S. states’ staggered adoption of the inevitable disclosure doctrine (IDD) on rival companies’ auditor choice. I posit that, in states where the IDD limits employee mobility among rival companies, the IDD adoption exogenously increases the costs of disclosing proprietary information through other channels. I find that on average peer companies do not show any changes in the probability of audit office sharing after the companies’ headquarter states adopt the IDD. I also find that companies with trade secrets respond to IDD adoption by avoiding audits conducted by the same audit office as their competitors’ audit office, supporting the proprietary cost hypothesis. The results are robust not only in various levels of auditor sharing but also after I incorporate factors including Mergers and Acquisitions, SOX, and differentiations of IDD adoption and rejection. Cross-sectional results related to Big N auditors suggest that peer companies with trade secrets that hire Big N auditors increase audit office sharing because Big N auditors’ higher levels of reputation, higher litigation costs, and deep pockets alleviate concerns of potential information leakage through audit office sharing in the post IDD adoption periods. My cross-sectional results related to audit committee experts show that peer companies with trade secrets respond to IDD adoption by engaging in more frequent audit office sharing when they have industry experts and accounting financial experts on audit committees. Supervisory financial expertise on audit committees of peer companies with trade secrets does not seem to affect the probability of audit office sharing after the IDD adoption. To my knowledge, this study is the first to document the causal effect of proprietary information costs on audit office choices of U.S. companies with trade secrets. / Business Administration/Accounting
|
Page generated in 0.1191 seconds