To see the other types of publications on this topic, follow the link: Secret service and espionage.

Dissertations / Theses on the topic 'Secret service and espionage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 47 dissertations / theses for your research on the topic 'Secret service and espionage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ritchey, David (David Benjamin. "George Washington's Development as an Espionage Chief." Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc500803/.

Full text
Abstract:
The American Revolution was a war of movement over great distances. Timely intelligence regarding the strength and location of the enemy was vital to the commanders on both sides. Washington gained his early experience in intelligence gathering in the wilderness during the French and Indian War. By the end of the American Revolution, Washington had become a skilled manager of intelligence. He sent agents behind enemy lines, recruited tory intelligence sources, questioned travelers for information, and initiated numerous espionage missions. Many heroic patriots gathered the intelligence that helped win the War for Independence. Their duties required many of them to pose as one of the enemy, and often incur the hatred of friends and neighbors. Some gave their lives in helping to establish the new American nation. It is possible that without Washington's intelligence service, American independence might not have been won.
APA, Harvard, Vancouver, ISO, and other styles
2

Blistène, Pauline. "Voir et faire voir le secret de l'État : fonctions et enjeux de la fiction d’espionnage contemporaine." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01H219.

Full text
Abstract:
Quelle est la valeur politique, morale et philosophique des fictions dites « d’espionnage » ? Nous examinons cette question à partir d’une méthodologie innovante mêlant analyse de séries télévisées contemporaines (Homeland, Le Bureau des Légendes) et enquêtes de terrain auprès des acteurs du renseignement (CIA, DGSE) et du divertissement (showrunners, scénaristes). La thèse que nous défendons est celle d’une modification du statut ontologique et épistémique des films ou séries d’espionnage en raison de l’engagement de véritables espions dans leur fabrication. L’importance politique et philosophique des fictions d’espionnage se manifeste par l’impact de ces fictions sur la réalité politique et sociale : le « réalisme » des fictions d’espionnage que nous définissons ici s’éloigne des conceptions communes de ressemblance avec le réel pour y substituer une approche qui met l’agentivité au cœur de l’analyse. Il ne s’agit pas de décréter l’effacement de la frontière entre fait et fiction mais au contraire d’en réaffirmer l’importance, comme hypothèse de production et de réception des œuvres. Dans un contexte où la demande d’information concernant les activités clandestines de l’État ne cesse de croître, les interactions entre professionnels du renseignement et du divertissement permettent aux premiers de mettre en scène leur propre dévoilement sans pour autant révéler leurs activités réelles. Ainsi, loin de concourir à l’abolition de la frontière du secret, de telles pratiques opèrent un déplacement de cette dernière : une reconduite du régime du secret sous l’apparence d’une mise en transparence. Le secret de l’État n’est jamais dévoilé, il est toujours signifié
What is the political, moral and philosophical value of “spy fiction”? This dissertation examines this question using an innovative methodology that combines an analysis of contemporary television series (Homeland, Le Bureau des Légendes) and interviews with intelligence practitioners (CIA, DGSE) along with entertainment professionals (showrunners, screenwriters). My thesis is that there is a change in the ontological and epistemic status of spy films and TV series due to the involvement of real spies in their creation. The political and philosophical importance of spy fiction manifests itself in the impact of spy fiction on the political and social reality: the “realism” of spy fiction that I define here departs from common conceptions of correspondence to reality and replaces it with an approach that locates agency at the heart of the analysis. This approach does not stipulate the blurring of fact and fiction, but instead reaffirms its importance as a hypothesis for the production and reception of cultural artifacts. In a context where the demand for information concerning clandestine activities of the state keeps growing, the interactions between intelligence and entertainment professionals allow the former to stage their own disclosure without revealing their real activities. Far from contributing to the abolition of the frontier of secrecy, such practices contribute to its displacement, thus allowing a renewal of secrecy under the appearance of transparency. State secrets are never revealed but only signified
APA, Harvard, Vancouver, ISO, and other styles
3

Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)." Thesis, Paris 4, 2010. http://www.theses.fr/2010PA040174.

Full text
Abstract:
Ce travail aborde la question du renseignement militaire de la guerre de succession d’Autriche (1740) au traité de Paris (1763). Le renseignement militaire est d’abord replacé dans la réflexion stratégique de la période qui l’évoque peu tout en soulignent paradoxalement l’importance pour les armées. Les différentes sources de l’information militaire constituent la seconde partie. L’espion d’armée, figure méconnue de la période joue un rôle quotidien auprès des armées d’Ancien Régime. Situé à la marge de la société civile et de la sphère militaire, attiré par le gain mais aussi par le goût de l’aventure, une reconnaissance sociale ou incité par un patriotisme naissant, l’espion prend des risques pour satisfaire un commanditaire. La troisième partie s’intéresse au secret militaire, difficile à préserver et dévoilé dans une logique de réseau, à différentes échelles et selon des organisations plus ou moins complexes. L’espion s’inscrit dans un rapport personnel avec un supérieur dont il est le « client ». L’étude s’intéresse dans un dernier temps à la transmission et la protection du renseignement obtenu. Les risques sont divers (interception postale mais surtout espions ennemis). La conclusion pose la question de l’efficacité du renseignement militaire, peu décisif du fait des contraintes logistiques et de la méfiance généralisée sur les informations et sur les acteurs qui les collectent. Dans une période de structuration de l’armée et de centralisation du pouvoir politique, le renseignement militaire oppose un fonctionnement décentralisé. La nécessité d’une information fiable entraîne une militarisation des civils, transformant ces derniers en auxiliaires de renseignement
This work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
APA, Harvard, Vancouver, ISO, and other styles
4

Le, Voguer Gildas. "Secret et démocratie dans l'Amérique de l'après-guerre : le contrôle parlementaire de l'activité des services de renseignement, 1947-1987." Orléans, 1992. http://www.theses.fr/1995ORLE1012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)." Electronic Thesis or Diss., Paris 4, 2010. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2010PA040174.pdf.

Full text
Abstract:
Ce travail aborde la question du renseignement militaire de la guerre de succession d’Autriche (1740) au traité de Paris (1763). Le renseignement militaire est d’abord replacé dans la réflexion stratégique de la période qui l’évoque peu tout en soulignent paradoxalement l’importance pour les armées. Les différentes sources de l’information militaire constituent la seconde partie. L’espion d’armée, figure méconnue de la période joue un rôle quotidien auprès des armées d’Ancien Régime. Situé à la marge de la société civile et de la sphère militaire, attiré par le gain mais aussi par le goût de l’aventure, une reconnaissance sociale ou incité par un patriotisme naissant, l’espion prend des risques pour satisfaire un commanditaire. La troisième partie s’intéresse au secret militaire, difficile à préserver et dévoilé dans une logique de réseau, à différentes échelles et selon des organisations plus ou moins complexes. L’espion s’inscrit dans un rapport personnel avec un supérieur dont il est le « client ». L’étude s’intéresse dans un dernier temps à la transmission et la protection du renseignement obtenu. Les risques sont divers (interception postale mais surtout espions ennemis). La conclusion pose la question de l’efficacité du renseignement militaire, peu décisif du fait des contraintes logistiques et de la méfiance généralisée sur les informations et sur les acteurs qui les collectent. Dans une période de structuration de l’armée et de centralisation du pouvoir politique, le renseignement militaire oppose un fonctionnement décentralisé. La nécessité d’une information fiable entraîne une militarisation des civils, transformant ces derniers en auxiliaires de renseignement
This work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
APA, Harvard, Vancouver, ISO, and other styles
6

Gleghorn, Todd E. "Exposing the seams : the impetus for reforming U.S. counterintelligence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FGleghorn.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, September 2003.
Thesis advisor(s): David C. Tucker, James Russell. Includes bibliographical references (p. 87-91). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Davies, Philip H. J. "Organisational development of Britain's Secret Intelligence Service 1909-1979." Thesis, University of Reading, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

PARIS, XAVIER-LOUIS. "Le secret medical dans le service de sante de l'armee." Nantes, 1991. http://www.theses.fr/1991NANT030M.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harlow, Richard. "Two missions, one secret service : the value of the investigative mission." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5587.

Full text
Abstract:
CHDS State/Local
Approved for public release; distribution is unlimited
The dual missions of the United States Secret Service, investigations and protection, appear to be without relationship or value to the other, and as a result, support and attention for the investigative mission has waned. This lack of attention to investigations is dangerous for the Secret Service and for the country it serves. To make this argument, this thesis attempts to determine whether the investigative mission is actually important to the successful performance of its protective mission. Through the use of a hybrid research methodology, with quantitative and qualitative aspects, this thesis argues that the types of investigations performed by the Secret Service are not as important as the experiential learning, respite from the hyper-vigilance of protection, and surge capacity provided by the investigative mission. Since the investigative mission supports the protective mission in these three important ways, the Secret Service requires a robust, well-funded and substantial investigative mission to continue to properly provide protection to this nation's leaders.
APA, Harvard, Vancouver, ISO, and other styles
10

Newswander, Chad B. "Agency of Crisis: The Chaos and Reordering of Presidential Security." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/31879.

Full text
Abstract:
Crisis situations have the power to restructure knowledge, norms, rules and discourse. The status quo can be changed, transformed, and revolutionized through shocks to a system. These events often lead to chaos and reordering. Deflecting blame, assigning praise and guilt, transcending the situation, and corrective actions are secondary concerns when an organization is trying to change its core identity and epistemic reality. These shocks to the system provide a momentary break in time in which new discursive spaces open and become available. In particular, crisis situations that become marked by high probability/high consequence events enable organizations to establish new meaning. In these moments, a Foucauldian framework that focuses on power as production is able to illuminate certain aspects about crisis situations and crisis response. This thesis delves into the process of how external shocks created opportunities for an organization like the Secret Service to mold a crisis moment through the production of knowledge and meaning. To examine how the Secret Service responded to these shocks, this thesis examines a series of case studies ranging from the attempted assassination of Roland Reagan to the Oklahoma City bombing. In these moments, the Secret Service relied on its ability to create authoritative meaning, discipline the president, and make declarative statements about potential threats and safety precautions. In its ability to formulate these concepts, the president becomes tied to the Secret Serviceâ s apparatus of truth production. This allows the Secret Service to produce new meaning that disciplines presidential movement and action. Due to these conditions, the Service pivots on an unstable foundation, which allows it to reformulate and create new protective measures to protect the president in an ever changing environment.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
11

Breton-Rahali, Céline. "Le secret professionnel et l’action médico-sociale." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0355.

Full text
Abstract:
Le secret professionnel, entendu comme l’obligation de taire une information, fait aujourd’hui l’objet de multiples dérogations. Dans le cadre particulier d’un établissement médico-social, l’étude de la notion de secret fait naître différentes interrogations. En premier lieu, les professionnels travaillant en équipe pluridisciplinaire sont soumis à des règles d’assujettissement au secret distinctes et éparses. Par conséquent, il est nécessaire d’apporter une clarification de ces règles, tant dans l’intérêt des professionnels que de celui des usagers. Ensuite, l’efficacité de la prise en charge du patient suppose une coordination entre les professionnels, fondée sur la nécessité du secret partagé au sein d’un même service ou établissement de santé. La coordination entre les professionnels est en effet un enjeu pour la qualité des soins mais aussi un enjeu économique permettant une régulation de l’offre de soins sanitaires et sociaux sur un territoire de santé. Ainsi, la coordination, en tant qu’enjeu majeur des politiques de santé, pose la question de l’adaptation des règles de droit existantes et celle de l’organisation des modalités de partage existant entre le secteur sanitaire et médico-social. Cette thèse a pour objectif de proposer les adaptations juridiques nécessaires pour déroger au secret professionnel en autorisant un échange d’informations entre les professionnels qui interviennent dans la prise en charge d’une personne. L’évolution recherchée du secret partagé, au service de la personne, implique de mettre en lumière les principes les plus protecteurs possibles pour l’usager, tout en tenant compte des réalités mais aussi des contraintes attachées à l’action médico-sociale
Professional confidentiality, understood as the obligation not to reveal certain information, is the subject of a number of exceptions. Its study within the particular context of specialised institutions reveals a number of issues. First, professionals working together from different disciplines are each subject to a different patchwork of applicable standards. As a result, it is necessary to clarify these rules, both within the interests of professionals and health-care users. Second, the effectiveness of patient care requires coordination between different professionals based upon shared confidentiality within the same department or health-care centre. Collaboration between professionals is an issue not only affecting the quality of care but also one of economics which allows for the effective management of the supply of health and social care within a given area. As a major challenge of public health policy, such coordination provokes a consideration of the adaptation of the existing legal framework and that of the organisation of the means of sharing confidential patient information within the health care system as a whole for both medical and social care services. This thesis makes a proposal for the necessary amendments to the current legislative framework for derogating from the general principle of confidentiality to allow for an exchange of information between professionals involved in the care of a patient. The evolution of shared confidentiality for the benefit of the patient requires an emphasis upon determining the most highly protective regime for patients without compromising the reality – and constraints – of providing effective health care
APA, Harvard, Vancouver, ISO, and other styles
12

Timén, William. "The logistical secret : Supply Chain Management in the Dominican Republic." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-19919.

Full text
Abstract:
Globalisation has made logistics more important than ever in developing countries. If one business function raises their costs on a service, the end customer will usually pay the price in the store. When the end customers cannot afford the end price on a product, they will turn to other alternatives. This thesis examines how process management would affect the local population within the Dominican Republic. By beginning to question why some functions exist the effect will be economically visible in a DuPont according to the theories. Supply chain management seeks to manage the whole processes from A to Z in the most efficient way possible. The study was conducted during 8 weeks in the Dominican Republic. Eleven managers were interviewed to see how important SCM is for DR. The conclusions of the study is that Supply Chain Management is very important for DR. Well managed supply chains allow higher quality goods such as medicine and food to be accessed at a lower price by the local population. By targeting the economical position of working capital in a process an organisation can reach an increased ROI without the use economical means (increase the income/delivery service or reduce the costs).
MFS study financed by the Swedish International Development cooperation Agency, SIDA
APA, Harvard, Vancouver, ISO, and other styles
13

Hugon, Alain. "Au service du roi catholique : honorables ambassadeurs et divins espions : représentation diplomatique et service secret dans les relations hispano-françaises de 1598 à 1635 /." Madrid : Casa de Velázquez, 2004. http://catalogue.bnf.fr/ark:/12148/cb39184990p.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Jakub, Joseph F. "Spies and saboteurs : Anglo-American collaboration and rivalry in human intelligence collection and special operations, 1940-1945." Thesis, University of Oxford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.670255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Hugon, Alain. "Au service du roi catholique : "honorables ambassadeurs" et "divins espions" face a la france. representation diplomatique et service secret dans les relations hispano-francaises de 1598 a 1635." Caen, 1996. http://www.theses.fr/1996CAEN1206.

Full text
Abstract:
Les fondements de la diplomatie contemporaine resident dans la dechirure religieuse du xvie siecle. La lente emergence des royaumes au moyen-age et les confrontations entre les differentes instances de souverainetes pendant la renaissance favorisent l'eclosion d'une representation des pouvoirs princiers aupres des differents monarques. Dans un contexte de paix (1958-1635), l'etablissement de relations bilaterales entre les couronnes espagnoles et francaise autorise l'etude de la diplomatie et celle de l'apurement des contentieux nes des guerres de religion. Tentant de comprendre les cadres de ces relations par l'analyse, lineaire et informatique, des documents diplomatiques espagnols, ces recherches aboutissent a preciser les limites de l'action politique dont les elements sont scandes par les traites et les conflits peripheriques aux deux couronnes. Ce tiers de siecle (1598-1635) aboutit a des mutations. Doit-on parler pour l'espagne de monarchie catholique "multinationale" (les agents seraient les "bons catholiques")? la couronne de france s'assimile-t-elle a une conscience nationale se constituant depuis plus d'un siecle ? la pratique diplomatique espagnole souligne les signes d'adhesion comme les ecarts envers ces schemas. Elle indique certaines evolutions. La represention du roi catholique a paris souligne la pregnance d'une culture propre a l'epoque moderne : ostentation, "corruption", importance attachee aux marques de l'identite nobiliaire. . . Dans le meme temps, les relations hispano-francaises demontrent le poids d'un consensus deja ancien quant a la pratique du droit des gens (immunites, protection des nationaux. . ). Afin de penetrer les intentions du partenaire, ce monde de l'emphase s'associe au domaine opaque du secret. Peut-on voir la "main de madrid" dans les differents complots contre le roi tres-chretien ?
The foundations of the contemporary diplomacy originated in the break up of religion in the xvith century. The slow emergence of the kingdoms during the middle ages and the confrontations amongst the different levels of sovereignty during the renaissance introduced the power of the princes and their representation alongside the different monarchs. During a time of peace (1598-1635), the establishment of bilateral relations between the french and the spanish crowns authorized the study of diplomacy and the settlement of contentious born during the wars of religion. Trying to understand the structures of these relations by the analyses, linearily and informatically, from the spanish diplomatic documents, these investigations point to the limits of political action whose elements are covered by the treaties and the peripherical conflicts of these two crowns. The period (1598-1635) brought about many changes. Can we describe spain as a "multinational" catholic monarchy (the agents would be the "bons catholiques")? does the french crown consider itself to be the conscience of the country which was built up for a century ? the spanish diplomatic practice emphasizes signs of adhesion and divergence in front of these schemes and draws evolutions. The catholic king's representation in paris underlines the original comportments of this century : ostentation, corruption, importance accorded to identify the marks of nobility. During this time, the hispanic-french relations demonstrate the importance of consensus, yet old, as shown by the practice of jus gentium (immunities, protection of the subjets). In order to penetrate the intentions of the partner, this world of pomposity finds association with the
APA, Harvard, Vancouver, ISO, and other styles
16

Senegas, Frédérique. "Implications médico-légales dans le fonctionnement d'un SAMU - Centre 15." Montpellier 1, 1992. http://www.theses.fr/1992MON11075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Young, Kirk B. "Kingdom Come." Digital Commons @ Butler University, 2017. https://digitalcommons.butler.edu/grtheses/487.

Full text
Abstract:
A secret service agent returns home to reconcile with his wife just as the Rapture begins. His scramble to reunite with her becomes all the more urgent when a violent cult begins terrorizing the city in its final hours
APA, Harvard, Vancouver, ISO, and other styles
18

Ferguson, Cody J. "Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate." Thesis, Monterey, California: Naval Postgraduate School, 2012.

Find full text
Abstract:
Approved for public release; distribution is unlimited.
Cyberespionage is a prolific threat that undermines the power projection capacity of the United States through reduced economic prowess and a narrowing of the technical advantage employed by the American military. International attempts to limit hostile cyber activity through the development of institutions, normative patterns of behavior, or assimilation of existing laws do not provide the American national security decision maker with a timely or effective solution to address these threats. Unfortunately, the stove-piped, redundant and inefficient nature of the U.S. counterintelligence community does not deliver a viable alternative to mitigating cyberespionage in an effective manner. Instituting a domestic and international micro-restructuring approach within the Department of Defense (DoD) addresses the need for increased effectiveness within an environment of fiscal responsibility. Domestic restructuring places emphasis on developing a forcing mechanism that compels the DoD counterintelligence services to develop joint approaches for combating cyberespionage by directly addressing the needs of the Combatant Commands. International restructuring places an emphasis on expanding cybersecurity cooperation to like-minded nations and specifically explores the opportunity and challenges for increased cyber cooperation with Taiwan. This approach recognizes that Taiwan and the United States are both negatively affected from hostile cyber activity derived from within the People’s Republic of China.
APA, Harvard, Vancouver, ISO, and other styles
19

Engel, Jean. "Assistants de service social et éducateurs spécialisés (en Alsace) face au secret partagé avec les élus : entre conflits de territoires et conflits de valeurs." Strasbourg, 2010. https://publication-theses.unistra.fr/public/theses_doctorat/2010/ENGEL_Jean_2010.pdf.

Full text
Abstract:
Cette thèse vise à comprendre les résistances des assistants de service social et des éducateurs spécialisés à l'introduction du «secret partagé» avec les maires dans le cadre de la loi de prévention de la délinquance (2007). A l'aide de 70 entretiens semi-directifs réalisés entre 2005 et 2009 auprès d'étudiants et de travailleurs sociaux, nous tentons de dégager les représentations et les usages du secret professionnel au sein de ces deux professions. Dans un premier temps, nous soutenons l 'hypothèse selon laquelle les usages du secret professionnel s'adossent à des processus de reconnaissance et d'exclusion qui sont constitutifs des identités professionnelles. Nous analysons la manière dont sont perçus les pairs et les partenaires avec lesquels les enquêtés sont amenés à échanger des informations en soulignant l'importance de la confiance et des phénomènes de concurrence à l'œuvre, sans négliger la problématique du pouvoir. Dans un second temps, nous démontrons l'importance des valeurs dans les mécanismes de justification qui président au partage des informations recueillies sur les usagers des services sociaux. Non sans souligner la relativité des valeurs collectives au sein du secteur, nous analysons dans quelle mesure la dissimulation des informations et la mobilisation contre la loi de prévention de la délinquance peuvent figurer des mécanismes permettant aux travailleurs sociaux de s'assurer de leur conformité aux valeurs qu'ils confèrent à leur activité. Face à la prévention de la délinquance, ces valeurs peuvent être le support d'une opposition idéologique qui n'exclut pas forcément des processus transactionnels permettant d'aboutir à des compromis pratiques
The goal of this thesis is to understand why social workers and educators are reluctant to enforce a "shared confidentiality" policy between them and mayors as advocated by the 2007 Law of Prevention of Delinquency. Basing my research on 70 semi-directive interviews of students and social workers conducted between 2005 and 2009, l have focused on the representations and use of professional confidentiality by those two professions. First, l discuss the hypothesis that the actual use of confidentiality is closely related to processes of recognition and exclusion in keeping with their professional identity. The first part is an analysis of the way interviewees perceive their peers and the work partners with whom they are supposed to share information. L address the issue of trust and competition in their mutual dealings, without ignoring the problem of power. The second part aims at demonstrating how relevant values are in the mechanisms of justification when workers choose to share or withhold information they have collected about users of social services. L underline the relativity of collective values within that field of activity and analyse to what extent with holding information and questioning the enforcement of the Law of Prevention of Delinquency may illustrate processes which enable social workers to make sure they hold on to the values that pertain to their professional activity. With regard to the prevention of delinquency, those values may induce an ideological stance which, even thongh it impedes effective partnership working, does not necessarily mean giving up transactional processes leading to practical compromises
APA, Harvard, Vancouver, ISO, and other styles
20

Jenkins, Danny R. "Winning trench warfare battlefield intelligence in the Canadian Corps, 1914-1918 /." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0018/NQ57601.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zhao, Yingxue. "Redesigning sedentary office environments, guided by new ergonomics theory." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1337007749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Korn, Dörthe. "Defizite bei der Umsetzung der EMRK im deutschen Strafverfahren : V-Leute, Lockspitzel, Telefonüberwachung von Rechtsanwälten /." Berlin : Duncker & Humblot, 2005. http://www.gbv.de/dms/sbb-berlin/49795351X.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Newswander, Chad B. "Presidential Security: Bodies, Bubbles, & Bunkers." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/77042.

Full text
Abstract:
The purpose of this research is to show how the idea of presidential security is a construct that has taken on several different meanings and rationalities in the American context due to shifting power relations, new practices of presidential security, and the constant re-formulation of the friend/enemy distinction. The United States Service has had to continually think and re-think the concept of presidential security in order to provide suitable protection for the President of the United States. In creating these spaces of protection, the practices of the Secret Service have slowly contributed to re-constituting the sovereign to fit the agency's particular logics and rationalities. The capturing of the Chief Executive Officer does not only rest on disciplinary techniques that restrict, but are also founded on the truth production of the Secret Service: presidents begin to accept and internalize the modus operandi of the Secret Service. They begin to self-monitor their own desires and actions related to security concerns. The walls of protection are coupled with a conscious capitulation to accept the barriers of protection. The cage is no longer only imposed from without, but also emerges internally. By problematizing how this evolving security bubble encapsulates the president, this dissertation is able to examine how the Secret Service begins to reshape and reformulate key democratic governance values by protecting the public and private body of the president through a disciplinary apparatus that seeks to control and contain as well as display and deliberate. Democratic norms that privilege openness have to be challenged, if not curtailed, to adequately protect the Chief Executive Officer. Everyone and everything is a risk that must be inspected, catalogued, and watched, even the president cannot be trusted with his own safety. With its mission to protect, the Secret Service has constructed an organizational operation to ostracize the other, permanently put the president behind protective procedures, and present a pleasing public persona fitting to the status of the POTUS. These overt actions have allowed an administrative agency to redefine key democratic governance values. The agency has been able to delineate who is a suspicious other, justify the placement of barricades that separate the president from the people, instill a preventive/security ethos in the Office of the President, and display the president as the apex of a constitutional order. Because of its successes and failures, presidential protection has become normal, acceptable, legitimate, and absolutely necessary, which has provided the Service the ability to give shape to a particular rationality concerning what the president can and cannot do. This constitutive role of a public agency has had a dramatic impact on how the people come to experience and interact with the POTUS. The development of the Secret Service and its protective procedures, however, has been sporadic and tenuous. For the past 100 years, this emerging rationality was produced by a multitude of sources that have helped construct the idea and practice of presidential security. The subjects of insecurity and security mutually created the idea of POTUS endangerment and safety. Enemies of the state have helped mold state action while friends of the president have sought to project an image of presidential grandeur. In this context, the Service has had to secure territorial spaces in order to conceal and confuse threats while simultaneously having to display and disclose the presidential body to the public. The capacity to control threats and to coordinate the presidential spectacle has enabled the Service to direct the body and mind of the POTUS. With this disciplinary apparatus in place, the Secret Service is able to construct bubbles and bunkers that are designed to protect and trap the president's two bodies.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
24

Herbstritt, Georg. "Bundesbürger im Dienst der DDR-Spionage : eine analytische Studie /." Göttingen : Vandenhoeck & Ruprecht, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015450137&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Stamm, Eric. "La transmission des données personnelles de santé : analyse et proposition d'évolution. Le cas du contrôle de l'assurance maladie." Thesis, Lyon 3, 2011. http://www.theses.fr/2011LYO30045/document.

Full text
Abstract:
L’évolution du secret médical vers un secret professionnel concernant de nombreuses professions soulève la question de la transmission des données personnelles de santé. Étudiant les fondements juridiques de cette transmission et s’appuyant sur des exemples pratiques relevés au cours de l’activité des praticiens conseils au sein de l’assurance maladie, ce travail développe les droits de l’individu sur la maîtrise du secret et les possibilités de transmissions des données dans le respect du droit des autres personnes que sont les ayants droits et les employeurs comme les droits de la défense. La possibilité d’une prédominance de la société sur la personne est envisagée dans le cadre de la protection de la santé, de la justice et de la gestion économique des dépenses de santé.Des propositions d’évolution des pratiques et de la législation visent à permettre l’encadrement des transmissions des données personnelles de santé dans le respect des droits des personnes
Medical secrecy is moving towards a professional secrecy, which concerns numerous professions, raising the question of transmission of personnel health data.This thesis, based on practical examples taken from professional activities of practitioners advisers in the Health insurance, studies legal foundations of this transmission and develops individual rights on how to control secrecy and possibilities of transmission of data according to the respect of the rights of other people such as eligible parties and employers. The fact that a society can be more prominent than a person is contemplated in the context of health protection, justice and economic management of health spending.Evolutions of practices and legislation are suggested and aim at allowing the supervision of transmission of personal health data according to people’s rights
APA, Harvard, Vancouver, ISO, and other styles
26

Ayral, Jean. "Les incidences médico-légales des interventions du SAMU 30." Montpellier 1, 1992. http://www.theses.fr/1992MON11105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Luce, Alexandra Isabella. "British intelligence in the Portuguese world, 1939-1945 : operations against German Intelligence and relations with the Polícia de Vigilância e Defesa do Estado (PVDE)." Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.608984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Guillaumin, Béatrice. "L'appareil français de renseignement : une administration ordinaire aux attributs extraordinaires." Electronic Thesis or Diss., Paris 1, 2021. https://ecm.univ-paris1.fr/nuxeo/site/esupversions/87fa596a-79d4-4f38-89d4-aca7a78356b9.

Full text
Abstract:
Depuis la fin des années 2000, l’intégration de l’appareil de renseignement dans le paysage administratif et institutionnel français est incontestable : encadrement juridique de ses activités, redéfinition du lien entretenu avec l’Exécutif, contrôle pluriel dont il fait dorénavant l’objet, etc. S’il convient de vérifier cette normalisation, il paraît davantage essentiel d’en évaluer la portée. Au seuil de l’étude, un faisceau d’indices peut être dégagé pour corroborer le processus d’une normalisation substantielle de l’appareil de renseignement. Ce dernier ne saurait pour autant disparaître et se fondre entièrement dans la matrice administrative. Dans cette hypothèse, alors que le processus de normalisation entend gommer les originalités de l’appareil de renseignement, il engendre en réalité un mouvement paradoxal : aux originalités de départ s’en sont ajoutées ou substituées de nouvelles. Ainsi envisagé, l’alignement de l’appareil de renseignement sur le modèle administratif demeure limité par un certain nombre d’éléments qui façonnent un édifice à la physionomie singulière, oscillant entre normalité et originalité. Pour s’en convaincre, il s’agit de mettre en exergue que la normalisation de l’appareil de renseignement s’opère par la conjonction de deux mouvements dans une synchronie parfaite. Le premier est relatif à l’encadrement juridique de l’appareil de renseignement qui, par les procédés qu’il déploie, constitue l’apanage de cette normalisation. Le second se concrétise dans le resserrement du contrôle de l’appareil de renseignement dont les mécanismes apparaissent comme les marqueurs de cette normalisation
Since the end of the 2000s, the integration of the intelligence apparatus into the French administrative and institutional landscape has been indisputable: legal framework for its activities, redefinition of the link maintained with the executive branch, plural control to which it is now subject, etc. While this normalisation should be verified, it will be more essential to assess its scope. At the threshold of the study, a bundle of clues can be released to corroborate the process of a substantial normalisation of the intelligence apparatus. However, it cannot disappear and merge entirely into the administrative matrix. In this hypothesis, while the normalisation process intends to erase the originalities of the intelligence apparatus, it actually generates a paradoxical movement: new originalities have been added. Thus considered, the alignment of the intelligence apparatus on the administrative model remains limited by a certain number of elements which shape an administration with a singular appearance, oscillating between normality and originality. To be convinced of this, the aim is to emphasise that the normalisation of the intelligence apparatus takes place by the conjunction of two movements in perfect synchronization. The first relates to the legal framework of the intelligence apparatus which constitutes the apanage of this normalisation. The second is triggered by the tightening of control over the intelligence apparatus, the mechanism of which appears to be the markers of this normalisation
APA, Harvard, Vancouver, ISO, and other styles
29

Quiniou, Matthieu. "Le contentieux du transfert de connaissances dans les relations entre l'Union européenne et la Chine." Thesis, Paris 2, 2015. http://www.theses.fr/2015PA020049.

Full text
Abstract:
Face à la mutation des modalités des échanges internationaux et à l'accentuation du commerce de biens intellectuels entre entreprises de traditions différentes, des réajustements des modèles contractuels et un réordonnancement des modes de règlement des différends semblent inévitables. La nature juridique incertaine des connaissances secrètes, en Chine et dans l’Union européenne est un obstacle à la formalisation de leur transfert et par conséquent à la définit ion d’un cadre de résolution des différends adapté. Si les propositions de lois et de direct ive se multiplient pour définir cette notion et son régime, l’approche retenue est souvent limitée à la dimension délictuelle de la divulgation de la connaissance. La recherche menée, tout en tenant compte des atteintes portées au secret, se focalise principalement sur le transfert volontaire de connaissances. Pour répondre aux besoins des acteurs du commerce international, ces opérations ne peuvent plus être limitées aux seuls contrats de « communication de savoir - faire ». Si les notions de « bien intellectuel » et de « possession intellectuelle »permettent de justifier théoriquement d’autres formes contractuelles, les droits chinois et européen se réfèrent aux cessions et licences de connaissances. Ces opérations, souvent insérées dans un ensemble contractuel complexe et réalisées entre parties de cultures différentes,peuvent engendrer des différends variés. Lorsque ces différends apparaissent,le degré de confidentialité assuré devant les juridictions nationales étudiées ne permet pas de répondre aux attentes légitimes des parties. Les différences de cultures processuelles des parties et la culture chinoise du règlement amiable des différends invitent aussi à éviter le recours aux juridictions nationales. Les combinaisons entre médiat ion et arbitrage, par leur grande flexibilité procédurale, peuvent fournir un cadre de résolut ion adapté aux exigences tant économiques que culturelles des parties. Dans cet esprit, la thèse propose la mise en place d’un Règlement de M²arb avec un médiateur–expert, garant de la confidentialité du processus de résolut ion des différends
Facing the evolution of international trade and the development of intellectual proper ty trade between companies from different backgrounds, contractual model readjustments and a reordering of dispute resolution systems seems unavoidable. The unsettled legal status of secret knowledge in China and in the EU can be an obstacle to the formalization of their transfer and therefore inhibits the definition of a suitable framework for resolving disputes. Legislators and scholars are currently debating proposals of laws and directives to elaborate this concept and its regime, but only address issues liketor t and disclosure of secret information. Legal scholarship to date has mainly been focused on the voluntary transfer of knowledge and has taken intoaccount the damage caused to secrets. To meet the needs of business operators, these operations should not be limited to "know-how communication contracts” (contrats de communication de savoir - faire). The concepts of “ intellectual good” and " intellectual ownership" theoretically justifyother types of contracts, while Chinese and European laws refer to assignment and license of trade secret . These operations, often provided for in a complexs et of contracts between parties from different cultural backgrounds, can lead to a wide variety of disputes. When disputes occur, national courts do not always provide a level of protect ion of confidential information that meets parties’ expectations. Differences in procedural cultures as well as the Chinese culture of amicable dispute settlement prevent the parties from relying on national courts. The combinations between mediation and arbitration, by their procedural flexibility, can provide a suitable dispute resolution framework taking into account economic and cultural considerations. Therefore, this thesis proposes M² arb Rules that introduce a mediator-expert with a mission of securing knowledge confidentiality during the dispute resolution process
APA, Harvard, Vancouver, ISO, and other styles
30

Oliveira, Nilo Dias de. "A vigilância da DOPS-SP às Forças Armadas: (Brasil - década de 1950) - sistema repressivo num Estado de natureza autocrática." Pontifícia Universidade Católica de São Paulo, 2008. https://tede2.pucsp.br/handle/handle/13099.

Full text
Abstract:
Made available in DSpace on 2016-04-27T19:31:57Z (GMT). No. of bitstreams: 1 NILO DIAS DE OLIVEIRA.pdf: 1727773 bytes, checksum: b03ba624a4aba0f0a823cc2848061a2a (MD5) Previous issue date: 2008-11-28
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
The present dissertation has as objective to analyze practical of monitoring and the repression of the Private Service of the DOPS-SP through the analysis immanent of its reports during the period of 1950 -1961, giving emphasis to the action of this agency under the Armed Forces. The infiltration of its agents in the cupola of the military who, congregated the Military Club, debated the alternatives for the national development and the entailing of this repressive system with the segments politicians subordinated to the sectors of the dependent bourgeoisies, whose monopoly of domination if saw threatened by the magnifying of the civil laws, as well as unchains a persecution and expurgations of military of the organizations considered pernicious to the continuity of the monopolista capitalism dependent, under égide of this institutionalized bourgeois autocracy. This process has the political role of "sanitation" this sector of the State whose division prevented, at that moment, the bonapartist centralization, already pushed through by such segments bourgeois since the overthrowal dictatorship varguista
A presente dissertação tem como objetivo analisar a prática de vigilância e repressão do Serviço Secreto da DOPS-SP através da análise imanente dos seus relatórios durante o período de 1950 -1961, dando ênfase à ação deste órgão sob as Forças Armadas. A infiltração de seus agentes na cúpula dos militares que, reunidos no Clube Militar, debatiam as alternativas para o desenvolvimento nacional e a vinculação deste sistema repressivo com os segmentos políticos subordinados aos setores das burguesias dependentes, cujo monopólio de dominação se via ameaçado pela ampliação dos direitos civis, desencadeia uma perseguição e expurgos de militares como também das organizações consideradas perniciosas à continuidade do capitalismo monopolista dependente, sob a égide desta autocracia burguesa institucionalizada. Este processo tem a função política de sanear este setor do Estado cuja divisão impedia, naquele momento, a centralização bonapartista, já pleiteada por tais segmentos burgueses desde a derrubada da ditadura varguista
APA, Harvard, Vancouver, ISO, and other styles
31

Pascal, Alexandra. "La justice pénale et les médias : approches juridique et sociologique." Thesis, Paris 2, 2016. http://www.theses.fr/2016PA020061.

Full text
Abstract:
En France, depuis plus d’une soixantaine d’années, la médiatisation des affaires pénales s’est nettement accentuée. Ce constat s'explique en raison de la multiplication des supports (presse, radio, télévision, internet), et de l'intérêt croissant que les journalistes portent aussi bien aux simples faits divers, qu'aux affaires politico-judiciaires. Le public se passionne pour cette actualité sans cesse renouvelée, tout en ignorant la plupart du temps les règles juridiques techniques et complexes du droit pénal et de la procédure pénale. Au-delà du principe de publicité du procès pénal qui autorise, dans une certaine mesure, sa médiatisation par le relais de la presse écrite et audiovisuelle, l’information s’étend dorénavant avec force aux phases secrètes de la procédure. Non sans difficulté, le Droit s’est adapté aux réalités d’une société de la communication, en créant des fenêtres de publicité au cours de la procédure. L’Institution judiciaire se plie aussi aux nécessités de la communication en transmettant des messages aux citoyens par le vecteur des médias. Les enjeux diffèrent. Les médias remplissent une mission de service public en informant le peuple. L’urgence du travail journalistique – et la recherche d’informations inédites ou spectaculaires – s’opposent aux lenteurs nécessaires du temps de la justice qui n’est pas le même que celui de la presse moderne, surtout quand elle est mue par une logique concurrentielle. La justice pénale entend valoriser le bon fonctionnement du système judiciaire à travers les informations qu’elle diffuse. Les dérives tendant à transformer la médiatisation de la justice pénale en une justice pénale « médiatique » se multiplient. La confrontation de ces objectifs distincts est source de conflits dont la résolution repose sur la quête perpétuelle d’un équilibre entre les grands principes démocratiques et les libertés fondamentales consacrés par le droit national et supranational
In France, the last 60 years or so have seen a sharp increase in the media profile of the criminal justice system. The explanation lies in the massive growth in media outlets (press, radio, television, internet) and in the increasing interest shown by journalists, not only in run-of-the-mill crime stories but in cases of corruption at the top of the political system. Public interest in such doings is huge, although with mostly little regard to the legal and technical complexities of the criminal law and its processes. The justice system in principle allows some media reporting by press and broadcasters, but the present-day appetite for information extends far deeper, into its more secret workings. The Law has adjusted, not without difficulty, to the realities of the communication society. In criminal proceedings, some windows have been thrown open on aspects of previously hidden processes. The judiciary, as an institution, has had to bow to popular pressure, has become more communicative, and has learned to use the media to keep people better informed. Different issues are at stake. The media, as a provider of information, perform a public service. But the urgency of the rush to print – and the pressure to publish undisclosed information including the most sensational – conflict with the justice system, that acts according to a more deliberate legal process than journalism, particularly when the latter’s logic is financial. The criminal justice system disseminates information to enhance its own value as a working institution. Even so, it may slip from being media-sensitive to being media-dependent or “mediatic”—and increasingly so. Different objectives give rise to unresolved conflicts, whose resolution relies on a balancing act that seeks to reconcile the principles of an open democratic society, with the fundamental freedoms guaranteed by national and supranational legal systems
APA, Harvard, Vancouver, ISO, and other styles
32

Delor, Pierre. "Les services à domicile pour les personnes âgées et les personnes handicapées : solvabilisation de l’accès aux services et protection des bénéficiaires." Thesis, Lille 2, 2016. http://www.theses.fr/2016LIL20004/document.

Full text
Abstract:
Depuis une cinquantaine d’années l’action sociale en faveur des personnes âgées et des personnes handicapées s’est construite par empilements successifs de dispositifs législatifs et réglementaires sans une volonté d’harmonisation et de cohérence.Les services à domicile, sanitaires ou médico-sociaux, créés ces vingt dernières années n’échappent pas à ce mouvement, qu’ils soient en direction des enfants ou des adultes handicapés, ou des personnes âgées.Cette thèse fait l’état de ce qui existe en recherchant comment les bénéficiaires utilisateurs ont accès aux services, par leurs propres moyens financiers, par un financement public ou par le biais de la solidarité nationale. Des propositions de simplification des dispositifs, de mise en cohérence entre eux sont faites pour permettre un plus large accès.La recherche de la protection des bénéficiaires y est présente notamment d’une part, par la qualité du service, dans l’étude des processus de professionnalisation des acteurs à travers leur formation ou l’organisation professionnelle du secteur. D’autre part, la protection des bénéficiaires est également étudiée sous l’angle des dispositifs juridiques existants, pour lesquels il semble nécessaire d’y apporter un renforcement. Enfin, pour développer le soutien aux aidants familiaux, pilier essentiel de la prise en compte de la dépendance des personnes âgées et des personnes handicapées, il faut modifier le droit actuel
Since fifty years the social action for the elderly and disabled persons has been built by successive stacks of legislation and regulations without desire for harmonization and consistency.Home services created in the last twenty years are no exception to this trend, whether towards children and adults with disabilities and the elderly, health or medico-social.This thesis is the state that exists by searching how recipient users have access to services through their own financial resources, through public funding or through national solidarity. Proposals for simplification of the devices, to ensure consistency between them are made to allow wider access.The search for the protection of beneficiaries is present, especially in the study of processes of professionalization, through training or professional organization of the sector. Proposals are made there. The protection of beneficiaries is also studied in terms of existing legal frameworks, where it seems necessary to make it stronger. Finally to expand the support for family caregivers, an essential pillar of taking into account the dependence of the elderly and disabled persons, we have to change the current law
APA, Harvard, Vancouver, ISO, and other styles
33

Bulan, Jiří. "Je třeba reformovat české zpravodajské služby?" Master's thesis, 2011. http://www.nusl.cz/ntk/nusl-312595.

Full text
Abstract:
Bulan, Jiří. Je třeba reformovat české zpravodajské služby? Praha, 2011. 101 s. Diplomová práce (Mgr.) Univerzita Karlova, Fakulta sociálních věd, Institut politologických studií. Katedra mezinárodních vztahů. Vedoucí diplomové práce Gen. Ing. Andor Šándor. Abstract The thesis is a comparative analysis of the Czech intelligence system. It is trying to answer how and whether or not to reform the Czech intelligence services on the basis of scholarly articles and especially interviews with current and former intelligence officials and particular politicians. It turned out that among some of the Czech intelligence services and even within those services prevails the tense atmosphere, which had been caused by various personal failings. All the cases were the individual personal excesses, not the system errors. Representatives of the services assesses the ability to detect security threats very critically. The services miss particularly tight government management as well as the independent overview of the service operations. How to improve the intelligence services work? The intelligence community must establish a common vision that will emerge from a deeper internal discussion only. It is not possible to reform the system without it.
APA, Harvard, Vancouver, ISO, and other styles
34

Hanžl, Pavel. "Mezinárodněprávní aspekty získávání informací zpravodajskými službami." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-351720.

Full text
Abstract:
This diploma thesis deals with intelligence gathering and its international law aspects. The main research question of this diploma thesis is as follows: is the intelligence gathering legal from the point of view of international law? In light of recent scandals and accusations of secret services of illegal espionage, it is very important to find an answer to this question. There are almost no relevant Czech academic sources about this issue and foreign sources are rather contradictory. Included in the main research question are number of additional issues, such as: are there differences in legality between intelligence gathering during peacetime or wartime? What are the international law sources regarding espionage? Is the work of secret services affected by international law? Is international law relevant to espionage? As part of the introduction the diploma thesis outlines various intelligence gathering methods and defines relevant terms. The diploma thesis also addresses the issue of compatibility of espionage with the international law principle of non-intervention and state sovereignty. Next, three current approaches to the question of legality of espionage are presented to the reader and one new approach is introduced. Furthermore, the international implications of the unlawful behavior of...
APA, Harvard, Vancouver, ISO, and other styles
35

KOUTSKÝ, Tomáš. "Informační síť hlavního představitele protirakouského odboje T. G. Masaryka v době první světové války." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-254082.

Full text
Abstract:
The main goal of this diploma thesis is analysis and reconstruction of the information network of major representative of anti-Austrian resistance abroad T. G. Masaryk in the First World War. The analysis and reconstruction will be put in context of contemporary events. Emphasis will be put on foreign and domestic information sources. It will show by which way and by whom was T. G. Masaryk informed about events in Bohemia and Austria-Hungary and what meaning this information had for his activities abroad.
APA, Harvard, Vancouver, ISO, and other styles
36

Yeh, Ching-Yuan, and 葉慶媛. "The Conflict Between Criminalizing Trade Secret Violation and Employee's Mobility - with the Extending Comments on the US Economic Espionage Act." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/zckrbq.

Full text
Abstract:
碩士
國立交通大學
科技法律研究所
103
Adding or cumulating criminal liability to trade secret infringement seems to be an unstoppable trend in the world, and Taiwan is no exception. However, the conflict between criminalization of Trade Secret Act and employee mobility is the most important thing that this thesis wants to probe into. Since employees are usually the disadvantaged minority, their bargaining power are relatively weak. When the working experience increases, it becomes harder to discriminate trade secrets from employees’ general skills. Thus, with the criminalization of trade secret theft, it is vital to balance the protection of employers’ trade secrets and employees’ right to work.   It is undoubtedly sensible that employers demand employees to sign Covenants Not to Compete for the sake of protecting trade secrets, limiting reasonable time, area etc. However, most Covenants Not to Compete are unilaterally written by employers, the terms and conditions are more often than not unreasonable, unfair and unchangeable. Though there sometimes might be reasonable restrictions on terms, there usually lack reasonable compensation to make up for the loss of employees’ right to work. For one thing, criminalization of Trade Secret Act can help protect trade secrets that employers spent millions of time and money on; for another, it can also become a fatal weapon for employers to threaten employees who intend to leave the company.   The newly added penal articles mainly refer to Economic Espionage Act in the US. Since 1996, there have been many cases to study and look into. This thesis aims to analyse materials that are related to Economic Espionage Act, supplemented by papers that are related to Trade Secret Act and Covenants not to Compete in Taiwan to compare and self-criticize the criminalization of Trade Secret Act. Moreover, in order to integrate practice with theory, this thesis devotes to study the criminalization of Trade Secret Act by conducting interviews with the professionals and empirical research of trade secret theft related cases. From those research, this thesis hopes to make clear suggestions for further law amending
APA, Harvard, Vancouver, ISO, and other styles
37

Chao, Ing-Ming, and 趙英明. "A Study on the U.S. Economic Espionage Act of 1996 - and A Proposal on the Peform of R.O.C. Trade Secret Law." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/74459272010799278366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Wang, Li-Chung, and 王勵中. "Research on Organization Members’background and Change Attitude – Example: Members of Secret Service Units." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/396948.

Full text
Abstract:
碩士
銘傳大學
管理研究所碩士在職專班
94
Secret Service maintains the life of the entire country because the safety of the people that Secret Service unit protect has something to do with national security and social stability. The Secret Service center has been attached to National Security Bureau since January 1944 after the three readings of a bill (National Security Bureau Organization law). It is responsible for the security of the president, vice-president and their children, former president and vice-president and certain people (11th item of National Security Bureau Organization law). It’s mission also includes the establishment of plainclothesmen, police, and armed mission. Owing to the shortage of uniformity of directive rights and responsibilities and training methods, the research researches the possibility to establish Secret Service Department by researching Secret Service unit members, questionnaire, credibility analysis, descriptive statistics, T inspection, single-element variation analysis, to investigate the interaction occurred under members’ pressure of organization change, different population statistics variations, and different personality. For organization change, the hardest thing is to change people’s behavior, because they are basically afraid of change. Whether organization change is successful depends on members’ identical willingness to change their behavior. However, the establishment of Secret Service Department will bring significant change of manpower, organization structure, style of career management, which are all huge impact on organization members. Therefore, it’s extremely important that all members of each unit have positive attitude and viewpoint on organization change. Successful organization change enables to not only raise morale but also prevent men of talent from running off. Above all, each unit should try hard to end potential negative factors before organization combination in order to receive effectiveness of half work with double result. and produce great influence on the whole human resource.
APA, Harvard, Vancouver, ISO, and other styles
39

Chao, Chin-Yu, and 趙智玉. "The Impact of Secret Service Personnel’s Emotional Labor on Emotional Exhaustion and Job Satisfaction." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/99tsjw.

Full text
Abstract:
碩士
銘傳大學
管理研究所碩士在職專班
97
The secret service aims to protect national leader whom they safeguard have the direct and immediate impact on the national security and social stability. During recent years, there has been a rise in people’s dissatisfaction, a polarization in the politics, a deterioration of economic environment, a confrontation between the government and the people and an increase of pressure on people’s life. People often have emotional reactions towards the management measures taken by the government, causing an increase of petitions and protests, which further leads to a burden of the Special agent’s emotional labor and emotional exhaustion and affects their job satisfaction. According to relevant researches, long-term emotional exhaustion would cause troubles for the service provider and individuals and further become a problem that many future managers have to think about. As a result, this research focused on whether the emotional labor due to the Special agent’s close contact with people when they are on duty would lead to emotional exhaustion and further bring negative impacts on their job satisfaction. Furthermore, this research also focused on issues such as different influences of social supports and emotional intelligence, hoping to serve as a reference to help secret service personnel on duty control their own emotion, solve their own emotional problems and further pacify the people to prevent any dangers or troubles from happening and to establish a good image of the secret service. Special agents were recruited to participate in this research. A total of 274 questionnaires were distributed, and 260 were returned, of which 250 were valid. The data were analyzed with descriptive statistics by using SPSS, t-test, correlation analysis, and regression analysis, to validate the hypotheses. The results are as follows: (1) the “expression of basic emotion” is at the highest level among the emotional labor of secret service personnel; (2) the emotional exhaustion of secret service personnel is at an intermediate level; (3) the “social satisfaction” is at the highest level among the job satisfaction of secret service personnel; (4) there are significant positive and negative relations between emotional labor and emotional exhaustion; (5) there is a significant negative relation between emotional exhaustion and job satisfaction; (6) social supports have part of moderating effect on the relation between emotional labor and emotional exhaustion; (7) emotional intelligence have part of moderating effect on the relation between emotional labor and emotional exhaustion; (8) emotional exhaustion does not have a mediation effect on the relation between the burden of emotional labor and job satisfaction. The suggestions are made as follows: (1) promoting the statutory position of secret service, and realizing (legal administration) policies; (2) strengthening the spiritual education of personnel, lowering their possibility of being replaced; (3) establishing execution examples, and increasing emotion management courses; (4) having a better understanding of personnel’s emotional reactions, and lowering the level of emotional exhaustion; (5) decreasing emotional exhaustion, and increasing job satisfaction; (6) holding leisure activities, and increasing the interactions between peers; (7) establishing psychological consultation departments, and increasing emotional intelligence.
APA, Harvard, Vancouver, ISO, and other styles
40

Chancey, Marla Karen Singh Bawa Satinder. "In the company's secret service Neil Benjamin Edmonstone and the First Indian Imperialists, 1780-1820 /." Diss., 2003. http://etd.lib.fsu.edu/theses/available/etd-11082003-043704/.

Full text
Abstract:
Thesis (Ph. D.)--Florida State University, 2003.
Advisor: Bawa Satinder, Singh, Florida State University, College of Arts and Sciences, Dept. of History> Title and description from dissertation home page (Feb. 23, 2004). Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
41

Lien, I.-Ting, and 連奕婷. "A Novel Privacy Preserving Location-Based Service Protocolwith Secret Circular Shift for k-NN Search." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/94925537856414476902.

Full text
Abstract:
碩士
國立臺灣大學
資訊工程學研究所
100
Location-based service (LBS) is booming up in recent years with the rapid growth of mobile devices and the emerging of cloud computing paradigm. Among the challenges to establish LBS, the user privacy issue becomes the most important concerns. A successful privacy-preserving LBS must be secure and provide accurate query (e.g., k-nearest neighbor) results. In this work, we propose a Private Circular Query Protocol (PCQP) to deal with the privacy and the accuracy issues of privacy-preserving LBS. The protocol consists of a space filling curve and a public-key homomorphic cryptosystem. We connect the points of interest (POIs) on a map to form circular structure with the aid of Moore curve and utilize the homomorphism of Paillier cryptosystem to perform secret circular shifts of POI-related information (POI-info) stored on the server side. Since the POI-info after shifting and the amount of shifts are encrypted, LBS providers (e.g., servers) have no knowledge about the user’s location during query process. The protocol can resist correlation attack and support multi-user scenario as long as the pre-described secret circular shift is performed before each query, in other words, the robustness of the proposed protocol is the same as that of one-time pad encryption scheme. As a result, the security level of the proposed protocol is close to perfect secrecy without the aid of a trusted third party and simulation results show that the k-NN query accuracy rate of the proposed protocol is higher than 90% even when k is large.
APA, Harvard, Vancouver, ISO, and other styles
42

Clement, Dominique Thomas. "The royal commission on espionage 1946-1948: a case study in the mobilization of the Canadian Civil Liberties Movement." Thesis, 2000. http://hdl.handle.net/2429/10389.

Full text
Abstract:
There exists, at this time, surprisingly little historiography on how civil liberties were shaped and developed in practice throughout Canadian history. An examination of the 1946 Royal Commission on Espionage offers several insights into the nature of the immediate post-World War Two civil liberties movement. The commission was formed in response to the defection of a Russian cipher clerk, Igor Gouzenko, in late 1945. The commission investigated the existence of a Russian-led spy ring that had recruited several Canadian civil servants into disclosing secret information. The commission is unique in Canadian history; dominantly due to the fact that it was empowered under the War Measures Act which granted it enormous powers. Everything from a citizen's right to counsel, habeas corpus, protection from state coercion and the right to a fair trial were circumvented. This work attempts to offer a few answers to some important questions about Canadian civil liberties. What were to consequences of the commission's actions? Does Canadian society accept the need to allow a government to violate individual liberties to protect the integrity of the state? Furthermore, the following article will examine the nature of the civil liberties movement following WWII, including the role of the media and civil liberties' organizations in increasing awareness of the vulnerability of individual rights from state abuse. The purpose of this work is to demonstrate the enormous potential in which Parliament could act independently in re-defining Canadians' civil liberties while at the same time demonstrating the central role the Royal Commission on Espionage played in stimulating the post-WWII civil liberties movement. The Royal Commission on Espionage is only one black spot in the history of Canadian civil liberties but there remain many questions to be asked about Canadians' willingness to trust and accept that dictates of the state.
APA, Harvard, Vancouver, ISO, and other styles
43

LI-HUA, YU, and 游麗華. "The Secret of My Growth: A Daughter and A Pre-service Teacher's Searching for the Self." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/71220855024918695300.

Full text
Abstract:
碩士
國立新竹教育大學
教育學系碩士班
98
This is a story about researching myself. I have thought that my real me and the ideal me were different and even contradictory in my life. Most of the time when I got along with people, I acted like a carefree and naive child;being alone, I thought I should be a mature and steady grow-up. I, an ordinary girl, used to be a good girl, sometimes lived in my own world and forgot the real life. I desired to be closer to my father in my mind, but kept away from my father in the real life. I, a girl who is dreaming about to be a teacher, have been through a lot of tests, and eventually realize that I like myself as a teacher the most. After accepting my father, I could re- accept and understand myself. Understanding myself, I have more energy to interact with others. I love myself nowadays, the one who is natural and sincere.
APA, Harvard, Vancouver, ISO, and other styles
44

Shen, Shing-Chiang, and 沈興強. "A Study on the Future Development of the Secret Service Organization from the Organization Structure point of view." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/61093942783390685864.

Full text
Abstract:
碩士
銘傳大學
管理研究所碩士在職專班
93
As an important aspect of the entire national security, the secret service that safeguard the V.I.P. influences directly to the national security and social stability. It is non-replaceable. As a matter of fact, it has great influence on the secret service duty whether the secret service organization structure could establish conspicuous advantage. Among managing field, organization structure go through a great change in the past several years. Under the fast-changing environment nowadays, various kinds of effective and flexible organization structures that developed by the administrator support and help the staff to promote every organization work, and therefore to set up a organization structure which enables the staff to have work with efficiency becomes a great challenge to administrators. This study is based on the theory of organization structure. Through ways of document surveying, secondary materials and relatively studying method, we pick the experience of foreign secret service organization structure, and discuss the good and bad of our country’s secret service organization structure from different organization structure. And then we probe into our country''s secret service organization structure to find out which function our country''s secret service organization structure should possess and how to design it to suit our country''s national conditions and be fully worthy of forming a complete set of secret service organization structure. As a result, we can present our study to the relative organization and institution for reference As our study shows that secret service organization structure of various countries mostly consider the need of safeguarding V.I.P. based on adopting the function subsection to complete the design of organization structure. But it indicates from studying that organizing type takes an attitude toward mixing-type orientation and not single-type organization orientation. And various countries secret service organization structures have technical and supporting staff officer layer. However, it is different under the jurisdiction of secret service organization structure or support by different organization. The country that adopts special project such as matrix organization can get the assistance of its functional department effectively to reach the task with all strength. So foreign secret service organization structure is worth our country''s following deeply. After surveying the present situation of the domestic and international secret service organization structure, we conclude the future developing direction of our country’s secret service organization structure, that is, our country should establish designated responsible secret service organization structure and adopt mixing-type oriented organizing type, in controlling the range, It should be towards flat level development. In order to avoid abusing one''s power, it needs to be supervised by the Congress. It is organized in accordance to the basis of relative law. Working procedures are handled by detailed rules and clear regulations, in order to accord with the principle of administration according to law. Another suggestion on objecting to be under the jurisdiction of organization should be considered scrupulously, and it can improve whole efficiency and overcome the flaws that may be produced by means of passing the organization structural design of the distribution, perfecting supervision mechanism
APA, Harvard, Vancouver, ISO, and other styles
45

Chao, Wang Yu, and 王育昭. "My Secret Garden: The Action Research of the Participation of Young Children in the Environmental Service Learning at School." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/44199408795635075963.

Full text
Abstract:
碩士
輔仁大學
兒童與家庭學系碩士班
99
Environmental Service-Learning is a concept that combines both of learning and community service; through community service, children can practice what they learned from the class. This method benefits to the community, and children can also find fulfillment in service. Pre-school became a perfect location for community service for our study, during 4 months of community service, children from 3 to 5 years- old cultivated flowers, and have learned how to take care of these flowers. After this 4 months, the garden has become a garden which is much more beautiful and opened for everyone, meanwhile, the garden became a good spot for eco-education. During community service, children face kinds of problems and challenges, they have to use their acknowledge and what they have learned in class to discuss to each other. The discussion can inspire their creativity and imagination, and solve problems. The environmental service learning enriches their life experience, and also, with various activities to develop their mind. The study found: children who participated environmental service learning had a great improvement in many areas, such as: they know well about the vegetation and plant technique, their interpersonal skills and school-group environment identity are much better than others. Keywords: service-learning, environmental service-learning, school and environment education.
APA, Harvard, Vancouver, ISO, and other styles
46

Smogorzewski, Emil. "Kontrola operacyjna w polskim procesie karnym." Doctoral thesis, 2017. https://depotuw.ceon.pl/handle/item/2622.

Full text
Abstract:
Przedmiotem rozprawy doktorskiej jest analiza instytucji kontroli operacyjnej w polskim procesie karnym. Głównym pytaniem problemowym pracy jest udzielenie odpowiedzi na pytanie, czy obecnie obowiązujący kształt przepisów o kontroli operacyjnej jest właściwy pod względem regulacyjnym oraz zakładanych celów empirycznych instytucji. Odpowiedź na wyżej wskazany podstawowy cel badawczy pracy wymaga analizy dodatkowych szczegółowych zagadnień, które są omawiane w poszczególnych rozdziałach pracy. W rozdziale I rozprawy znajdują się podstawowe informacje na temat czynności operacyjno-rozpoznawczych. Przeanalizowano w nim definicje czynności operacyjno- rozpoznawczych oraz ich typologię. Przedstawiono także poszczególne służby uprawnione do ich prowadzenia. Rozdział ten zawiera również rozważania na temat relacji między czynnościami operacyjno-rozpoznawczymi, a działaniami procesowym.W rozdziale II omówiono podstawowe kwestie teoretyczno-semantyczne, związane z kontrolą operacyjną – jej definicję, zakres przedmiotowy i podmiotowy, w tym również zagadnienie relacji między postępowaniem z uzyskanymi materiałami z kontroli operacyjnej, a kodeksową regulacją dotyczącą zakazów dowodowych. Przeprowadzone w nim wywody wskazują, że na gruncie kontroli operacyjnej system ochrony tajemnic zawodowych jest niewystarczający.Rozdział III poświęcony jest analizie postępowania w przedmiocie zastosowania kontroli operacyjnej. Zawiera on omówienie wymogów wniosku o zastosowanie kontroli operacyjnej, a także opisuje sposób procedowania w przedmiocie jego rozpoznania. Rozdział ten zawiera również rozważania na temat czasu trwania kontroli operacyjnej, zaskarżania postanowień w przedmiocie kontroli operacyjnej oraz zastosowania kontroli w przypadku niecierpiącym zwłoki. Przeprowadzona w tym rozdziale analiza wykazała, że nadzór prokuratora i sądu nad kontrolą operacyjną jest w wielu miejscach niewystarczający. W rozdziale IV znajdują się rozważania, dotyczące sposobu wykorzystania uzyskanych materiałów kontroli operacyjnej w procesie karnym. W rozdziale tym prowadzone są szczegółowe rozważania (także w perspektywie historycznej) na temat wykorzystania dowodów wykraczających poza treść decyzji organu stosującego kontrolę operacyjną. Przedmiotem zainteresowania tego rozdziału jest również zagadnienie legalności kontroli operacyjnej, zwłaszcza w kontekście art. 168a k.p.k.W rozdziale V przedmiotem rozważań uczyniono analizę obowiązujących rozwiązań z zakresu kontroli operacyjnej, pod kątem zgodności z wymaganiami zawartymi w Konstytucji RP.W rozdziale VI poddano analizie orzecznictwo Europejskiego Trybunału Praw Człowieka dotyczącego niejawnej inwigilacji. Analiza ta wykazała, że przepisy z zakresu kontroli operacyjnej nie spełniają wszystkich europejskich standardów prawnych stosowania niejawnej inwigilacji. Niezgodność ta dotyczy zarówno elementów konstrukcyjnych kontroli operacyjnej jak i postępowania w przedmiocie zarządzenia kontroli operacyjnej.Pracę kończą wnioski badawcze oraz postulaty de lege ferenda. W treści pracy przytoczono także zebrane informacje statystyczno-empiryczne.
The subject matter of my doctoral dissertation is the analysis of the operational control in the Polish criminal process. The main aim of the research is to answer whether the current operational control regulations are proper in respect of legal norms and assumed empirical objectives. An answer to the above mentioned basic research aim requires the analysis of further detailed issues, which are discussed in the particular chapters of the dissertation.In the first chapter of the thesis, we find basic information about operational and investigative activities. Definitions and typology of the operational and investigative activities have been analyzed. Moreover, the particular security services entitled to conduct the operational and investigative activities, are presented. This chapter also includes the deliberations on the relations between the operational and investigative activities and the procedural activities.The second chapter of the thesis discusses the basic theoretical-semantic issues, related to operational control – its definition, the types of offences which may warrant the use of operational control and the targets of the operational control, including the relations between the results of the operational control and the rules of inadmissibility of evidence, provided by the Criminal Procedure Code. The above considerations indicate that the system of protection of privileged communications is insufficient.The third chapter has been dedicated to the proceedings for launching operational control. It contains the discussion about the formal requirements of request for operational control and describes the procedure for launching operational control. This chapter also discusses the duration of operational control, an appeal against the decision for launching operational control and the urgent procedure for launching operational control (with ex-post authorization). The discussion demonstrated that the mechanism of judicial and prosecution supervision is not efficient.In the fourth chapter the author deals with the issues of the use of the results of operational control as evidence in criminal proceedings. Detailed analysis (also from a historical perspective) of the use of evidence exceeding the surveillance authorization has been made. The fourth chapter of the thesis discusses also the legality of the operational control, particularly in the view of article 168a of Criminal Procedure Code.The fifth chapter of the thesis discusses the compatibility of the norms regulating surveillance with the requirements enshrined in Polish Constitution.Jurisdiction of the European Court of Human Rights concerning secret surveillance has been discussed in the sixth chapter. The author demonstrated that the norms regulating operational control did not respect all European secret surveillance standards. This incompatibility concerns both the structural elements and the proceedings for launching operational controlFinally, the conclusions and lex ferenda were proposed. The dissertation includes also statistical data gathered by the author.
APA, Harvard, Vancouver, ISO, and other styles
47

Friesen, Andreas. "Mission der mennoniten Brüdergemeinde in Karaganda/Kasachstan." Diss., 2001. http://hdl.handle.net/10500/585.

Full text
Abstract:
The dissertation in hand is about the theological researches about the mission of the German Mennonite - Brethren - Church in Karaganda I Kasachstan from 1956 to 2000. The existing socialism with its atheistical values affected adversely the lives of the Christians and prevented them from missionary work. In spite of that mission was able to be practised. Experienced preachers and teachers in the church prepared the missionary work by instructing the Christians to be effective witnesses for the Lord. This was achieved by the training of young preachers. regular pronouncements of the Gospel and the work with children and young persons. The Christians retained this method until the middle of the 70ies when the regid laws concerning the missionary work were mitigated. Commited brothers. young persons, preachers and singers visited lonely Christians and churches in remote villages, had personal conversations with unbelievers and organized evangelizations. Members ofthe church were sent out as missionaries to erect parishes and carry out evangelizations
Missiology
M.Th.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography