To see the other types of publications on this topic, follow the link: Information law.

Dissertations / Theses on the topic 'Information law'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information law.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Cofone, Ignacio Nicolas <1987&gt. "Privacy Tradeoffs in Information Technology Law." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7246/4/Cofone_Ignacio_tesi.pdf.

Full text
Abstract:
The thesis aims to make the dynamics of the tradeoffs involving privacy more visible; both theoretically and in two of the central current policy debates in European data protection law, the right to be forgotten and online tracking. In doing so, it offers an explanation for data protection law from an economic perspective and provides a basis for the evaluation of further data protection measures.
APA, Harvard, Vancouver, ISO, and other styles
2

Cofone, Ignacio Nicolas <1987&gt. "Privacy Tradeoffs in Information Technology Law." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7246/.

Full text
Abstract:
The thesis aims to make the dynamics of the tradeoffs involving privacy more visible; both theoretically and in two of the central current policy debates in European data protection law, the right to be forgotten and online tracking. In doing so, it offers an explanation for data protection law from an economic perspective and provides a basis for the evaluation of further data protection measures.
APA, Harvard, Vancouver, ISO, and other styles
3

Moroz, Viktor. "Features of information security in martial law." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/53731.

Full text
Abstract:
Purpose: the article is devoted to the analyze of the features of information security in martial law. Research methods: comparative analysis of individual regulations and the case law of Ukraine regulatory framework and case law in the application of the information security in martial law. Results: normative regulation of the formation of a single information space in Ukraine should contribute to the harmonious development of information resources, information services and the information product in the country. Improving the effectiveness of the subjects under investigation countering threats to information security. Discussion: the analysis of the legal the features of information security in martial law is carried out.
APA, Harvard, Vancouver, ISO, and other styles
4

Voigt, Sonja. "World summit on the information society." Universität Potsdam, 2008. http://opus.kobv.de/ubp/volltexte/2009/3655/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sabir, Mammadrzali Shahin. "RENOVATING THE SUBJECT MATTER OF INFORMATION LAW: RIGHT TO EDUCATION IN INFORMATION SOCIETY." Thesis, Сучасна правова освіта: [матеріали VIІ Міжнародної науково-практичної конференції, Київ, Національний авіаційний університет, 23 лютого 2018 р.]. – Тернопіль: «Вектор», 2018, 2018. http://er.nau.edu.ua/handle/NAU/32831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Thornlow, Christopher C. "Fusing intelligence with law enforcement information : an analytic imperative." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FThornlow.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2005.<br>Thesis Advisor(s): Robert L. Simeral, Steven B. Ashby. Includes bibliographical references (p. 55-57) Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Yannopoulos, Georgios. "Modelling the legal process for information applications in law." Thesis, Queen Mary, University of London, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

McLean, Sheila Ann Manson. "Information disclosure, consent to medical treatment and the law." Thesis, University of Glasgow, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.298800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Hsinchun, Jennifer Schroeder, Roslin V. Hauck, et al. "COPLINK Connect: information and knowledge management for law enforcement." Elsevier, 2002. http://hdl.handle.net/10150/106338.

Full text
Abstract:
Artificial Intelligence Lab, Department of MIS, University of Arizona<br>Information and knowledge management in a knowledge-intensive and time-critical environment presents a challenge to information technology professionals. In law enforcement, multiple data sources are used, each having different user interfaces. COPLINK Connect addresses these problems by providing one easy-to-use interface that integrates different data sources such as incident records, mug shots and gang information, and allows diverse police departments to share data easily. User evaluations of the application allowed us to study the impact of COPLINK on law-enforcement personnel as well as to identify requirements for improving the system. COPLINK Connect is currently being deployed at Tucson Police Department (TPD).
APA, Harvard, Vancouver, ISO, and other styles
10

Yemisi, Olorunfemi Doreen. "The information behaviour of law students in Nigerian universities." Thesis, University of Zululand, 2014. http://hdl.handle.net/10530/1418.

Full text
Abstract:
A thesis submitted to the Faculty of Arts in fulfilment of the requirements for the award of the Degree of Doctor of Philosophy (Library and Information Science) in the Department of Information Studies at the University of Zululand, South Africa, 2014<br>Information seeking skills are important for students who are preparing to embark on information intensive professions such as the legal profession. Despite law libraries being available in all the Nigerian universities offering law as an undergraduate programme, law students generally do not seem interested in making optimal use of the available facilities and sources to find relevant information for their studies and to prepare them for their chosen career. Though many information behaviour studies relating to students do exist it is important to establish how and why students, especially those who have to rely on information to perform their duties as legal practitioners, seek for information and how they use the available information facilities and services to satisfy their information needs. The specific objectives of this study were to: investigate the information behaviour of law students in Nigerian university law libraries, determine the purposes for which law students retrieve information in Nigerian university law libraries, investigate the library information resources available to law students in Nigerian university law libraries, examine how law students utilise information resources in university law libraries, specifically ICT resources, determine the challenges faced by law students in the use of law library electronic resources and other law sources in the process of information retrieval in Nigerian university law libraries, provide recommendations for improving law library systems in Nigerian universities and to develop a theoretical model that suits the information seeking behaviour of law students in Nigerian university law libraries. The research paradigm followed a positivism and interpretive perspective using both qualitative and quantitative approaches. The study adopted a survey research design. The study targeted all the law students in Nigerian universities. Out of the 30 universities offering law as a course of study in Nigeria, a total of 12 universities were chosen for the study namely: Ambrose Alli University, Ekpoma; Ekiti State University, Ado-Ekiti; Imo State University, Owerri; Kogi State University, Anyigba; Nasarawa State University, Keffi; Olabisi Onabanjo University, Ago-Iwoye; Obafemi Awolowo University, Ile-Ife; University of Benin, Benin; University of Calabar, Calabar; University of Ibadan, Ibadan; University of Ilorin, Ilorin: and University of Nigeria, Enugu Campus. From the 12 chosen universities, 1,534 law students were randomly selected; this represents the sample for the study. Data was collected using a questionnaire, an interview and observation methods. The findings revealed that the surveyed law students generally exhibited a positive attitude towards patronage of law libraries, and that printed information sources are the main information sources utilised by respondents in law libraries. Digital libraries found in the law libraries were found not to be optimally used. Reasons given were the unavailability and inaccessibility of computers and the lack of Internet connectivity. The majority of the respondents indicated that they possessed the ICT skills required to search for information using electronic information resources in the law libraries. The Internet facilities provided in the law library where only used by 33% of the respondents when it was necessary to find academic related information. An ability test showed that only 47% of the respondents tested had the Internet skills to effectively retrieve applicable information sources/databases on the Internet. It was revealed that access to ICT facilities in the law libraries was poor, and the existing electronic libraries and other sources like the Internet and law databases were underutilised by the surveyed law students for a variety of reasons, such as a lack of access to the electronic law libraries, lack of ICT resources, or the fact that the existing ICT sources were not intended for law students’ use. Observations showed that only three law libraries provided access to law databases out of the twelve law libraries. Other challenges identified concerning the use of the law libraries included: erratic power supply; Internet connectivity problems; slow downloading speed; non-subscription to law databases; lack of qualified staff to manage and maintain the electronic law libraries; inadequate amount of computers for student utilisation; unhelpful library staff; and inadequate funding to provide quality ICT resources in the universities’ law libraries. The study recommended that law students should be allowed access to all law library resources and be provided with current and relevant library sources, electronic sources and ICT equipment that will encourage them to frequent the law libraries and use its information resources. Additionally, the libraries need adequate support and enough funds to facilitate the purchase of current legal material; upgrade ICT equipment; subscribe to legal databases; upgrade Internet connectivity; and improve their power supply. The study also recommended that library sources (print and electronic) should be aggressively advertised to attract students’ attention and more library orientation and ICT training courses should be provided..<br>Nigerian Tertiary Education Trust Fund (TETFUND)
APA, Harvard, Vancouver, ISO, and other styles
11

Scrollini, Mendez Fabrizio. "Right to information arenas : exploring the right to information in Chile, New Zealand and Uruguay." Thesis, London School of Economics and Political Science (University of London), 2015. http://etheses.lse.ac.uk/3361/.

Full text
Abstract:
The Right to Information (RTI) – a right every individual has to access public information held by governments – is now established in more than 100 countries. RTI laws set up a new logic in government: availability of public information is the principle and secrecy the exception. RTI laws create new public information arenas where several actors request, release and use public information for several purposes. In this work, I seek to explore why RTI arenas based on similar principles, work differently leading to different outputs. My explanation is based on a historical- institutionalist perspective arguing that origins of these laws and previous institutional structures matter. I argue that three factors help to shape these arenas: the level of participation in the policy-making process, the professionalisation of state bureaucracy and RTI enforcement institutions. The combination of these factors gives us three different kinds of arenas: functional, mixed and contested. I develop a conceptual framework, operating at a middle-range theory level, to analyse the role RTI laws, requesters, the state, and the existence of RTI enforcement institutions play in each configuration. I show how these arenas evolve and work, running a structured and focused comparison of three case studies: Uruguay, Chile and New Zealand. This work shows how these arenas ended up differing in outputs such as availability of public information and efficiency in processing RTI requests, as well as the existence of effective accountability mechanisms to resolve disputes about public information.
APA, Harvard, Vancouver, ISO, and other styles
12

Broberg, Pernilla. "Vad förklarar variationer i frivillig information?" Thesis, Kristianstad University College, Department of Business Administration, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-3755.

Full text
Abstract:
<p>There is an increased pressure for firms to provide the financial market with additional information. Such disclosure is attached with different kinds of costs. In spite of these costs, and in spite of increased mandatory disclosures, firms choose to voluntary disclosure financial information to analysts and others. This indicates that firms also benefit from providing additional information. The subjects of this study is 431 annual reports from firms listed at the Stockholm Stock Exchange for 2002 and 2005 and the objective is to survey factors that can explain variations in firms’ voluntary disclosure. The findings not only support explanations from agency theory and positive accounting theory (ownership structure, leverage and size) but also explanations that can be derived from institutional theory and “international capital market pressures” (international listing, industry and regulation). One conclusion is that some regulation is necessary to avoid underproduction of information, whilst to much regulation (such as SOX) leads to an “unintended chilling effect”. </p>
APA, Harvard, Vancouver, ISO, and other styles
13

Grigalashvili, Mariam. "Taxpayers’ rights protection during exchange of information : Whether taxpayers’ rights (right to privacy, participation rights) aresufficiently protected during exchange of information." Thesis, Uppsala universitet, Juridiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-409537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Kalaf, William M. "Arizona law enforcement biometrics identification and information sharing technology framework." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FKalaf.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2010.<br>Thesis Advisor(s): Bergin, Richard ; Josefek, Robert. "March 2010." Description based on title screen as viewed on April 28, 2010. Author(s) subject terms: Arizona Criminal Justice Commission, biometrics technology, biometrics identification, facial recognition, fingerprint identification, law enforcement, information sharing, criminal information sharing, Arizona, Mexico, New Mexico, Texas, California, RISC, AFIS, IAFIS, NGI, governors border conferences, Central America, south west border initiative. Includes bibliographical references (p. 87-92). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
15

Finkle, Aaron. "Essays in the economics of information, incentives, and the law /." Thesis, Connect to this title online; UW restricted, 2004. http://www.gbv.de/dms/zbw/546804861.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Saint-Jacques, Guillaume B. "Information technology and the rise of the power law economy." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/103212.

Full text
Abstract:
Thesis: S.M. in Management Research, Massachusetts Institute of Technology, Sloan School of Management, 2015.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 36-38).<br>We show that the dramatically increasing share of income going to top earners can be explained by the rise of the "power law economy" and argue this reflects increased digitization and networks. Specifically, tax data (1960-2008) show that a bigger share of individual incomes are drawn from a power law, as opposed to the long-established log-normal distribution. We present a simple theoretical model to argue that the increased role of power laws is consistent with the growth of information technology, because digitization and networks facilitate winner-take-most markets. We generate four testable hypotheses, and find they match the data. (1) Our model, incorporating power laws, fits the data better than any purely log-normal distribution, (2) the increase in the variance of the log-normal portion of the distribution has slowed, suggesting a slowing of skill-biased technical change, (3) more individuals now select into the power law economy, (4) there is more skewness within that economy.<br>by Guillaume B. Saint-Jacques.<br>S.M. in Management Research
APA, Harvard, Vancouver, ISO, and other styles
17

Skupien, Kathryn Stephanie. "Colors and Mapping: The Right to Receive Information." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4845.

Full text
Abstract:
Color is used in everything we see and do and it often can be used for effect and representation, particularly on maps and transportation signage. This study explores the issues that the color blind population exhibits when viewing these maps and signs. Seeing that 8%#37; of the male population is afflicted with some form of color blindness, it is pertinent that research reflect these issues and take into consideration the Right to Receive Information for this population. A qualitative method using Photovoice and interviews was used to determine whether this population considers itself having a disability and what solutions can be found to assist with issues of seeing colors on transportation maps and signage. Results show that although half of the participants feel they have a disability, they do not want to be categorized with other disabilities or have restrictions placed on them. The overall consensus regarding maps was to use less colors and simplify. One solution to the issue of being able to read maps and signage was to instill the ColorADD Symbol System in the U.S. comprehensively. This study provides insight to the issues faced by the color blind population regarding Right to Receive Information for maps and signage, including alternate solutions to providing color blind people with sufficient materials. The significance of this research can be used to provide safer transportation signage for driving and better maps for traveling.
APA, Harvard, Vancouver, ISO, and other styles
18

Bopape, Tsekere Solomon. "Utilization of information technology to support information and knowledge management by law firms in Polokwane City." Thesis, University of Limpopo (Turfloop Campus), 2009. http://hdl.handle.net/10386/689.

Full text
Abstract:
Thesis (Ph.D. (Information Studies)) --University of Limpopo, 2009<br>This research report serves as an empirical investigation into the utilization of information technology to support information and knowledge management in law firms, as well as an attempt to design an information and knowledge management model for law firms. Members of the legal profession attached to law firms in the Polokwane City were investigated to find out how optimally they utilize information and communication technologies to support information and knowledge management in their daily operations. The research indicated that there are several ways in which information technology could be used to support the creation, organization, and transfer of information and knowledge in law firms, for the benefit of both lawyers and their clients . In order to provide for an empirical basis for this research, a survey research method, through the use of the questionnaires and interviews, was conducted, followed by a detailed content analysis of law firm websites. An in-depth literature review on the utilization of information technology to support information and knowledge management in law firms was also carried out to determine the findings of other studies that have been conducted elsewhere on the current topic. The results of this research showed that lawyers attached to law firms in the city of Polokwane appear to be non-users of information technology in as far as information and knowledge management is concerned. Most of the members of the law firms in the city seem to be utilizing information technology for basic purposes such as word processing, legal research, client billing, and communication through the e-mail. Other information and knowledge management tools, such as intranets, extranets and web portals, appear not to be utilized by most of the law firms in the city. Based on the findings of this research project, an information and knowledge network model, in a form of Wireless Local Area Network for the law firms in the Polokwane City, is proposed. This network could be utilized by law firms operating in the city to deposit, organize, retrieve, and share information and knowledge collaboratively through the use of information technology. Factors that should be taken into consideration in attempting to implement the proposed model are also discussed. At the end of the research report, some recommendations on encouraging lawyers to utilize information technology optimally are provided, together with recommendations for future research.
APA, Harvard, Vancouver, ISO, and other styles
19

Taylor, Mark J. "Genetic information, the contractual environment, and the response of English law : ought English law respond to genetic information gaining increased significance within the contractual environment?" Thesis, University of Sheffield, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.398390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Saxby, Stephen John. "Regulation of the market in digital information." Thesis, University of Southampton, 1996. https://eprints.soton.ac.uk/192875/.

Full text
Abstract:
This Thesis examines the current public policy and regulatory options likely to influence the future development of the information market. The context is the successful delivery, by digital technology, of the Internet - the precursor to a future broadband network, more popularly known as the `information superhighway'. This advance, which feeds on convergence of the information and communication technologies, will enable text, sound and image to be manipulated, exploited and communicated in digital format across a number of delivery platforms. It has introduced a new phase of intensive policy analysis among administrations intended to lead to the development of national or regional information infrastructure plans, designed ultimately to produce a global framework. A central focus of policy examined by the Thesis is what form the regulatory environment should take to encourage synergy between the public and private sectors in respect of their contributions to the plan. Throughout the work the approaches of the United Kingdom, the European Union and the United States are compared. The core of the Thesis is four papers, located in Chapters 1-4, which have either been published or accepted for publication in 1995/96. The first three will appear in the International Journal of Law and Information Technology (Oxford University Press) and the fourth in the 1995 International Yearbook of Law, Computers & Technology (Carfax). Chapter 1, `A Jurisprudence for Information Technology Law' considers the legal response to `digitization' and what the future holds. Chapter 2, `Public Sector Policy and the Information Superhighway' develops one of the themes from Chapter 1 and considers the public policy dilemmas posed by the information superhighway. Chapter 3, `Public Information Access Policy in the Digital Network Environment assesses the arguments for reform of EU access policy, its implications for the UK and the contribution it will make to the information market. Chapter 4, `A UK National Information Policy for the Electronic Age' reviews the progress of the UK in developing an integrated information policy for the information society. Chapter 5 contains a Conclusion. The author believes the Thesis to be the first sustained public policy analysis of the subject since the digital network first began to enter the public domain in 1993.
APA, Harvard, Vancouver, ISO, and other styles
21

Dang, Trung Ha. "Adopting Freedom of Information Law and the Quest for the Right of Access to Information in Vietnam." Thesis, Griffith University, 2018. http://hdl.handle.net/10072/380294.

Full text
Abstract:
People have the right to know. More than one hundred countries have adopted Freedom of Information (FOI) laws that provide legal guarantees for protecting the right of access to information (ATI). The passage and further implementation by Vietnam of an FOI law, namely the Law on Access to Information No.104/2016/QH13 (hereinafter referred to as “the LATI 2016”), adopted in April 2016, can possibly enhance the right of ATI in that country. The LATI 2016 was passed with the purpose of providing „for the exercise of the citizens' right of access to information‟1. As such the law is expected to be a turning point for accelerating the enforcement of the right of ATI in Vietnam when it takes effect on July 1, 2018. This study examines whether or not this expectation is justified and if the requisite conditions prevail in Vietnam for implementing a system that gives people access to information. There is a growing evidence of a consensus that access to certain kinds of information needs to be considered either as a human right or in the context of rights that citizens should have to prosper in their country. This study takes a rights-based approach, and argues that it provides a useful theoretical foundation for investigating the potential impact and implication of FOI laws. The sophistication and level of compliance with FOI laws in countries can vary depending on how aligned they are with human rights ambitions. The alternative instrumentalist approach as to why FOI legislation is enacted ties the regime to pragmatic values, revealing a lack of a consolidation of a theoretical and conceptual framework for understanding and implementing FOI law, and might not go far enough in the cause of protecting the right of ATI. This study draws on the wider historical, political and economic factors influencing the adoption of the LATI 2016 by Vietnam, which give context for the scope of public disclosure endorsed by the new law and the likely effect of its implementation. It argues that the legal text on its own is overambitious and should not be presumed to create sudden and major institutional changes aimed at securing the right of ATI. The enactment of the LATI 2016 demonstrates a positive transformation in the willingness and the capacity of both suppliers (the state) and demanders (the people) to improve the mechanisms for exercising ATI as a fundamental right of citizens. However, this progress has also been influenced by not only the country‟s economic context but also by the political regime. For the purpose of promoting the right of ATI in Vietnam, the study highlights the need for bottom-up reform, stemming from civil and social demands, rather than a top-down process as has been undertaken over the period of drafting of the LATI 2016. The human rights-based approach taken to ATI in this work indicates that Vietnam is making progress towards deeply reforming their legal framework but much work needs to be done in terms of creating a robust implementation regime.<br>Thesis (PhD Doctorate)<br>Doctor of Philosophy (PhD)<br>Griffith Law School<br>Arts, Education and Law<br>Full Text
APA, Harvard, Vancouver, ISO, and other styles
22

Chen, Hsinchun, Daniel Zeng, Homa Atabakhsh, Wojciech Wyzga, and Jennifer Schroeder. "CopLink: Managing Law Enforcement Data And Knowledge." ACM, 2003. http://hdl.handle.net/10150/105522.

Full text
Abstract:
Artificial Intelligence Lab, Department of MIS, University of Arizona<br>In response to the September 11 terrorist attacks, major government efforts to modernize federal law enforcement authorities’ intelligence collection and processing capabilities have been initiated. At the state and local levels, crime and police report data is rapidly migrating from paper records to automated records management systems in recent years, making them increasingly accessible. However, despite the increasing availability of data, many challenges continue to hinder effective use of law enforcement data and knowledge, in turn limiting crime-fighting capabilities of related government agencies. For instance, most local police have database systems used by their own personnel, but lack an efficient manner in which to share information with other agencies. More importantly, the tools necessary to retrieve, filter, integrate, and intelligently present relevant information have not yet been sufficiently refined. According to senior Justice Department officials quoted on MSNBC, Sept. 26, 2001, there is “justifiable skepticism about the FBI’s ability to handle massive amounts of information,” and recent anti-terrorism initiatives will create more data overload problems. As part of nationwide, ongoing digital government initiatives, COPLINK is an integrated information and knowledge management environment aimed at meeting some of these challenges.
APA, Harvard, Vancouver, ISO, and other styles
23

Yannopoulos, George Nicholas. "Modelling the legal decision process for information technology applications in law /." The Hague : Kluwer Law International, 1998. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=008004619&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Miller, Patrick E. "How can we improve information sharing among local law enforcement agencies?" Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FMiller%5FPatrick.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2005.<br>Thesis Advisor(s): Chris Bellavita. Includes bibliographical references (p.65-67). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
25

Stoll, Jane. "Swedish donor offspring and their legal right to information." Licentiate thesis, Uppsala universitet, Juridiska institutionen, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-146449.

Full text
Abstract:
All donor offspring conceived under the Swedish Genetic Integrity Act or the now-repealed Act on Insemination, from gametes donated after 1 March 1985, have the right to obtain identifying information about the donor when they are sufficiently mature. Despite this, studies undertaken in Sweden and abroad reveal that many donor offspring will never be able to exercise their right to information because their parents do not tell them how they were conceived. This study examines the regulatory framework established to facilitate access to identifying information for donor offspring in Sweden; the main objective being to determine whether or not the right to information is an effective legal right. In addition to giving an account of the source and scope of the right under Swedish law, Sweden´s possible obligations to donor offspring under the United Nations Convention on the Rights of the Child and the European Convention on Human Rights are explored. A number of measures that could promote the right to information are also considered.
APA, Harvard, Vancouver, ISO, and other styles
26

Sinopoli, Anthony F. "Cyberwar and International Law: An English School Perspective." Scholar Commons, 2012. http://scholarcommons.usf.edu/etd/4404.

Full text
Abstract:
Cyberwar challenges future endeavors of state security. As technological capability has improved, and access to information has become more widespread the importance of the issue in today's ever-globalizing world grows each day. A primary objective is to evaluate the place of cyber-warfare against nation-states and any repercussions under an international law paradigm. Utilizing an English School perspective, emphasis will be applied to the argument that disruptive circumstances could come to fruition if international conventions are not created to bring consensus and order among nation-states on this subject. This study hypothesizes that a future application could be an agreement under international law, beyond current regional cooperative initiatives. Since cyber-related attack is a relatively new development, the issue lacks adequate historical context. In addition, since state behavior is a major contributor to the interpretation of international law, the matter is in need of a clear delineation of the norms that define the phenomena and what acceptable responses might entail. Case study analysis will highlight recent examples of state behavior and cyber-related attacks and sabotages.
APA, Harvard, Vancouver, ISO, and other styles
27

Bell, Justine Ann. "An integrated information management model for ecologically sustainable development." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/33245/1/Justine_Bell_Thesis.pdf.

Full text
Abstract:
Ecologically sustainable development has become a major feature of legal systems at the international, national and local levels throughout the world. In Australia, governments have responded to environmental crises by enacting legislation imposing obligations and restrictions over privately-owned land. Whilst these obligations and restrictions may well be necessary to achieve sustainability, the approach to management of information concerning these instruments is problematic. For example, management of information concerning obligations and restrictions in Queensland is fragmented, with some instruments registered or recorded on the land title register, some on external registers, and some information only available in the legislation itself. This approach is used in most Australian jurisdictions. This fragmented approach has led to two separate but interconnected problems. First, the Torrens system is no longer meeting its goal of providing a complete and accurate picture of title. Second, this uncoordinated approach to the management of land titles, and obligations and restrictions on land use, has created a barrier to sustainable management of natural resources. This is because compliance with environmental laws is impaired in the absence of easily accessible and accurate information. These problems demonstrate a clear need for reform in this area. To determine how information concerning these obligations and restrictions may be most effectively managed, this thesis will apply a comparative methodology and consider three case studies, which each utilise different models for management of this information. These jurisdictions will be assessed according to a set of guidelines for comparison to identify which features of their systems provide for effective management of information concerning obligations and restrictions on title and use. Based on this comparison, this thesis will devise a series of recommendations for an effective system for the management of information concerning obligations and restrictions on land title and use, taking into account any potential legal issues and barriers to implementation. This series of recommendations for reform will be supplemented by suggested draft legislative provisions.
APA, Harvard, Vancouver, ISO, and other styles
28

Bader, Caroline, Eva-Louise Castefelt, and Louise Gunnarsson. "The Recipe for Cookies : A studies about cookies & the GDPR-law." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-14330.

Full text
Abstract:
The term cookie regarding IT is still a relatively new term. It is rarely discussed among internet users. The name cookie is fairly known but the concept not as much. Cookies are well established by different companies and organizations that in some way offer online services. Today visitors of the internet meet cookies almost every time they go online. For the users who choose not to accept cookies the online experience becomes highly limited. Cookies store information of the visitors in order to improve their experience but also to help the organization. The majority of webpages online that uses electronic commerce or in any way can benefit from storing the customers information uses cookies. Cookies can be sold or exchanged between organizations to increase their profit and range. In 2011 a provision regarding all organizations using cookies were implemented. Every internet user visiting these pages had to be notified about their use of cookies immediately. New laws are established in order to control or regulate the exertion of other people’s personal information at the same pace as cookies are further developed. The next law to be established is GDPR, General Data Protection Regulation, which will be focused on in this thesis. The purpose of this study is to explore the phenomenon of cookie-use and how it affects internet users and organizations in synergy with the GDPR-law. To achieve the desired result a mixed method has been applied involving both interviews and a survey. The interviews consisted of pre-determined questions and dynamic follow-up questions. Three different organizations participated in the interviews, an university, an organization using e-business and a media agency. The survey consisted of a few mandatory closed questions. The distribution of the survey led to right above 130 respondents. The gained results from the use of a quantitative methods hinted that barely half of the respondents knew what a cookie actually was. Several of the participants were curious about learning more about the phenomenon while a lower percentage did not consider it important. Knowledge or ignorance regarding cookies turned out to have a great impact on the respondent’s comfortableness and behavior online. The results from the qualitative method showed that the organizations working with cookies will be affected by GDPR. Following thesis will contribute to the field of informatics by consequently process the empiric data collected with support from theoretic competences. It will contribute as a source of information regarding cookies within information technology.<br>Termen cookie är fortfarande en relativt ny term och är inte särskilt debatterad bland internetanvändare. Begreppet cookie är någorlunda känt men innebörden inte lika så. Cookies är väl etablerat av olika företag och organisationer som på något sätt använder sig av internet. Idag stöter användare på cookies nästan överallt när de rör sig på internet. För den som bestämmer sig för att avstå från allt som har med cookies att göra blir internet vistelsen mycket begränsad. Cookies arbetar för att lagra information om besökarna dels för att gynna besökarnas vistelse men även för att hjälpa företagen. Majoriteten av alla hemsidor som idag använder sig av e-handel samt kan gynnas av att kundens data sparas använder sig av cookies. Cookies kan även säljas eller utbytas mellan företag och organisationer för att öka deras försäljning och vidd. År 2011 implementerades en bestämmelse gällande alla företag och organisationer som då använde sig av cookies. Alla besökare skulle upplysas om att just de använde cookies när de besöker deras hemsida. Nya lagar etableras för att kunna kontrollera och reglera användandet av besökares personliga information online i takt med att användandet av cookie utvecklas. Den nästkommande lagen att implementeras är GDRP, General Data Protection Regulation, som kommer att ha stort fokus i denna uppsats. Syftet med denna uppsats är att granska fenomenet cookie, dess användningsområden samt hur det påverkar internetanvändare och de olika företagen och organisationerna i synergi med GDPR-lagen. För att uppnå önskat resultat har en mixad metod använts i form av intervjuer och en enkät. Intervjuerna bestod av förutbestämda frågor och dynamiska följdfrågor under samtalets gång. Tre företag ställde upp som intervjuobjekt. En högskola, ett företag med försäljning online samt en mediebyrå. Enkäten bestod av obligatoriska frågor med förutbestämda svarsalternativ. Distributionen av enkäten ledde till strax över 130 respondenter. Resultatet efter användningen av den kvantitativa metoden antydde att knappt hälften av respondenterna inte visste vad en cookie var. Många var nyfikna och ville lära sig mer medan en lägre procent av respondenterna inte ansåg att de inte ville veta mer. Vetskapen samt ovetskapen gällande cookies påvisade sig ha stor inverkan på respondenternas bekvämlighet samt beteende online. Resultatet av den kvalitativa metoden visade att organisationer som arbetar med cookies kommer bli påverkade av GDPR. Följande uppsats kommer bidra till området informatik genom att följaktligen bearbeta empiriinsamling med stöd av teoretiska kompetenser. Den kommer att bidra som en informationskälla gällande cookies inom informationsteknologi.
APA, Harvard, Vancouver, ISO, and other styles
29

Moore, Joe Wesley. "Information warfare, cyber-terrorism and community values." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=29563.

Full text
Abstract:
Information Warfare involves the attack and defense of information and information systems, both in time of armed conflict and in operations short of war. While information technology provides the promise of a new class of less lethal military instruments, it also presents vulnerabilities occasioned by widespread dependence on an increasingly complex and interconnected global information infrastructure. These vulnerabilities, when exploited by those who would target civilians in order to inspire widespread fear in hopes of accomplishing a political agenda, can be understood as cyber-terrorism.<br>As information warfare techniques evolve, those employing them should look to several relevant sources for normative guidance. Relevant, internationally shared values can be found in international custom, the U.N. Charter, treaties dealing with the subject of "cybercrime," those governing the communication media likely to be utilized by information warriors, UNGA Resolutions and those treaties and customary norms that make up the Law of Armed Conflict.
APA, Harvard, Vancouver, ISO, and other styles
30

Masango, Charles Akwe. "User preferences in the use of Law Library collections : a case study of the Brand van Zyl Law Library of the University of Cape Town." Master's thesis, University of Cape Town, 1997. http://hdl.handle.net/11427/13397.

Full text
Abstract:
Bibliography: leaves 129-134.<br>Law libraries are specialised libraries consisting primarily of printed and electronic legal literature which assist their patrons in legal research and the teaching of law. The use of the law library by the entire university often causes concern on the part of the legal patrons and staff who use and manage the library and its collection. This dissertation investigates the nature and purpose of the law library of the University of Cape Town, with a view to establishing patterns of use and revealing the problems encountered by patrons and members of staff in the use of this library and its collections. In the investigation, two types of questionnaires were prepared and administered to the patrons and members of staff of this library in order to establish their library usage and preferences. The researcher undertook the quantitative approach since the qualitative approach in the form of interviews and observations had earlier been effectuated by the researcher during his internship in this library. In the investigation during which a total number (60) of students, academics (14) and four members of staff responded, it was revealed that the patrons encounter problems of space, noise and movements. The members of staff noted inter alia that in addition to the problems of space, noise and movements, there were also problems of mutilation of the library's materials (underlining passages and tearing pages) and of the deliberate mis-shelving of materials. In the light of these identified problems, this dissertation makes a number of recommendations designed to alleviate the problems experienced by the respondents.
APA, Harvard, Vancouver, ISO, and other styles
31

Nezafati, Mohammad Reza. "Fundamental principles for intellectual property and information technology law : a comparative study between United Kingdom, Islamic and Iranian law." Thesis, University of Strathclyde, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.442013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Handa, Sunny. "Reverse engineering computer programs under Canadian copyright law." Thesis, McGill University, 1994. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=22693.

Full text
Abstract:
The field of copyright law has been especially active in recent times as a result of its application to computer programs. Copyright law, not originally designed to protect such works, has had to adapt to suit the special nature of computer programs. This paper addresses the applicability of copyright law to the reverse engineering of computer programs. Reverse engineering is a method by which programmers may uncover the ideas and processes used within an existing computer program, thereby allowing the construction of compatible computer programs. Reverse engineering may also be used to create works which are directly competitive with the original program, and may also be used to assist in the piracy of computer programs. The mere act of reverse engineering computer programs, regardless of its purpose, potentially infringes the copyright of the computer program in question, notwithstanding whether the results of the process are used in an infringing manner.<br>Recently both the European Union countries and the United States have accepted reverse engineering as an exception to copyright infringement. The European Union has opted for a legislative solution, whereas in the United States several courts have construed the fair use exception contained in that country's Copyright Act as allowing reverse engineering.<br>In this paper, it is argued that Canada must also adopt a reverse engineering exception to copyright infringement. It is claimed that the implementation of such an exception is justified through examination of the underlying policy goals of copyright law in the context of an economic framework. Reverse engineering fosters the creation of standards which, it is argued, increase societal wealth. The existence of a reverse engineering exception is consistent with the balance between the economic rights of individual authors and societal technological progress, which copyright seeks to maintain. It is demonstrated that copyright exists as the only form of applicable intellectual property protection which can broadly limit the disclosure of concepts underlying computer programs.<br>It is suggested that an effective exception should be statutorily based. It is felt that the existing fair dealing exception contained in the Canadian Copyright Act is juridically under-developed and too uncertain to provide an effective solution to the reverse engineering problem. A legislative solution would send a clear message to the software industry as well as to the courts, and could prohibit contracting out of the Copyright Act which would potentially be allowed were a judicial solution sought. It is further suggested that the statutory exception should broadly allow the process of reverse engineering as opposed to limiting it to cases where compatibility is sought. Narrowing the exception creates conceptual difficulties in applying limits to reverse engineering. Allowing a broad exception would avoid these difficulties while continuing to provide copyright holders with protection if, after the reverse engineering process is concluded, their protectable expression is used within another's software product.
APA, Harvard, Vancouver, ISO, and other styles
33

Cofone, Ignacio Nicolas [Verfasser], and Klaus [Akademischer Betreuer] Heine. "Privacy Tradeoffs in Information Technology Law / Ignacio Nicolas Cofone ; Betreuer: Klaus Heine." Hamburg : Staats- und Universitätsbibliothek Hamburg, 2017. http://d-nb.info/1124591397/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Козловська, Ганна Борисівна, Анна Борисовна Козловская, Hanna Borysivna Kozlovska, and M. Vinnik. "Patent law: historical insight and importance in contemporary language and information world." Thesis, ВД «Ельдорадо», 2018. http://essuir.sumdu.edu.ua/handle/123456789/68002.

Full text
Abstract:
Метою статті є вивчення історії патентного права, що має велике значення в сучасному мовному та інформаційному світі. Права інтелектуальної власності є цінними, і бізнес має бути захищений у багатьох аспектах.<br>Целью статьи является рассмотрение патентного права с исторической точки зрения. Патентное право имеет огромное значение в современном лингвоинформационном мире. Права интеллектуальной собственности имеют огромную ценность, а бизнес должен быть всесторонне защищен.<br>The objective of the article is to explore the history of patent law which is of great importance in contemporary language and information world. Intellectual property rights are valuable and business must be protected in many aspects.
APA, Harvard, Vancouver, ISO, and other styles
35

Riley, Diana. "The information needs of attorneys in a large South African law firm." Master's thesis, University of Cape Town, 2005. http://hdl.handle.net/11427/8014.

Full text
Abstract:
This paper reports the results of a study, which was carried out to investigate the information needs of the attorneys in a large South African law firm. The survey research method was employed and a single survey conducted within a particular time-span. Two methods of data collection were employed, namely the analysis of documentary sources and questioning. A combination of self-administered questionnaires and interviews were used to gather the data. The questionnaire designed by the researcher consisted of closed and open-ended questions and a rating scale was used where appropriate to enable the respondents to express their opinions or strength of preferences. The majority of the questions included a general response category that made it possible for respondents to enter other relevant data and personal observations. The questionnaire was sent to all the Bowman Gilfillan attorneys via electronic mail. The email, which included the questionnaire as a MSWord attachment, introduced and explained the purpose of the questionnaire. All questions incorporated in the questionnaire were subjected to cross-tabulation to establish the impact of the independent or classification variables on the dependent variables. The following variables were considered during cross-tabulation: respondent's age, position in the firm and number of years experience as attorney. To establish which results were significant the Pearson chi-square statistical test was applied to all bivariate relations. Results that yielded a chi-square statistic below the .01 significance level were rejected. This study sought to investigate why the attorneys need work-related information, what type of work-related information they require, which sources and systems of information they use and what the factors are that influence their information-seeking behaviour. As a law librarian, the researcher also investigated the role of the law librarian and library in the provision of work-related information to the attorneys. The findings revealed that the attorneys required access to work-related information to provide a legal service to their clients and that their most important information need is to establish the current status of the law and to keep up-to-date with the latest legal developments. The attorneys made use of various informal and personal sources of information (e.g. colleagues) and the library and required access to primary and secondary sources of law as well as non-legal information. The findings also indicated that the attorneys required quick and easy access to current and accurate information and that factors such as age, number of years experience as an attorney and position in the law firm appeared to influence the use of the various sources and systems of information as the younger, less experienced attorneys had a greater need for the various sources and systems of information. The study also found that law librarians and libraries undoubtedly have an important role to play in the provision of work related information.
APA, Harvard, Vancouver, ISO, and other styles
36

Cofone, Ignacio Nicolas Verfasser], and Klaus [Akademischer Betreuer] [Heine. "Privacy Tradeoffs in Information Technology Law / Ignacio Nicolas Cofone ; Betreuer: Klaus Heine." Hamburg : Staats- und Universitätsbibliothek Hamburg, 2017. http://d-nb.info/1124591397/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Morgan, Deanne. "Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4729/.

Full text
Abstract:
The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges are encountered during conventional criminal investigations, terrorist investigations also present unique challenges. Through content and typological analysis, this study examined open source information to identify, categorize and propose a model of these challenges. Four primary categories were identified: technology, methodology, legal, and administration and human resources challenges.
APA, Harvard, Vancouver, ISO, and other styles
38

Burdon, Mark. "The conceptual and operational compatibility of data breach notification and information privacy laws." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/47512/1/Mark_Burdon_Thesis.pdf.

Full text
Abstract:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
APA, Harvard, Vancouver, ISO, and other styles
39

Correia, e. Silva Benilde. "Some legal aspects of flight information regions." Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59573.

Full text
Abstract:
This thesis broadly seeks to present some relevant legal aspects concerning Flight Information Regions (FIRs) and to analyze State responsibility vis-a-vis FIRs, as well as liability incurred by States on account of acts and omissions while discharging their responsibilities.<br>The first part of this thesis is a presentation of the international rules and regulations applicable to FIRs, their legal implications and the extent to which they create obligations for States.<br>Some relevant problems (accidents, airspace congestion, unlawful interference) likely to present an additional challenge for the discharge of responsibilities with regard to FIRs are also considered.<br>Settlement of differences between States deserves special attention and is discussed in the light of the judicial machinery provided under the Chicago Convention 1944.<br>Finally, the liability of States is analyzed and the need for a strict liability regime and a policy of risk management is considered.
APA, Harvard, Vancouver, ISO, and other styles
40

Svensson, Emelie. "Sekretesslagstiftningen : Hanteringen av skyddsvärd information vid kris." Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik, konst och samhälle, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86759.

Full text
Abstract:
I mörkret av coronapandemins framfart har frågor lyfts kring hanteringen av den kris som pandemin har inneburit för samhället. Information hos en viss myndighet har inte kunnat komma till användning hos en annan myndighet på grund av den snåriga lagstiftning som avser skydda den enskilde. Syftet med detta arbete har varit att undersöka myndigheters hantering av sekretessbelagd information i ett krisläge. För att undersöka rådande rättsläge har en rättsdogmatisk metod använts samt information hämtad från myndighetsföreskrifter. Analys av det rådande rättsläget och tillämpbar lagstiftning visar att det finns möjligheter att bryta sekretessen i flera fall. Befintliga sekretessbrytande bestämmelser gör inte skillnad på krissituation och vardag: sekretesskyddad information hanteras på samma sätt oavsett pågående kris eller ej.
APA, Harvard, Vancouver, ISO, and other styles
41

Clark, Andrew Gerald. "Advances in information technology and the growth of para-legal services in Britain." Thesis, University of Exeter, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.387424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Paradissis, Jean-Jacques. "The right to access environmental information : an analysis of UK law in the context of international, European, and comparative law." Thesis, City University London, 2005. http://openaccess.city.ac.uk/8454/.

Full text
Abstract:
The present thesis comprehensively examines the right of any member of the public to access environmental information held by mainly public bodies and the obligation of these bodies to provide it upon request. In doing this, we do not claim to present the reader with a brand new theory. However this thesis is original in the way that it combines in a single piece of work all the aspects of the subject: both legal and non-legal. With respect to the legal aspects of the subject, these are analysed in regard of not only national law, but also international, EC law and also the law of the European Convention on Human Rights. In other words, the present thesis is a synthesis that has never been done before. In our introductory chapter we set the limits of our examination by stating that we will mainly examine the legal rules that grant a right to individuals to access environmental information upon request. We also examine the historical evolution of the right to access to environmental information. Then, in Chapter I, which is the core chapter of the present work, we explain in detail the substantive provisions of the legal instruments granting a right to access environmental information upon request: the Aarhus convention, the 2003/4IEC Environmental Information Directive on public access to Environmental Information and the Environmental Information Regulations 2004, which transpose into UK law this Directive and the information provisions of the Aarhus convention. It should be stressed that we analyse in parallel the equivalent provisions of EC law, international law and UK law, thus avoiding repeating the identical parts of these instruments. This parallel examination of all legal rules that grant a right to access environmental information is also a feature that renders the present work original, since there is no other written work on the subject adopting such an approach. In chapter 2 we examine other specific UK enactments that grant a right to access specific kinds of environmental information which is recorded on registers. Moreover, we highlight the fact that the statutory provisions on registers serve a different function than the environmental information regulations, as they also create a statutory duty for some public authorities to collect and compile certain types of environmental information and place it on registers. In chapter 3 we examine the relevant ECHR articles which have been interpreted by the Court of Strasbourg as including a right to access environmental information. Thus, we analyse how in some limited circumstances the right to access environmental information can be of a fundamental nature. Finally, in chapter 4 we examine how the 90/313IEEC Directive (the precursor of Directive 2003/41EC) was transposed in French ,law, in comparison with England. We conclude that the English method of transposition has been more in conformity with the aim of the right to access environmental information: environmental protection. We also conclude that this important finding is also of some relevance today, even after the enactment of the 2003 Directive and the Environmental Information Regulations 2004. The present work is concluded by showing that: I) the right of access to environmental information is what could be called a 'multi-layered' right, which stems from various legal instruments of different levels (the EC level, international level and UK national level). This is the reason why the right to environmental information is a right with uncertain boundaries and content, since, although all these instruments go into the same direction of recognising a right to access environmental information to any person, they all contain different limitations and exceptions to the scope of this right; 2) the right to access environmental information is fundamentally different from the general right to access information held by public bodies, since it aims at achieving better environmental protection; 3) as a consequence, the correct approach to any analysis of the right to access environmental information is to understand and acknowledge that, first, this right stems from various European, national and international legal instruments, and second, that although it is a right similar to the general right to access information, it is conceptually different as it aims to protect the environment.
APA, Harvard, Vancouver, ISO, and other styles
43

Alghamdi, Khalid Ahmad. "Evolving standards of information disclosure : reform of Saudi Arabian medical law in the light of the developments of English law." Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/7926/.

Full text
Abstract:
The major concern of this thesis is about the current professional standard of care under Saudi Arabian medical law, regarding doctors’ duty to disclose information and risks to competent adult patients about a proposed medical treatment. Additionally, the thesis has highlighted other legal deficiencies that occur as a result of applying the professional standard in Saudi Arabia and considered how reforms can be introduced, based on English law experience in a way that is in harmony with Islamic Sharia. The thesis has undertaken a novel approach by critically studying and comparing the current practice in Saudi Arabian medical law to the comparative English law approach. The reason for this is to provide a comprehensive legal literature review based on the extremely well- developed English law experiences in the same matters. Realising the significance of the principle of the respect for autonomy, the thesis has placed a noticeable emphasis on this principle by arguing that considering and respecting autonomy would lead the law to protect the patient’s autonomy and self-determination in a medical context. The thesis has argued that both Western and Islamic Sharia medical ethics have considered the notion of the respect for patients’ autonomy, but that consideration has been approached differently, as the thesis has shown. Further, the thesis has critically discussed how the English law standard of care has been developed in the last three decades, in order to move from the professional standard of care to a new standard that protects patients’ autonomy and self-determination. These developments and years of experience have provided sufficient arguments and supports for the thesis’s motion to recommend and suggest that Saudi Arabian medical law departs from the professional standard and adopts the prudent patient standard to protect patients’ autonomy in compliance with Islamic Sharia. In addition to proposing a legal formula for the prudent patient standard that can be adopted by Saudi Arabian medical law, this thesis has also proposed other formulas as solutions for other legal deficiencies, based on English law experience and in accordance with Islamic Sharia.
APA, Harvard, Vancouver, ISO, and other styles
44

France, Paul. "Preventing terrorism using information sharing networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FFrance.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2006.<br>Thesis Advisor(s): Nadav Morag and Robert Simeral. "September 2006." Includes bibliographical references (p. 75-78). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
45

Lessner, Grace I. "Subtle Sentry: State Public Records Laws and the Availability of Government Information." W&M ScholarWorks, 1998. https://scholarworks.wm.edu/etd/1539626175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

El-Sheikh, Mahmoud Mohamed Omar. "Developing a Libyan information privacy framework." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/65866/1/Mahmoud%20Mohamed%20Omar_El-Sheikh_Thesis.pdf.

Full text
Abstract:
This thesis considers how an information privacy system can and should develop in Libya. Currently, no information privacy system exists in Libya to protect individuals when their data is processed. This research reviews the main features of privacy law in several key jurisdictions in light of Libya's social, cultural, and economic context. The thesis identifies the basic principles that a Libyan privacy law must consider, including issues of scope, exceptions, principles, remedies, penalties, and the establishment of a legitimate data protection authority. This thesis concludes that Libya should adopt a strong information privacy law framework and highlights some of the considerations that will be relevant for the Libyan legislature.
APA, Harvard, Vancouver, ISO, and other styles
47

Keck, Andrew G. "Electronic discovery." Thesis, Utica College, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10101099.

Full text
Abstract:
<p> Cyber incidents continue to increase across the entire globe. The increase in security threats requires organizations to rethink strategies and policies continually fortifying against known and unknown threats. Cyber incident policies and response plans range from non-existent to hundreds of pages in length. A policy may include sections discussing roles and responsibility, incident detection, escalation, and many additional categories, and often discuss the collection and preservation of forensic evidence. Policies briefly address, in many cases, the proper collection of evidence; however, the written regulation concerning the potential liabilities, the risks associated with current and future litigation, and the legal consequences to a cyber incident remains sparse. The desired outcome of this paper is to enlighten the reader through identification of the risks, the potential pitfalls, and steps to policy development pertaining to the handling of electronic evidence, with a cross examination of overlapping sectors between forensics, electronic discovery, and cyber security.</p>
APA, Harvard, Vancouver, ISO, and other styles
48

Lazarus, Seth A. "Cyber Mobs| A Model for Improving Protections for Internet Users." Thesis, Utica College, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10271260.

Full text
Abstract:
<p> Cyber mobs have grown to have a significant impact on individuals in real space and cyber space. Law enforcement and legislators have been confronted with challenges in mitigating the intangible harms inflicted by individuals of cyber mobs. Law enforcement, in most cases, is focused on solving cybercrimes associated with tangible harms. Thus, legislators seek to better protect cyber mob victims by increasing law enforcement training and focus on cyber mob incidents, as well as to create new legislation to better cope with the harms caused by cyber mobs. Much of the current research available focuses on the social aspects of cyber mobs, and before creating changes to statutes and law enforcement training, research is necessary to craft those changes better to counter cyber mob activities. The study reviewed several different types of cyber mobs, legislative measures, and cyber policing methods to provide recommendations. The research found that cyber mobs seem to overlap in their techniques, tactics, and procedures, though the harms they cause to accomplish their goals vary. In order to protect against their actions, research suggested, overall, that the examination of current legislation to create new methods of enforcement is necessary before creating additional statutes. In parallel with using current legislation, online communities already employ methods to police themselves, and these methods offer new avenues for law enforcement to work with these communities to better assist them when issues arise. These results demonstrated that much of what is necessary to protect against cyber mobs is already available, but it must be utilized differently to improve effectiveness.</p>
APA, Harvard, Vancouver, ISO, and other styles
49

Lupton, Mandy. "Information literacy and learning." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/16665/1/Mandy_Lupton_Thesis.pdf.

Full text
Abstract:
This thesis explores the relationship between information literacy and learning. In formal education, students are frequently required to independently find and use information to learn about a topic, and information literacy is often claimed to be a generic skill and graduate attribute. However, to date; the experienced relationship between information literacy and learning has not been investigated. In order to investigate this experience, I have based this research on interviews with 19 students enrolled in third year music composition courses, and 18 students enrolled in a third year tax law course at an Australian university. My primary research question was 'What is the experienced relationship between information literacy and learning?' The secondary research question was "What are the generic and situated aspects of information literacy?' In this study, I have used phenomenography to describe the qualitatively different ways that students in two distinct disciplines experience the relationship between information literacy and learning. I have suggested curriculum implications of this description based on a relational approach to learning and teaching. The outcomes of the study include two related sets of categories which map the experience of students in music composition and tax law, and the theoretical GeST windows model for information literacy which is based upon literacy models and theories. The key findings of this study include: * A description of the nature of the experienced relationship between information literacy and learning in music composition and tax law as 1) Applying, 2) Discovering and 3) Expressing (music) or Understanding (tax law); * the theoretical GeST windows model and alignment of the model with the empirical study; * the presentation of curriculum implications in music and tax law, and * an exploration of the nature of information as-it-is-experienced. The findings may be used by teachers, students, librarians, academic skills advisors, academic developers and policy makers in higher education.
APA, Harvard, Vancouver, ISO, and other styles
50

Lupton, Mandy. "Information literacy and learning." Queensland University of Technology, 2008. http://eprints.qut.edu.au/16665/.

Full text
Abstract:
This thesis explores the relationship between information literacy and learning. In formal education, students are frequently required to independently find and use information to learn about a topic, and information literacy is often claimed to be a generic skill and graduate attribute. However, to date; the experienced relationship between information literacy and learning has not been investigated. In order to investigate this experience, I have based this research on interviews with 19 students enrolled in third year music composition courses, and 18 students enrolled in a third year tax law course at an Australian university. My primary research question was 'What is the experienced relationship between information literacy and learning?' The secondary research question was "What are the generic and situated aspects of information literacy?' In this study, I have used phenomenography to describe the qualitatively different ways that students in two distinct disciplines experience the relationship between information literacy and learning. I have suggested curriculum implications of this description based on a relational approach to learning and teaching. The outcomes of the study include two related sets of categories which map the experience of students in music composition and tax law, and the theoretical GeST windows model for information literacy which is based upon literacy models and theories. The key findings of this study include: * A description of the nature of the experienced relationship between information literacy and learning in music composition and tax law as 1) Applying, 2) Discovering and 3) Expressing (music) or Understanding (tax law); * the theoretical GeST windows model and alignment of the model with the empirical study; * the presentation of curriculum implications in music and tax law, and * an exploration of the nature of information as-it-is-experienced. The findings may be used by teachers, students, librarians, academic skills advisors, academic developers and policy makers in higher education.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!