Dissertations / Theses on the topic 'Personal data control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 41 dissertations / theses for your research on the topic 'Personal data control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Allwine, Daniel Alan. "Personal computer based data acquisition, sensing and control." Ohio : Ohio University, 1993. http://www.ohiolink.edu/etd/view.cgi?ohiou1174932273.
Full textOlausson, Michaela. "User control of personal data : A study of personal data management in a GDPR-compliant grahpical user interface." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-75880.
Full textJensen, Torstein, and Knut Halvor Larsen. "Developing Patient Controlled Access : An Access Control Model for Personal Health Records." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9597.
Full textThe health and social care sector has a continuous growth in the use of information technology. With more and more information about the patient stored in different systems by different health care actors, information sharing is a key to better treatment. The introduction of the personal health record aims at making this treatment process easier. In addition to being able to share information to others, the patients can also take a more active part in their treatment by communicating with participants through the system. As the personal health record is owned and controlled by the patient with assistance from health care actors, one of the keys to success lies in how the patient can control the access to the record. In this master's thesis we have developed an access control model for the personal health record in a Norwegian setting. The development is based on different studies of existing similar solutions and literature. Some of the topics we present are re-introduced from an earlier project. Interviews with potential users have also been a valuable and important source for ideas and inspiration, especially due to the fact that the access control model sets high demands on user-friendliness. As part of the access control model we have also suggested a set of key roles for the personal health record. Through a conceptual implementation we have further shown that the access control model can be implemented. Three different solutions that show the conceptual implementation in the Indivo personal health record have been suggested, using the Extensible Access Control Markup Language as the foundation.
Yu, Sam Shaokai. "Performance analysis and call control procedures in high-speed multimedia personal wireless communications /." Title page, abstract and contents only, 1999. http://web4.library.adelaide.edu.au/theses/09PH/09phy936.pdf.
Full textWild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Doctoral thesis, Universitätsbibliothek Chemnitz, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-217284.
Full textWild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.
Full textVan, der Westhuizen Eldridge Welner. "A framework for personal health records in online social networking." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1012382.
Full textWeston, Mindy. "The Right to Be Forgotten: Analyzing Conflicts Between Free Expression and Privacy Rights." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6453.
Full textGoratti, L. (Leonardo). "Design, analysis and simulations of medium access control protocols for high and low data rate applications." Doctoral thesis, Oulun yliopisto, 2011. http://urn.fi/urn:isbn:9789514296512.
Full textTiivistelmä Kahden viime vuosikymmenen aikana innovatiivisella langattomalla tekniikalla varustettujen viestintälaiteiden määrä on kasvanut räjähdysmäisesti. Lyhyen kantaman verkkoja kuten langattomia henkilökohtaisen alueen verkkoja (WPAN), langattomia anturiverkkoja (WSN) ja langattomia vartaloalueen verkkoja (WBAN) on määritelty ja tutkittu, jotta voitaisiin tuottaa korkeanopeuksisia kotiyhteyksiä sekä välineitä ympäristön ja terveydentilan seurantaan. Tämä väitöskirja käsittelee lyhyen kantaman viestintään suunniteltujen linkinohjauskerroksen MAC-protokollien suunnittelua, analysointia ja simulointia. Näissä kaikissa käytetään akkukäyttöisiä laitteita, mutta myös tietyt MAC-protokollien suunnittelun haasteet ovat tavallisia fyysisen kerroksen teknologiaa valittaessa. Ultra-laajakaistainen (UWB) teknologia ja 60 GHz teknologia (eli millimetriaallonpituusalueen tietoliikenne) ovat hyviä esimerkkejä kuluneen vuosikymmenen langattomasta vallankumouksesta. Tässä väitöskirjassa huomioidaan UWB teknologiaan liittyvää MAC-kerroksen analyysiä tehtäessä useat olemassa olevat standardit, kuten IEEE 802.15.3, ECMA-368, IEEE 802.15.4 ja sen lisäys IEEE 802.15.4a. Millimetriaallonpituusalueen tietoliikenteessä huomioidaan myös IEEE 802.15.3c standardin erityispiirteet. IEEE 802.15.3c:tä lukuun ottamatta kaikki MAC-protokollat on mallinnettu Opnet verkkosimulaattorilla. Tämä tutkimus tarjoaa innovatiivisen ja syväluotaavan tutkimuksen näiden standardien pohjalta ja analyyttisten ja simuloitujen mallien avulla kehitetyistä hallinnallisista lähestymistavoista (esim. ECMA-368 hajautettu majakkasignaali). Näiden avulla voidaan valita kohteena oleviin sovelluksiin ja teknologioihin parhaiten soveltuvia MAC-ominaisuuksia. Kaikkien protokollien analysointiin käytetty ensisijainen suorituskykymittari on energiatehokkuus, mutta myös datanopeuksia on tarkasteltu. Tässä tutkimuksessa esitellään myös innovatiivinen tapa tutkia MAC protokollia integroituina konsepteina suhteessa verkon ja sovellusten tyyppiin sekä fyysisen kerroksen teknologiaan. Lisäksi tämä väitöskirja esittelee MAC suorituskykyä UWB verkossa silloin, kun siinä otetaan huomioon väärät hälytykset, väärä havainnointi ja vastaanottimen signaalinkaappaus (vastaanoton mallintamiseksi käytetään olemassa olevaa interferenssimallia). MAC analyysistä poistetaan useimmat epärealistiset, vaikkakin tavalliset, olettamukset, ja verkkojen suorituskykyä tarkastellaan valittujen kriittisten parametrien monitoroinnissa Opnet-simulaatioiden avulla. Tunnettua binäärijakoinen eksponentiaalinen perääntyminen -algoritmia analysoidaan innovatiivisella, yksinkertaistetulla yksiulotteisella Markov-ketju -mallilla 60 GHz:n suunta-antenni MAC:n yhteydessä. Kuten tässä tutkimuksessa tullaan osoittamaan, esitelty yksinkertaistus ei rajoita tulosten tarkkuutta, vaan mukaan voidaan lukea jopa rajallinen määrä uudelleenlähetyksiä yksinkertaisen Markovin ketjun laajennuksen avulla
Bantom, Simlindile Abongile. "Accessibility to patients’ own health information: a case in rural Eastern Cape, South Africa." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2411.
Full textAccess to healthcare is regarded as a basic and essential human right. It is widely known that ICT solutions have potential to improve access to healthcare, reduce healthcare cost, reduce medical errors, and bridge the digital divide between rural and urban healthcare centres. The access to personal healthcare records is, however, an astounding challenge for both patients and healthcare professionals alike, particularly within resource-restricted environments (such as rural communities). Most rural healthcare institutions have limited or non-existent access to electronic patient healthcare records. This study explored the accessibility of personal healthcare records by patients and healthcare professionals within a rural community hospital in the Eastern Cape Province of South Africa. The case study was conducted at the St. Barnabas Hospital with the support and permission from the Faculty of Informatics and Design, Cape Peninsula University of Technology and the Eastern Cape Department of Health. Semi-structured interviews, observations, and interactive co-design sessions and focus groups served as the main data collection methods used to determine the accessibility of personal healthcare records by the relevant stakeholders. The data was qualitatively interpreted using thematic analysis. The study highlighted the various challenges experienced by healthcare professionals and patients, including time-consuming manual processes, lack of infrastructure, illegible hand-written records, missing records and illiteracy. A number of recommendations for improved access to personal healthcare records are discussed. The significance of the study articulates the imperative need for seamless and secure access to personal healthcare records, not only within rural areas but within all communities.
Suárez, Gonzalo Sara. "Big data, poder y libertad. Sobre el impacto social y político de la vigilancia masiva." Doctoral thesis, Universitat Pompeu Fabra, 2019. http://hdl.handle.net/10803/668235.
Full textThis doctoral thesis reflects on the social and political impact of big data exploitation at the European level. The research fulfils two main objectives. Firstly, it defines the general context in which this exploitation is embedded, through the analysis of five factors: a) the logic of big data generation, gathering and processing; b) the business model of digital services corporations; c) the dominant media discourse on big data technologies; d) the social reactions and forms of resistance to this new scenario; and e) the European regulation on personal data protection, including its conceptual foundations. Secondly, it discusses to what extent these five factors favour or hinder privacy, freedom and control over data, from the lens of critical theory of capitalism, republican philosophy, feminist political theory and framing theory. The study consists of five publications: 1. La conversación sobre big data en Twitter. Una primera aproximación al análisis del discurso dominante. 2. Tay is you. The attribution of responsibility in the algorithmic culture. 3. Big social data: límites del modelo notice and choice para la protección de la privacidad. 4. Your likes, your vote? Big personal data exploitation and media manipulation in the US presidential election campaign of Donald Trump in 2016. 5. Personal data are political. A feminist view on privacy and personal data protection. This report contextualizes, organizes and connects the main contributions of these papers.
Aquesta tesi doctoral reflexiona sobre l'impacte social i polític de l'explotació de dades massives a escala europea. Compleix dos objectius principals. En primer lloc, defineix el context general en el qual es produeix aquesta explotació, a través de l'anàlisi de cinc factors: a) la lògica de generació, recopilació i processament de les dades massives; b) el model de negoci de les grans corporacions de serveis digitals; c) el discurs mediàtic dominant al voltant de les tecnologies big data; d) les reaccions socials i formes de resistència davant d’aquest nou escenari; i e) el reglament europeu de protecció de dades personals, incloent-hi la seva fonamentació conceptual. En segon lloc, discuteix en quina mesura aquests cinc factors afavoreixen o obstaculitzen la privacitat, la llibertat i el control sobre les dades, des d'una perspectiva fonamentada en la teoria crítica del capitalisme, la filosofia republicana, la teoria política feminista i la teoria del framing. La recerca es composa de cinc publicacions: 1. La conversación sobre big data en Twitter. Una primera aproximación al análisis del discurso dominante. 2. Tay is you. The attribution of responsibility in the algorithmic culture. 3. Big social data: límites del modelo notice and choice para la protección de la privacidad. 4. Your likes, your vote? Big personal data exploitation and media manipulation in the US presidential election campaign of Donald Trump in 2016. 5. Personal data are political. A feminist view on privacy and personal data protection. Aquesta memòria contextualitza, organitza i relaciona les aportacions principals d'aquests articles.
ROSSI, NICOLO'. "IL POTERE DI CONTROLLO DEL DATORE DI LAVORO TRA ESIGENZE DELL'IMPRESA E TUTELA DELLA DIGNITA' E DELLA RISERVATEZZA DEI LAVORATORI." Doctoral thesis, Università Cattolica del Sacro Cuore, 2019. http://hdl.handle.net/10280/59517.
Full textThe power to control the activity of workers has always been an ineradicable manifestation of the employer’s legal position. To the extent that it is necessary for the correct performance of the contract, the subjection of the worker to the employer control is an essential element of the relationship referred to in Article 2094 of the Italian Civil Code and plays a crucial role in the definition of subordination. For this reason, an accurate recognition of the legal limits on the entrepreneur’s controls is important to avoid the risk that the employment relationship becomes an occasion for conditioning workers’ freedom in a way that is incompatible with the principles of a democratic society. Based on these considerations, the study analyzes the regulatory framework on the employer’s power to control workers, focusing mostly on the rules laid down by Legge no. 300/1970 (Statuto dei lavoratori) and on the recent Personal Data Protection Regulation. The reflection, which is organized around four chapters, is carried out with an eye on both traditional problems related to this topic and new challenges raised by technological innovation.
Jancey, Jonine Maree. "Development and evaluation of a physical activity intervention for older adults." Curtin University of Technology, School of Public Health, 2007. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=18659.
Full textThe study attracted a greater proportion of ‘obese’ older adults (27%) relative to state averages. 2. Over the intervention period there was a significant increase in participants’ total physical activity of 2.25 hours per week (p >.001). The General Estimating Equation analysis confirmed significant increase in physical activity from baseline to midpoint (p=.002) and to post intervention (p=.0031). Perceptions of financial struggle (p=.020) were positively correlated with physical activity time spent by participants, whereas having friends or acquaintances living nearby (p=.037) had a significant negative correlation with physical activity time. 3. At the end of the intervention, 32% of the intervention group and 25% of the control group had dropped out, resulting in an overall drop out rate of 28%. Most of the attrition occurred in the first 3 months (77%). Characteristics of individuals lost to attrition (n=86, 35%) were compared with program completers (n=162, 65%). Logistic regression analysis showed that those lost to attrition came from areas of lower socio-economic status, were overweight, were less physically active, and had a lower walking self-efficacy score and a higher loneliness score. The results suggest that to improve retention and to avoid potential bias, early assessment of these characteristics should be undertaken to identify individuals at risk of attrition. 4. Based on the finding of this research, future intervention studies should consider: the role of tertiary students as a skilled resource; the use of volunteers to contain costs; the importance of a tailored program; the appropriateness of walking as a form of physical activity for this age group; the enjoyment associated with a walking group; and the usefulness of social support.
This practical program is potentially effective and sustainable for mobilizing physically inactive older people. 5. Qualitative research highlighted the need for older adults to receive more specific information on: the benefits of physical activity; the role of pain management in physical activity; and the concept that involvement in physical activity in younger years leads to involvement when older. The older adults also expressed a desire to engage in less age appropriate activities. These results suggest that the intervention was successful in recruiting older adults into and retaining them in the intervention, documenting a need for early identification of individuals at risk of attrition. The program significantly increased the participants’ weekly mean time for physical activity and identified factors that affect their commitment to physical activity programs. This program was practical and could be used as a model for physical activity programs aimed at older adults.
Chini, Foroushan Amir Hossein. "Protecting Location-Data Against Inference Attacks Using Pre-Defined Personas." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66792.
Full textHayes, Jared, and n/a. "Reducing the impact of decision complexity in ambulance command and control." University of Otago. Department of Information Science, 2008. http://adt.otago.ac.nz./public/adt-NZDU20080404.160620.
Full textCodron, Clemence. "La surveillance diffuse : entre Droit et Norme." Thesis, Lille 2, 2018. http://www.theses.fr/2018LIL2D002/document.
Full textThe purpose of this research is to understand how diffuse surveillance fits into the evolution of legal concepts of privacy and personal data. Contrary to the abundant literature on the subject of surveillance, it is not a questionhere of highlighting the need to find a balance between surveillance in its security dimension and the protection of privacy and data, as a fundamental freedom recognized by French and European institutions. This search for a balance between security and freedom must necessarily be overcome to understand the phenomenon of diffuse surveillance. Surveillance is no longer just a search for information about a potentially dangerous individual. Rather, it is a continuation of what Hannah Arendt calls the « crisis of culture ». Diffuse surveillance is even oneof the features of contemporary culture dominated by fear, consumption and alienation by technology. Having become the new accepted social norm, the diffuse surveillance deinstitutes the right of the personal data and the protection of the private life. Gradually, it also deinstitutes the Law to profit from the economic liberalism that it carries within it
Cerda, Silva Alberto. "La Autoridad de Control en la Legislación sobre Protección frente al Tratamiento de Datos Personales." Tesis, Universidad de Chile, 2003. http://www.repositorio.uchile.cl/handle/2250/106762.
Full textSANTOS, JULIANA GRACIELA DOS. "ANTECEDENTES DOS BENEFÍCIOS PERCEBIDOS DE COMPLIANCE ÀS POLÍTICAS DE PROTEÇÃO DE DADOS PESSOAIS NAS ORGANIZAÇÕES." Universidade Metodista de Sao Paulo, 2016. http://tede.metodista.br/jspui/handle/tede/1612.
Full textMade available in DSpace on 2017-01-27T14:19:22Z (GMT). No. of bitstreams: 1 JulianaG.Santos.pdf: 965373 bytes, checksum: e9ac2dac85934fdcd07c615473464973 (MD5) Previous issue date: 2016-11-23
Personal data protect procedures are organizational tools that properly used by the employee help in the prevention and personal data protect within a safety and transparency organizational limit. This study analyzed the factors that have influenced the perception of the employees of Brazilian organizations about perceived benefits of compliance on the policies established in the prevention and protection of personal data. The research was conducted through a quantitative research approach with analysis of structural equations and the study data were collected through a survey tool to obtain a valid sample of 220 respondents. The study concluded that trust in organization and the risk of loss of personal data are stimulus that positive influence the benefits perceived of the compliance. The results also show that the employees who had your data improperly used, reduces your credibility in organizational controls and increases their perceived risk of privacy loss. The result of the study can help organizations managers to achieve greater adherence of employees with regard to personal data protection policy of organization in which they work, in addition to demonstrate the importance of credibility in internal controls and trust in the organization as predictors of perceived benefits of compliance.
Políticas de proteção de dados pessoais são ferramentas organizacionais que, se usadas de maneira adequada pelos colaboradores auxiliam na prevenção e proteção dos dados pessoais dentro de um limite de segurança e transparência organizacional. Este estudo objetiva analisar os fatores que influenciam a percepção dos empregados de organizações brasileiras quanto aos benefícios percebidos de compliance sobre as políticas estabelecidas na prevenção e proteção dos dados pessoais. A pesquisa foi conduzida através de uma abordagem de investigação quantitativa, com análise por equações estruturais e os dados do estudo foram coletados por meio de um instrumento de pesquisa com obtenção de uma amostra válida de 220 respondentes. O estudo concluiu que a Confiança na organização e a Percepção do risco de perda dos dados pessoais são estímulos que influenciam positivamente os benefícios percebidos de compliance. Os resultados também evidenciam que o empregado que teve seus dados utilizados de forma indevida reduz a sua credibilidade nos controles organizacionais e aumenta a sua Percepção do risco de perda de privacidade. O resultado do estudo pode auxiliar gestores de organizações a obter maior aderência dos empregados quanto às políticas de proteção de dados pessoais da organização em que trabalham, além de demonstrar a importância da credibilidade nos controles internos e a confiança na organização como preditores dos benefícios percebidos de compliance.
Franceschini, Davide. "Panoramica sull'utilizzo etico dei Big Data." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13809/.
Full textArauco, Villar José Alfonso. "Desarrollo de un Data Warehouse para la integración de la información de las personas con discapacidad y el apoyo en la gestión, aplicado al CONADIS-Perú." Bachelor's thesis, Universidad Nacional Mayor de San Marcos, 2015. https://hdl.handle.net/20.500.12672/8843.
Full textMuestra el desarrollo de un Data Warehouse y su debida explotación, para el tratamiento de la información de las personas con discapacidad del Perú, a través de la integración de los datos relacionados a los procesos principales en el tema de la discapacidad de las personas; datos e información que es manejada por el Consejo Nacional para la integración de las Personas con Discapacidad (CONADIS), institución responsable de los temas relacionados a la problemática de la discapacidad en el Perú.
Tesis
Bardou, Sophie. "Les traitements de données biométriques en entreprise." Thesis, Montpellier 1, 2010. http://www.theses.fr/2010MON10031/document.
Full textBiometry brings together computing techniques that enable the identification of individuals on the basis of their biological, physical appearance and/or behavioral characteristics. Although firstly reserved for the legal system/judiciary domain, biometry tends to be generalized in all spheres of people life. Recently, biometry has also been used in companies who are always receptive to new technologies. Thus, the introduction of identifying devices such as these into a company life has to be the subject of corporate discussions between the managing teams and staff representatives. Indeed, such technologies are often compared to video surveillance, RFID chips, GPS data … and they can lead to the spying of employees if their uses are not well supervised. In the absence of specific laws, the legislator has given the CNIL the abilities to establish the requirements of eligibility of this technology usage within the companies. The "liberty and computing" legislation is then combined with the labor laws in order to apply common principles such as the finality, the proportionality, the loyalty, the transparency of information and employee consents
Keller, Jonathan. "La notion d'auteur dans le monde des logiciels." Thesis, Paris 10, 2017. http://www.theses.fr/2017PA100195/document.
Full textThe world of software shall be constraint widely as could testified the computer tool in our modern society. This research tries to emphasize that the protection of the software is more an opportunistic choice than a reasoned one. That opportunism was seen through the delegation of the rulemaking of the juridical regime of the software to the economic actors. Until very recently, the conjugation of the copyright and ordinary law of contracts which increased the exclusivity of the stakeholder over the code, through the copyright, and an immunity over the poor quality over the same code through the contract law. Such policy generated a dissenting movement against the IP rights, an increasing of the risks on the consumers and a perverted protection because the disclosure of the work by its authors is supposed to be done when the author judges it ready. This legal laissez-faire is also found in the computerized data, informations, where the absence of protection by itself was subject to debates between programmers (liberals) and lawyers (conservative). Or our research is pleading for the establishment of a digital patrimony as the latest laws and cases laws are developing. However the digital patrimony is easily copied and not exclusive by nature, police and intelligence committees can cease it easily than before, thanks to the help of service providers. Such patrimony also helps to the building of an intrusive panopticon
Sedlmajer, Kamil. "Uživatelské rozhraní pro řízení dronu s využitím rozšířené virtuality." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399711.
Full textEtien-Gnoan, N'Da Brigitte. "L'encadrement juridique de la gestion électronique des données médicales." Thesis, Lille 2, 2014. http://www.theses.fr/2014LIL20022/document.
Full textThe electronic management of medical data is as much in the simple automated processing of personal data in the sharing and exchange of health data . Its legal framework is provided both by the common rules to the automated processing of all personal data and those specific to the processing of medical data . This management , even if it is a source of economy, creates protection issues of privacy which the French government tries to cope by creating one of the best legal framework in the world in this field. However , major projects such as the personal health record still waiting to be made and the right to health is seen ahead and lead by technological advances . The development of e-health disrupts relationships within one dialogue between the caregiver and the patient . The extension of the rights of patients , sharing responsibility , increasing the number of players , the shared medical confidentiality pose new challenges with which we must now count. Another crucial question is posed by the lack of harmonization of legislation increasing the risks in cross-border sharing of medical
Lowther, Dwain Eldred. "Customer relationship management: A financial perspective." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2694.
Full textChemlali, Laroussi. "Protection du consommateur et commerce électronique : droit français, européen et tunisien." Thesis, Paris Est, 2011. http://www.theses.fr/2011PEST0049.
Full textB to C e-commerce is increasingly gaining popularity. The number of its followers has seen a drastic surge throughout the few recent years. Its advantages in terms of speed, convenience and proximity are not any more questionable by consumers. Nevertheless, the characteristic of this medium used to carry out online transactions as well as the specificities of the electronic environment - in particular the immateriality, the interactivity and internationality - influence considerably cyber-consumers confidence. Simultaneously, they increase their vulnerability. Thus, the need for an appropriate legal framework to regulate the rise of B to C e-commerce and protect cyber-consumers. Taking into account these requirement, community, French and Tunisian legislators set up a number of measures to reassure the latter and allow them to engage confidently in online commerce transactions. These measures have two targets: some of them were intended to grant cyber-consumers an intrinsic protection in the process of the online transaction. This protection is set to be an upstream transaction protection at the pre-contractual phase as well as during the contractual period; i.e. at the level of on line transaction finalization and execution. The others aim to guarantee the consumer an extrinsic protection throughout the process of e-commerce transaction. In this respect, two aspects are taken into account, namely: personal data processed during transactions and the aspects of private international law of cyber-consumer protection
Olech, Valérie. "Le secret médical et les technologies de l’information et de la communication." Thesis, Université de Lorraine, 2019. http://docnum.univ-lorraine.fr/ulprive/DDOC_T_2019_0343_OLECH.pdf.
Full textIs there something to add about “medical secrecy”? Scholar disputes over the professional secrecy foundations are supposed to be dried up, since it is now limited to the patient’s interest alone, which would explain the generalization of medical secrecy to all persons of the care system. Yet, when it comes to the matter of the relationship between information and communications technologies and medical secrecy, the scholar discourse suffer from a lake of clarity. What is the impact of the information and communications technologies on the “medical secrecy”? It is a question worth asking by exploring different analytical frameworks from those traditionally employed. The latter is about studying the structural movement according to which the medical secrecy is at the same time “protected” by Law in face of information and communications technologies and “affected” in Law and by the technologies
Dari, Bekara Kheira. "Protection des données personnelles côté utilisateur dans le e-commerce." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00923175.
Full textKoumpli, Christina. "Les données personnelles sensibles : contribution à l'évolution du droit fondamental à la protection des données personnelles : étude comparée : Union Européenne, Allemagne, France, Grèce, Royaume-Uni." Thesis, Paris 1, 2019. http://www.theses.fr/2019PA01D003.
Full textBefore the GDPR, protection of sensitive personal data consisted of a prior check by an independent authority despite limiting their free movement. This has been replaced by the obligation of the controller to prepare a privacy impact assessment. With this modification, one can assume a risk of pre-legitimization of data processing, putting the controller at an advantage. Is that compatible with the fundamental right to the protectionof personal data ? This thesis questions the content of this right and the validity of the GDPR. It is based on a comparative study from 1970s until present day between four European countries and the European Union, in which sensitive data are chosen as a meanto the analysis due to their particular protection. Research shows that in legal termsthe preventive conception is a part of the history of protection in the European Union. By limiting freedom of processing it gives meaning to protection and its only subject,the individual. Such an interpretation is compatible with National Constitutions despite their variations. However, the preventive conception of data protection is not so easily compatible with article 8 of the European Charter of Fundamental Rights. The thesis puts forward that this article contains the safeguard of a balancing, between EU liberties and individuals’ freedoms, which implicates reduced protection. It is up to the European Court of Justice to identify the essence of this right, an aim to which this thesis could contribute
Righi, Silvia. "La lutte contre la criminalité et la sauvegarde des droits et des libertés fondamentales dans l'Union européenne." Thesis, Strasbourg, 2014. http://www.theses.fr/2014STRAA013.
Full textThe research aims to verify whether and how, at the EU level, the fight against crime (particularly organized crime) is perpetuated in full respect of fundamental rights and freedoms, and whether cooperation among Member States in this field can promote high and homogeneous standards of protection.The historical reluctance of Member States to give the relative competences to the Union has strongly obstructed the development of an equilibrated “area of freedom, security and justice”. However, the Lisbon Treaty has provided important tools. After firstly presenting security in the EU, I discuss judicial cooperation in criminal matters. Both the rich normative production aimed at repression, and the more recently adopted measures finalized at guarantying and promoting individual rights are analyzed. Then, I pass to police cooperation and EU financial / patrimonial intervention, together with the right to protection of personal data and the right to property - the two most at stake
Drozd, Olha, Rigo Wenning, and Sabrina Kirrane. "Enabling Personal Data Processing Control via Dynamic Consent." 2018. http://epub.wu.ac.at/6494/1/Drozd%2D2018%2DOPERANDI.pdf.
Full textOberholzer, Hendrik Johannes. "A privacy protection model to support personal privacy in relational databases." Thesis, 2008. http://hdl.handle.net/10210/507.
Full textProf. M.S. Olivier
Slavíček, Daniel. "Dohled a etika." Doctoral thesis, 2012. http://www.nusl.cz/ntk/nusl-308471.
Full textZamastilová, Lucie. "Elektronický dohled v oblasti současného marketingu a spotřeby a využívaných strategií." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-388828.
Full textSepúlveda, João. "Implementação de um filtro activo de potência para optimização da interface entre a rede e outros sistemas eléctricos : estudo e desenvolvimento de filtros activos de potência do tipo série com sistema de controlo implementado em computador pessoal." Doctoral thesis, 2004. http://hdl.handle.net/1822/835.
Full textThe intensive use of power converters and other non-linear loads, such as electronic equipments and discharge lamps, in industry and by consumers in general, is responsible for an increase in the deterioration of the power systems current and voltage waveforms. The presence of harmonics in the power lines results in greater power losses in the distribution system, interference problems in communication systems, faulty operation of protection devices, and sometimes, in operation failures of electronic equipments, which are more and more sensitive since they include microelectronic control systems, which work with very low energy levels. In the long run the effects are, basically, overheating and premature aging of electric devices and mechanical fatigue of electrical machines. Passive filters can be used to compensate some power quality problems, but they only solve the problems for the frequencies they were tuned for. Besides, their operation cannot be limited to a certain zone, and resonances cannot be fully prevented. Active power filters are power electronic devices which do not have the disadvantages of passive filters and are able to compensate some voltage and current related problems, namely: short outages, current or voltage distortion due to harmonics, current or voltage unbalance in three-phase systems, flicker (subharmonics), momentary overvoltages or undervoltages, and they can also correct power factor. There are basically two types of active filters: the shunt active filter, to filter line currents; and the series active filter, to filter mains voltages. The control algorithms based on the p-q theory may be easily and efficiently used for controlling active filters. The calculations are done in the time domain, with instantaneous values of voltages and currents, and are relatively simple. If the voltages are being compensated with a series active filter, it is also possible to efficiently use a classical control approach (for example, proportional + integral control), because the reference signals are known. The main objective of this thesis was to study, simulate, develop, and test a series active filter with a control system implemented in a personal computer (PC), using a standard multifunction data acquisition PCI bus card. This option is justified by its relative low cost, high processing capability, versatility, and because of the numerous possibilities offered by such a computer-based system. The control of a series active filter is a type of application which requires a fast controller, which does not lose samples, and where all the maximum allowed deadlines must be met each and every time. These characteristics imply that this application needs a hard real-time control system. A PC implemented controller presents some difficulties. The main problems are related to the standard multitasking operating systems, and can only be solved by very skilled programmers. Another problem is the slow data input/output system. These boards are connected to the PCI bus and do not take advantage of the full processor speed. They are usually designed to acquire data for monitoring purposes or process control. Thus, they are very limited when performing hard real-time control, and besides, hardware manufacturers do not provide low cost solutions to perform PC based hard real-time control, yet. Usually, it is necessary to synchronize the active power filters with the mains distorted electric signals. Simple circuits like zero crossing detectors may easily fail in performing this task, so it is necessary to use more robust circuits. Two possible solutions are discussed here: the Phase Locked Loop and the Vector Adaptative Filter. In this thesis, simulated and experimental results of the developed controllers and active power filters are also presented. Furthermore, a comparison with a microcontroller based implementation is made.
PRODEP
Marques, Hugo André Alves Vieira. "Os deveres de controlo do empregador em matéria de tempo de trabalho." Master's thesis, 2020. http://hdl.handle.net/10400.14/31663.
Full textThe advent of flexibility instruments of working time increased the unpredictability of the workday and the consequent intensification of the need to control it in a clear and precise way. This control ensures compliance with the rules of duration and organization of working time and is indirectly linked to several basic principles of Labor Law, especially the principle of conciliation between professional life and family and personal life and the principle of safety and health at work. In addition, this control promotes the efficiency of inspective interventions and provides the worker with a reliable means of proof. In the first instance, it is on the employer, as an essential part of the employment relationship, that reflect the duties of controlling the working time of its workers, which can be carried out through three different modalities. Regarding the control of the working schedule, the employer must prepare a work schedule map which has to be posted in a visible location within the respective workplace. The control of the workday, by itself, is done through the registration of working hours, the modality that has triggered the most quarrels in recent times. Finally, it is through overtime record that the legal overtime limits and grounds are monitored. These control mechanisms constitute personal data of the worker, which imposes special cares in its creation and maintenance.
Dbouba, Selsabil. "Caractérisation et étude de l’impact des permissions dans les applications mobiles." Thèse, 2017. http://hdl.handle.net/1866/20844.
Full textLouw, Candice. "Modeling personally identifiable information leakage that occurs through the use of online social networks." Thesis, 2015. http://hdl.handle.net/10210/13846.
Full textWith the phenomenal growth of the Online Social Network (OSN) industry in the past few years, users have resorted to storing vast amounts of personal information on these sites. The information stored on these sites is often readily accessible from anywhere in the world and not always protected by adequate security settings. As a result, user information can make its way, unintentionally, into the hands of not only other online users, but also online abusers. Online abusers, better known as cyber criminals, exploit user information to commit acts of identity theft, Advanced Persistent Threats (APTs) and password recovery, to mention only a few. As OSN users are incapable of visualising the process of access to their OSN information, they may choose to never adjust their security settings. This can become synonymous with ultimately setting themselves up to becoming a victim of cyber crime. In this dissertation we aim to address this problem by proposing a prototype system, the Information Deduction Model (IDM) that can visualise and simulate the process of accessing information on an OSN profile. By visually explaining concepts such as information access, deduction and leakage, we aim to provide users with a tool that will enable them to make more informed choices about the security settings on their OSN profiles thereby setting themselves up for a pleasant online experience.
Simões, Maria Inês Almeida de Sousa. "O regime sancionatório da proteção de dados pessoais: paradigma ou paradoxo?" Master's thesis, 2019. http://hdl.handle.net/1822/64010.
Full textO presente estudo tem a intenção de repensar o conceito de proteção de dados e as sanções aplicáveis à sua violação num mundo complexo caracterizado por avanços tecnológicos e alterações legislativas. A fim de compreender se a nossa «era digital» pode ser a razão para criar outros conceitos e viver sob diferentes princípios, é crucial estar ciente do quadro internacional, europeu e nacional em matéria de proteção de dados pessoais. Com o propósito de demonstrar as diversas questões emergentes da legislação aplicável em matéria de proteção de dados pessoais, este estudo culmina com a apresentação de um «novo» direito, já reconhecido pela jurisprudência europeia e constitucionalmente consagrado no art. 35.º da C.R.P., e com uma análise do regime sancionatório a que está sujeita a sua violação. Esta «nova» dimensão da intervenção contraordenacional e penal, em matéria de proteção de dados, traz novos (ou, talvez, não tão novos) problemas de delimitação entre o direito de mera ordenação social e o direito penal após a entrada em vigor do Regulamento Geral sobre a Proteção de Dados no ordenamento jurídico português. Até que ponto o Regulamento Geral altera os quadros constitucionais da ordem jurídica nacional portuguesa, ou até esvazia o próprio direito sancionatório vigente? Será a Proposta de Lei de Proteção de Dados Pessoais, em discussão parlamentar, o melhor meio de execução do Regulamento Geral na ordem jurídica portuguesa? O presente estudo analisa as questões inerentes a esta interpelação, posicionando-se criticamente sobre as contraordenações e os crimes previstos, em matéria de proteção de dados, na legislação em vigor e em discussão parlamentar. A questão central subjacente é efetivamente o confronto do direito de mera ordenação social vigente e do direito penal clássico com uma espécie de ordem preventiva infra-criminalizadora, resultante da inflação legislativa em matéria de proteção de dados pessoais.
The current study has the intent of rethinking the concept of data protection and the sanctions applicable to its violation in a complex world characterized by technological advances and legal changes. In order to understand if our «digital era» can be the reason to craft new concepts and to live under different principles it is crucial to be aware of the international, European and national personal data protection framework. In order to demonstrate the various issues arising from the personal data protection legislation, this study culminates in the presentation of a «new» right, already recognized in European case law and constitutionally enshrined in art. 35.º of C.R.P., and in the analysis of the sanctioning framework to which it is subject its violation. This «new» dimension of administrative and criminal intervention, concerning data protection, brings new (or, perhaps, not so new) problems of delimitation between the law of mere social order and criminal law after the entry into force in the Portuguese legal order of the General Regulation on Data Protection. To what extent does the General Regulation change the constitutional frameworks of the Portuguese national legal order, or even extinguishes the sanctioning right in force itself? Is Proposed Legislative Amendment on Personal Data Protection, in parliamentary discussion, the best way to execute the General Regulation in the Portuguese legal order? The present study analyzes the issues inherent to this interpellation, positioning itself critically about misconductions and crimes regarding data protection, in the legislation in force and in parliamentary discussion. The underlying central question is effectively the confrontation of the law of mere social order in force and the traditional criminal law with a sort of undercriminalizing social preventive order, resulting from legislative inflation in terms of personal data protection.
Ferreira, Manuel Alexandre Lopes Gomes. "O regulamento geral sobre a protecção de dados." Master's thesis, 2018. http://hdl.handle.net/10362/54953.
Full textO Regulamento (EU) 2016/679, sobre a protecção dos dados das pessoas singulares, será directamente aplicável, em todos os estados Membros da União, a partir do dia 25 de Maio de 2018. Nos últimos tempos, tem sido um dos documentos jurídicos mais referidos e discutidos, nem sempre da forma mais adequada. O presente trabalho tem como objectivo analisar aspectos fundamentais do referido regulamento tentando contribuir para recentrar o debate, enfatizando as principais alterações do novo regime jurídico sobre a protecção de dados. Assim, considera-se de primordial importância, identificar e avaliar o impacto que o novo paradigma regulatório introduz na governança das organizações dos sectores público e privado. Um conjunto de obrigações novas, que densificam o quadro legal existente, terá que responder aos direitos dos titulares dos dados. As organizações terão que desenhar um sistema interno, com procedimentos e medidas técnicas e organizativas, capaz de demonstrar e de garantir a conformidade com o regulamento europeu. A nova arquitectura política e organizativa, das entidades públicas e das empresas privadas, terá que ter por base os dois princípios fundamentais que o regulamento coloca no centro das operações de tratamento dos dados pessoais e que são os princípios da finalidade e da necessidade.Garantido o respeito por estes princípios, existem duas condições essenciais de legitimidade para proceder-se ao tratamento lícito dos dados pessoais que são o consentimento do titular e a existência de enquadramento legal obrigatório. Como garantia da implementação e da manutenção de uma política e de um sistema de gestão de protecção de dados, aplicando as melhores práticas organizativas, o regulamento criou a figura do Encarregado de Protecção de Dados. Não sendo de designação obrigatória, o regulamento vê, nesta figura, um “provedor” que garante a continuidade da conformidade demonstrável, em ligação com os titulares dos dados e a Autoridade de Controlo nacional.
Park, Seong Cheol. "Indianapolis emergency medical service and the Indiana Network for Patient Care : evaluating the patient match process." Thesis, 2014. http://hdl.handle.net/1805/3808.
Full textIn 2009, Indianapolis Emergency Medical Service (I-EMS, formerly Wishard Ambulance Service) launched an electronic medical record system within their ambulances and started to exchange patient data with the Indiana Network for Patient Care (INPC). This unique system allows EMS personnel in an ambulance to get important medical information prior to the patient’s arrival to the accepting hospital from incident scene. In this retrospective cohort study, we found EMS personnel made 3,021 patient data requests (14%) of 21,215 EMS transports during a one-year period, with a “success” match rate of 46%, and a match “failure” rate of 17%. The three major factors for causing match “failure” were (1) ZIP code 55%, (2) Patient Name 22%, and (3) Birth Date 12%. This study shows that the ZIP code is not a robust identifier in the patient identification process and Non-ZIP code identifiers may be a better choice due to inaccuracies and changes of the ZIP code in a patient’s record.