To see the other types of publications on this topic, follow the link: Computer networks, law and legislation.

Dissertations / Theses on the topic 'Computer networks, law and legislation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer networks, law and legislation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Mik, Eliza. "Contract formation in open electronic networks." Phd thesis, Faculty of Law, 2007. http://hdl.handle.net/2123/4995.

Full text
Abstract:
Thesis (Ph. D.)--University of Sydney, 2007.<br>Title from title screen (viewed 28 May 2009) Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy to the Faculty of Law. Degree awarded 2007. Includes bibliography references. Also available in print format.
APA, Harvard, Vancouver, ISO, and other styles
2

Ital, Eric Guy. "Copyright law and the Internet : in modern South African law." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51666.

Full text
Abstract:
Thesis (LLM)--University of Stellenbosch, 2000.<br>ENGLISH ABSTRACT: The Internet is coming more and more into focus of national and international legislation. Especially with regard to copyright law, the rapid growth of the Internet, its global character, its novel technical applications and its private and commercial use by millions of people makes the control over a work complicated and raises copyright problems all over the world. Present legislation is therefore challenged to avoid gaps in the law. Considering the rapid growth of online providers and users in South Africa, it is li
APA, Harvard, Vancouver, ISO, and other styles
3

Desai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.<br>The aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtful
APA, Harvard, Vancouver, ISO, and other styles
4

O'Brien, N. D. "The liability of Internet service providers for unlawful content posted by third parties." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1149.

Full text
Abstract:
Internet Service Providers (ISP’s) are crucial to the operation and development of the Internet. However, through the performance of their basic functions, they faced the great risk of civil and criminal liability for unlawful content posted by third parties. As this risk threatened the potential of the Internet, various jurisdictions opted to promulgate legislation that granted ISP’s safe harbours from liability. The South African (RSA) response is Chapter XI of the Electronic Communications and Transactions Act (ECTA). The protection it provides is however not absolute. It is limited to ISP’
APA, Harvard, Vancouver, ISO, and other styles
5

Gottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.

Full text
Abstract:
Critical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the “internet of things”. This list is not complete and a constant challenge exists in identify
APA, Harvard, Vancouver, ISO, and other styles
6

Andre, Edward E. "Investigating information management weaknesses in a local government organisation: A critical hermeneutic ethnographic case study of internet documents from information warfare and legal perspective(s)." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/633.

Full text
Abstract:
In this thesis I develop an approach to analyse and interpret internet documents belonging to a particular organisation in a State of Australia. My intention in the research is to find ways to protect a local government organisation from litigation and other threats due to weaknesses in information management on the internet. Based on Gadamer's (1985) approach to the interpretation of text discourse, this thesis is a critical hermeneutic ethnographic case study of one local government organisation investigating internet docunents from information warfare and legal perspective(s).
APA, Harvard, Vancouver, ISO, and other styles
7

孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime". Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Harte, David. "Internet content control in Australia : data topology, topography and the data deficit." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1073.

Full text
Abstract:
The success of the online adult industry has provoked a public policy controversy over the need for internet censorship, and in recent times there has emerged desire to protect minors from possibly unsuitable content. On January 1st 2000, the Broadcasting Services Amendment (Online Services) Act (Cwlth, 1999) (BSA) was proclaimed. The Act purports to regulate and control Internet content in Australia. Operating in tandem with the Act is the Internet Industry Association Code of Practice, giving Australia a co-regulatory approach to Internet content control. The Australian Broadcasting Authorit
APA, Harvard, Vancouver, ISO, and other styles
9

Sundstrom, Linda-Marie. "Internet radio: Identifying administrative and regulatory gaps in a cyberspace world without borders." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2137.

Full text
Abstract:
The purpose of this paper is to identify gaps in regulatory policies resulting from the emergence of Internet radio. To accomplish this purpose, the paper seeks to: 1) provide insights into agencies that may have direct involvement in potentially regulating Internet radio; 2) explore the concepts of jurisdiction in cyberspace; and 3) address the regulatory challenges that exist when traditional country borders no longer apply.
APA, Harvard, Vancouver, ISO, and other styles
10

Spencer, Logan Lemuella C. "Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /." Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Weinstein, Lee. "Scale free networks and their power law distribution." Diss., Connect to the thesis, 2005. http://hdl.handle.net/10066/3880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Temur, Nuri. "Computer Crime as a Barrier to Electronic Commerce: New Solutions for Public Law Enforcement." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3171/.

Full text
Abstract:
Electronic commerce was expected to grow exponentially, but the actual rate of growth in recent years has been disappointing. Recent surveys of perceptions of the development of electronic commerce clearly focus our attention on the perception and fear of computer crime as the major cause of this disappointing growth pattern. The thesis critiques existing private law solutions to this problem and argues from a normative theory on “the commons” for the application of new public law enforcement solutions in the public trust, sanctions, and public coproduction of order. The thesis argues that giv
APA, Harvard, Vancouver, ISO, and other styles
13

Mabeka, Nombulelo Queen. "When does the conduct of an employer infringe on an employee's constitutional right to privacy when intercepting or monitoring electronic communications?" Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5883_1253850534.

Full text
Abstract:
<p>&quot<br>The Regulation of Interception of Communications and Provision of Communication Related Information Act 70 of 2002 (RICA) that regulates the monitoring of electronic communications has not yet been tested by our courts. This paper explores the likelihood of an infringement of an employee's right to privacy by an employer in the process of intercepting the latters electronic communications. It is argued that there is no explicit provision of the protection of the right to privacy that is provided in the LRA. It is further argued that the provisions of section 4, 5 and 6 of RICA as t
APA, Harvard, Vancouver, ISO, and other styles
14

Frantz, Courtney Siler. "An electronic storage and access system for special education legislation." W&M ScholarWorks, 1995. https://scholarworks.wm.edu/etd/1539618425.

Full text
Abstract:
In the field of education, instructional leaders must know the regulations governing the assessment, curriculum, and instruction of all students. An area of special concern is the regulations governing programs for students with disabilities. Although the average population of students with disabilities may represent less than 10% of the total student body, the school administrator is responsible for maintaining access to the most current regulations, for accurately interpreting, and effectively implementing federal and state mandates to ensure that the due process rights of the students with
APA, Harvard, Vancouver, ISO, and other styles
15

Corradi, Marco Claudio. "A law and economics analysis of corporate opportunities doctrines from a comparative perspective." Thesis, University of Oxford, 2015. http://ora.ox.ac.uk/objects/uuid:f9469cef-a68f-4657-8275-d0eefb005faf.

Full text
Abstract:
Business opportunities are a chance for a company to grow its activity and to further the aggregate welfare of the society as a whole. Corporate opportunities rules and their functional equivalents should enable companies to develop their business activities when directors discover those business opportunities. Companies need to be certain that they can legally appropriate those business opportunities. A company should have this ability when it is the best potential exploiter of the opportunity at issue, which is likely when the opportunity is a chance to expand the company's line of business
APA, Harvard, Vancouver, ISO, and other styles
16

Lundström, Justus, Jonas Widriksson, and Viktor Zaunders. "Changes in media consumption and file sharing : The impact of legislation and new digital media services." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12534.

Full text
Abstract:
<p>In this study we investigate how the attitude and behaviour concerning illegal file shar-ing have changed among the young population in Sweden. The study will analyze the impact of the IPRED law that was introduced in April 2008 and new digital media ser-vices that have emerged in the last couple of years. It is also evaluated which of these have had the most impact on the attitude and behaviour of the selected population.</p><p>The main part of our research consists of a quantitative survey handed out to a sample population among high school students (ages 16-20) in Jönköping, Sweden. This
APA, Harvard, Vancouver, ISO, and other styles
17

Karjiker, Sadulla. "Open-source software and the rationale for copyright protection of computer programs." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80044.

Full text
Abstract:
Thesis (LLD)--Stellenbosch University, 2013.<br>ENGLISH ABSTRACT: The rationale for the legal protection of copyright works is based on the perceived need to encourage the creation of works which are considered to be socially beneficial. By awarding authors proprietary rights in their creations, copyright law allows authors the ability to earn direct financial returns from their efforts, and, thus, copyright law provides the required incentives for authors to create copyright works. Since the early days of commercial software development, copyright protection has been extended to computer prog
APA, Harvard, Vancouver, ISO, and other styles
18

Bac, Joanna Ewa. "Software intelligence (SI), dependent legal personhood & SI-human amalgamation : an evolutionary step for US patent law and SI." Thesis, University of Aberdeen, 2018. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=237873.

Full text
Abstract:
This doctoral thesis addresses the question of why and how the United States of America (US) legal system should grant legal personhood to software intelligence (SI). This new legal status of SI is visualised as a dependent type of person. The SI dependent legal person would be determined by an inextricable connection between SI and a new type of corporate body, introduced here as SI-Human Amalgamation (SIHA). SI has been defined as one or more computer programmes with an ability to create work that is unforeseen by humans. This includes SI capacity to generate unforeseen innovations, patentab
APA, Harvard, Vancouver, ISO, and other styles
19

Steh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Nichols, Kenneth Nolan. "Technical-legal aspects of software patents." CSUSB ScholarWorks, 1996. https://scholarworks.lib.csusb.edu/etd-project/1249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Qutieshat, Enas M. "Traditional contract law in the electronic environment : evolution or revolution?" Thesis, University of Aberdeen, 2010. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=158831.

Full text
Abstract:
This thesis will examine issues related to the formation and validity of electronic contracts on a comparative basis between the English, American and UNCITRAL approaches.  When examining the English approach, reference will be made to relevant EC Directives in relation to the subject matter. This thesis has four main objectives.  First, to assess the impact of using electronic communication tools to reach agreement.  Second, to identify some key points that should be considered when examining the formal validity of electronic contracts. Third, to establish a foundation for having a valid cont
APA, Harvard, Vancouver, ISO, and other styles
22

Upton, Oren K. "Asserting national sovereignty in cyberspace : the case for Internet border inspection." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FUpton.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Funk, Antje Elisabeth Margarete. "Criminal liability of Internet providers in Germany and other jurisdictions." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/70134.

Full text
Abstract:
Thesis (LLM)--Stellenbosch University, 2004<br>ENGLISH ABSTRACT: This thesis deals with the criminal liability of Internet providers. The focus is on Germany, but the analysis is put in a wider, comparative context. This is done with reference to South Africa, as well as Europe and the American system. This thesis demonstrates and discusses the existing legal norms to regulate Internet provider liability for illegal content on the Internet and the international efforts to deal with this issue. In the introduction it is shown how the Internet has given rise to a new form of global commun
APA, Harvard, Vancouver, ISO, and other styles
24

Hodge, Dominic Shaughn. "The income tax consequences of the in-house development of software." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1013550.

Full text
Abstract:
The objective of this thesis was to explore the nature of expenditure incurred on the internal development of software and its treatment in terms of the accounting and taxation frameworks to which it is subject. In fulfilling the primary objective the thesis had a number of subsidiary considerations. These included, firstly, a brief analysis of the approach of the software industry in South Africa to the taxation treatment of this type of software. The second consideration was a discussion and analysis of the taxation framework which differentiates between capital and revenue and the extent to
APA, Harvard, Vancouver, ISO, and other styles
25

HUANG, YANMU. "TRAFFIC EFFECT OF BROADCAST ON LARGE PEER-TO-PEER NETWORKS-A CASE STUDY OF THE GNUTELLA." University of Cincinnati / OhioLINK, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1012927157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Saganich, Robert Lee. "An investigation of electronic Protected Health Information (e-PHI) privacy policy legislation in California for seniors using in-home health monitoring systems." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1075.

Full text
Abstract:
This study examined privacy legislation in California to identify those electronic Protected Health Information (e-PHI) privacy policies that are suited to seniors using in-home health monitoring systems. Personal freedom and independence are essential to a person's physical and mental health, and mobile technology applications provide a convenient and economical method for monitoring personal health. Many of these apps are written by third parties, however, which poses serious risks to patient privacy. Current federal regulations only cover applications and systems developed for use by covere
APA, Harvard, Vancouver, ISO, and other styles
27

Scharneck, Justin William. "A framework for the governance of social media in the workplace." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1020180.

Full text
Abstract:
Social media is fast becoming an ever-increasingly significant part of the world of business and a phenomenon which cannot be evaded. The advent of social media in the workplace compels organisations to acclimatise to the transformation emanating from employees‟ adoption of these technologies (Hanaki & Casella, 2008). Approximately seventy percent of organisations do not have a social media governance framework in place (Fink et al., 2011). Social media governance in organisations is very disjointed; companies have varying stances as to social media strategy, the risks, benefits and business u
APA, Harvard, Vancouver, ISO, and other styles
28

Mostert, Charl. "The benefits of contractual causes in mitigating project failures using business system projects." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1778.

Full text
Abstract:
Dissertation submitted in partial fulfilment of the requirements for the degree Master of Technology of Technology: Business Information Systems in the Faculty of Business at the Cape Peninsula University of Technology<br>This study evaluates the utilisation and effectiveness of contract clauses in Information Technology (IT) and Information System (IS) projects in South Africa to address and mitigate key risks associated with these types of projects. This study established whether specific clauses were being utilised to address key risks, and where clauses were being utilised, whether
APA, Harvard, Vancouver, ISO, and other styles
29

Stevens, Irena. "Policy implications of municipal investment in Georgia's wireline broadband networks." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/49081.

Full text
Abstract:
The Community Broadband Investment Act, introduced in the Georgia legislature in 2012 and 2013 is a reflection of a broader national debate over the role of government investment in broadband infrastructure. The bill would limit local governments' ability to invest in broadband infrastructure for their communities because of arguments that government entry into the telecommunications sector crowds-out private competition, does not serve the public adequately, and lacks a comprehensive business model or best practices. A closer look at the history of utility regulation and various economic pers
APA, Harvard, Vancouver, ISO, and other styles
30

Schlenkrich, Lara. "An investigation of social computing." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1006194.

Full text
Abstract:
Social network sites have recently become extremely popular online destinations as they offer users easy ways to build and maintain their relationships with each other. Consequently, students, lecturers, teachers, parents and businesses are using these tools to communicate with each other in a fast and cost-effective manner. However, literature suggests that the full potential of social network sites has not yet been revealed since users are still battling to overcome the various negative characteristics surrounding these sites. A framework for appropriate use of these sites is needed so that
APA, Harvard, Vancouver, ISO, and other styles
31

Basilio, Bernardo I. "Knowledge-based classification scheme for regulating the flow of hazardous materials through tunnels." Thesis, Virginia Polytechnic Institute and State University, 1987. http://hdl.handle.net/10919/91097.

Full text
Abstract:
Safety is a major concern for tunnel operators. Local authorities responsible for tunnel facilities are concerned with developing restrictions for hazardous materials passing through the facility that will reduce the risk of death and injury, to an extent that these restrictions do not burden commerce unnecessarily. Hazardous material regulatory controls for tunnels are extensive, detailed, and subject to constant changes. The general lack of expertise in tunnel personnel and the lack of a scientific basis leading to the development of these regulations have created problems to local tunnel
APA, Harvard, Vancouver, ISO, and other styles
32

Balan, Júnior Osvaldo [UNESP]. "O estabelecimento virtual na sociedade técnica: a necessária busca de segurança jurídica nas transações comerciais." Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/98930.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:29:45Z (GMT). No. of bitstreams: 0 Previous issue date: 2011-09-23Bitstream added on 2014-06-13T18:39:47Z : No. of bitstreams: 1 balanjunior_o_me_fran.pdf: 1517696 bytes, checksum: ab435b5e58869752ea0cd89ca36317b8 (MD5)<br>O presente trabalho buscará trazer uma profunda reflexão sobre o avanço técnico na sociedade moderna do instituto denominado estabelecimento virtual, assim como seus reflexos nas mais variadas searas. Buscar-se-á compreender este fenômeno através do estudo da técnica, tudo com base nas obras do pensador Jacques Ellul, que trilhou s
APA, Harvard, Vancouver, ISO, and other styles
33

Balan, Júnior Osvaldo. "O estabelecimento virtual na sociedade técnica : a necessária busca de segurança jurídica nas transações comerciais /." Franca : [s.n.], 2011. http://hdl.handle.net/11449/98930.

Full text
Abstract:
Orientador: Jorge David Barrientos-Parra<br>Banca: Rui Décio Martins<br>Banca: Jorge Luis Mialhe<br>Resumo: O presente trabalho buscará trazer uma profunda reflexão sobre o avanço técnico na sociedade moderna do instituto denominado estabelecimento virtual, assim como seus reflexos nas mais variadas searas. Buscar-se-á compreender este fenômeno através do estudo da técnica, tudo com base nas obras do pensador Jacques Ellul, que trilhou sobre as mais diversas áreas do conhecimento no século passado, com extremo brilhantismo, podendo, além disso, ser considerado um visionário. Mostrar-se-ão os p
APA, Harvard, Vancouver, ISO, and other styles
34

劉漢傑. "電腦犯罪若干問題研究 =Research into the some question of computer crime". Thesis, University of Macau, 2016. http://umaclib3.umac.mo/record=b3570914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Jeppson, Jonas. "The OECD cryptography policy guidelines and their implementation /." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=31164.

Full text
Abstract:
The Organization for Economic Co-operation and Development (OECD) issued on 27 March 1997 a recommendation concerning cryptography policy guidelines in an attempt to foster international co-operation and harmonization. Information is becoming increasingly valuable in society. Globalization of markets, improvements in information and communication technology and the shift to a knowledge-based economy has, furthermore, created an enormous potential for electronic commerce. Conservative estimates predict electronic commerce will have a turnover of more than US $400 billion by 2002. The increasing
APA, Harvard, Vancouver, ISO, and other styles
36

Hargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.

Full text
Abstract:
The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine using a write blocker and then analyse the acquired image. This has the advantage of preserving the contents of the computer’s hard disk at that point in time. However, the disadvantage of this approach is that the preservation of the disk is at the expense of volatile data such as that stored in memory, which does not remain once the power is disconnected. There are an increasing number of situations where this traditional approach of ‘pulling
APA, Harvard, Vancouver, ISO, and other styles
37

Hargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.

Full text
Abstract:
The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine using a write blocker and then analyse the acquired image. This has the advantage of preserving the contents of the computer’s hard disk at that point in time. However, the disadvantage of this approach is that the preservation of the disk is at the expense of volatile data such as that stored in memory, which does not remain once the power is disconnected. There are an increasing number of situations where this traditional approach of ‘pulling
APA, Harvard, Vancouver, ISO, and other styles
38

Louw, Sanelda. "Die belastingaftrekbaarheid van sagteware." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/20434.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2004.<br>ENGLISH ABSTRACT: The aim of this study is to determine the applicability of the various South African Income Taxation Act sections on the deduction of software costs. A distinction is made between the various deduction sections in the Income Taxation Act that are applicable to software costs. By doing this an appropriate taxation deduction is recommended for the different types of software costs that the taxpayer incurs. Software assets and expenditure can be divided into various categories based on the acquisition agreement. The rights
APA, Harvard, Vancouver, ISO, and other styles
39

Asubiaro, Omowumi Modupe. "www.crimesagainstchildren.com : addressing child pornography via the Internet in Africa." Thesis, University of the Western Cape, 2004. http://etd.uwc.ac.za/index.php?module=etd&amp.

Full text
Abstract:
The study focus on child pornography on the Internet as a manifestation of sexual abuse and sexual exploitation of children. The debate centres around the exacerbated effect of child pornography on victims and subsequent effects on the society. Ultimately, the study aims to highlight the various legal and non-legal responses specific to child pornography on the Internet with a view to proffer solutions to African states on how to deal with the problem. The study also lend an African voice to the ongoing debate on how to deal with the problem of child pornography on the Internet
APA, Harvard, Vancouver, ISO, and other styles
40

Iacovino, Livia. "Recordkeeping, ethics and law : regulatory models, participant relationships and rights and responsibilities in the online world /." Dordrecht : Springer, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/511999585.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Homem, Irvin. "LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177902.

Full text
Abstract:
The Internet in its most basic form is a complex information sharing organism. There are billions of interconnected elements with varying capabilities that work together supporting numerous activities (services) through this information sharing. In recent times, these elements have become portable, mobile, highly computationally capable and more than ever intertwined with human controllers and their activities. They are also rapidly being embedded into other everyday objects and sharing more and more information in order to facilitate automation, signaling that the rise of the Internet of Thin
APA, Harvard, Vancouver, ISO, and other styles
42

Souza, Ricardo Vieira de. "O ciberespaço e a jurisdição transnacional: necessidade de regulação." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/21438.

Full text
Abstract:
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-09-26T10:04:28Z No. of bitstreams: 1 Ricardo Vieira de Souza.pdf: 1123440 bytes, checksum: e5ceefcb485691ee0e19257f666d7604 (MD5)<br>Made available in DSpace on 2018-09-26T10:04:28Z (GMT). No. of bitstreams: 1 Ricardo Vieira de Souza.pdf: 1123440 bytes, checksum: e5ceefcb485691ee0e19257f666d7604 (MD5) Previous issue date: 2018-08-24<br>This work is based on the concern about the practice of illicit at the transnational level facilitated by the incessant and always renewed improvement of communication through the world wide web. If
APA, Harvard, Vancouver, ISO, and other styles
43

Breindl, Yana. "Hacking the law: an analysis of internet-based campaigning on digital rights in the European Union." Doctoral thesis, Universite Libre de Bruxelles, 2011. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209836.

Full text
Abstract:
Digital rights activism constitutes an exemplary case of how internet affordances can be mobilised to engender political change. The values and principles stemming from the hacker imaginaire, and free and open source software practices, underpin digital rights activism, which uses the internet as a tool, object and platform for the protection of rights in the digital realm. The analysis focuses on how digital rights activists use and adapt the political affordances of the internet to intervene in European Union policy-making. Two original case studies of internet-based campaigning at the Europ
APA, Harvard, Vancouver, ISO, and other styles
44

Guimarães, Lourenço da Rocha. "Previsão de inadimplência e redes neurais artificiais." Universidade do Estado do Rio de Janeiro, 2006. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=383.

Full text
Abstract:
O objetivo deste trabalho é a previsão de inadimplência. Foram implementados dois modelos de previsão de inadimplência, de modo que o primeiro modelo fez uso de uma rede neural feedforward utilizando o algoritmo de retro propagação, e o segundo utilizou uma rede não supervisionada (rede Kohonen). As características relevantes de usuários de crédito foram apresentadas para as redes neurais, para o seu treinamento e teste. Os resultados obtidos demonstram que tanto as redes neurais supervisionadas quanto as redes neurais não supervisionadas mostraram-se instrumentos eficazes para o processo de
APA, Harvard, Vancouver, ISO, and other styles
45

Peterson, Sarahfina Aubrey. "The Effect of Social Media on Public Awareness and Extra-Judicial Effects: The Gay Marriage Cases and Litigating for New Rights." PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/2086.

Full text
Abstract:
When the Supreme Court grants new rights, public awareness is a crucial part of enforcement. Gerald N. Rosenberg and Michael J. Klarman famously criticized minority rights organizations for attempting to gain new rights through the judiciary. The crux of their argument relied heavily on the American media's scanty coverage of Court issues and subsequent low public awareness of Court cases. Using the 2013 United States v. Windsor and Hollingsworth v. Perry rulings as a case study, I suggest that the media environment has changed so much since Rosenberg and Klarman were writing that their theori
APA, Harvard, Vancouver, ISO, and other styles
46

Dostál, Otto. "Právní aspekty boje proti počítačové trestné činnosti." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-433079.

Full text
Abstract:
The thesis deals with the topic of computer crime. Foremost, it demonstrates on an example of the operation of a medical image information processing system some selected aspects of this issue. It shows that it is always necessary to monitor the current state of the technical knowledge at the time, but also the need of addressing the issue within the corresponding legal limits. The thesis presents criminal law reality as a complex system. The links between different parts of the system are examined, and possible shortcomings are considered. The legal instruments and legal limits of the procedu
APA, Harvard, Vancouver, ISO, and other styles
47

Junior, Nilton Alves. "Caracterização de redes complexas: aplicação à modelagem relacional entre sistemas autônomos da Internet." Universidade do Estado do Rio de Janeiro, 2007. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=607.

Full text
Abstract:
Neste trabalho, foram utilizadas técnicas e conceitos tipicamente encontrados em estudos de Redes Complexas, uma sub-área da Física Estatística, para caracterizar a Internet e sua evolução em uma década, de 1998 a 2007. Foi considerada como unidade básica de análise, a estrutura Sistema Autônomo. Nesta caracterização, foram utilizadas várias ferramentas computacionais desenvolvidas em linguagem C/C++, que permitiram classificar, simular e modelar propriedades dinâmicas. Dentre estas propriedades podemos destacar o coeficiente de conectividade, fundamental para os estudos topológicos, e o parâ
APA, Harvard, Vancouver, ISO, and other styles
48

蔣東霖. "P2P 網絡借貸的法律風險與規制 =Legal risk and regulation of P2P lending". Thesis, University of Macau, 2016. http://umaclib3.umac.mo/record=b3570019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Lenormand, Maxime. "Initialiser et calibrer un modèle de microsimulation dynamique stochastique : application au modèle SimVillages." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2012. http://tel.archives-ouvertes.fr/tel-00822114.

Full text
Abstract:
Le but de cette thèse est de développer des outils statistiques permettant d'initialiser et de calibrer les modèles de microsimulation dynamique stochastique, en partant de l'exemple du modèle SimVillages (développé dans le cadre du projet Européen PRIMA). Ce modèle couple des dynamiques démographiques et économiques appliquées à une population de municipalités rurales. Chaque individu de la population, représenté explicitement dans un ménage au sein d'une commune, travaille éventuellement dans une autre, et possède sa propre trajectoire de vie. Ainsi, le modèle inclut-il des dynamiques de cho
APA, Harvard, Vancouver, ISO, and other styles
50

Jamalkhan, Nasserkhan. "What is the impact of the Cyber Crime Act on the business community in Mauritius." Thesis, 2004. http://hdl.handle.net/10413/1503.

Full text
Abstract:
At this early age of the internet, the e-business environment is almost like a lawless territory. Fast movers are making fortunes whereas rebels can act with impunity and move on before the legal process can catch up. The fast expansion of cyber crimes in the world has been the motivation to perform this research on its impact on the business community in Mauritius after the devastating effects in developing countries. Organisations that are not keeping pace with these realities are becoming vulnerable to cyber criminals or hackers. An analysis of the situation in the world from the literature
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!