Dissertations / Theses on the topic 'Business secret'

To see the other types of publications on this topic, follow the link: Business secret.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Business secret.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Brands, Raina Annelise. "Secret women's business : gender stereotypes bias the perception of social networks." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hannah, David Ramsay. "An investigation of the effects of trade secret protection procedures and psychological contract violations on employees' tendencies to divulge trade secrets /." Digital version accessible at:, 2000. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chui, Kit-ching, and 崔潔貞. "The secret behind the screen : a tale of Hong Kong's pawnbroking business." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/208081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
High counter top, full-height screen in front of main hall and accompanied with narrow staircase, which never see another end, pawnshop seems very mystery to everyone. Never having visited a pawnshop before, the author interviewed and tried to unfold this mysterious mask. Pawnbroking business is an interesting traditional business. It is full of old traditions and customs. Through more than eight months of research and several interviews, the author has documented and analyzed this old business in Hong Kong. Pawnbroking business is an ancient trade in the world. Although different countries have different traditions and practices, it is believed that it originated from a temple in China. It can be traced back to AD420-589. Sharing the same origin with China, Hong Kong pawnbroking business is still keeping its traditional business practices. However, little literature about the Hong Kong pawnbroking business can be found. Published documentations about the topic are not based on in-depth research. Besides, the general public and scholars tend to focus on the pawnshop building with little attention on its traditional trade. This paper aims to recognize the tangible and intangible features of pawnbroking by documentation of a traditional pawnshop in Hong Kong. Through the understanding of its significance, hopefully a way to preserve this traditional trade can be determined, raising the general public’s and scholar’s attention and keeping it sustainable in the future.
published_or_final_version
Conservation
Master
Master of Science in Conservation
4

Garinot, Jean-Marie. "Le secret des affaires." Thesis, Dijon, 2011. http://www.theses.fr/2011DIJOD007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
En dépit de son importance pratique, le secret des affaires n’est guère pris en compte par le droit français. Bien que mentionné par quelques textes épars, il ne peut être qualifié de notion juridique. Face aux lacunes de notre législation, les tribunaux sont contraints d’appliquer le droit commun pour protéger les informations économiques sensibles : or, l’article 1382 du Code civil, comme les textes réprimant le vol et le recel, ne sont pas adaptés. Pourtant, comme en témoignent certains systèmes juridiques étrangers, la protection du secret est nécessaire ; il convient donc d’en rechercher les fondements. Bien que justifiée, la sauvegarde des renseignements confidentiels doit toutefois être conciliée avec les autres intérêts en présence, tels que les droits particuliers à l’information, les principes directeurs du procès, la transparence financière ou encore la liberté du travail. Le but de cette étude est donc de cerner la notion de secret des affaires, puis de proposer des modalités de protection, en respectant les intérêts des tiers
Despite its practical relevance, business secrecy remains barely recognized under French law. Even if various texts refer to that concept, it cannot be considered as a legal concept under French law. In order to face the defects of our law, courts are bound to apply ordinary law to guarantee the protection of sensitive business information. However, applying article 1382 of the French civil code (torts) as well as referring to the concepts of robbery or handling (criminal law) are inappropriate solutions. Nevertheless, some foreign legal systems have demonstrated that protecting business secrecy was necessary. Therefore, our study will seek the grounds of that need for protection. Protecting confidential data, although justified, must be compatible with other key principles: individual rights to information, civil trial practice standards, financial transparency or freedom of work. Thus, the purpose of that study is to delimitate the concept of business secrecy before suggesting new measures to protect it while preserving third parties beneficiaries
5

Kim, Michelle. "Cracking the Hollywood Formula: The Secret Powers of the Superhero Franchise." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
There are many perceived advantages of developing a film from a comic book series such as its preexisting built-in audiences, easy marketability, licensing opportunities of comic book characters, and easily adaptable stories. All these qualities make the comic book conducive to film adaptation and profitable franchises. Studios have also taken notice and have been producing comic book inspired films in record numbers in the past decade. This thesis will investigate the comic book-to-film phenomena and will attempt to quantify whether it is in fact as lucrative as it appears. In order to quantify the effect of the comic book variable on film's success, this study will utilize the ordinary least squares method. By regressing the comic variable along with all other control variables, we hope to determine if the effect of the comic variable varies between two different measures of success.
6

Azizi, Farnoush, and XiLu Wang. "Your secret weapon to achieve E-Loyalty : A Quantitative Study On Antecedents Leading To E-loyalty." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-76083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the rise of e-commerce, more and more retailers switch the focus to online environment. In order to gain customers’ e-loyalty, e-retailers have to pay more attention to e-loyalty itself and its antecedents. To help practitioners and academicians better understand e-loyalty, theory of e-satisfaction, e-trust and perceived value were introduced in this thesis. A conceptual model was structured to further explain the relationships towards e-loyalty. The purpose of this thesis is to explain the relationship of e-loyalty and its antecedents (e-satisfaction, e-trust and perceived value) and identify the strongest antecedent leading to e-loyalty.
7

Atkins, Matthew. "What is the purpose of the ongoing use of fiduciary duties in English business law, with particular reference to breaches of duty in relation to bribery, secret profits, conflicts of interest and unconscionability?" Thesis, Lancaster University, 2018. http://eprints.lancs.ac.uk/127025/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tassabehji, Rana. "Secure use of the Internet by business." Thesis, University of Salford, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Čech, Petr. "Konkurenční strategie firmy." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2010. http://www.nusl.cz/ntk/nusl-222473.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The aim of the diploma thesis is to create competitive strategy of a middle-size company working in mechanical industry. The thesis analysis the current state and the internal factors of the analyzed firm with respect to the external factors. The competitive strategy and its implementation are suggested on the base of defined firm´s target and competitive advantages.
10

Argyropoulos, Nikolaos. "Designing secure business processes from organisational goal models." Thesis, University of Brighton, 2018. https://research.brighton.ac.uk/en/studentTheses/6aca6ecc-0073-48dd-a781-6cb66de28272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Business processes are essential instruments used for the coordination of organisational activities in order to produce value in the form of products and services. Information security is an important non-functional characteristic of business processes due to the involvement of sensitive data exchanged between their participants. Therefore, potential security shortfalls can severely impact organisational reputation, customer trust and cause compliance issues. Nevertheless, despite its importance, security is often considered as a technical concern and treated as an afterthought during the design of information systems and the business processes which they support. The consideration of security during the early design stages of information systems is highly beneficial. Goal-oriented security requirements engineering approaches can contribute to the early elicitation of system requirements at a high level of abstraction and capture the organisational context and rationale behind design choices. Aligning such requirements with process activities at the operational level augments the traceability between system models of different abstraction levels and leads to more robust and context-aware operationalisations of security. Therefore, there needs to be a well-defined and verifiable interconnection between a system’s security requirements and its business process models. This work introduces a framework for the design of secure business process models. It uses security-oriented goal models as its starting point to capture a socio-technical view of the system to-be and its security requirements during its early design stages. Concept mappings and model transformation rules are also introduced as a structured way of extracting business process skeletons from such goal models, in order to facilitate the alignment between the two different levels of abstraction. The extracted business process skeletons, are refined to complete business process models through the use of a set of security patterns, which standardise proven solutions to recurring security problems. Finally, the framework also offers security verification capabilities of the produced process models through the introduction of security-related attributes and model checking algorithms. Evaluation of this work is performed: (i) through individual evaluation of its components via their application in real-life systems, (ii) a workshop-based modelling exercise where participants used and evaluated parts of the framework and (iii) a case study from the public administration domain where the overall framework was applied in cooperation with stakeholders of the studied system. The evaluation indicated that the developed framework provides a structured approach which supports stakeholders in designing and evaluating secure business process models.
11

Sadique, Kazi Masum. "Secure Mobile POS System : A point of sale application for secure financial transitions in a mobile business enviroment." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The use of smart phones has changed the lifestyle of the society. Almost all kind of useful tools you can find on your smart phone. People used to buy goods every day. And for the purchase of goods they must pay. Security is very important while payment is concern. In this thesis we have designed and demonstrated a mobile phone application that can be used for a small shop or a big market. For any kind of commerce application, three different kind of entities are mostly involved: the customer, the sales person, and the management of the shop. Our designed mobile application has three different interfaces for three different kind of users: Manager Interface, Employee Interface, and Customer Interface. An interface for the system administrator is also designed, which should be used as an desktop application on the point of sale server. This application is flexible with capabilities of different payment options. Our proposed design can be implemented in any smart phone environment for example Android, iOS or Windows phone. This design provides availability, confidentiality, and integrity of payment data.
12

O'Neal, Matthew R., and Joshua S. Dixon. "Defense Strategic and Business case analyses for commercial products in secure mobile computing." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
MBA Professional Report
The Defense (DoD) lags behind commercial entities in terms of adopting mobile computing technologies. Commercial smartphones offer scalable solutions to meet requirements ranging from business functions to tactical operations; however, these solutions require considerations beyond those applicable to the commercial sector. This research identifies whether potential solutions may contribute to three objectives: 1) reduce the DoD's currently high device and service costs; 2) increase the DoD's smartphone functionality; 3) maintain or increase the level of security functionality available in commercial devices for DoD. A strategic analysis of the commercial mobile communications industry highlights the business drivers and motivations of industry participants. This information is used to identify the DoD's strategic options, which, in turn, serve as the basis of business cases for adopting future smartphone capabilities. Business case analyses compare proposed cost models with the cost models for current smartphone implementations. Results indicate growing strategic opportunities for the DoD to acquire more economical commercial handsets and more flexible network services. The business cases may potentially save billions of dollars over seven years-i.e., the estimated life cycle of cellular network equipment. Risk assessments demonstrate the strong potential for the proposed solutions to maintain handset functionality, security features, and network coverage.
13

Xue, Feng 1970. "A secure, anonymous and scalable digital cash system /." Thesis, McGill University, 1999. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Blind signatures make anonymity a reality in digital cash systems. However, when deployed in digital cash systems such as eCash, blind signatures raise such drawbacks as bad scalability and unfair anonymity. In this thesis, efforts have been done to combine digital signatures and a mechanism called "money-exchange" found in NetCash to build a new digital cash system. In the new system, two forms of digital cash are introduced: digital notes and digital coins. "Money-exchange" is extended to permit cash exchange from one form to the other. At the side of the digital cash issuer, at least two databases are maintained to detect double-spending. The new digital cash system is secure due to its deployment of both symmetric and asymmetric encryption algorithms. The combination of blind signatures and the extended money-exchange mechanism offers unconditional and fair anonymity, and it makes the system more scalable with the regards to the number of clients served.
14

Corris, Alexander Grosholz. "Secure Mobile Deployment of NFL Training Materials." Thesis, Nova Southeastern University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3642884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:

The problem addressed is the lack of empirical research describing the delivery of individualized learning material in a secure and mobile manner. The goal was to investigate the effectiveness of deploying training materials to National Football League (NFL) players during a recent NFL season.

Over the past few seasons, NFL teams have started to deliver player training material to mobile devices. The training material is sensitive and includes planning documents for upcoming games. An effort was made to survey a representative at each of the 32 NFL teams in order to gain insight on effectiveness, security, and process. Nearly half of the league responded with 14 of the 32 franchises reporting back.

The results demonstrate that mobile devices can be an effective means to distribute educational materials to individuals in secure manner. The iPad was identified as a suitable platform for delivery of instructional material. Security elements such as encryption and using mobile security products should be strongly considered. The results are discussed in detail. A set of standards and guidelines were created based on the responses provided by club employees.

15

Bianco, Alessandro. "Le contrat de franchise : contribution à une analyse relationnelle." Thesis, Poitiers, 2014. http://www.theses.fr/2014POIT3012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Le contrat de franchise organise la transmission d'un savoir-faire et prépare la réitération d'un succès commercial. Compte tenu de la nature complexe de la prestation caractéristique, les parties au contrat deviennent au fil du temps des véritables partenaires, si bien que le contrat de franchise acquiert une dimension relationnelle. Malgré cette spécificité, le droit français appréhende encore le contrat de franchise en utilisant le modèle cognitif classique offert par la théorie générale du contrat. Une telle démarche risque d'ignorer la réalité des problèmes que les partenaires peuvent rencontrer, ce qui peut conduire à l'application de solutions inadaptées. La proposition d'une analyse relationnelle vise à réduire un tel risque. En se fondant principalement sur les travaux de la doctrine nord-américaine, l'analyse relationnelle séduit de plus en plus les juristes français notamment parce que les raisonnements proposés sont souvent compatibles avec le droit positif. En envisageant le contrat de franchise grâce à la grille de lecture fournie par l'analyse relationnelle, il devient possible d'appréhender l'intégralité du contexte dans lequel ce contrat s'insère et de proposer des règles de droit en harmonie avec les besoins et préoccupations des partenaires contractuels
The franchise agreement organizes the transmission of trade secrets and business plans. Given the complex nature of this performance , the contracting parties over time become true partners , so that the franchise agreement acquires a relational dimension. Despite the existence of a relational dimension, French contract law still rule the franchise agreement using the standard cognitive model offered by classic contract theory. Such an approach risks ignoring the real problems that partners can meet , which may lead to the application of inappropriate solutions. The proposal for a relational analysis aims to reduce such a risk. Based largely on the work of the North American contract law doctrine , the relational analysis is attracting more and more French scholars especially because the proposed arguments follow the French legal system's evolution. The relational analysis allows us to understand the franchise agreement's context and propose solutions in harmony with the needs and concerns of contractual partners
16

Locust, Valencia Y. "Strategies Used by Women to Secure SBA's 8(a) and 504 Loan financing." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Many woman small business owners lack strategies to obtain Small Business Administration's (SBA) 8(a) and 504 Loan financing to start and grow their businesses. This exploratory case study explored strategies that 5 women business owners used to secure SBA's 8(a) and 504 Loan financing. The TPB and feminist theory were the conceptual frameworks used in this multiple case study. In-depth, semistructured interviews with purposively selected women small business owners supplemented a review of loan acceptances and certifications. Yin's 5-step analysis guided the coding process of participants' responses, and member checking verified the transcription accuracy and that emerging themes and inferences were in accord with participant experiences. The major themes of the study revealed that motivational factors, innovative strategies, and receiving assistance from the SBA enabled women to obtain SBA financing to start and grow successful businesses. All participants noted access to financial resources was the most significant resource that supported the success of their business in the initial phase of starting a business. The study's implications for positive social change include contributing to obtaining finances so that more women can start businesses and add to the economic well-being of society. This study may benefit women small business owners seeking to obtain government business loans to start and grow their businesses.
17

Du, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal methods in protocol security verification. The implication is that it may prove suitable for developing secure protocols in other electronic business domains. In depth investigations are conducted into a range of issues in relation to establishing generic security requirements for e-tendering systems. The outcomes are presented in a form of basic and advanced security requirements for e-tendering process. This analysis shows that advanced security services are required to secure e-tender negotiation integrity and the submission process. Two generic issues discovered in the course of this research, functional difference and functional limitations, are fundamental in constructing secure protocols for tender negotiation and submission processes. Functional difference identification derives advanced security requirements. Functional limitation assessment defines how the logic of generic security mechanisms should be constructed. These principles form a proactive analysis applied prior to the construction of security protocols. Security protocols have been successfully constructed using generic cryptographic security mechanisms. These protocols are secure e-tender negotiation integrity protocol suite, and secure e-tender submission protocols. Their security has been verified progressively during the design. Verification results show that protocols are secure against common threat scenarios. The primary contribution of this stage are the procedures developed for the complex e-business protocol analysis using formal methods. The research shows that proactive analysis has made this formal security verification possible and practical for complex protocols. These primary outcomes have raised awareness of security issues in e-tendering. The security solutions proposed in the protocol format are the first in e-tendering with verifiable security against common threat scenarios, and which are also practical for implementation. The procedures developed for securing the e-tendering process are generic and can be applied to other business domains. The study has made improvements in: establishing adequate security for a business process; applying proactive analysis prior to secure protocol construction; and verifying security of complex e-business protocols using tool aided formal methods.
18

MIRANDA, SANDRA MARA SANTA BARBA. "IS SECRECY STILL THE SOUL OF BUSINESS?: A DISCOURSE ANALYSIS OF NATIONAL INTELLIGENCE SERVICES' HOME PAGES." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2006. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9569@1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
Os serviços nacionais de inteligência são instituições que, tradicionalmente, têm se fechado ao escrutínio público e cujas atividades são cercadas por certo mistério. Este trabalho investiga a página inicial (home page) na internet de três serviços nacionais de inteligência: o turco, o italiano e o australiano. A análise das páginas discute o discurso institucional dos serviços em duas esferas: a verbal e a visual. A análise verbal focaliza a declaração de missão/lema dessas instituições e a análise visual contempla as imagens e o layout das páginas como um todo. Como suporte teórico para a análise verbal, utiliza-se a gramática funcional de Halliday (1994). Já a análise visual se fundamenta na teoria da multimodalidade de Kress e van Leeuwen (1996). O estudo sugere que, embora a presença dos serviços nacionais de inteligência na internet possa parecer, à primeira vista, uma mudança de postura de relacionamento para com o público em geral, muito pouco é dito acerca de princípios, objetivos específicos ou métodos de atuação pelos quais se pautam essas instituições.
National intelligence services are institutions which have traditionally avoided public scrutiny and whose activities have been clothed in some mistery. This study investigates the home page of three national intelligence services: the Turkish, the Italian and the Australian. The analysis examines two aspects of the institutional discourse of the services: the verbal and the visual. The verbal analysis centers on the institutional mission statement/motto and the visual analysis focuses on images and layout of the pages as a whole. The verbal analysis is based on Halliday's functional grammar (1994) and critical discourse analysis. The verbal analysis draws on Kress and van Leeuwen's theory of multimodality (1996). The results suggest that, although the presence of national intelligence services on the internet may seem to be a step forward toward a more transparent relationship with the general public, very little is actually said about specific principles, objectives and modus operandi these institutions guide themselves.
19

Hardy, Jasmine Y. "Strategies to Secure Sustainable Funding for Nonprofit Organizations." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
There are 1.4 million active nonprofit organizations in the United States; however, funding sustainability often forces nonprofit senior leaders into closure, which can lead to increased unemployment and decreased services provided to local communities. Nonprofit senior leaders seek help from scholars, at times, to identify strategies to secure sustainable funding sources, improve the sustainability of funding, or prevent or reverse losses of funding to their organizations. Through the conceptual lens of the general systems theory, the 2015-2016 Baldrige Excellence Framework and Criteria, and single- and double-loop learning, this single-case study explored strategies used to secure sustainable funding for nonprofit organizations from businesses, foundations, and individual donations. Through a purposeful sample of 3 senior leaders of a small nonprofit organization located in Baltimore, Maryland, data collection occurred through semistructured interviews, a review of public and internal documents, as well as performance outcomes. Through thematic analysis, 4 themes emerged: process strengths, process opportunities, results strengths, and results opportunities. Identifying strategies to secure sustainable funding may assist nonprofit senior leaders when struggling in an environment in which the supply of critical resources is low. The findings have implications for positive social change for nonprofit senior leaders and the community. Nonprofit senior leaders that secure sustainable funding may offer a positive influence in communities by reducing unemployment, creating new jobs, providing tax payments, promoting philanthropy, and improving lives.
20

Zajac, Michal. "La sélection des projets innovants : les critères mis en oeuvre par les investisseurs en capital dans le secteur du numérique." Paris 13, 2013. http://scbd-sto.univ-paris13.fr/secure/ederasme_th_2013_zajac.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Nous cherchons à découvrir les critères de sélection précis utilisés par les capitaux-risqueurs et les Business Angels. Pour saisir toute la complexité de leur processus de sélection, nous développons un nouveau modèle de l’incitation rationnelle à penser. En particulier, nous montrons que la pensée d’un investisseur rationnel aura tendance à suivre des schémas simplistes et biaisés si l’acte de penser possède un coût d’opportunité. Nous appliquons ce résultat général au cas des investisseurs en capital, ce qui nous permet de formuler un certain nombre d’hypothèses sur leur comportement de sélection. En particulier, nous montrons que la pensée des investisseurs devrait être caractérisée par de nombreux biais cognitifs. En partant de l’hypothèse que penser est coûteux, nous parvenons ainsi à dériver l’existence de nombreux biais cognitifs au nombre desquels des « classiques » comme la persistance des croyances, le biais de confirmation et la pensée par catégories. Notre modèle prédit également l’existence de nouveaux biais que nous nommons « patience limitée » et « aversion pour l’ignorance ». Les hypothèses théoriques sont ensuite testées sur les décisions d’un échantillon de capitaux-risqueurs et de Business Angels français. De la sorte, nous parvenons à reconstituer les critères de sélection employés par une cinquantaine d’investisseurs. Ces critères sont extrêmement hétérogènes entre investisseurs et montrent que ceux-ci interprètent le monde de manière très subjective. Comme le prédit notre modèle théorique, les schémas d’interprétation mis en oeuvre par les investisseurs sont non seulement très personnels, mais comportent de nombreux biais cognitifs, dont la patience limitée et l’aversion pour l’ignorance
We study the selection criteria of Venture Capitalists and Business Angels. In order to take into account the complexity of the selection process, we propose a new theoretical model of the economic incentives to think. We first show that, if thinking has an opportunity cost, a rational investor will tend to use simplistic and biased heuristics when analyzing the surrounding universe. We then apply this result to the case of venture capital and show that the selection criteria will be subjective and biased. We thus succeed in creating a model of human thinking that not only gives rise to classical cognitive biases, like the confirmation bias and categorical thinking, but also predicts the existence of new biases, such as “limited patience” and “ignorance aversion”. We then test empirically our hypotheses, by analyzing the selection criteria of a sample of fifty French Venture Capitalists and Business Angels. We show that their criteria are highly heterogeneous and are based upon subjective ways of analyzing the surrounding universe. In particular, we confirm our theoretical insights that selection criteria are fraught with cognitive biases, including “limited patience” and “ignorance aversion”
21

Bou, Abdo Jacques. "Efficient and secure mobile cloud networking." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
MCC (Mobile Cloud Computing) est un candidat très fort pour le NGN (Next Generation Network) qui permet aux utilisateurs mobiles d’avoir une mobilité étendue, une continuité de service et des performances supérieures. Les utilisateurs peuvent s’attendre à exécuter leurs travaux plus rapidement, avec une faible consommation de batterie et à des prix abordables ; mais ce n’est pas toujours le cas. Diverses applications mobiles ont été développées pour tirer parti de cette nouvelle technologie, mais chacune de ces applications possède ses propres exigences. Plusieurs MCA (Mobile Cloud Architectures) ont été proposées, mais aucune n'a été adaptée pour toutes les applications mobiles, ce qui a mené à une faible satisfaction du client. De plus, l'absence d'un modèle d'affaires (business model) valide pour motiver les investisseurs a empêché son déploiement à l'échelle de production. Cette thèse propose une nouvelle architecture de MCA (Mobile Cloud Architecture) qui positionne l'opérateur de téléphonie mobile au cœur de cette technologie avec un modèle d'affaires de recettes. Cette architecture, nommée OCMCA (Operator Centric Mobile Cloud Architecture), relie l'utilisateur d’un côté et le fournisseur de services Cloud (CSP) de l'autre côté, et héberge un cloud dans son réseau. La connexion OCMCA / utilisateur peut utiliser les canaux multiplex menant à un service beaucoup moins cher pour les utilisateurs, mais avec plus de revenus, et de réduire les embouteillages et les taux de rejet pour l'opérateur. La connexion OCMCA / CSP est basée sur la fédération, ainsi un utilisateur qui a été enregistré avec n’importe quel CSP, peut demander que son environnement soit déchargé de cloud hébergé par l'opérateur de téléphonie mobile afin de recevoir tous les services et les avantages de OCMCA.Les contributions de cette thèse sont multiples. Premièrement, nous proposons OCMCA et nous prouvons qu'il a un rendement supérieur à toutes les autres MCA (Mobile Cloud Architectures). Le modèle d'affaires (business model) de cette architecture se concentre sur la liberté de l'abonnement de l'utilisateur, l'utilisateur peut ainsi être abonné à un fournisseur de cloud et être toujours en mesure de se connecter via cette architecture à son environnement à l'aide du déchargement et de la fédération
Mobile cloud computing is a very strong candidate for the title "Next Generation Network" which empowers mobile users with extended mobility, service continuity and superior performance. Users can expect to execute their jobs faster, with lower battery consumption and affordable prices; however this is not always the case. Various mobile applications have been developed to take advantage of this new technology, but each application has its own requirements. Several mobile cloud architectures have been proposed but none was suitable for all mobile applications which resulted in lower customer satisfaction. In addition to that, the absence of a valid business model to motivate investors hindered its deployment on production scale. This dissertation proposes a new mobile cloud architecture which positions the mobile operator at the core of this technology equipped with a revenue-making business model. This architecture, named OCMCA (Operator Centric Mobile Cloud Architecture), connects the user from one side and the Cloud Service Provider (CSP) from the other and hosts a cloud within its network. The OCMCA/user connection can utilize multicast channels leading to a much cheaper service for the users and more revenues, lower congestion and rejection rates for the operator. The OCMCA/CSP connection is based on federation, thus a user who has been registered with any CSP, can request her environment to be offloaded to the mobile operator's hosted cloud in order to receive all OCMCA's services and benefits
22

Adia, Ibrahim. "Strategies to Secure Sustainable Funding for the Successful Conclusion of Infrastructure Projects." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Construction industry leaders who neglect to implement appropriate project funding strategies harm business operations and lose profits. Inadequate funding is also a significant cause of project failures in the global construction sector. The purpose of this qualitative multiple case study was to explore strategies construction project owners use to secure sustainable funding for the successful conclusion of infrastructure projects. The population comprised 5 leaders of organizations owning construction projects in the Middle Eastern Gulf Cooperation Council states, with successful strategies to acquire adequate funding for completing infrastructure projects. Data were collected from semistructured interviews with the business leaders and reports published by prominent organizations involved in funding infrastructure projects. The modern portfolio theory formulated the conceptual framework. Through thematic analysis, 5 themes emerged: address project funding issues promptly, select projects with high returns and low risks, use project financial management processes to manage project funds, apply a project finance structure for large-scale projects, and implement an Islamic finance scheme for eligible projects. The potential contributions of the study include communities benefitting from improved well-being and construction business employees enjoying higher job security, enhanced working conditions, and better standards of living for their families.
23

Lipkins, Lisa. "Strategies Used by African American Women to Secure Financial Capital to Start New Businesses." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Women-owned businesses continue to drive economic growth in the United States. However, some African American businesswomen lack strategies to obtain capital to start their business. Strategies to obtain funds for a startup is vital to African American women seeking to start and sustain their businesses. Guided by entrepreneurial theory, the purpose of this qualitative multiple case study was to explore strategies African American women use to secure financial capital to start new businesses. The participants included 6 African American women business owners in Atlanta, Georgia, with successful experience in utilizing strategies to secure financial capital to start new businesses. Data were collected from semistructured interviews and company documents. Yin's 5-step analysis was used to analyze the data. The main themes were challenges of being an African American business woman, motivating factors leading to business ownership, and overcoming bank financing challenges. The implications for positive social change may include addressing the disparity of social, human, and financial capital to start new businesses among African American women.
24

Li, Weifeng, and Weifeng Li. "Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Social media analytics is a critical research area spawned by the increasing availability of rich and abundant online user-generated content. So far, social media analytics has had a profound impact on organizational decision making in many aspects, including product and service design, market segmentation, customer relationship management, and more. However, the cybersecurity sector is behind other sectors in benefiting from the business intelligence offered by social media analytics. Given the role of hacker communities in cybercrimes and the prevalence of hacker communities, there is an urgent need for developing hacker social media analytics capable of gathering cyber threat intelligence from hacker communities for exchanging hacking knowledge and tools. My dissertation addressed two broad research questions: (1) How do we help organizations gain cyber threat intelligence through social media analytics on hacker communities? And (2) how do we advance social media analytics research by developing innovative algorithms and models for hacker communities? Using cyber threat intelligence as a guiding principle, emphasis is placed on the two major components in hacker communities: threat actors and their cybercriminal assets. To these ends, the dissertation is arranged in two parts. The first part of the dissertation focuses on gathering cyber threat intelligence on threat actors. In the first essay, I identify and profile two types of key sellers in hacker communities: malware sellers and stolen data sellers, both of which are responsible for data breach incidents. In the second essay, I develop a method for recovering social interaction networks, which can be further used for detecting major hacker groups, and identifying their specialties and key members. The second part of the dissertation seeks to develop cyber threat intelligence on cybercriminal assets. In the third essay, a novel supervised topic model is proposed to further address the language complexities in hacker communities. In the fourth essay, I propose the development of an innovative emerging topic detection model. Models, frameworks, and design principles developed in this dissertation not only advance social media analytics research, but also broadly contribute to IS security application and design science research.
25

Alotaibi, Hind. "Context-aware and secure workflow systems." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/8052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Businesses do evolve. Their evolution necessitates the re-engineering of their existing "business processes”, with the objectives of reducing costs, delivering services on time, and enhancing their profitability in a competitive market. This is generally true and particularly in domains such as manufacturing, pharmaceuticals and education). The central objective of workflow technologies is to separate business policies (which normally are encoded in business logics) from the underlying business applications. Such a separation is desirable as it improves the evolution of business processes and, more often than not, facilitates the re-engineering at the organisation level without the need to detail knowledge or analyses of the application themselves. Workflow systems are currently used by many organisations with a wide range of interests and specialisations in many domains. These include, but not limited to, office automation, finance and banking sector, health-care, art, telecommunications, manufacturing and education. We take the view that a workflow is a set of "activities”, each performs a piece of functionality within a given "context” and may be constrained by some security requirements. These activities are coordinated to collectively achieve a required business objective. The specification of such coordination is presented as a set of "execution constraints” which include parallelisation (concurrency/distribution), serialisation, restriction, alternation, compensation and so on. Activities within workflows could be carried out by humans, various software based application programs, or processing entities according to the organisational rules, such as meeting deadlines or performance improvement. Workflow execution can involve a large number of different participants, services and devices which may cross the boundaries of various organisations and accessing variety of data. This raises the importance of _ context variations and context-awareness and _ security (e.g. access control and privacy). The specification of precise rules, which prevent unauthorised participants from executing sensitive tasks and also to prevent tasks from accessing unauthorised services or (commercially) sensitive information, are crucially important. For example, medical scenarios will require that: _ only authorised doctors are permitted to perform certain tasks, _ a patient medical records are not allowed to be accessed by anyone without the patient consent and _ that only specific machines are used to perform given tasks at a given time. If a workflow execution cannot guarantee these requirements, then the flow will be rejected. Furthermore, features/characteristics of security requirement are both temporal- and/or event-related. However, most of the existing models are of a static nature – for example, it is hard, if not impossible, to express security requirements which are: _ time-dependent (e.g. A customer is allowed to be overdrawn by 100 pounds only up-to the first week of every month. _ event-dependent (e.g. A bank account can only be manipulated by its owner unless there is a change in the law or after six months of his/her death). Currently, there is no commonly accepted model for secure and context-aware workflows or even a common agreement on which features a workflow security model should support. We have developed a novel approach to design, analyse and validate workflows. The approach has the following components: = A modelling/design language (known as CS-Flow). The language has the following features: – support concurrency; – context and context awareness are first-class citizens; – supports mobility as activities can move from one context to another; – has the ability to express timing constrains: delay, deadlines, priority and schedulability; – allows the expressibility of security policies (e.g. access control and privacy) without the need for extra linguistic complexities; and – enjoy sound formal semantics that allows us to animate designs and compare various designs. = An approach known as communication-closed layer is developed, that allows us to serialise a highly distributed workflow to produce a semantically equivalent quasi-sequential flow which is easier to understand and analyse. Such re-structuring, gives us a mechanism to design fault-tolerant workflows as layers are atomic activities and various existing forward and backward error recovery techniques can be deployed. = Provide a reduction semantics to CS-Flow that allows us to build a tool support to animate a specifications and designs. This has been evaluated on a Health care scenario, namely the Context Aware Ward (CAW) system. Health care provides huge amounts of business workflows, which will benefit from workflow adaptation and support through pervasive computing systems. The evaluation takes two complementary strands: – provide CS-Flow’s models and specifications and – formal verification of time-critical component of a workflow.
26

Alva, Cruz Josselyn Estefanía. "The implementation of business policies of use and control of technological work tools as an effective mechanism to suspend the expectation of confidentiality in the employment relationship." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/117473.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Based on the considerations presented by the Constitutional Court in the light of a specific case, this article addresses the discussion about the limit of intervention that the employer has to intercept and collect those communications that are protected by the secrecy of the law of the Communications of workers, establishing the possibility of implementing new control mechanisms that suspend any kind of expectation of confidentiality.
A partir de las consideraciones expuestas por el Tribunal Constitucional en atención a un caso en concreto, el presente artículo aborda la discusión sobre el límite de intervención que posee el empleador para interceptar y recaudar aquellas comunicaciones que se encuentran protegidas por el secreto al derecho de las comunicaciones de los trabajadores, estableciendo la posibilidad de implementar nuevos mecanismos de control que suspenden cualquier tipo de expectativa de confidencialidad.
27

Essaidi, Moez. "Model-Driven Data Warehouse and its Automation Using Machine Learning Techniques." Paris 13, 2013. http://scbd-sto.univ-paris13.fr/secure/edgalilee_th_2013_essaidi.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
L'objectif de ce travail de thèse est de proposer une approche permettant l'automatisation complète du processus de transformation de modèles pour le développement d'entrepôts de données. L'idée principale est de réduire au mieux l'intervention des experts humains en utilisant les traces de transformations réalisées sur des projets similaires. L'objectif est d'utiliser des techniques d'apprentissage supervisées pour traiter les définitions de concepts avec le même niveau d'expression que les données manipulées. La nature des données manipulées nous a conduits à choisir les langages relationnels pour la description des exemples et des hypothèses. Ces langages ont l'avantage d'être expressifs en donnant la possibilité d'exprimer les relations entres les objets manipulés mais présente l'inconvénient majeur de ne pas disposer d'algorithmes permettant le passage à l'échelle pour des applications industrielles. Pour résoudre ce problème, nous avons proposé une architecture permettant d'exploiter au mieux les connaissances issues des invariants de transformations entre modèles et métamodèles. Cette manière de procéder a mis en lumière des dépendances entre les concepts à apprendre et nous a conduits à proposer un paradigme d'apprentissage dit de concepts-dépendants. Enfin, cette thèse présente plusieurs aspects qui peuvent influencer la prochaine génération de plates-formes décisionnelles. Elle propose, en particulier, une architecture de déploiement pour la business intelligence en tant que service basée sur les normes industrielles et les technologies les plus récentes et les plus prometteuses
This thesis aims at proposing an end-to-end approach which allows the automation of the process of model transformations for the development of data warehousing components. The main idea is to reduce as much as possible the intervention of human experts by using once again the traces of transformations produced on similar projects. The goal is to use supervised learning techniques to handle concept definitions with the same expressive level as manipulated data. The nature of the manipulated data leads us to choose relational languages for the description of examples and hypothesises. These languages have the advantage of being expressive by giving the possibility to express relationships between the manipulated objects, but they have the major disadvantage of not having algorithms allowing the application on large scales of industrial applications. To solve this problem, we have proposed an architecture that allows the perfect exploitation of the knowledge obtained from transformations' invariants between models and metamodels. This way of proceeding has highlighted the dependencies between the concepts to learn and has led us to propose a learning paradigm, called dependent-concept learning. Finally, this thesis presents various aspects that may inuence the next generation of data warehousing platforms. The latter suggests, in particular, an architecture for business intelligence-as-a-service based on the most recent and promising industrial standards and technologies
28

Lichtenberg, Alex Leon. "A Historical Review of Five of the Top Fast Food Restaurant Chains to Determine the Secrets of Their Success." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The primary goal of this paper is to critically examine five of the top nine US fast food chains to look at their history and to determine what factors have lead to their massive success. The companies that will be analyzed include: McDonald's, Taco Bell, Kentucky Fried Chicken, Domino's Pizza, and Subway. Similarities and differences of these companies are compared and contrasted throughout the paper and clearly demonstrate how each company has managed to capture and maintain major market share in their respective food categories. Areas that are examined range from product quality to to business models to consumer psychology. A review of these companies reveals that there are specific success factors for each, and one overarching factor for all. Specific factors include, but are not limited to marketing technique, organizational structure and overall business concept. The one factor that seems critical to all is entering the market with an innovative and unique concept.
29

Gustafsson, Jacob, and Adam Törnkvist. "Secure handling of encryption keys for small businesses : A comparative study of key management systems." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Background: A recent study shows that key management in the cooperate world is very painful due to, among other reasons, a lack of knowledge and resources. Instead, some companies embed the encryption keys and other software secrets directly in the source code for the application that uses them, introducing the risk of exposing the secrets. Today, there are multiple systems for managing keys. However, it can be hard to pick a suitable one. Objectives: The objectives of the thesis are to identify available key management systems for securing secrets in software, evaluate their eligibility to be used by small businesses based on various attributes and recommend a best practice to configure the most suited system for managing software secrets. Methods: Key management systems are identified through an extensive search, using both scientific and non-scientific search engines. Identified key management systems were compared against a set of requirements created from a small business perspective. The systems that fulfilled the requirements were implemented and comprehensively evaluated through SWOT analyses based on various attributes. Each system was then scored and compared against each other based on these attributes. Lastly, a best practice guide for the most suitable key management system was established. Results: During the thesis, a total of 54 key management systems were identified with various features and purposes. Out of these 54 systems, five key management systems were comprehensively compared. These were Pinterest Knox, Hashicorp Vault, Square Keywhiz, OpenStack Barbican, and Cyberark Conjur. Out of these five, Hachicorp Vault was deemed to be the most suitable system for small businesses. Conclusions: There is currently a broad selection of key management systems available. The quality, price, and intended use of these vary, which makes it time-consuming to identify the system that is best suitable based on the needs. The thesis concludes Hachicorp Vault to be the most suitable system based on the needs presented. However, the thesis can also be used by businesses with other needs as a guideline to aid the problem of choosing a key management system.
Bakgrund: En ny studie visar att nyckelhantering i företagsvärlden är väldigt omständligt, bland annat på grund av brist av kunskap och resurser. Istället väljer vissa företag att inkludera krypteringsnycklar och andra mjukvaruhemligheter direkt i källkoden för applikationen som ska använda dem, och därmed introducerar risken att exponera hemligheterna om källkoden skulle bli tillgänglig för en obehörig part. Syfte: Syftet med denna avhandling är att identifiera tillgängliga nyckelhanteringssystem för att säkra upp mjukvaruhemligheter, bedöma deras lämplighet för småföretag genom att utvärdera dem baserat på olika egenskaper, och rekommendera bästa praxis för att konfigurera det mest lämpliga nyckelhanteringssystemet. Metod: Nyckelhanteringssystem har identifierats genom en omfattande sökning i både vetenskapliga och icke-vetenskapliga sökmotorer. Identifierade nyckelhanteringssystem jämfördes med ett antal krav skapade från ett småföretags-perspektiv. De systemen som uppfyllde kraven implementerades och utvärderades omfattande genom SWOT analyser baserade på attribut för exempelvis funktioner, prestanda, användarvänlighet och uppskattat framtida stöd. Varje system fick sedan en poäng som jämfördes mot de andra systemen baserat på dessa attributen. Till sist togs även en bästa praxis fram för det mest lämpade nyckelhanteringssystemet. Resultat: Under avhandlingen identifierades totalt 54 nyckelhanteringssystem med olika funktioner och syften. Utav dessa system jämfördes fem omfattande. Dessa var Pinterest Knox, Hashicorp Vault, Square Keywhiz, OpenStack Barbican och Cyberark Conjur. Utav dessa fem ansågs Hachicorp Vault vara det mest lämpade systemet för småföretag. Slutsatser: Det finns nuvarande ett brett utbud av nyckelhanteringssystem tillgängliga. Kvalitén, priset och deras syfte varierar vilket gör det tidskrävande att identifiera det systemet som best lämpar sig till ens behov. Avhandlingen anser Hachicorp Vault vara den mest lämpliga baserat på de presenterade behoven, men avhandlingen kan också användas av företag med andra behov som en guide för att underlätta problemet med att välja ett lämpligt nyckelhanteringssystem.
30

Efendic, Elvira, and Sabina Lajiq. "Service Quality : A research on how recruitment companies secure service quality." Thesis, Linnéuniversitetet, Ekonomihögskolan, ELNU, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Background: Service quality is considered to be a vital strategy for survival and success in today’s competitive environment. Although there have been an emphasis in quality overall, the research in companies performance within a business-to-business approach is still largely unexplored. Accordingly, service quality in recruitment companies will be interesting to examine in order to explore the business-to-business industry further. Purpose &: The purpose of this research is to study how recruitment Research Question: companies secure quality in their services. What factors indicate various quality levels? Methodology: This is a qualitative study with a deductive approach. Multiple case studies were conducted with a total of six respondents from three companies. Conclusion: This research concluded factors that indicate various quality levels in recruitment companies. The collected data that could not be strengthened with the theories was recommended as further research.
31

Domeher, Daniel. "Secure property rights and access to small enterprises' (SEs) credit : a comparative study of Ghana and England." Thesis, Liverpool John Moores University, 2013. http://researchonline.ljmu.ac.uk/6177/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Small enterprises are a major source of livelihood for most people in the developing world. Their ability to grow is however, undermined by credit constraints. This has often been attributed to the lack of registered property ownership which is argued to make property insecure and unacceptable to lenders. Though several studies have been conducted on the relationship between property registration and credit access, the focus is usually on the demand side mainly involving households and the agricultural sector. Furthermore, no studies have compared the developed and developing countries. Finally, the exact nature of , the credit constraint amongst businesses in countries such as Ghana for instance is not known. This research therefore, set out to conduct a demand-side study into the nature of the credit constraint amongst small businesses in Ghana and a supply-side investigation of the influence of registration on small businesses access to credit. The multi methodology was deemed most suitable approach for the investigation of the objectives of the study. The quantitative approach was first used to investigate the objectives. Part of the initial findings was validated through the quantitative approach whilst the other part was validated through the qualitative approach. The results show amongst other things that the existing credit constraint is almost entirely a supply side problem. The supply side study showed that in Ghana, unregistered property is not eligible for use as collateral but this is applicable only to the universal banks (UBs) and not the microfinance institutions (MFIs). That said, the possession of registered property title was not found to influence the loan terms that businesses are offered neither was there evidence that it guarantees access to credit. Even though in England the eligibility of property was not dependent on whether it is registered or not, lenders also did agree that the possession of registered property does not guarantee credit access neither does it influence the credit terms businesses are offered. It was concluded that since majority of small businesses in Ghana seek credit from MFIs, the lack of registered property titles does not constitute a major barrier to credit access. The I main barriers to credit access identified are the poor repayment ability and high risk of default amongst others.
32

Ma, Lai No. "Personal financial planning : a way to make a better and more secure life." Thesis, University of Macau, 1997. http://umaclib3.umac.mo/record=b1644067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Alzahrani, Naif Saeed. "A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games." PDXScholar, 2019. https://pdxscholar.library.pdx.edu/open_access_etds/5038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Counterfeit products, especially in the pharmaceutical sector, have plagued the international community for decades. To combat this problem, many anti-counterfeiting approaches have been proposed. They use either Radio Frequency Identification (RFID) or Near Field Communication (NFC) physical tags affixed to the products. Current anti-counterfeiting approaches detect two counterfeiting attacks: (1) modifications to a product's tag details, such as changing the expiration date; and (2) cloning of a genuine product's details to reuse on counterfeit products. In addition, these anti-counterfeiting approaches track-and-trace the physical locations of products as the products flow through supply chains. Existing approaches suffer from two main drawbacks. They cannot detect tag reapplication attacks, wherein a counterfeiter removes a legitimate tag from a genuine product and reapplies it to a counterfeit or expired product. Second, most existing approaches typically rely on a central server to authenticate products. This is not scalable and creates tremendous processing burden on the server, since significant volumes of products flood through the supply chain's nodes. In addition, centralized supply chains require substantial data storage to store authentication records for all products. Moreover, as with centralized systems, traditional supply chains inherently have the problem of a single-point of failure. The thesis of this dissertation is that a robust, scalable, counterfeiting-resistant supply chain that addresses the above drawbacks and can be simultaneously achieved by (i) using a combination of NFC tags on products and a distributed ledger such as blockchain for reapplication-proof, decentralized, and transparent product authentication (ii) a novel game-theoretical consensus protocol for enforcing true decentralization, and enhancing the protocol's security and performance. In this dissertation, we first propose a new Tag Reapplication Detection (TRD) system to detect reapplication attacks using low-cost NFC tags and public key cryptography. To detect reapplication attacks, TRD tracks the number of times a tag has been read in the supply chain using a 'central' authentication server. Second, leveraging the blockchain technology, we propose the Block-Supply Chain, a transformation of TRD into a decentralized supply chain. In this chain, each node maintains a blockchain (distributed public ledger) per product. This blockchain comprises chained blocks, where each is an authentication event. The Block-Supply Chain can detect tag reapplication attacks and can replace the centralized supply chain design, thus overcoming the centralization issues. One of the fundamental characteristics of blockchain technology is the consensus protocol. Consensus protocols ensure that all nodes in the blockchain network agree on the validity of a block to be included in the public ledger. The first and most popular of the existing consensus protocols is Proof of Work (PoW). However, PoW requires massive computational effort, resulting in high energy and computing resources consumption. Alternatively, Byzantine Fault Tolerance (BFT) protocols, such as Tendermint, were adapted in blockchain technology to be efficient and easy to implement. Nevertheless, not all of BFT protocols guarantee true decentralization, and they are mostly based on fixed-validators. BFT fixed-validators protocols typically rely on fixed, static validators responsible for validating all newly proposed blocks. This opens the door for adversaries to launch several attacks on these validators, such as Distributed Denial of Service (DDoS) and Eclipse attacks. In contrast, a truly decentralized protocol ensures that variable sets of anonymous validators execute the blocks' validations. Building on this observation, we propose the TrueBFT, a truly decentralized BFT-based consensus protocol that does not require PoW and randomly employs a different set of validators on each block's proposal. TrueBFT is designed for permissioned blockchains (in such blockchains, the participants who can transact on the blockchain are limited, and each participant is required to have permission to join the system). Our simulations show that TrueBFT offers remarkable performance with a satisfactory level of security compared to the state-of-the-art protocol Tendermint. Another issue with current consensus protocols, particularly the BFT, is that the majority of them do not take the number of employed validators into consideration. The number of validators in a blockchain network influences its security and performance substantially. In response, we integrate a game theoretical model into TrueBFT that analyzes the risk likelihood of each proposer (i.e., the node that creates and proposes the new block). Consequently, each time a new block is proposed, the 'number of validators' becomes proportional to the risk likelihood block's proposer. Additionally, the game model reinforces the honest behavior of the validators by rewarding honest validators and punishing dishonest ones. Together, TRD, Block-Supply Chain, and the game-theoretical TrueBFT consensus protocol enable robust, scalable, decentralized anti-counterfeiting supply chain that is resistant to tag reapplication attacks, as well as attacks to consensus protocols such as DDoS and Eclipse attacks.
34

Munteanu, Radu. "Three essays on licensing university inventions." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2007. http://wwwlib.umi.com/cr/ucsd/fullcit?p3268347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (Ph. D.)--University of California, San Diego, 2007.
Title from first page of PDF file (viewed August 7, 2007). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references.
35

Pool, Estelle. "Insider trading : has legislation been successful?" Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/6172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (MBA (Business Management))--Stellenbosch University, 2008.
ENGLISH ABSTRACT: This research report reviews South African and international legislation aimed at preventing insider trading and provides an overview of the successful criminal and civil proceedings taken against insiders. It highlights the possible preventative measures South African companies and legislature can take to reduce insider trading. The United States of America is one of the few countries that had successfully implemented legislation prohibiting insider trading prior to the 1990s. Most countries, including South Africa, only implemented legislation prohibiting insider trading in the late 1990s. Due to apartheid and sanctions against South Africa, the JSE has built up a legacy of being an insider's haven. The Directorate of Market Abuse has the task of transforming this legacy to restore investors' confidence in the market in order to promote economic growth. The success of the legislation is firstly measured by the knowledge the market has gained relating to insider trading since the implementation of the legislation. According to the South African market, insider trading is unethical, but 22% of the participants in the G:cnesis survey still believe that it is an acceptable practice in the South African market. South African companies therefore need to educate their employees and take preventative measures to reduce insider trading in order to erode this culture. Insider trading can only be prevented and reduced if legislation is enforced. Globally, few legal criminal proceedings have been successful, therefore legislation in most countries makes provision for civil remedies. As the burden of proof in a civil legal proceeding is only on "a balance of probabilities", civil proceedings against insiders have been successful. In South Africa, the majority of cases referred for civil legal action have been settled out of court by the alleged insider without admitting guilt to a criminal offence. The South African legislation regulating insider trading in the market is aligned with legislation globally. South Africa's future challenges are to maintain the initial success achieved in reducing insider trading. The establishment of a specific court specialising in financial crime and monitoring specific changes to legislation could increase the possibility of future success.
AFRIKAANSE OPSOMMING: Die projek ondersoek die Suid-Afikaanse en internasionale wetgewing teen binnehandel. Verder word die suksesvolle kriminele en siviele verrigtinge teen diegene wat hulle aan binnehandel skuldig maak onder die soeklig geplaas. Die projek beklemtoon die moontlike voorkomingsmaatreels wat Suid-Afrikaanse maatskappye en regslui kan implementeer om moontlike toekomstige binnehandel te bekamp. Die Verenigde State van Amerika is een van die min lande wat reeds voor die 1990s wetgewing teen binnehandel suksesvol geimplementeer bet. Ander lande, insluitend Suid-Afrika, het eers in die laat 1990s wetgewing teen binnehandel geproklameer. Apartheid en sanksies teen Suid-Afrika het 'n nalatenskap van vrye binnehandel op die JSE gelaat. Dit is die taak van die Direktoraat van Markmisbruik om hierdie nalatenskap uit te wis, sodat beleggersvertroue in die mark herstel kan word, wat weer tot ekonomiese groei sal lei. Een van die maatstawwe om die sukses van die wetgewing te meet, is om te bepaal hoeveel kennis die finansiele gemeenskap sedert die implementering van die nuwe wetgewing ingewin het. Volgens die finansiele gemeenskap is binnehandel oneties, maar 22% van die deelnemers aan die G:encsis-opname glo dat binnehandel wel in Suid-Afrika aanvaarbaar is. Daarom moet Suid-Afrikaanse maatskappye hulle werknemers se kennis oor binnehandel verbreed en ander voorkomende maatreels in plek stel om die kultuur van binnehandel te elimineer. Binnebandel kan slegs voorkom en verminder word indien wetgewing geimplementeer word. Relatief min kriminele sake teen binnehandel lei tot skuldigbevinding, maar plaaslike en internasionale wetgewing maak voorsiening vir siviele aksies. In 'n siviele hofsaak moet ingediende bewyse slegs na alle waarskynlikheid die skuld van die oortreder bewys, wat suksesvolle siviele vervolging moontlik maak. Die meerderheid siviele sake in Suid-Afrika word buite die bar geskik sonder dat die aangeklaagde skuld aan 'n kriminele daad erken. Die Suid-Afrikaanse wetgewing is in lyn met internasionale standaarde. Suid-Afrika staar verskeie uitdagings in die gesig ten opsigte van die handhawing van die huidige suksesvolle bekamping van binnehandel. Die moontlike totstandkoming van 'n spesiale hof, wat slegs finansiele verwante oortredings aanhoor en veranderings aan die wetgewing kontroleer, kan bydra tot die toekomstige sukses van die Suid-Afrikaanse wetgewing.
36

Fairhurst, Keith. "Investigating funding board composition and turnaround potential of private firms in financial distress." Thesis, University of Pretoria, 2017. http://hdl.handle.net/2263/62694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Controlling shareholders of private firms may define "value of the firm" in terms of personal utility. They may thus prioritize their personal wealth over the firm. Furthermore, agency-based corporate governance may not apply to privately owned firms. This study looked at managers and owners of private firms as potentially risky decision makers. Financial distress was positioned as a boundary to agency theory-based corporate governance for private firms. Choices of shareholders in respect of board composition and the relationship between board composition and external sources of funding were investigated. Influence on turnaround potential, of management who are also shareholders, was also considered. Data from 104 business rescue plans were used for correlation and multiple hierarchical regression analyses. The mean return to secured creditors was 94 % and the mean return to unsecured creditors was 48 %. Unexpectedly a negative correlation between number of directors and free assets was determined. Yet, in the regression model for return to secured creditors, the significant variables were total directors and free assets. It is concluded that personal surety provided by directors may be detrimental to a private firm's free assets. For unsecured creditors, the significant variables were size; management shareholding, and return to secured creditors. The study was conducted between 2011 and 2016 using secondary data drawn from actual business rescue cases. In conclusion, the agency cost of debt construct was refined and an estimate for the agency cost of distressed debt, was presented. Research findings offer improved insight into agency theory for private firms with a foundation for improved corporate governance models. Theorists may use this research to extend understanding of the theory of the firm and corporate governance. Furthermore bankruptcy and turnaround theory may be enhanced by the findings of this research. Practitioners may use the findings to refine credit risk and pricing models.
Thesis (PhD)--University of Pretoria, 2017.
Business Management
PhD
Unrestricted
37

Stenberg, Enbuske Jenny, and Erika Göransson. "Bakomliggande orsaker till uppdelning i intern- och externredovisning : - En studie av tre K3-företag i tillverkningsbranschen." Thesis, Högskolan i Halmstad, Akademin för ekonomi, teknik och naturvetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-34482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Redovisning används för att på ett smidigt sätt kommunicera ut ekonomisk information till företagets olika intressenter, såsom aktieägare, potentiella investerare, chefer, anställda, långivare och stat. Den grundar sig i att företagets olika intressenter, som kan delas in i interna och externa, vill ha tillgång till viss information. Det finns flertalet skillnader mellan det som redovisas internt och det som redovisas externt. Dessa skillnader är bland annat de lagstadgade kraven, vem som ska använda sig av informationen, i vilket sammanhang informationen ska användas samt hur ofta och aktuell information som intressenten behöver. Det är även en stor skillnad mellan vilken tillgång de externa och interna intressenterna har till informationen. De interna intressenterna har direkt tillgång till information medan de externa intressenterna får förlita sig på den information som företaget väljer att publicera offentligt. Syftet med denna studie är att undersöka varför företag gör en uppdelning av sin redovisning i intern- och externredovisning och varför de inte väljer att redovisa dessa tillsammans. Studien bygger på teorier kring isomorfism, legitimitet, intressenter samt teori kring konkurrens, företagshemligheter och risker. Teorier kopplas till intervjuer gjorda med representanter från tre stycken tillverkande K3-företag för att besvara studiens forskningsfråga angående uppdelningen av redovisningen. Intervjuerna genomfördes med en semistrukturerad intervjuguide där intervjuaren har större möjlighet att ställa följdfrågor. Svaren från intervjuerna bidrar till att, genom ett nutids- och verklighetsperspektiv, visa på hur redovisningen fungerar i tillverkande företag år 2017. Studiens resultat visar att företagen gör en uppdelning av redovisningen i intern- och externredovisning på grund av faktorer som beslutsfattning och konkurrens. Företagens interna och externa intressenter har olika behov och krav på den information som företagen lämnar för att kunna använda den till beslutsfattande. Externredovisningen ger inte tillräckligt med underlag för de interna intressenternas beslutsfattande för att de ska kunna fatta snabba och rättbeslut. Medan internredovisningen i sin tur kan vara alltför omfattande för vissa externa intressenter. Ur ett konkurrensperspektiv vill företagen inte att deras konkurrenter ska kunna ta del av företagets internredovisning för att de inte ska få tillgång till deras framgångsrecept. De företag som ingår i studien vill behålla sina konkurrensfördelar och skydda sina affärsmöjligheter för att öka sin lönsamhet och effektivitet.
Accounting is used to easily communicate financial information to the company's various stakeholders, such as shareholders, potential investors, managers, employees, lenders and state. It is based on that the company's various stakeholders, which can be divided into internal and external, want access to certain information. There are several differences between what is reported internally and what is reported externally. These differences include the statutory requirements, who will use the information, the context in which the information is to be used and how often and current information the stakeholder needs. There is also a big difference between the access the external and internal stakeholders have to the information. Internal stakeholders have direct access to information while external stakeholders have to rely on information that the company selects to publish. The purpose of this study is to investigate why companies make a division of their accounts in management and financial accounting and why they do not report them together. The study is based on theories about isomorphism, legitimacy, stakeholders, and theory of competition, business secrets and risks. Theories are linked to interviews made with representatives from three manufacturing K3 companies to answer the study's research question regarding the division of the accounts. The interviews were conducted with a semi-structured interview guide where the interviewers have a greater opportunity to ask supplementary questions. The responses from the interviews contribute to show how the accounting in manufacturing companies works in 2017, in a contemporary and realistic perspective. The study's results show that the companies make a division of the accounts in management and financial accounting due to factors such as decision-making and competition. The company's internal and external stakeholders have different needs and requirements for the information that companies provide in order to use it for decision-making. The financial accounting does not provide sufficient information for the decision-making of internal stakeholders in order to make quick and correct decisions. While management accounting could be too extensive for some external stakeholders. From a competitive perspective, companies do not want their competitors to be able to access the company's management accounting so that they cannot access their recipe of success. The companies included in the study want to maintain their competitive advantages and protect their business opportunities to increase its profitability and efficiency.
38

Zacher, Benedikt. "Risikobewusstes Wissensmanagement in Technologiekooperationen : theoretische Grundlagen und Realisierungsmöglichkeiten /." Frankfurt am Main [u.a.] : Lang, 2008. http://www.gbv.de/dms/ilmenau/toc/559215711.PDF.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Rylander, Malin, and Sofia Thörnberg. "Revisorns tystnads- och anmälningsplikt : tala är silver, tiga är guld?" Thesis, Kristianstad University, School of Health and Society, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-6857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:

Swedish accountants are, amongst other laws, controlled by a couple of so called duties. One of those is the professional secrecy, which guarantees the safety of company secrets and other important information that the accountant needs to know but shouldn’t tell anybody. Since 1999 Swedish accountants also need to follow the regulations of the reporting duty. In short, this means that in some cases of suspected crime within a company, auditors are obliged to report this to the authorities. Some auditors consider these two duties to be in conflict with one another. This specific conflict is very rarely touched upon in other media than essays.A few auditors have, in case of a suspected crime with very vague evidence, gone against the law by getting rid of their client thus not having to take the risk of being sued because of violation of the professional secrecy by reporting the crime in vain. This fact, that some auditors even break the law, is reason enough to investigate why some auditors consider the two duties to be in conflict with one another.During our study, personal interviews with four auditors and two persons of authority were carried out. None of them have experienced any negative emotions about the reporting duty, but when it comes to the auditors that in fact do consider the two duties to be in conflict with one another, the opinions start to differ. Some say that it is practically impossible to get rid of a client by the above reasons without reporting the suspected crime, while others claim the opposite. A possible explanation for the different opinions regarding the two duties could be due to the fact that the regulations surrounding the reporting duty are very differently interpreted by different people. Does the law guarantee the safety of the auditor, or does it not? Is there a conflict between the two duties or not?We are of the opinion that there is absolutely a need to thoroughly investigate this topic, possibly by deciding upon which interpretation of the law is the right one. Swedish accounting organizations need to take this case more seriously than they have so far. Or could it be that they simply don’t want to?


Svenska revisorer lyder bland annat under ett antal olika plikter. En av dessa är tystnadsplikten, som garanterar säkerheten för företagshemligheter och annan viktig information som revisorn måste känna till men inte får yppa för någon. Sedan år 1999 måste svenska revisorer också ta hänsyn till anmälningsplikten. Kortfattat innebär denna att revisorn, i vissa fall, själv måste anmäla misstänkta brott denne upptäckt i företaget till myndigheterna. En del revisorer upplever att dessa två plikter befinner sig i konflikt med varandra. Denna konflikt berörs ytterst sällan i annan media än uppsatser.Några revisorer har, i fall då ett misstänkt brott upptäckts men bevisningen är mycket vag, begått ett lagbrott genom att göra sig av med klienten. På så vis slipper de ta risken att anmälan inte leder någon vart och då riskera att bli stämd för att ha brutit mot tystnadsplikten. Detta, att vissa revisorer går så långt som till att bryta mot lagen, är skäl nog att utreda varför vissa revisorer upplever en konflikt mellan de två plikterna.Vi utförde under denna studie personliga samtal med fyra revisorer och två myndighetspersoner. De upplever personligen inga problem med anmälningsplikten, men har olika åsikter om de revisorer i tidigare studier som faktiskt menar sig uppleva en konflikt. Vissa menar att det är fullständigt omöjligt att göra sig av med en klient för att slippa anmäla ett misstänkt brott - andra det motsatta. En förklaring till att åsikterna om konflikten mellan plikterna varierar skulle kunna vara att tolkningen av lagtexten är föremål för många varierande tolkningar. Garanterar lagtexten revisorns säkerhet eller ej? Finns det en konflikt mellan de två plikterna?Avslutningsvis anser vi att det finns ett stort behov av att utreda detta, förslagsvis genom att bestämma vilken lagtolkning som är den korrekta. Svenska revisorsorganisationer måste ta ämnet på större allvar än hittills. Eller de kanske inte vill?

40

Söderbergh, Veronica, and Zainab Mahdizadeh. "Handel på Facebook och Instagram : Och faktorer som kan påverka benägenheten till det." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-26599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet är ett ständigt växande fenomen med nya innovationer. Som en följd av utvecklandet av Internet har e-handel uppkommit och då även handel via de sociala mediesidorna Facebook och Instagram. Genom att en stor del av internetanvändare befinner sig på de båda plattformarna kan företag dra nytta av att befinna sig där samt att möjliggöra för konsumenter att kunna handla från dem där för att nå fler människor. Konsumenter kan handel på plattformarna bidra till en ökad smidighet då en produkt kan köpas direkt när den ses i Instagram flödet. Syftet med studien är studera handel på Facebook respektive Instagram och att bidra med mer information kring ämnet. Vidare ska studien ge en inblick i agerandet kring köp på kanalerna och hur de tänker kring viljan till att genomföra köp. Det finns ett intresse för företag att få en ökad inblick i ämnet då det är två olika kanaler som företag kan utveckla handel på, och därmed satsa både tid och pengar på kanalerna. Det finns olika begrepp som dyker upp som viktiga för respondenter och som används i studien för att studeras närmare vilka är upplevd säkerhet, erfarenhet, humör, reklam och produkt samt trovärdighet. Resultatet indikerar att de flesta konsumenter idag helst vill använda sig utav företagets hemsida vid handel på Internet. Det finns dock en stor andel av konsumenter som kan tänka sig att någon gång genomföra köp på plattformarna Facebook respektive Instagram. De konsumenter som ännu inte genomfört köp via Facebook och Instagram angav att de inte gjort det på grund av att de inte har det behovet och att de hellre besöker företagets hemsida. När faktorer som kan påverka att ett köp kommer eller har genomförts undersöktes angav flertalet konsumenter att det behövde vara enkelt, smidigt, smidigt, säkert, anpassad reklam och finnas en trovärdighet för företaget.
The Internet is a growing phenomenon with new innovations. The development of the Internet caused e-commerce and shopping via social media, such as Facebook and Instagram, to emerge. Since a large proportion of the Internet users are using both platforms, companies can benefit from having a presence and enabling for consumers to shop from there in ordr to reach more consumers. For the consumers shopping on the platforms can make it easier for people to buy products when they a purchase can be done as soon as a product is seen in the Instagram feed. The purpose of this essay is to study commerce on Facebook and Instagram in order to contribute with more information about the subject. Furthermore, the study will provide an insight into the actions and thoughts the consumers have about what makes them willing to make purchases on these platforms. Companies have a self-interest to gain an increased insight into the subject as there are two different channels on which companies can develop trade, and thus invest both time and money in them. There are various concepts that emerge as important for respondents which are used in this paper and are going to be studied in more detail which are, perceived security, experience, mood, advertisement, and product as well as credibility. The results indicate that most consumers prefer to use the company's website when shopping on the Internet. However, there are a large proportion of consumers who consider making purchases on Facebook and Instagram sometimes. The consumers who have not yet made a purchase via these channels stated that they do not have the need to do so and that they would rather visit the company's website. When it comes to factors that influence a purchase, the majority of consumers stated that it needed to be simple, flexible and secure, in addition to customized advertising and the company’ s credibility. The company’s credibility is also the defining factor. The essay is written in Swedish.
41

張雯吉. "論企業商業秘密權與自由擇業權的衝突與平衡 :以競業禁止為研究視角 = A discussion on the conflicts and balances between the right of the commercial secrets and the right of freedom in choosing a job : based on the "non compete aggrement"." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Svensson, Linda, and Caroline Nävemark. "Revisionens nytta och kommunikation : En intervjustudie om revisorers respektive företagsledningars uppfattning om kommunikationen som sker mellan parterna." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-68725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Bakgrund: Revisorn har till uppgift att kvalitetssäkra sitt klientföretags redovisning, vilket ger en ökad pålitlighet för allmänheten. Att revisorn har en relation till sitt klientföretag som präglas av förtroende har visat sig vara viktigt för att få ut nödvändig information och kunna utföra revisionen på ett korrekt sätt, men samtidigt har revisorn krav på sig om att vara helt oberoende mot företaget de reviderar. De står inför påtryckningar från allmänheten om mer öppenhet och information om företaget, vilket kan ställas i relation till dess tystnadsplikt. Utifrån dessa dilemman har vi genomfört vår studie, där vi undersöka kommunikationen och relationen mellan revisorn och klientföretaget. Syfte: Att bidra till kunskap om den kommunikation som sker mellan revisor och företagsledning och deras uppfattningar kring det. Metod: För att genomföra vår studie har vi använt en deduktiv ansats där vi utgått från befintlig teori som sedan legat till grund för vår empiriska studie. Vi har genomfört intervjuer med revisorer och representanter från företagsledningar, och materialet härifrån har vi sedan analyserat för att få fram vårt resultat. Resultat: Det som både revisorer och representanter för företagsledningarna anser vara mest centralt för att bygga förtroende, är revisorns oberoende, tystnadsplikt och kompetens. Studien har också visat att revisionsberättelsen, som är revisorns kommunikation ut till allmänheten, till stor del förlorar sin nytta om den till största del består av standardtext, vilket gör att revisorn inte alltid uppfyller allmänhetens förväntningar. I relationen mellan revisor och företagsledning, upplevs ingen misstro mellan parterna, vilket blir en positiv effekt av det uppbyggda förtroendet.
Background: The auditor is responsible for quality assurance of his client company's accounts, which gives increased public confidence. That the auditor has a relationship with his client which is based on trust has proven to be important in order to obtain the necessary information and to be able to perform the audit properly, but at the same time the auditor is required to be completely independent of the company they are auditing. They are faced with pressure from the public regarding more transparency and information about the company, which may be in conflict to its confidentiality. Based on these dilemmas, we have conducted our study, examining the communication and relationship between the auditor and the client company. Purpose: To contribute knowledge about the communication between auditor and the top management team and their perceptions about it. Method: In order to complete our study, we have used a deductive approach, based on existing theory which has been the foundation of our empirical study. Conclusions: What both auditors and representatives of the top management teams consider to be most central to building trust are the independence of the auditor, confidentiality and competence. The study has also shown that the audit report, which is the auditor's communication to the public, largely loses its usefulness if it consists mostly of standard text, which means that the auditor does not always meet the public's expectations. In the relationship between the auditor and management, no mistrust is experienced between the parties, which will be a positive effect of the build-up of confidence.
43

Landin, Frida, and Magdalena Zawada. "Interorganisatorisk samverkan : En kvalitativ studie om hur myndigheter samverkar för att återvinna brottsutbyten." Thesis, Högskolan Väst, Avd för företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-11218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Myndigheter har en central roll i dagens samhälle och många av dem möter vi varje dag vilket gör deras arbete högst aktuellt. Deras ansvarsområden överlappar ibland varandra vilket kräver att de samverkar. Tack vare samverkan kan myndigheterna effektivisera sitt arbete och uppnå bättre resultat. Däremot fungerar deras samverkan inte alltid på ett effektivt sätt utan är något som måste utvecklas och skapas tillsammans. Syftet med denna studie var att få en bredare förståelse för samt bidra med kunskap kring interorganisatorisk samverkan vid återvinning av brottsutbyten med särskilt fokus på faktorer som kan främja respektive utgöra hinder för samverkan. Efter avslutad studie har vi gett ett bidrag om de faktorer som kännetecknar interorganisatoriska samband vid brottsbekämpning om brottsutbyten samt gett förslag på förbättringar. Vi valde att använda oss av en fallstudie som metod där en kvalitativ forskningsansats tillämpades. För att få olika perspektiv samt en ökad förståelse för fenomenet som studerats har vi intervjuat sex experter, därmed en från varje myndighet. Vår teoretiska referensram består av forskning som behandlar samverkans betydelse, former och förutsättningar med särskild fokus på främjande respektive hindrande faktorer för interorganisatorisk samverkan. Vi presenterar även en analysmodell som fungerade som en utgångspunkt då vi med hjälp av denna konkretiserade vårt informationsbehov. I empirikapitlet presenterar vi de olika myndigheterna och deras roll i samverkan samt resultaten av intervjuerna. Information kring brottsutbyten presenteras också vilket utgör grunden för den empiriska bakgrunden och den empiriska undersökningen. Detta utgör tillsammans med den teoretiska referensramen grunden för vår diskussion och slutsats. Vår studie visar att det finns faktorer i de utvalda myndigheternas interorganisatoriska samverkan som utgör hinder samt främjar deras arbete kring återvinning av brottsutbyten. Engagemanget ser vi som en främjande faktor i myndigheternas interorganisatoriska samverkan. Kommunikationen mellan myndigheterna utgör en främjande faktor samtidigt som det också finns hinder i kommunikationen. Andra hinder för samverkan är sekretess och brist på relevanta verktyg för uppföljning. Eftersom myndigheterna arbetar utifrån olika ansvarsområden, uppdrag och regelverk konstaterar vi avslutningsvis att samverkan behöver bättre styrning som kan stödja pågående projekt och bidra till bättre synkronisering, koordinering och integrering av arbetsprocesserna.
Authorities play a central role in today's society. We meet many of them every day, which makes their work very actual. Their responsibilities sometimes overlap, which requires them to interact. Through this collaboration, the authorities can improve their efficiency and achieve better results. However, their collaboration does not always work well but is something that has to be created and developed together. The purpose of this study was to contribute with knowledge about inter-organizational collaboration in the reclaiming of profits from crime. We wanted to get a wider understanding of government collaboration that takes place with particular focus on factors that can promote or constitute barriers to collaboration. After completing the study, we have made a contribution about the factors that characterize inter-organizational collaboration in the reclaiming of profits from crime and suggest improvements. We have conducted a qualitative case study as a method. To get different perspectives and an increased understanding of the phenomenon studied, we have interviewed six experts, one from each authority. Our theoretical framework consists of research addressed the importance of collaborations as well as forms and conditions of collaboration with particular focus on facilitators and barriers for inter-organizational collaboration. We also present an analysis model which was used as a starting point for our information needs. In the empirical part of the present study we present the authorities' role in the collaboration as well as the results of the interviews. Information about the reclaiming the profits from crime is also presented and it forms the basis for the empirical background and the empirical study. This, together with the theoretical framework, forms the basis for our discussion and conclusion. This study identifies important facilitators and barriers for the inter-organizational collaboration in the reclaiming of profits from crime. The factors such as commitment impacts the collaboration positively. Communication between the authorities constitutes a promotion factor while there are also obstacles in the communication. Other barriers in collaboration are confidentiality and lack of relevant follow-up tools. As the authorities work on different responsibilities, tasks and regulations, we conclude that the collaboration requires better governance that would support ongoing projects and contribute to better synchronization, coordination and integration of the work processes.
44

Ren, Esther, and 任祥棣. "Trade Secret Act and the Research of Business Management System Concerning Trade Secret." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/24816802872664191149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
碩士
國立成功大學
企業管理學系
87
Information revolution increased the speed of superseding of technology and products. To survive and make profit in markets,business need to be engaging in the updating of products and technology . So, intangible intellectual property becomes the key component of competing. For the sake of being conscious of the importance of intellectual property, even advanced countries seek the protections of intellectual property abroad by political forces. In whole global, the protection of IPRs has become a magatrend .Our country exerted also the Law of Trade Secret at Jan 17,1996. Business need to establish security programs to prevent outside trespass toward trade secret and make confidence clause to avoid exposure of secret by people inside the company. When business faces the suit of trade secret, the clear identification concerning the range of trade secret, the proper activities of the protection of secret and proving of the trespass will be the key factor to win the suit .
45

吳岱臻. "Identification of Business Secret Protection and Analysis of Court Judgment Practice." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/hmg58e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
碩士
南臺科技大學
財經法律研究所
106
In recent years, there have been many cases of business secret leaks and job-hopping incidents in Taiwan by current or former employees of the benchmark enterprise. In the case of global talent circulation, companies often use irresistible high salaries to attract talents. For employees, this may give the most leverage for them to discuss terms of the career plan. Therefore, there is a tendency to “go together” or “stay together”, which has an impact on the company. For the company, in the face of international talent competition, how to retain talents, as well as how to protect business secrets and core assets have become the most important issue for business operators. In the field of intellectual property, the protection of business secrets has gradually become a core issue besides patents, trademarks, and copyrights. It includes mutual accusations of poaching employees between enterprises, as well as differences in perceptions of rights and obligations between companies and former employees. Many high-tech companies are involved, which also extends to international business competition. The confirmation of business secrets (specific confidential objects) and the adoption of reasonable confidentiality measures are the two major key points for protecting business secrets, as well as the core basis for litigation evidence. This paper explores the internal management system of the industry through the development trend and theoretical opinions of the relevant judgments of Taiwan courts, as well as what reasonable confidentiality measures should be taken for the holders of business secrets. Moreover, it identifies the kind of information that is required for the protection of business secrets, and establishes the sound management system based on it. Based on the requirements of the Business Secrets Act for “confidentiality measures”, confidentiality contracts are used to make persons with access to business secrets subject to the obligation of confidentiality. There are several common forms of confidentiality. This paper proposes to bring the act of simply bringing out business secrets to foreign countries into the scope of punishment, which has not been included in the scope of punishment. It is suggested that in addition to the law amendments, in order to avoid the business secrets being easily stolen and utilized, each company should establish the complete confidentiality protection mechanism for business secrets.
46

Jakl, Jan. "Obchodní tajemství v obchodních závazkových vztazích." Master's thesis, 2013. http://www.nusl.cz/ntk/nusl-329815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The main purpose in writing this work was therefore to analyze whether the trade secret belongs to assignable and transferable type of intangible asset law and whether it could be effectively protected. The author of this work has been himself asking questions: first of all what actually is trade secret? And is it possible transfer or cede it? And if it is possible is also possible to protect this intangible asset sufficiently in course of this transaction? The author came to conclusion that trade secret falls within the scope of intellectual property, same as patent, trademark, copyright, though trade secrets are more difficult to transfer and protect then other kinds of intellectual property while they are neither formalized nor well documented. And most of all they supposed to stay hidden forever. The property right in a trade secret is determined by the fact the owner protects its trade secret from disclosure to third parties. On the other hand in order for a valid transaction to take place trade secret must be first of all adequately identified. Above mentioned shall be taken into account while writing various types of contract that could be used for transferring of ceding of trade secrets i.e. license agreement, the contract on transfer of business share, contract for work, contract on lease...
47

Lin, Chia-Ching, and 林家慶. "A Study on business management of trade secret: focus on obligations of Confidentiality and Non-Competition." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/y76egv.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
碩士
國立臺灣大學
科際整合法律學研究所
105
Protecting trade secrets well which helps business to obtain an advantaged status of market. According to Trade Secret Act, the term “trade secret” must meet the three requirements: 1.Secrecy 2.Economical value 3.Taking measures of maintaining secrecy. In recent years, a lot of threats not come from competitive business but employees violating obligations of confidentiality and non-competition decrease benefits of business. So how to manage the trade secret of business in a complying with obligations of confidentiality and non-competition aspect which is the most important key for business management. Trade secret Protection and management of Human resource and labor contract, relief management and development of court opinions are all essential to trade secret management of business.
48

Chin, Wei-Hsiang, and 金偉翔. "The Secret behind Corporate R&D Expenditure: Group Density and Affiliate Centrality of IT Business Groups in Taiwan." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/19028650545437889097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
碩士
中國文化大學
國際貿易學系碩士班
98
In the contemporary business landscape, firm’s competitive position and advantage is supported on inimitable and idiosyncratic assets, particularly their knowledge-based resources or capabilities. R&D (Research and Development) plays an important role for the creation and maintenance of a sustainable competitive advantage, and impact on firms’ performance. Many studies have examined how R&D expenditure is influenced by firm’s size, past performance and firm’s age. Despite this extensive line of research, our study adds to this literature on another dimension to discuss the relation between firm R&D expenditure and its social network. While Taiwan is famous for its small and medium sized enterprises, business groups also are important players in the country. Business groups are a type of multi-business firm that combines elements of conglomerate holding companies and multidivisional corporations, creating what some theorists view as a network form of organization. This study considers one type of intra-group linkages: director ties. The ties create opportunities for innovation by affiliates and, in aggregate, for the group as a whole-opportunities that arise from access to information. This study investigate how the overall density and individual centrality of ties affects group and affiliate innovativeness among about 542 firms within 127 IT business groups in Taiwan between 2003 and 2007. We also find (1) the greater the centrality of an affiliate within its group, the greater the innovative activity of the affiliate and (2) the higher the intra-group density, the greater the group’s innovative activity.
49

HUANG, AI-CHEN, and 黃愛珍. "A Research on the Business Strategy of Beauty and SPA Industry in Taiwan - A Case Study of Elite Secret Biotech." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/5ja3bu.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
碩士
環球科技大學
中小企業經營策略管理研究所
107
The beauty and SPA industry will definitely become an industry with economies of scale in the future. With the improvement of the life quality and the changes in the social and economic environment, modern people always work under great stress. Therefore, people pay more and more attention to their health and beauty regardless of genders, which triggers the strong demand of SPA relaxation. Indeed, many women are willing to have facial skin care and body SPA treatment to maintain youth. Moreover, skin care and body SPA also serve as relaxation ways for men to relieve stress. In this study, we want to discuss the situation of the beauty and SPA industry in Taiwan. Due to the development of aesthetic medicine and the health club, the beauty and SPA industry has faced fierce competition in recent years. The increase of different franchises and diversified sales channels has led to the price reduction competition (e.g., promotion of cosmetics and skin care products), and also restrained the willingness of consumers to purchase products in local beauty SPAs. To have effective and continuous business operation, the business strategy of local beauty SPAs becomes essential in such competitive markets. Herein, we focus on the case study of Elite Biotech, one of the most successful local beauty SPA franchises, and how will they maintain their business leadership and customer loyalty through improving its high service quality in the future, in order to promote the dominant competitiveness of Taiwanese beauty SPAs. Based on the qualitative interviews with Elite Biotech franchises, our study used SWOT and Porter five forces analysis to discuss the successful factors of beauty SPAs management. Finally, we analyzed the advantages of the brand including technique quality, vertical integration, and diversified channels, thereby offering suggestions and directions for Elite Biotech.
50

Correia, João Fialho Neiva. "O segredo comercial e a sua relevância jurídica no domínio comercial contemporâneo." Master's thesis, 2021. http://hdl.handle.net/10400.14/36333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Vivemos, cada vez mais, num mundo tecnológico e digital, que instiga a produção, a inovação e a evolução industrial, que, por sua vez, cria novos desafios, e, simultaneamente, numa sociedade da informação fortemente terceirizada. Neste contexto, os segredos comerciais ou de negócio assumem um papel crescentemente relevante. Existe, por isso, nos meios interessados, uma séria preocupação em salvaguardar as informações secretas dos negócios com valor comercial, o que se traduz na adoção crescente de medidas tendentes a esse efeito. Mas isso não basta, torna-se necessária também a sua proteção jurídica. Historicamente, esta surge ligada à problemática da concorrência desleal e, apesar da sua recente autonomização, em grande medida ainda assim sucede. Com efeito, em tempos de forte concorrência e competitividade nos setores comerciais, industriais e dos serviços, a informação confidencial qualificável como segredo de negócio confere a quem tem o seu domínio e à respetiva organização produtiva uma vantagem competitiva, no respetivo setor ou mercado, que pode ser de grande monta. Daí a natural tentação dos concorrentes de a ela acederem, não apenas por meios lícitos, mas também ilícitos ou desleais.
We live, more and more, in a technological and digital world, which instigates production, innovation and industrial evolution, which in turn creates new challenges, and simultaneously, in a strongly outsourced information society. In this context, trade or business secrets play an increasingly relevant role. For this reason, there is a serious concern in the interested circles to safeguard the secret information of businesses with commercial value, which translates into the increasing adoption of measures aimed at this effect. That is not enough, it is also necessary to have legal protection. Historically, this has been linked to the problem of unfair competition and, despite the recent autonomy of this protection, it still largely happens. Indeed, in times of strong competition and competitiveness in the commercial, industrial and services sectors, confidential information qualifying as a business secret gives those who have their domain and the respective productive organization a competitive advantage, in the respective sector or market, which can be of great magnitude. Hence the natural temptation of competitors to access it, not only by lawful, but also by illicit or unfair means.

To the bibliography