Dissertations / Theses on the topic 'Secret service and espionage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 47 dissertations / theses for your research on the topic 'Secret service and espionage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ritchey, David (David Benjamin. "George Washington's Development as an Espionage Chief." Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc500803/.
Full textBlistène, Pauline. "Voir et faire voir le secret de l'État : fonctions et enjeux de la fiction d’espionnage contemporaine." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01H219.
Full textWhat is the political, moral and philosophical value of “spy fiction”? This dissertation examines this question using an innovative methodology that combines an analysis of contemporary television series (Homeland, Le Bureau des Légendes) and interviews with intelligence practitioners (CIA, DGSE) along with entertainment professionals (showrunners, screenwriters). My thesis is that there is a change in the ontological and epistemic status of spy films and TV series due to the involvement of real spies in their creation. The political and philosophical importance of spy fiction manifests itself in the impact of spy fiction on the political and social reality: the “realism” of spy fiction that I define here departs from common conceptions of correspondence to reality and replaces it with an approach that locates agency at the heart of the analysis. This approach does not stipulate the blurring of fact and fiction, but instead reaffirms its importance as a hypothesis for the production and reception of cultural artifacts. In a context where the demand for information concerning clandestine activities of the state keeps growing, the interactions between intelligence and entertainment professionals allow the former to stage their own disclosure without revealing their real activities. Far from contributing to the abolition of the frontier of secrecy, such practices contribute to its displacement, thus allowing a renewal of secrecy under the appearance of transparency. State secrets are never revealed but only signified
Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)." Thesis, Paris 4, 2010. http://www.theses.fr/2010PA040174.
Full textThis work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
Le, Voguer Gildas. "Secret et démocratie dans l'Amérique de l'après-guerre : le contrôle parlementaire de l'activité des services de renseignement, 1947-1987." Orléans, 1992. http://www.theses.fr/1995ORLE1012.
Full textGenêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)." Electronic Thesis or Diss., Paris 4, 2010. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2010PA040174.pdf.
Full textThis work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
Gleghorn, Todd E. "Exposing the seams : the impetus for reforming U.S. counterintelligence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FGleghorn.pdf.
Full textThesis advisor(s): David C. Tucker, James Russell. Includes bibliographical references (p. 87-91). Also available online.
Davies, Philip H. J. "Organisational development of Britain's Secret Intelligence Service 1909-1979." Thesis, University of Reading, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363245.
Full textPARIS, XAVIER-LOUIS. "Le secret medical dans le service de sante de l'armee." Nantes, 1991. http://www.theses.fr/1991NANT030M.
Full textHarlow, Richard. "Two missions, one secret service : the value of the investigative mission." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5587.
Full textApproved for public release; distribution is unlimited
The dual missions of the United States Secret Service, investigations and protection, appear to be without relationship or value to the other, and as a result, support and attention for the investigative mission has waned. This lack of attention to investigations is dangerous for the Secret Service and for the country it serves. To make this argument, this thesis attempts to determine whether the investigative mission is actually important to the successful performance of its protective mission. Through the use of a hybrid research methodology, with quantitative and qualitative aspects, this thesis argues that the types of investigations performed by the Secret Service are not as important as the experiential learning, respite from the hyper-vigilance of protection, and surge capacity provided by the investigative mission. Since the investigative mission supports the protective mission in these three important ways, the Secret Service requires a robust, well-funded and substantial investigative mission to continue to properly provide protection to this nation's leaders.
Newswander, Chad B. "Agency of Crisis: The Chaos and Reordering of Presidential Security." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/31879.
Full textMaster of Arts
Breton-Rahali, Céline. "Le secret professionnel et l’action médico-sociale." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0355.
Full textProfessional confidentiality, understood as the obligation not to reveal certain information, is the subject of a number of exceptions. Its study within the particular context of specialised institutions reveals a number of issues. First, professionals working together from different disciplines are each subject to a different patchwork of applicable standards. As a result, it is necessary to clarify these rules, both within the interests of professionals and health-care users. Second, the effectiveness of patient care requires coordination between different professionals based upon shared confidentiality within the same department or health-care centre. Collaboration between professionals is an issue not only affecting the quality of care but also one of economics which allows for the effective management of the supply of health and social care within a given area. As a major challenge of public health policy, such coordination provokes a consideration of the adaptation of the existing legal framework and that of the organisation of the means of sharing confidential patient information within the health care system as a whole for both medical and social care services. This thesis makes a proposal for the necessary amendments to the current legislative framework for derogating from the general principle of confidentiality to allow for an exchange of information between professionals involved in the care of a patient. The evolution of shared confidentiality for the benefit of the patient requires an emphasis upon determining the most highly protective regime for patients without compromising the reality – and constraints – of providing effective health care
Timén, William. "The logistical secret : Supply Chain Management in the Dominican Republic." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-19919.
Full textMFS study financed by the Swedish International Development cooperation Agency, SIDA
Hugon, Alain. "Au service du roi catholique : honorables ambassadeurs et divins espions : représentation diplomatique et service secret dans les relations hispano-françaises de 1598 à 1635 /." Madrid : Casa de Velázquez, 2004. http://catalogue.bnf.fr/ark:/12148/cb39184990p.
Full textJakub, Joseph F. "Spies and saboteurs : Anglo-American collaboration and rivalry in human intelligence collection and special operations, 1940-1945." Thesis, University of Oxford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.670255.
Full textHugon, Alain. "Au service du roi catholique : "honorables ambassadeurs" et "divins espions" face a la france. representation diplomatique et service secret dans les relations hispano-francaises de 1598 a 1635." Caen, 1996. http://www.theses.fr/1996CAEN1206.
Full textThe foundations of the contemporary diplomacy originated in the break up of religion in the xvith century. The slow emergence of the kingdoms during the middle ages and the confrontations amongst the different levels of sovereignty during the renaissance introduced the power of the princes and their representation alongside the different monarchs. During a time of peace (1598-1635), the establishment of bilateral relations between the french and the spanish crowns authorized the study of diplomacy and the settlement of contentious born during the wars of religion. Trying to understand the structures of these relations by the analyses, linearily and informatically, from the spanish diplomatic documents, these investigations point to the limits of political action whose elements are covered by the treaties and the peripherical conflicts of these two crowns. The period (1598-1635) brought about many changes. Can we describe spain as a "multinational" catholic monarchy (the agents would be the "bons catholiques")? does the french crown consider itself to be the conscience of the country which was built up for a century ? the spanish diplomatic practice emphasizes signs of adhesion and divergence in front of these schemes and draws evolutions. The catholic king's representation in paris underlines the original comportments of this century : ostentation, corruption, importance accorded to identify the marks of nobility. During this time, the hispanic-french relations demonstrate the importance of consensus, yet old, as shown by the practice of jus gentium (immunities, protection of the subjets). In order to penetrate the intentions of the partner, this world of pomposity finds association with the
Senegas, Frédérique. "Implications médico-légales dans le fonctionnement d'un SAMU - Centre 15." Montpellier 1, 1992. http://www.theses.fr/1992MON11075.
Full textYoung, Kirk B. "Kingdom Come." Digital Commons @ Butler University, 2017. https://digitalcommons.butler.edu/grtheses/487.
Full textFerguson, Cody J. "Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate." Thesis, Monterey, California: Naval Postgraduate School, 2012.
Find full textCyberespionage is a prolific threat that undermines the power projection capacity of the United States through reduced economic prowess and a narrowing of the technical advantage employed by the American military. International attempts to limit hostile cyber activity through the development of institutions, normative patterns of behavior, or assimilation of existing laws do not provide the American national security decision maker with a timely or effective solution to address these threats. Unfortunately, the stove-piped, redundant and inefficient nature of the U.S. counterintelligence community does not deliver a viable alternative to mitigating cyberespionage in an effective manner. Instituting a domestic and international micro-restructuring approach within the Department of Defense (DoD) addresses the need for increased effectiveness within an environment of fiscal responsibility. Domestic restructuring places emphasis on developing a forcing mechanism that compels the DoD counterintelligence services to develop joint approaches for combating cyberespionage by directly addressing the needs of the Combatant Commands. International restructuring places an emphasis on expanding cybersecurity cooperation to like-minded nations and specifically explores the opportunity and challenges for increased cyber cooperation with Taiwan. This approach recognizes that Taiwan and the United States are both negatively affected from hostile cyber activity derived from within the People’s Republic of China.
Engel, Jean. "Assistants de service social et éducateurs spécialisés (en Alsace) face au secret partagé avec les élus : entre conflits de territoires et conflits de valeurs." Strasbourg, 2010. https://publication-theses.unistra.fr/public/theses_doctorat/2010/ENGEL_Jean_2010.pdf.
Full textThe goal of this thesis is to understand why social workers and educators are reluctant to enforce a "shared confidentiality" policy between them and mayors as advocated by the 2007 Law of Prevention of Delinquency. Basing my research on 70 semi-directive interviews of students and social workers conducted between 2005 and 2009, l have focused on the representations and use of professional confidentiality by those two professions. First, l discuss the hypothesis that the actual use of confidentiality is closely related to processes of recognition and exclusion in keeping with their professional identity. The first part is an analysis of the way interviewees perceive their peers and the work partners with whom they are supposed to share information. L address the issue of trust and competition in their mutual dealings, without ignoring the problem of power. The second part aims at demonstrating how relevant values are in the mechanisms of justification when workers choose to share or withhold information they have collected about users of social services. L underline the relativity of collective values within that field of activity and analyse to what extent with holding information and questioning the enforcement of the Law of Prevention of Delinquency may illustrate processes which enable social workers to make sure they hold on to the values that pertain to their professional activity. With regard to the prevention of delinquency, those values may induce an ideological stance which, even thongh it impedes effective partnership working, does not necessarily mean giving up transactional processes leading to practical compromises
Jenkins, Danny R. "Winning trench warfare battlefield intelligence in the Canadian Corps, 1914-1918 /." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0018/NQ57601.pdf.
Full textZhao, Yingxue. "Redesigning sedentary office environments, guided by new ergonomics theory." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1337007749.
Full textKorn, Dörthe. "Defizite bei der Umsetzung der EMRK im deutschen Strafverfahren : V-Leute, Lockspitzel, Telefonüberwachung von Rechtsanwälten /." Berlin : Duncker & Humblot, 2005. http://www.gbv.de/dms/sbb-berlin/49795351X.pdf.
Full textNewswander, Chad B. "Presidential Security: Bodies, Bubbles, & Bunkers." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/77042.
Full textPh. D.
Herbstritt, Georg. "Bundesbürger im Dienst der DDR-Spionage : eine analytische Studie /." Göttingen : Vandenhoeck & Ruprecht, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015450137&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA.
Full textStamm, Eric. "La transmission des données personnelles de santé : analyse et proposition d'évolution. Le cas du contrôle de l'assurance maladie." Thesis, Lyon 3, 2011. http://www.theses.fr/2011LYO30045/document.
Full textMedical secrecy is moving towards a professional secrecy, which concerns numerous professions, raising the question of transmission of personnel health data.This thesis, based on practical examples taken from professional activities of practitioners advisers in the Health insurance, studies legal foundations of this transmission and develops individual rights on how to control secrecy and possibilities of transmission of data according to the respect of the rights of other people such as eligible parties and employers. The fact that a society can be more prominent than a person is contemplated in the context of health protection, justice and economic management of health spending.Evolutions of practices and legislation are suggested and aim at allowing the supervision of transmission of personal health data according to people’s rights
Ayral, Jean. "Les incidences médico-légales des interventions du SAMU 30." Montpellier 1, 1992. http://www.theses.fr/1992MON11105.
Full textLuce, Alexandra Isabella. "British intelligence in the Portuguese world, 1939-1945 : operations against German Intelligence and relations with the Polícia de Vigilância e Defesa do Estado (PVDE)." Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.608984.
Full textGuillaumin, Béatrice. "L'appareil français de renseignement : une administration ordinaire aux attributs extraordinaires." Electronic Thesis or Diss., Paris 1, 2021. https://ecm.univ-paris1.fr/nuxeo/site/esupversions/87fa596a-79d4-4f38-89d4-aca7a78356b9.
Full textSince the end of the 2000s, the integration of the intelligence apparatus into the French administrative and institutional landscape has been indisputable: legal framework for its activities, redefinition of the link maintained with the executive branch, plural control to which it is now subject, etc. While this normalisation should be verified, it will be more essential to assess its scope. At the threshold of the study, a bundle of clues can be released to corroborate the process of a substantial normalisation of the intelligence apparatus. However, it cannot disappear and merge entirely into the administrative matrix. In this hypothesis, while the normalisation process intends to erase the originalities of the intelligence apparatus, it actually generates a paradoxical movement: new originalities have been added. Thus considered, the alignment of the intelligence apparatus on the administrative model remains limited by a certain number of elements which shape an administration with a singular appearance, oscillating between normality and originality. To be convinced of this, the aim is to emphasise that the normalisation of the intelligence apparatus takes place by the conjunction of two movements in perfect synchronization. The first relates to the legal framework of the intelligence apparatus which constitutes the apanage of this normalisation. The second is triggered by the tightening of control over the intelligence apparatus, the mechanism of which appears to be the markers of this normalisation
Quiniou, Matthieu. "Le contentieux du transfert de connaissances dans les relations entre l'Union européenne et la Chine." Thesis, Paris 2, 2015. http://www.theses.fr/2015PA020049.
Full textFacing the evolution of international trade and the development of intellectual proper ty trade between companies from different backgrounds, contractual model readjustments and a reordering of dispute resolution systems seems unavoidable. The unsettled legal status of secret knowledge in China and in the EU can be an obstacle to the formalization of their transfer and therefore inhibits the definition of a suitable framework for resolving disputes. Legislators and scholars are currently debating proposals of laws and directives to elaborate this concept and its regime, but only address issues liketor t and disclosure of secret information. Legal scholarship to date has mainly been focused on the voluntary transfer of knowledge and has taken intoaccount the damage caused to secrets. To meet the needs of business operators, these operations should not be limited to "know-how communication contracts” (contrats de communication de savoir - faire). The concepts of “ intellectual good” and " intellectual ownership" theoretically justifyother types of contracts, while Chinese and European laws refer to assignment and license of trade secret . These operations, often provided for in a complexs et of contracts between parties from different cultural backgrounds, can lead to a wide variety of disputes. When disputes occur, national courts do not always provide a level of protect ion of confidential information that meets parties’ expectations. Differences in procedural cultures as well as the Chinese culture of amicable dispute settlement prevent the parties from relying on national courts. The combinations between mediation and arbitration, by their procedural flexibility, can provide a suitable dispute resolution framework taking into account economic and cultural considerations. Therefore, this thesis proposes M² arb Rules that introduce a mediator-expert with a mission of securing knowledge confidentiality during the dispute resolution process
Oliveira, Nilo Dias de. "A vigilância da DOPS-SP às Forças Armadas: (Brasil - década de 1950) - sistema repressivo num Estado de natureza autocrática." Pontifícia Universidade Católica de São Paulo, 2008. https://tede2.pucsp.br/handle/handle/13099.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior
The present dissertation has as objective to analyze practical of monitoring and the repression of the Private Service of the DOPS-SP through the analysis immanent of its reports during the period of 1950 -1961, giving emphasis to the action of this agency under the Armed Forces. The infiltration of its agents in the cupola of the military who, congregated the Military Club, debated the alternatives for the national development and the entailing of this repressive system with the segments politicians subordinated to the sectors of the dependent bourgeoisies, whose monopoly of domination if saw threatened by the magnifying of the civil laws, as well as unchains a persecution and expurgations of military of the organizations considered pernicious to the continuity of the monopolista capitalism dependent, under égide of this institutionalized bourgeois autocracy. This process has the political role of "sanitation" this sector of the State whose division prevented, at that moment, the bonapartist centralization, already pushed through by such segments bourgeois since the overthrowal dictatorship varguista
A presente dissertação tem como objetivo analisar a prática de vigilância e repressão do Serviço Secreto da DOPS-SP através da análise imanente dos seus relatórios durante o período de 1950 -1961, dando ênfase à ação deste órgão sob as Forças Armadas. A infiltração de seus agentes na cúpula dos militares que, reunidos no Clube Militar, debatiam as alternativas para o desenvolvimento nacional e a vinculação deste sistema repressivo com os segmentos políticos subordinados aos setores das burguesias dependentes, cujo monopólio de dominação se via ameaçado pela ampliação dos direitos civis, desencadeia uma perseguição e expurgos de militares como também das organizações consideradas perniciosas à continuidade do capitalismo monopolista dependente, sob a égide desta autocracia burguesa institucionalizada. Este processo tem a função política de sanear este setor do Estado cuja divisão impedia, naquele momento, a centralização bonapartista, já pleiteada por tais segmentos burgueses desde a derrubada da ditadura varguista
Pascal, Alexandra. "La justice pénale et les médias : approches juridique et sociologique." Thesis, Paris 2, 2016. http://www.theses.fr/2016PA020061.
Full textIn France, the last 60 years or so have seen a sharp increase in the media profile of the criminal justice system. The explanation lies in the massive growth in media outlets (press, radio, television, internet) and in the increasing interest shown by journalists, not only in run-of-the-mill crime stories but in cases of corruption at the top of the political system. Public interest in such doings is huge, although with mostly little regard to the legal and technical complexities of the criminal law and its processes. The justice system in principle allows some media reporting by press and broadcasters, but the present-day appetite for information extends far deeper, into its more secret workings. The Law has adjusted, not without difficulty, to the realities of the communication society. In criminal proceedings, some windows have been thrown open on aspects of previously hidden processes. The judiciary, as an institution, has had to bow to popular pressure, has become more communicative, and has learned to use the media to keep people better informed. Different issues are at stake. The media, as a provider of information, perform a public service. But the urgency of the rush to print – and the pressure to publish undisclosed information including the most sensational – conflict with the justice system, that acts according to a more deliberate legal process than journalism, particularly when the latter’s logic is financial. The criminal justice system disseminates information to enhance its own value as a working institution. Even so, it may slip from being media-sensitive to being media-dependent or “mediatic”—and increasingly so. Different objectives give rise to unresolved conflicts, whose resolution relies on a balancing act that seeks to reconcile the principles of an open democratic society, with the fundamental freedoms guaranteed by national and supranational legal systems
Delor, Pierre. "Les services à domicile pour les personnes âgées et les personnes handicapées : solvabilisation de l’accès aux services et protection des bénéficiaires." Thesis, Lille 2, 2016. http://www.theses.fr/2016LIL20004/document.
Full textSince fifty years the social action for the elderly and disabled persons has been built by successive stacks of legislation and regulations without desire for harmonization and consistency.Home services created in the last twenty years are no exception to this trend, whether towards children and adults with disabilities and the elderly, health or medico-social.This thesis is the state that exists by searching how recipient users have access to services through their own financial resources, through public funding or through national solidarity. Proposals for simplification of the devices, to ensure consistency between them are made to allow wider access.The search for the protection of beneficiaries is present, especially in the study of processes of professionalization, through training or professional organization of the sector. Proposals are made there. The protection of beneficiaries is also studied in terms of existing legal frameworks, where it seems necessary to make it stronger. Finally to expand the support for family caregivers, an essential pillar of taking into account the dependence of the elderly and disabled persons, we have to change the current law
Bulan, Jiří. "Je třeba reformovat české zpravodajské služby?" Master's thesis, 2011. http://www.nusl.cz/ntk/nusl-312595.
Full textHanžl, Pavel. "Mezinárodněprávní aspekty získávání informací zpravodajskými službami." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-351720.
Full textKOUTSKÝ, Tomáš. "Informační síť hlavního představitele protirakouského odboje T. G. Masaryka v době první světové války." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-254082.
Full textYeh, Ching-Yuan, and 葉慶媛. "The Conflict Between Criminalizing Trade Secret Violation and Employee's Mobility - with the Extending Comments on the US Economic Espionage Act." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/zckrbq.
Full text國立交通大學
科技法律研究所
103
Adding or cumulating criminal liability to trade secret infringement seems to be an unstoppable trend in the world, and Taiwan is no exception. However, the conflict between criminalization of Trade Secret Act and employee mobility is the most important thing that this thesis wants to probe into. Since employees are usually the disadvantaged minority, their bargaining power are relatively weak. When the working experience increases, it becomes harder to discriminate trade secrets from employees’ general skills. Thus, with the criminalization of trade secret theft, it is vital to balance the protection of employers’ trade secrets and employees’ right to work. It is undoubtedly sensible that employers demand employees to sign Covenants Not to Compete for the sake of protecting trade secrets, limiting reasonable time, area etc. However, most Covenants Not to Compete are unilaterally written by employers, the terms and conditions are more often than not unreasonable, unfair and unchangeable. Though there sometimes might be reasonable restrictions on terms, there usually lack reasonable compensation to make up for the loss of employees’ right to work. For one thing, criminalization of Trade Secret Act can help protect trade secrets that employers spent millions of time and money on; for another, it can also become a fatal weapon for employers to threaten employees who intend to leave the company. The newly added penal articles mainly refer to Economic Espionage Act in the US. Since 1996, there have been many cases to study and look into. This thesis aims to analyse materials that are related to Economic Espionage Act, supplemented by papers that are related to Trade Secret Act and Covenants not to Compete in Taiwan to compare and self-criticize the criminalization of Trade Secret Act. Moreover, in order to integrate practice with theory, this thesis devotes to study the criminalization of Trade Secret Act by conducting interviews with the professionals and empirical research of trade secret theft related cases. From those research, this thesis hopes to make clear suggestions for further law amending
Chao, Ing-Ming, and 趙英明. "A Study on the U.S. Economic Espionage Act of 1996 - and A Proposal on the Peform of R.O.C. Trade Secret Law." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/74459272010799278366.
Full textWang, Li-Chung, and 王勵中. "Research on Organization Members’background and Change Attitude – Example: Members of Secret Service Units." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/396948.
Full text銘傳大學
管理研究所碩士在職專班
94
Secret Service maintains the life of the entire country because the safety of the people that Secret Service unit protect has something to do with national security and social stability. The Secret Service center has been attached to National Security Bureau since January 1944 after the three readings of a bill (National Security Bureau Organization law). It is responsible for the security of the president, vice-president and their children, former president and vice-president and certain people (11th item of National Security Bureau Organization law). It’s mission also includes the establishment of plainclothesmen, police, and armed mission. Owing to the shortage of uniformity of directive rights and responsibilities and training methods, the research researches the possibility to establish Secret Service Department by researching Secret Service unit members, questionnaire, credibility analysis, descriptive statistics, T inspection, single-element variation analysis, to investigate the interaction occurred under members’ pressure of organization change, different population statistics variations, and different personality. For organization change, the hardest thing is to change people’s behavior, because they are basically afraid of change. Whether organization change is successful depends on members’ identical willingness to change their behavior. However, the establishment of Secret Service Department will bring significant change of manpower, organization structure, style of career management, which are all huge impact on organization members. Therefore, it’s extremely important that all members of each unit have positive attitude and viewpoint on organization change. Successful organization change enables to not only raise morale but also prevent men of talent from running off. Above all, each unit should try hard to end potential negative factors before organization combination in order to receive effectiveness of half work with double result. and produce great influence on the whole human resource.
Chao, Chin-Yu, and 趙智玉. "The Impact of Secret Service Personnel’s Emotional Labor on Emotional Exhaustion and Job Satisfaction." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/99tsjw.
Full text銘傳大學
管理研究所碩士在職專班
97
The secret service aims to protect national leader whom they safeguard have the direct and immediate impact on the national security and social stability. During recent years, there has been a rise in people’s dissatisfaction, a polarization in the politics, a deterioration of economic environment, a confrontation between the government and the people and an increase of pressure on people’s life. People often have emotional reactions towards the management measures taken by the government, causing an increase of petitions and protests, which further leads to a burden of the Special agent’s emotional labor and emotional exhaustion and affects their job satisfaction. According to relevant researches, long-term emotional exhaustion would cause troubles for the service provider and individuals and further become a problem that many future managers have to think about. As a result, this research focused on whether the emotional labor due to the Special agent’s close contact with people when they are on duty would lead to emotional exhaustion and further bring negative impacts on their job satisfaction. Furthermore, this research also focused on issues such as different influences of social supports and emotional intelligence, hoping to serve as a reference to help secret service personnel on duty control their own emotion, solve their own emotional problems and further pacify the people to prevent any dangers or troubles from happening and to establish a good image of the secret service. Special agents were recruited to participate in this research. A total of 274 questionnaires were distributed, and 260 were returned, of which 250 were valid. The data were analyzed with descriptive statistics by using SPSS, t-test, correlation analysis, and regression analysis, to validate the hypotheses. The results are as follows: (1) the “expression of basic emotion” is at the highest level among the emotional labor of secret service personnel; (2) the emotional exhaustion of secret service personnel is at an intermediate level; (3) the “social satisfaction” is at the highest level among the job satisfaction of secret service personnel; (4) there are significant positive and negative relations between emotional labor and emotional exhaustion; (5) there is a significant negative relation between emotional exhaustion and job satisfaction; (6) social supports have part of moderating effect on the relation between emotional labor and emotional exhaustion; (7) emotional intelligence have part of moderating effect on the relation between emotional labor and emotional exhaustion; (8) emotional exhaustion does not have a mediation effect on the relation between the burden of emotional labor and job satisfaction. The suggestions are made as follows: (1) promoting the statutory position of secret service, and realizing (legal administration) policies; (2) strengthening the spiritual education of personnel, lowering their possibility of being replaced; (3) establishing execution examples, and increasing emotion management courses; (4) having a better understanding of personnel’s emotional reactions, and lowering the level of emotional exhaustion; (5) decreasing emotional exhaustion, and increasing job satisfaction; (6) holding leisure activities, and increasing the interactions between peers; (7) establishing psychological consultation departments, and increasing emotional intelligence.
Chancey, Marla Karen Singh Bawa Satinder. "In the company's secret service Neil Benjamin Edmonstone and the First Indian Imperialists, 1780-1820 /." Diss., 2003. http://etd.lib.fsu.edu/theses/available/etd-11082003-043704/.
Full textAdvisor: Bawa Satinder, Singh, Florida State University, College of Arts and Sciences, Dept. of History> Title and description from dissertation home page (Feb. 23, 2004). Includes bibliographical references.
Lien, I.-Ting, and 連奕婷. "A Novel Privacy Preserving Location-Based Service Protocolwith Secret Circular Shift for k-NN Search." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/94925537856414476902.
Full text國立臺灣大學
資訊工程學研究所
100
Location-based service (LBS) is booming up in recent years with the rapid growth of mobile devices and the emerging of cloud computing paradigm. Among the challenges to establish LBS, the user privacy issue becomes the most important concerns. A successful privacy-preserving LBS must be secure and provide accurate query (e.g., k-nearest neighbor) results. In this work, we propose a Private Circular Query Protocol (PCQP) to deal with the privacy and the accuracy issues of privacy-preserving LBS. The protocol consists of a space filling curve and a public-key homomorphic cryptosystem. We connect the points of interest (POIs) on a map to form circular structure with the aid of Moore curve and utilize the homomorphism of Paillier cryptosystem to perform secret circular shifts of POI-related information (POI-info) stored on the server side. Since the POI-info after shifting and the amount of shifts are encrypted, LBS providers (e.g., servers) have no knowledge about the user’s location during query process. The protocol can resist correlation attack and support multi-user scenario as long as the pre-described secret circular shift is performed before each query, in other words, the robustness of the proposed protocol is the same as that of one-time pad encryption scheme. As a result, the security level of the proposed protocol is close to perfect secrecy without the aid of a trusted third party and simulation results show that the k-NN query accuracy rate of the proposed protocol is higher than 90% even when k is large.
Clement, Dominique Thomas. "The royal commission on espionage 1946-1948: a case study in the mobilization of the Canadian Civil Liberties Movement." Thesis, 2000. http://hdl.handle.net/2429/10389.
Full textLI-HUA, YU, and 游麗華. "The Secret of My Growth: A Daughter and A Pre-service Teacher's Searching for the Self." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/71220855024918695300.
Full text國立新竹教育大學
教育學系碩士班
98
This is a story about researching myself. I have thought that my real me and the ideal me were different and even contradictory in my life. Most of the time when I got along with people, I acted like a carefree and naive child;being alone, I thought I should be a mature and steady grow-up. I, an ordinary girl, used to be a good girl, sometimes lived in my own world and forgot the real life. I desired to be closer to my father in my mind, but kept away from my father in the real life. I, a girl who is dreaming about to be a teacher, have been through a lot of tests, and eventually realize that I like myself as a teacher the most. After accepting my father, I could re- accept and understand myself. Understanding myself, I have more energy to interact with others. I love myself nowadays, the one who is natural and sincere.
Shen, Shing-Chiang, and 沈興強. "A Study on the Future Development of the Secret Service Organization from the Organization Structure point of view." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/61093942783390685864.
Full text銘傳大學
管理研究所碩士在職專班
93
As an important aspect of the entire national security, the secret service that safeguard the V.I.P. influences directly to the national security and social stability. It is non-replaceable. As a matter of fact, it has great influence on the secret service duty whether the secret service organization structure could establish conspicuous advantage. Among managing field, organization structure go through a great change in the past several years. Under the fast-changing environment nowadays, various kinds of effective and flexible organization structures that developed by the administrator support and help the staff to promote every organization work, and therefore to set up a organization structure which enables the staff to have work with efficiency becomes a great challenge to administrators. This study is based on the theory of organization structure. Through ways of document surveying, secondary materials and relatively studying method, we pick the experience of foreign secret service organization structure, and discuss the good and bad of our country’s secret service organization structure from different organization structure. And then we probe into our country''s secret service organization structure to find out which function our country''s secret service organization structure should possess and how to design it to suit our country''s national conditions and be fully worthy of forming a complete set of secret service organization structure. As a result, we can present our study to the relative organization and institution for reference As our study shows that secret service organization structure of various countries mostly consider the need of safeguarding V.I.P. based on adopting the function subsection to complete the design of organization structure. But it indicates from studying that organizing type takes an attitude toward mixing-type orientation and not single-type organization orientation. And various countries secret service organization structures have technical and supporting staff officer layer. However, it is different under the jurisdiction of secret service organization structure or support by different organization. The country that adopts special project such as matrix organization can get the assistance of its functional department effectively to reach the task with all strength. So foreign secret service organization structure is worth our country''s following deeply. After surveying the present situation of the domestic and international secret service organization structure, we conclude the future developing direction of our country’s secret service organization structure, that is, our country should establish designated responsible secret service organization structure and adopt mixing-type oriented organizing type, in controlling the range, It should be towards flat level development. In order to avoid abusing one''s power, it needs to be supervised by the Congress. It is organized in accordance to the basis of relative law. Working procedures are handled by detailed rules and clear regulations, in order to accord with the principle of administration according to law. Another suggestion on objecting to be under the jurisdiction of organization should be considered scrupulously, and it can improve whole efficiency and overcome the flaws that may be produced by means of passing the organization structural design of the distribution, perfecting supervision mechanism
Chao, Wang Yu, and 王育昭. "My Secret Garden: The Action Research of the Participation of Young Children in the Environmental Service Learning at School." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/44199408795635075963.
Full text輔仁大學
兒童與家庭學系碩士班
99
Environmental Service-Learning is a concept that combines both of learning and community service; through community service, children can practice what they learned from the class. This method benefits to the community, and children can also find fulfillment in service. Pre-school became a perfect location for community service for our study, during 4 months of community service, children from 3 to 5 years- old cultivated flowers, and have learned how to take care of these flowers. After this 4 months, the garden has become a garden which is much more beautiful and opened for everyone, meanwhile, the garden became a good spot for eco-education. During community service, children face kinds of problems and challenges, they have to use their acknowledge and what they have learned in class to discuss to each other. The discussion can inspire their creativity and imagination, and solve problems. The environmental service learning enriches their life experience, and also, with various activities to develop their mind. The study found: children who participated environmental service learning had a great improvement in many areas, such as: they know well about the vegetation and plant technique, their interpersonal skills and school-group environment identity are much better than others. Keywords: service-learning, environmental service-learning, school and environment education.
Smogorzewski, Emil. "Kontrola operacyjna w polskim procesie karnym." Doctoral thesis, 2017. https://depotuw.ceon.pl/handle/item/2622.
Full textThe subject matter of my doctoral dissertation is the analysis of the operational control in the Polish criminal process. The main aim of the research is to answer whether the current operational control regulations are proper in respect of legal norms and assumed empirical objectives. An answer to the above mentioned basic research aim requires the analysis of further detailed issues, which are discussed in the particular chapters of the dissertation.In the first chapter of the thesis, we find basic information about operational and investigative activities. Definitions and typology of the operational and investigative activities have been analyzed. Moreover, the particular security services entitled to conduct the operational and investigative activities, are presented. This chapter also includes the deliberations on the relations between the operational and investigative activities and the procedural activities.The second chapter of the thesis discusses the basic theoretical-semantic issues, related to operational control – its definition, the types of offences which may warrant the use of operational control and the targets of the operational control, including the relations between the results of the operational control and the rules of inadmissibility of evidence, provided by the Criminal Procedure Code. The above considerations indicate that the system of protection of privileged communications is insufficient.The third chapter has been dedicated to the proceedings for launching operational control. It contains the discussion about the formal requirements of request for operational control and describes the procedure for launching operational control. This chapter also discusses the duration of operational control, an appeal against the decision for launching operational control and the urgent procedure for launching operational control (with ex-post authorization). The discussion demonstrated that the mechanism of judicial and prosecution supervision is not efficient.In the fourth chapter the author deals with the issues of the use of the results of operational control as evidence in criminal proceedings. Detailed analysis (also from a historical perspective) of the use of evidence exceeding the surveillance authorization has been made. The fourth chapter of the thesis discusses also the legality of the operational control, particularly in the view of article 168a of Criminal Procedure Code.The fifth chapter of the thesis discusses the compatibility of the norms regulating surveillance with the requirements enshrined in Polish Constitution.Jurisdiction of the European Court of Human Rights concerning secret surveillance has been discussed in the sixth chapter. The author demonstrated that the norms regulating operational control did not respect all European secret surveillance standards. This incompatibility concerns both the structural elements and the proceedings for launching operational controlFinally, the conclusions and lex ferenda were proposed. The dissertation includes also statistical data gathered by the author.
Friesen, Andreas. "Mission der mennoniten Brüdergemeinde in Karaganda/Kasachstan." Diss., 2001. http://hdl.handle.net/10500/585.
Full textMissiology
M.Th.