Littérature scientifique sur le sujet « Computer crimes – European Union countries »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Computer crimes – European Union countries ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Computer crimes – European Union countries"

1

Sukawati, Maheswara Perbawa. « European Union Policy on Artificial Intelligence Related to Cyber Crime ». Hang Tuah Law Journal 4, no 1 (4 août 2020) : 40. http://dx.doi.org/10.30649/htlj.v4i1.169.

Texte intégral
Résumé :
<p>Abstract: </p><p><em>Artificial Intelligence is one of the sector in Revolution Industry 4.0 that become serious topic to discuss in every countries in the world including the European Union itself. They believe that Artificial Intelligence can make the good benefit for the society, however the using of Artificial Intelligence usually make a negative impact for the society therefore the European Union made some Policy about the Artificial Intelligence to support about the Revolution Industry 4.0. The Policy about Artificial Intelligence have the purpose to regulate about using Artificial Intelligence in European Union basically for the members, everything about Artificial Intelligence have the relation with the Technology that have been develop nevertheless everything about technology, internet, computer, and data have already regulated in Convention on Cyber Crime Budapest 2001 therefore everything about Artificial Intelligence including the Policy of Artificial Intelligence in European Union have to related with the Convention on Cyber Crime.</em></p>
Styles APA, Harvard, Vancouver, ISO, etc.
2

Rqiq, Yassine, Jesus Beyza, Jose M. Yusta et Ricardo Bolado-Lavin. « Assessing the Impact of Investments in Cross-Border Pipelines on the Security of Gas Supply in the EU ». Energies 13, no 11 (6 juin 2020) : 2913. http://dx.doi.org/10.3390/en13112913.

Texte intégral
Résumé :
The European Union (EU) is highly dependent on external natural gas supplies and has experienced severe gas cuts in the past, mainly driven by the technical complexity of the high-pressure natural gas system and political instability in some of the supplier countries. Declining indigenous natural gas production and growing demand for gas in the EU has encouraged investments in cross-border transmission capacity to increase the sharing of resources between the member states, particularly in the aftermath of the Russia–Ukraine gas crisis in January 2009. This article models the EU interconnected natural gas system to assess the impact of investments in the gas transmission network by comparing the performance of the system for scenarios of 2009 and 2017, using a mathematical optimization approach. The model uses the technical data of the infrastructures, such as production, storage, regasification, and exchange capacity through cross-border pipelines, and proposes an optimal collaborative strategy which ensures the best possible coverage of overall demand. The actual peak demand situations of the extreme cases of 2009 and 2017 are analyzed under hypothetical supply crises caused by geopolitical or commercial disputes. The application of the proposed methodology leads to results which show that the investments made in this system do not decongest the cross-border pipeline network but improve the demand coverage. Countries such as Spain and Italy experience a lower impact on gas supply due to the variety of mechanisms available to cover their demand. Furthermore, the findings prove that cooperation facilitates the supply of demand in crisis situations.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Hsieh, Jin-chi, Ching-cheng Lu, Ying Li, Yung-ho Chiu et Ya-sue Xu. « Environmental Assessment of European Union Countries ». Energies 12, no 2 (18 janvier 2019) : 295. http://dx.doi.org/10.3390/en12020295.

Texte intégral
Résumé :
This study utilizes the dynamic data envelopment analysis (DEA) model by considering time to measure the energy environmental efficiency of 28 countries in the European Union (EU) during the period 2006–2013. There are three kinds of variables: input, output, and carry-over. The inputs are labor, capital, and energy consumption (EC). The undesirable outputs are greenhouse gas emissions (GHE) and sulfur oxide (SOx) emissions, and the desirable output variable is gross domestic product (GDP). The carry-over variable is gross capital formation (GCF). The empirical results show that first the dynamic DEA model can measure environment efficiency and provide optimum improvement for inefficient countries, as more than half of the EU countries should improve their environmental efficiency. Second, the average overall scores of the EU countries point out that the better period of performance is from 2009 to 2012. Third, the output variables of GHE, SOx, and GDP exhibit a significant impact on environmental efficiency. Finally, the average value of others is significantly better than high renewable energy utilization (HRE) with the Wilcoxon test. Thus, the EU’s strategy for environmental energy improvement should be to pay attention to the benefits of renewable energy (RE) utilization, reducing greenhouse gas emissions (GHE), and enhancing the development of RE utilization to help achieve the goal of lower GHE.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ishchenko, Ivan, Kostiantyn Buhaichuk, Olha Tokarchuk, Kateryna Rudoi et Iryna Tsareva. « European experience of preventive activities performed by law enforcement agencies : administrative aspect and theoretical-legal aspect ». Cuestiones Políticas 40, no 75 (29 décembre 2022) : 263–73. http://dx.doi.org/10.46398/cuestpol.4075.17.

Texte intégral
Résumé :
The aim of the research was to reveal the peculiarities of preventive activities carried out by law enforcement agencies in the countries of the European Union. Attention is paid to the known methods of preventive work carried out by the police of different countries, which make it possible to prevent crimes and arrest criminals when they are still preparing to commit a crime. In this regard, models of preventive activities used in continental European countries are described. The methodological basis of the research is presented in comparative-legal and systematic analysis, formal-legal method, method of interpretation, hermeneutic method, as well as methods of analysis and synthesis. In the conclusions attention is paid to the peculiarities of prevention applied by individual members of the European Union, in particular, the policy of prevention by the Polish police, in terms of recidivism of persons who have already committed crimes. This policy is developed by borrowing from the European experience, because in some countries the emphasis is on extending the powers of police officers, in others - on maximum interaction with the society involved to help implement some police functions.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Cherniei, Volodymyr, Serhii Cherniavskyi, Alexander Dzhuzha et Viktoria Babanina. « Combating credit fraud : experience of Ukraine and some other European Countries ». Revista Amazonia Investiga 10, no 42 (30 juillet 2021) : 93–102. http://dx.doi.org/10.34069/ai/2021.42.06.9.

Texte intégral
Résumé :
The article is devoted to the study of the peculiarities of combating fraud in the field of finance, in particular, combating crimes in the field of lending. The experience of Ukrainian law enforcement agencies in combating credit fraud has been studied. The experience of some European Union countries in combating financial fraud is analyzed. To achieve the goal of the paper a set of general scientific and special methods was used, such as method of system-structural analysis, dogmatic (formal-logical), historical, general sociological, comparative-legal method and others. It is concluded in the article that the rules of criminal law of Ukraine establish more severe penalties for some crimes compared to EU countries. For example, this applies to crimes in the field of money laundering. On the other hand, some offenses that do not qualify as crimes in Ukraine are recognized as criminal offenses in the EU. For example, this applies to abuses in the field of insurance. According to the results of the study, the solution of some important issues is proposed such as improvement of the current legislation in the field of credit and financial relations, adaptation of the legislation of Ukraine to international norms and standards in the system of credit and financial relations.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Vavrek, Roman, et Jana Chovancová. « Energy Performance of the European Union Countries in Terms of Reaching the European Energy Union Objectives ». Energies 13, no 20 (13 octobre 2020) : 5317. http://dx.doi.org/10.3390/en13205317.

Texte intégral
Résumé :
European energy policy, especially the project of the Energy Union, is one of the most rapidly developing areas of the EU, and one through which European institutions are obtaining gradually more extensive power over the performance of the national energy sectors. The paper focuses on an analysis of the energy performance of EU member states (MS) with regard to the priorities of the European Energy Union. For an assessment of the energy performance of EU countries, the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) was chosen, using the Coefficient of Variation method (CV) as an objective method for determining the weights of eight input indicators, including CO2 intensity, electricity and gas price, energy productivity, energy dependence, consumption of renewables and research and development. The analysis for the period from 2008 to 2016 showed significant changes in the input indicators, which directly influenced the results of both methods mentioned above. Long-term differences between the best- and worst-rated countries are seen mainly in CO2 emissions, energy imports and total consumption of renewable energy sources. It is these aspects of comprehensive energy performance and their convergence at the level of EU countries that we believe should be addressed in the near future.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Steponavičiūtė, Ramunė. « The scope of criminal liability for misappropriation of authorship in EU countries : comparative analysis ». Vilnius University Open Series, no 6 (28 décembre 2020) : 192–217. http://dx.doi.org/10.15388/os.law.2020.17.

Texte intégral
Résumé :
Intellectual property legal protection is undoubtedly one of the most important factors and conditions of effective economic, social and cultural development in modern society. According to researchers, absolute majority of countries in the world have set criminal liability for certain crimes against intellectual property rights, including all of the European Union (hereinafter – EU) countries. One of those crimes is misappropriation of authorship. Yet the criminal laws of EU countries criminalise misappropriation of authorship very differently - some protect not only author rights but also related rights, the conditions for criminal liability in the general corpus delicti are of a very different scope as well as the punishments for those crimes differ significantly. This analysis will present the scope of criminal liability in all the EU countries, including the reasons why, as well as will try to find the answer whether ways of coping with these difficulties exist.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Josipović, Ivo. « Responsibility for war crimes before national courts in Croatia ». International Review of the Red Cross 88, no 861 (mars 2006) : 145–68. http://dx.doi.org/10.1017/s1816383106000099.

Texte intégral
Résumé :
This article analyses problems with which the Republic of Croatia, as a country in transition, has to contend during war crimes proceedings. A major characteristic of the recent wars waged on the territory of the former Yugoslavia is that war crimes were committed, though on a different scale, by all parties involved, irrespective of the political and other motives that prompted them to engage in armed conflict. Political unwillingness is the principal reason why national courts, including those in the Republic of Croatia, did not prosecute war crimes in accordance with internationally acceptable standards. The international community responded by setting up the International Criminal Tribunal for the former Yugoslavia (ICTY), the main objectives of which are to establish justice, render justice to victims and determine the historical truth. Implicitly, despite political and other opposition to its work, the ICTY is helping to define legal and ethical standards appropriate for a democratic society in the countries established on the territory of the former Yugoslavia. This is particularly important for the reason that all these countries aspire to membership of the European Union. The work of the ICTY, as well as proceedings before domestic courts, is therefore an important legal, political and moral catalyst on their way towards accession to the European Union. This is fully confirmed by the example of the Republic of Croatia.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Picchi, Marta. « Violence against Women and Domestic Violence : The European Commission’s Directive Proposal ». Athens Journal of Law 8, no 4 (30 septembre 2022) : 395–408. http://dx.doi.org/10.30958/ajl.8-4-3.

Texte intégral
Résumé :
The Commission proposed to enshrine in the law of the European Union minimum standards to criminalise certain forms of violence against women; protect victims and improve access to justice; support victims and ensure coordination between relevant services; and prevent these types of crimes from happening in the first place. In particular, the Commission’s proposal would make it possible, on the one hand, to surmount the gaps existing in some Member States and, on the other hand, to standardise the various national legislations with a single discipline valid in all the countries of the European Union. This paper focuses on the contents of the European Commission’s proposal by highlighting and reflecting on the key points. Keywords: Violence against women; Domestic violence; Directive proposal; European Commission; Minimum standards
Styles APA, Harvard, Vancouver, ISO, etc.
10

Іван Васильович Яковюк, Артем Павлович Волошин et Антон Олексійович Шовкун. « Legal aspects of counteracting phishing : the European Union experience ». Problems of Legality, no 149 (9 juin 2020) : 8–23. http://dx.doi.org/10.21564/2414-990x.149.200028.

Texte intégral
Résumé :
Cybersecurity is increasingly seen as a fundamental problem of the state, which comprehensively affects its security and defense, economy, certain spheres of public life, in particular energy, health care and others. Reliable operation of data networks, computer systems and mobile devices is a prerequisite for the effective state and society functioning, an individual’s life. The reliability of key public information systems depends on many factors: cyberattacks, hardware and software failures, and all kinds of errors. The significant increase in the number of incidents in cyberspace necessitates a systematic analysis of sources of threats, the first place among which is phishing. The introduction of criminal responsibility for phishing is complicated by the fact that "phishing" is an "umbrella" concept that covers a number of launched or committed crimes. From criminal law point of view, phishing attacks can correspond to different categories of crimes (extortion, fraud, blackmail, offenses related to the processing of personal data, etc.). The attempt by some states to impose criminal penalties for phishing at the national level does not solve the problem, since it is not difficult for phishers who work worldwide to cross national barriers. That is still the reason why counteracting cybercrime requires significant efforts not only by individual states but also by international organizations, in particular by the European Union.
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Computer crimes – European Union countries"

1

Cochrane, Brandy Marie. « Drowning In It : State Crime and Refugee Deaths in the Borderlands ». PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/772.

Texte intégral
Résumé :
This paper examines the current state of border hardening against refugees in the European Union and Australia through the lens of state crime. Border hardening strategies are described for both of these areas and a theoretical basis of state crime victimology is used to examine the refugees who encounter this border hardening. The present study analyzes two data sets on border deaths, one for the European Union and one for Australia, to examine the demographics of the refugees who perish while attempting to transgress the border. Results indicated that there remains a significant amount of missing data, suggesting that official methods of record-keeping are necessary to determine the most basic demographics, such as gender and age, so analyses can be run to determine significance in this area. One clear finding was that migrants most frequently die from drowning (EU: 83.6%; AU: 93%) compared to any other cause. Also, there is indication that those from disadvantaged areas of origin (such as the Middle East and Africa) are more likely to die in the borderlands than others in the dataset. Practical implications of the findings are discussed along with suggestions for future research.
Styles APA, Harvard, Vancouver, ISO, etc.
2

BLASI, CASAGRAN Cristina. « Towards a global data protection framework in the field of law enforcement : an EU perspective ». Doctoral thesis, 2015. http://hdl.handle.net/1814/36995.

Texte intégral
Résumé :
Defence date: 8 June 2015
Examining Board: Professor Marise Cremona, European University Institute (Supervisor); Professor Gregorio Garzón Clariana, Autonomous University of Barcelona; Dr. Maria O’Neill, University of Abertay Dundee; Professor Martin Scheinin, European University Institute.
This thesis seeks to examine the existing EU frameworks for data-sharing for law enforcement purposes, both within the EU and between the EU and third countries, the data protection challenges to which these give rise, and the possible responses to those challenges at both EU and global levels. The analysis follows a bottom-up approach, starting with an examination of the EU internal data-sharing instruments. After that, it studies the data transfers conducted under the scope of an international agreement; and finally, it concludes by discussing the current international initiatives for creating universal data protection standards. As for the EU data-sharing instruments, this thesis demonstrates that these systems present shortcomings with regard to their implementation and usage. Moreover, each instrument has its own provisions on data protection and, despite the adoption of a Framework Decision in 2008, this has not brought about a convergence of data protection rules in the JHA field. A similar multiplicity of instruments is also found when the EU transfers data to third countries for the purpose of preventing and combating crimes. This is evident from examining the existing data-sharing agreements between the EU and the US. Each agreement has a section on data protection and data security rules, which again differ from the general clauses of the 2008 Framework Decision. This study demonstrates the influence of US interests on such agreements, as well as on the ongoing negotiations for an umbrella EU-US Data Protection Agreement. One possible way to ensure a high level of EU data protection standards in the field of law enforcement in the face of US pressure is by enhancing the role of Europol. This EU Agency shares information with EU member states and third countries. This thesis demonstrates that Europol has a full-fledged data protection framework, which is stronger than most of the member states’ privacy laws. However, taking Europol rules as a reference for global standards would only partially achieve the desired result. The exchange of data for security purposes does not only involve law enforcement authorities, but also intelligence services. The recent NSA revelations have shown that the programmes used by these bodies to collect and process data can be far more intrusive and secretive than any current law enforcement system. In view of the above, this thesis explores the potential of CoE Convention 108 for the Protection of Individuals with regard to the Automatic Processing of Personal Data and ii the Cybercrime Convention as the basis for a global regime for data protection in law enforcement. This thesis concludes that an optimum global data protection framework would entail a combination of the 108 CoE Data Protection Convention and the Cybercrime Convention. The cumulative effect of these two legal instruments would bind both law enforcement and intelligence services in the processing of data. In sum, by promoting the Europol approach to data protection and existing Council of Europe rules, the EU could play a crucial role in the creation of global data protection standards.
Styles APA, Harvard, Vancouver, ISO, etc.
3

PORCEDDA, Maria Grazia. « Data protection and the prevention of cybercrime : a dual role for security policy in the EU ? » Doctoral thesis, 2012. http://hdl.handle.net/1814/26594.

Texte intégral
Résumé :
Supervisor: Prof. Giovanni Sartor, EUI
Award date: 13 February 2012
PDF of thesis uploaded from the Library digital archive of EUI PhD theses
Cybercrime and cyber-security are attracting increasing attention, both for the relevance of Critical Information Infrastructure to the national economy, and the interplay of the policies tackling them with ‘ICT sensitive’ liberties, such as privacy and data protection. As such, the subject falls in the ‘security vs. privacy’ debate. The objective of this study is twofold. On the one hand, it is descriptive: it aims to cast light on the (legal substantive) nature of, and relationship between, cybercrime and cyber security, which are currently ‘terms of hype’. On the other, it explores the possibility of reconciling data protection and privacy with the prevention of cybercrime and the pursuit of a cyber-security policy, and therefore wishes to explore causation. The latter is a subset of the wider question of whether it is possible to build ‘human rights by design’, i.e. a security policy that reconciles both security and human rights. I argue that narrow or online crimes and broad or off-line crimes are profoundly different in terms of underlying logics while facing the same procedural challenges, and that only narrow cybercrime pertains to cyber-security, understood as a policy. Yet, the current policy debate is focussing too much on broad cybercrimes, thus biasing the debate over the best means to tackle ICT-based crimes and challenging the liberties involved. I then claim that the implementation of data protection principles in a cyber-security policy can act as a proxy to reduce cyber threats, and in particular (narrow) cybercrime, provided that the following caveats are respected: i) we privilege a technical computer security notion; ii) we update the data protection legislation (in particular the understanding of personal data); and iii) we adopt a core-periphery approach to human rights. The study focuses on the EU. Due to time constraints, the interaction between privacy and data protection and other liberties involved, as well as purely procedural issues are outside of the scope of this research.
Styles APA, Harvard, Vancouver, ISO, etc.
4

PORCEDDA, Maria Grazia. « Cybersecurity and privacy rights in EU law : moving beyond the trade-off model to appraise the role of technology ». Doctoral thesis, 2017. http://hdl.handle.net/1814/45944.

Texte intégral
Résumé :
Defence date: 30 March 2017
Examining Board: Professor Marise Cremona, EUI (Supervisor); Professor Deirdre Curtin, EUI; Professor Anne Flanagan, Queen Mary University of London; Professor Ronald Leenes, Tilburg University
This thesis concerns a specific instance of the trade-off between security and ‘privacy rights’, namely cybersecurity, as it applies to EU Law. The research question is whether, and how, the pursuit of cybersecurity can be reconciled with the protection of personal data and respect for private and family life, which I treat as two independent rights. Classic legal argumentation is used to support a normative critique against the trade-off; an in-depth scrutiny of ‘(cyber)security’ and ‘privacy’ further shows that the trade-off is methodologically flawed: it is an inappropriate intellectual device that offers a biased understanding of the subject matter. Once the terms of discussion are reappraised, the relationship between cybersecurity and privacy appears more nuanced, and is mediated by elements otherwise overlooked, chiefly technology. If this fatally wounds the over-simplistic trade-off model, and even opens up avenues for integration between privacy and cybersecurity in EU law, on the other hand it also raises new questions. Looked at from the perspective of applicable law, technology can both protect and infringe privacy rights, which leads to the paradox of the same technology being both permissible and impermissible, resulting in a seeming impasse. I identify the problem as lying in the combination of technology neutrality, the courts’ avoidance in pronouncing on matters of technology, and the open-ended understanding of privacy rights. To appraise whether cybersecurity and privacy rights can be reconciled, I develop a method that bridges the technological and legal understandings of information security and privacy, based on the notions/methods of protection goals, attributes and core/periphery or essence, and which has the advantage of highlighting the independence of the two privacy rights. A trial run of the method discloses aspects of the ‘how’ question that were buried under the trade-off debate, viz. the re-appropriation of the political and judicial process vis-àvis technology.
Chapter 4 draws upon an article in Neue Kriminalpolitik 4/2013
Styles APA, Harvard, Vancouver, ISO, etc.
5

KIES, Raphaël. « Promises and limits of web-deliberation ». Doctoral thesis, 2008. http://hdl.handle.net/1814/10477.

Texte intégral
Résumé :
Defence date: 09 June 2008
Examining Board: Prof. Peter Wagner, University of Trento and EUI Supervisor Prof. Alexander Trechsel, EUI Prof. Jürg Steiner, University of Carolina Prof. Hanspeter Kriesi, University of Zürich
PDF of thesis uploaded from the Library digital archive of EUI PhD theses
In this work we will attempt to evaluate which of these scenarios is most likely to become prominent in the future by focusing essentially on three issues: 1) the usage of the online forum by observing how diffuse the phenomenon is and who the users of the online debates are; 2) The offer of the online political forum, by analyzing which are the political actors (civil society, media, institutional actors) who are more susceptible to host the online political debates; and 3) the quality of the online debates by assessing their deliberativeness. By elaborating a sophisticated method for measuring the deliberativeness of the online debates and by analyzing a great variety of online debates our objective is to provide an appreciation of the deliberative potential of the web-debates that avoids shortcuts and inappropriate generalizations, but that recognizes that this may be determined by a multiplicity of factors. From a theoretical perspective the results obtained through our investigations contribute to evaluate whether the deliberative model of democracy could be fostered by the virtualization of the political debates and, more generally, it should also contribute to the elaboration of a deliberative model of democracy that is grounded not only on theoretical principles and suppositions, as this tends to be the case, but also on empirical studies that test its adaptability to the 'real life politics'.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Computer crimes – European Union countries"

1

Sloan, Barbara. Accessing European Union information. Washington, D.C : Delegation of the European Commission, Office of Press & Public Affairs, 1998.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Ryan, Michael H. The EU regulatory framework for electronic communications handbook. 2e éd. London : Bloomsbury Professional, 2010.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Christou, George. Cyber security in the European Union : Resilience and adaptability in governance policy. Houndmills, Basingstoke Hampshire : Palgrave Macmillan, 2015.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Broderick, Terry R. Regulation of information technology in the European Union. London : Kluwer Law International, 2000.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

EU digital copyright law and the end-user. Berlin : Springer, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Cristina, Capineri, et Rietveld Piet, dir. Networks in transport and communications : A policy approach. Aldershot : Ashgate, 1997.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Cappel, Alexander. Grenzen auf dem Weg zu einem europäischen Untreuestrafrecht : Das Mannesmann-Verfahren und [Paragraph] 266 StGB als Beispiele eines expansiven Wirtschaftsstrafrech. Frankfurt am Main : P. Lang, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Europe, United States Congress Commission on Security and Cooperation in. Implementation of the Helsinki accords : Hearing before the Commission on Security and Cooperation in Europe, One Hundred Third Congress, first session, the countries of Central Asia, problems in the transition to independence and the implications for the United States, March 25, 1993. Washington : U.S. G.P.O., 1993.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Europe, United States Congress Commission on Security and Cooperation in. Implementation of the Helsinki accords : Hearing before the Commission on Security and Cooperation in Europe, One Hundred Third Congress, first session, the countries of Central Asia, problems in the transition to independence and the implications for the United States, March 25, 1993. Washington : U.S. G.P.O., 1993.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Baber, Graeme Scott. European Union and the Global Financial Crisis : A View from 2016. Nova Science Publishers, Incorporated, 2016.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Chapitres de livres sur le sujet "Computer crimes – European Union countries"

1

Radoniewicz, Filip. « International Regulations of Cybersecurity ». Dans Cybersecurity in Poland, 53–71. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_5.

Texte intégral
Résumé :
AbstractThere is no doubt that, due to the global nature of modern ICT networks, international cooperation plays a key role in ensuring cybersecurity, including in the fight against cybercrime.This chapter describes initiatives taken within international organizations to ensure cybersecurity and the prevention of cybercrime. The presentation will start with the initiatives of the OECD and the Council of Europe. This is due not only to some kind of “Eurocentrism” but above all to the fact that these two organisations were the first to address cybersecurity and cybercrime issues. In addition, the Council of Europe Convention 185 on CyberCrime of November the 23rd, 2001, an international agreement concluded in the Council of Europe, is a milestone in the prevention of computer crime, remaining the only binding act of international law to combat it. Its importance is best demonstrated by the constantly growing number of signatories (and countries that model without signatures after the provisions, e.g. Pakistan) and the fact that international organisations, or recommend that their members accept (UN, G7/G8, European Union) or “copy” provisions, creating their own model legal acts (e.g. Commonwealth).
Styles APA, Harvard, Vancouver, ISO, etc.
2

« Emissions Trading Scheme : Evidence from the European Union Countries ». Dans Communications in Computer and Information Science, 204–15. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23766-4_17.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Martinho, Vítor João Pereira Domingues. « Analysis of the Cybercrime with Spatial Econometrics in the European Union Countries ». Dans Advances in Digital Crime, Forensics, and Cyber Terrorism, 483–99. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch030.

Texte intégral
Résumé :
The main objective of this chapter is to analyze the crimes related to the new information technologies in the European Union using the data provided by the European Commission and the spatial econometrics approaches. The data were analyzed with several tests, namely the Moran´s I, to verify the existence of global (for all countries of the European Union) and local spatial autocorrelation. The presence of spatial autocorrelation in the data means that the variable analyzed in a determined country is auto correlated with the same variable in the neighboring countries. The data analysis was complemented with some cross-section estimations, considering namely the Lagrange Multiplier tests, to examine the spatial lag and the spatial error autocorrelation. The spatial autocorrelation is a statistical infraction, so the consideration of these subjects prevents result bias and on the other hand allows some conclusions important to help in the definition of adjusted policies.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Madai, Sándor. « The Impact of Economic Policy on Economic Crime ». Dans Criminal Legal Studies : European Challenges and Central European Responses in the Criminal Science of the 21st Century, 361–70. Central European Academic Publishing, 2022. http://dx.doi.org/10.54171/2022.evcs.cls_12.

Texte intégral
Résumé :
This study presents the parallelism of the characteristics of the economic crimes of the Central and Eastern-European countries participating in the project. That is, it notes aspects of criminal law that clearly show that such countries in the past decade employed (and still employ) similar regulatory principles, owing to reasons such as geographical proximity and others. This study provides an over- view of the regulatory directions of the countries after World War II, which, from the Soviet sphere of interest, were common. We then review the main steps in the field of action against economic crimes, which can be perceived as stemming from democratization. Notably, most of the examined countries are European Union members, and more countries want to join. Therefore, among the countries, the integration process indeed reveals a similar legal and political background. Consider- ing the limitations of the study, it was not possible to examine the changes in the regulations of each country in detail. Thus, we only tried to draw attention to the similarities of common processes and characteristics.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Violeta Achim, Monica, Sorin Nicolae Borlea, Viorela Ligia Văidean, Decebal Remus Florescu, Eugenia Ramona Mara et Ionut Constantin Cuceu. « Economic and Financial Crimes and the Development of Society ». Dans Standard of Living, Wellbeing, and Community Development [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.96269.

Texte intégral
Résumé :
The purpose of this chapter is to study the detailed dynamics of economic and financial crimes within the European Union member states, namely corruption, shadow economy, tax evasion, money laundering, cybercrime and financial frauds. Our econometric modelling focuses on the impact of the vector of financial and economic crime proxies upon economic prosperity and human development. In accordance to the reviewed literature, for our sample of European Union countries, corruption and shadow economy have a negative effect upon the vector of development proxies while money laundering and cybercrimes belonging to “white collars” are positively correlated with the vector of development proxies that we analyze. All the data are interpreted and discussed, and then conclusions are drawn. Governmental policies on economic prosperity and societal wellbeing should focus on reducing corruption and shadow economy, in order to favour benefits in the field of economic and human development.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Rossel, Lucia, Brigitte Unger, Jason Batchelor et Jan van Koningsveld. « The Implications of Making Tax Crimes a Predicate Crime for Money Laundering in the EU ». Dans Combating Fiscal Fraud and Empowering Regulators, 236–71. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198854722.003.0013.

Texte intégral
Résumé :
This chapter sheds light on the divergence of tax crimes and money laundering laws across Europe after the implementation of the 4th Anti Money Laundering Directive. Laws are a crucial part of the tax environment as they are one of the rules under which the tax ecosystem operates. Taxpayers should pay their taxes following the law, and tax experts should advise them within the realm of it. The chapter sees the 4th AMLD as a shock that put money laundering regulation inside the tax ecosystem, and the way that countries implement this in their regulation is the response to this shock; it uses an innovative comparative approach that involves the analysis of tax evasion through an empirical legal lens. The chapter includes a dataset built by the authors with the legislation of all European Union countries regarding tax crimes and money laundering, as well as other relevant legal variables.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zakharko, Andrii, et Oleksii Boiko. « THE STATUS OF IMPLEMENTATION OF THE CYBER CRIME CONVENTION IN EASTERN EUROPE ». Dans Science, technology, and innovation : the experience of European countries and prospects for Ukraine. Publishing House “Baltija Publishing”, 2021. http://dx.doi.org/10.30525/978-9934-26-190-9-7.

Texte intégral
Résumé :
The monograph analyzes the status of reform of criminal procedure legislation of Ukraine and other Eastern European countries to implement the procedural provisions of the International Convention on Cybercrime in order to determine the procedural powers of pre-trial investigation authorities to collect electronic evidence. The relevance of the research topic is substantiated by statistical data on the rapid growth of the number of criminal offenses, the method of committing which is inextricably linked with the use of computers and computer data processing. The monograph consists a systematic analysis of the procedural powers of pre-trial investigation bodies which are provided for in the Convention on Cybercrime and aimed at increasing the effectiveness of pre-trial investigation bodies in documenting criminal activity, taking into account the specific form of factual data that need to be collected as evidence in these investigations. It is stated that the need to supplement the procedural powers of pre-trial investigation bodies in the investigation of computer crimes is determined by such factors as: technological ability to change, distort, modify and destroy electronic data quickly after using them in computer crimes; technological possibility of placing such electronic data outside the territorial jurisdictions of individual states and outside the location of continents, etc. It has been established that in order to ensure the effectiveness of pre-trial investigations into computer crimes, the powers of the prosecution need to be supplemented by the following procedural possibilities, provided for in the Cybercrime Convention: the possibility for the competent authority to issue an order for the urgent retention of certain computer data, including data on the movement of information stored by the computer system, in particular when there are grounds to believe that such computer data is particularly vulnerable to loss or modification; the obligation of the person who controls the relevant computer data to kept and maintain the integrity of such computer data for a certain period of time which is necessary to obtain permission from the competent authority to disclose such data; the obligation of the person who must keep such computer data on the order of the competent authority, to maintain the confidentiality of the fact of such procedures for a certain period; ensuring the possibility of urgent storage of data on the movement of information, regardless of the number of service providers involved in the transmission of such information; ensuring the possibility of urgent disclosure of information on the movement of information, to the competent authority. Such amount of information is sufficient to identify service providers and the route of the information`s transmission; search and seizure of computer data, etc. A systematic analysis of the criminal procedure legislation of Eastern European countries has shown that Ukraine’s neighbors have also not fully signed and ratified the procedural provisions of the Convention on Cybercrime. Only Hungary, Romania and the Republic of Bulgaria have secured the most effective powers of the analyzed states. In particular, the criminal procedure law of these states provides for such powers of the prosecution as: issuing a warrant for the urgent preservation of certain e-data; the person’s responsibility to maintain the integrity of stored e-data; seizure of data, computer system, part or medium; copying and saving a copy of such e-data; preserving the integrity of stored e-data; extracting e-data from a computer system, etc.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Miheș, Cristian Dumitru. « Romania : National Regulations in the Shadow of a Common Past ». Dans Criminal Legal Studies : European Challenges and Central European Responses in the Criminal Science of the 21st Century, 125–55. Central European Academic Publishing, 2022. http://dx.doi.org/10.54171/2022.evcs.cls_5.

Texte intégral
Résumé :
The rule of law is very difficult to enforce during periods of dictatorship or war. We can have a justice system that functions, as we had before 1989, but that system was confined to upholding the regime in power. Romania experienced a dictatorship for a very long period of time. In the first phase, there was a royal dictatorship from 1938, then a military one, followed by the communist regime until the end of 1989. Since 1945, Romania has been a part of the world where the communist system imposed by the Soviet Union left its mark on criminal justice. The authors of the 1968 Penal Code considered that code to have been adopted “with the purpose of solving uniformly the vast problematic of pre- venting and punishing the crimes.” In a practical regard, the entire legislation was a tool to ensure the success of the regime of communist oppression. In these circumstances, the events that took place in 1989 liberated the spirit of freedom; meanwhile, the consequences of those events took the citizens of the Central and East European countries by surprise, and they were unprepared for the struggle toward democracy and the rule of law. This was the case in Romania when, finally, in 2014, the process of enforcing all fundamental codes was established. In fact, the reform was deeper than the adoption of a new Penal Code, the Code of Criminal Procedure, and the Law on the Execution of Sentences, Educational Measures, and Judicial Measures during Criminal Proceedings. This study presents the main principles, legal institutions, and operational characteristics of the new laws.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Ragusa, Angela T., et Emma Steinke. « Studying Locally, Interacting Globally ». Dans Computer-Mediated Communication across Cultures, 344–68. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-60960-833-0.ch022.

Texte intégral
Résumé :
The general trend towards freely circulating capital, goods and services, coupled with changes in the openness of labour markets, has translated into growing demands for an international dimension of education and training. Indeed, as world economies become increasingly inter-connected, international skills have grown in importance for operating on a global scale. Globally oriented firms seek internationally-competent workers versed in foreign languages and having mastered basic inter-cultural skills to successfully interact with international partners. Governments as well as individuals are looking to higher education to play a role in broadening students’ horizons and allowing them to develop a deeper understanding of the world’s languages, cultures and business methods. One way for students to expand their knowledge of other societies and languages, and hence leverage their labour market prospects, is to study in tertiary educational institutions in countries other than their own. Several OECD [Organisation for Economic Co-operation and Development] governments – especially in countries of the European Union (EU) – have set up schemes and policies to promote mobility as a means of fostering intercultural contacts and building social networks for the future. (Organisation for Economic Co-operation and Development, 2009, p. 310)
Styles APA, Harvard, Vancouver, ISO, etc.
10

Págio, Leonardo Saraiva. « UMA NOVA ORDEM JURÍDICA FISCAL INTERNACIONAL ATRAVÉS DA COOPERAÇÃO ELETRÔNICA DE INFORMAÇÕES FINANCEIRAS-FISCAIS ». Dans Fronteiras de acesso à Justiça : Processo e Meios Alternativos na Democracia no Século XXI, 35–53. JUS.XXI, 2022. http://dx.doi.org/10.51389/qdkv9608.

Texte intégral
Résumé :
In a Portuguese-Brazilian dialogue, confronting the realities of the American and European continents, it is clear that the European Union, through the OECD with the support of the United States through FATCA, contributes to international cooperation with respect to providing legal conditions and procedures favorable to an information technology integrated in the scope of their respective financial-fiscal systems to attend to the control and inspection of facts that generate taxable wealth and, in this way, realize distributive justice at the international level, strengthening all countries. It is notorious the existence of a significant portion of the population using the culture of avoiding taxation as an advantageous means to indulge themselves and have greater gains against competitors in an unfair way. This posture on the part of natural and legal persons in American and European countries directly harms the collection, the provision of public services and the democratic process for the effective reduction of social inequalities. Confronting this nefarious and improper conduct of omissive tax exemption, which directly affects the implementation of international fiscal and human rights standards, is in line with a promising legal regime for exchanges at a technological level of financial-tax information in the fight against fraud and tax evasion. In addition to eliminating terrorist financing, preventing aggressive tax planning, money laundering and eliminating criminal organizations that engage in money laundering and other crimes against public order. The theme of exchanging tax information has been widely debated and new paradigms have been adopted, namely due to the international context we have lived in the last decades characterized by the phenomenon of globalization of national economies, technological advances, the role of the Social State and several unexpected events and impacting of a natural or induced nature, it has favored a new posture of adaptation, improvement and integration of countries and their administrative operation systems and, above all, fiscal. The activities in this legal exchange regime, according to the author, are the responsibility of an international organization with specialized technical coordination (European Commission/WTO) with power to make decisions regarding the promotion or economic administrative restrictions in favor of the public interest, in the rigorous and sophisticated regulation of the entire flow of information generated in each tax system in the European Union, Mercosur and all countries in the world, so that taxpayers are under monitoring and security regarding their valued income and acquisitions, given the globalized economy, as this deepens scientific research in his master's thesis in legal and business sciences in Portugal. The European Union, like Mercosur and other intergovernmental organizations for economic integration, are advancing with the objective of transparency and improvement of processes that will benefit the State's revenue and establish fiscal rules that favor the exchange of financial information between countries for an advanced control and inspection of the tax system, in the face of that omissive sovereign State, which perhaps does not respect or is unable to preserve the rights constitutionally guaranteed to all its citizens. The cooperation system in the exchange of financial-fiscal information at a universal level, between the tax administrations integrated to the competition bodies, will enable the execution of investigation, analysis, control and financial-fiscal-market assessment of all taxpayers and companies in a certain territory, so that it does not happen that a given company decides to transfer to another country to carry out its operations, based on privileged and selective conditions granted to it, without taking into account the damage to competitors, to the taxpayers and the State.
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Computer crimes – European Union countries"

1

Antonoaie, Cristina, et Camelia Bucur. « CONSIDERATIONS CONCERNING ICT SPECIALISTS IN EUROPE ». Dans eLSE 2021. ADL Romania, 2021. http://dx.doi.org/10.12753/2066-026x-21-002.

Texte intégral
Résumé :
Today we need more than basic skills to use a computer. Due also to the current pandemic situation we have a lot of on-line activities - starting from school, work, training, shopping, paying the bills, exercising, watching a movie and many others. Fortunately, the Internet is offering us the possibility to stay safe. That is why we need to obtain digital skills - information, communication, problem-solving, and software skills. For that, besides the infrastructure, we need specialists that will be able in the end to also teach the large population to properly use a computer. We have analyzed in this paper six indicators referring to individuals' level of digital skills, the ways to obtaining ICT skills, the number of employed ICT specialists, the education attainment level of those specialists, and their age. We did that with the help of the data from the Eurostat database. We selected for the graphical analysis 5 countries with different national cultures and different companies cultures, as identified with Hofstede's Model: Romania, Bulgaria, Poland, Germany, Finland, and we also use the composite index EU-27 for the remaining 27 countries in the European Union. Unfortunately, for the moment, the ICT specialists are representing only a maximum of 7% of the employed persons. For sure this percent will become higher because society needs to adapt to the new realities, the new and dangerous crises. The discrepancies between the urban and the rural population, and of course, between the rich and the poor will be more accentuated.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kolumber, David. « Protistátní trestné činy v moderních kodifikacích ». Dans Protistátní trestné činy včera a dnes. Brno : Masaryk University Press, 2021. http://dx.doi.org/10.5817/cz.muni.p210-9976-2021-4.

Texte intégral
Résumé :
The contribution “Anti-state Crimes in Modern Codifications” deals with the topic of anti-state crimes during centuries. Firstly, legal concepts in the pre-state period are mentioned. Then the attention is paid on the evolution of this institute in the Euro-Atlantic area. From this point of view, there are mentioned mainly regulations from England (1351), France (1810), Germany (1871) and Soviet Union (1958) which could be remarked as the most important for the development of other countries. On the other hand, it also reminds the development of codifications in Czechoslovakia, the Czech Republic and Slovakia, which were affected by the Austro-Hungarian legislations as well as German and Soviet approaches. The Czech current arrangement generally does not depart from the other European samples, but it cannot be omitted that in the Czech Republic it is distinguished the penal concept of the high treason (Landesverrat, vlastizrada) from the constitutional concept (Hochverrat, velezrada) which is dedicated to the presidential anti-state activities. The contribution also indicates that the concept of anti-state crimes in countries has not been unified and it has been varying according to various experiences and attitudes.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Nichoga, Vitalij, Petro Dub et Eugeniusz Grudzinski. « Peculiarities of European Union Countries and Ukraine Approach to Estimation of Technogenic Electromagnetic Fields Influence on Bioecosystems ». Dans 2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science. IEEE, 2006. http://dx.doi.org/10.1109/tcset.2006.4404428.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Sloka, Biruta, Ieva Brence et Henrijs Kalkis. « Application of information technologies for social inclusion : current trends and future prospective ». Dans 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002652.

Texte intégral
Résumé :
Remote work and remote studies has increased in great extent the requirements of information technologies use and skills to apply information technologies. In European Union countries annually it is checked the availability of computer software as well as skills of information technologies use: there are annually conducted surveys on survey on use of information and communication technologies (ICT) in households and by individuals. The aim of the paper is to research theoretical aspects and to analyze internet use in regions of Latvia for checking on whether there is statistically significant use. The source of the data is the questionnaire No. ICT-persons “Use of computers and the internet in households”. As well as Labor Force Surveys, EU-SILC survey data. Research methods applied: scientific publication analysis, time-series analysis of internet use in Baltic countries, analysis of data on differences of availability of computers in households by regions of Latvia by analysis if variance or ANOVA, by territories (urban and rural) by t – test and by household size by ANOVA.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Molnar, Jozef, Marek Pecka et Jaroslav Kment. « SCORPIO-VVER : Two Decades of Experience and Enhancements in Reactor Core Monitoring and Surveillance in Central Europe ». Dans 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-66867.

Texte intégral
Résumé :
During the years 1970–80’ in the satellite countries of the former Soviet Union more than 24 new reactor builds were started. In the former Czechoslovakia, the new builds were realized with a high degree of input from the local engineers and the local industry. This territory up to today has an indigenous nuclear industry, machinery and nuclear engineering background. Starting with the year 1972, on the territory of Czechoslovakia (now on the territory of the Czech and Slovak Republic) 12 new units of the VVER-440 type of reactors were started to build. Nowadays the 2 oldest units were already shutdown in Slovakia, 4+4 units are still operating in both countries, and 2 units of VVER-440 model V213 are still under construction in Slovakia. The reactors designed lifetime in original configuration are 30 years. During these units’ operation period, wide range of modifications and upgrades were performed to strengthen the nuclear safety and the reactors operability. In 2015/16, activities related to the unit operation licenses extension were carried out in both of countries. In scope of strengthening the reactor’s core monitoring and surveillance, at Dukovany NPP (CZ, 1998) and at Bohunice NPP (SK, 2001) the original Russian VK3 computation system was completely replaced with an alternative advanced Core Monitoring and Surveillance System (CMS) SCORPIO-VVER. In Hungary, a locally developed “Verona”, and on the units under construction in Slovakia the Russian “Kruiz” CMS is used. Nowadays the SCORPIO-VVER CMS presents a nuclear fuel type and fuel vendor independent, advanced computer based reactor core monitoring system with an open and flexible framework, including the latest achievements in the fields of N/F and T/H for reliable and safe reactor operation with high efficiency of fuel cycle. The system’s framework governing the know-how and knowledge of 5 European institutes with proven experiences with reactor operation, fuel pattern and fuel campaign design and with utilizing the existing unit’s project reserves to increase the reactor operation and fuel campaign efficiency. Since the first installation the SCORPIO-VVER CMS system has a remarkable operating history and experience. More than 18 years of experiences at 6 units of VVER-440 type of reactors in two different countries helps to put the system to a very high level of usability and reliability. Even if the SCORPIO-VVER is installed only on VVER-440 reactors, it could be adapted to the needs of other VVER type of reactors and to needs of education and training centers too.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Vilinová, Katarína, Lucia Petrikovičová et Laura Babjaková. « Práca s internetom ako indikátor počítačovej gramotnosti obyvateľstva Slovenska ». Dans XXIII. mezinárodní kolokvium o regionálních vědách / 23rd International Colloquium on Regional Sciences. Brno : Masaryk University Press, 2020. http://dx.doi.org/10.5817/cz.muni.p210-9610-2020-37.

Texte intégral
Résumé :
Computer literacy affects all areas of human life, and our subsequent control is almost inevitable nowadays. Due to the rapid growth of scientific knowledge and development of information and communication technologies, significant changes are taking place in individual countries. New technologies are coming to the fore through which there is an increase in country's economy, employment as well as labor productivity. To some extent, this fact is influenced by the ability of basic computer skills. This aspect is also important in terms of regional development at the national, regional and local level. The aim of the paper is to characterize selected indicator of computer literacy - internet work at three levels of Slovakia (state, district and municipality). The paper will be based by data from the Statistical Office of the European Union and Statistical Office of the Slovak republic. The methods of analysis, synthesis as well as graphical and cartographic methods will be the main methods used in the paper. Based on the achieved results, it can be stated that Slovakia achieved an average of 51.4 % in the development of internet use. It is very just above the EU average. At the regional level, the highest rate of internet use is manifested in the western part of Slovakia. At the local level in the case of the Nitra district, the internet was mostly used in the hinterland of the city of Nitra.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Wahba, Khaled, et Sherif Kamel. « A Virtual Research Model to Help Academics Face the Challenges of the 21st Century ». Dans 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2401.

Texte intégral
Résumé :
The academic career and the stages of promotion of teachers and field researchers at the Egyptian universities as well as at many research centers available in Egypt's 26 provinces is guided by a set of rules and regulations that mainly depend on the number of publications that the researcher is producing in a specific period of time. It is also important to note that such publications should be published in well-known and accredited journals, transactions, and conference proceedings amongst others. These publications could be produced jointly with other institutions both locally and internationally. In all scenarios, one common problem always prevails, that is resources and funding. As for funding it is occasionally provided through international donors such as the European Union and the National Science Foundation. However, the problem remains in the local segment where various barriers are slowing down if not blocking the production of up-to-standard publications and research projects that are needed to contribute to the overall development of various sectors both quantitatively and qualitatively. Example barriers would include financial resources, required specialized equipment, as well as computing (hardware and software) and communication resources. In that respect, Scientific Computer Software Applications (SCSA) is becoming frequently the workhorse of research and development activities. Many software packages have been released to help researchers analyze and produce scientific publications. Most of these packages have a complicated design as well as expensive making it difficult to buy and not easy to understand by the user. Egypt, a developing country, lacks funding for research and development activities as compared to the United States and other European countries. The lack of financial resources and the scarcity of required resources make it difficult for academic researchers to build and excel in their academic careers. This paper demonstrates a new model namely; Virtual Research System (VRS), that is free from limitations of spatial distance and time and based mainly on information and communication technologies including the Internet to help leverage the quality and the quantity of academic researchers in Egyptian universities both locally as well as through collaborative work with other international research institutions. The paper provides an opportunity to share a wealth of information and knowledge that was never tapped before through the old accustomed to traditional techniques. The paper also demonstrates that new information and communication technologies are creating many challenges and opportunities for growth in different disciplines including research and development.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Vlada, Marin, et Adrian Adascalitei. « COMPUTERS : AS DIGITAL FACILITIES FOR SCIENTIFIC RESEARCH AND AS TOOLS FOR ENHANCED LEARNING IN HIGHER EDUCATION ». Dans eLSE 2014. Editura Universitatii Nationale de Aparare "Carol I", 2014. http://dx.doi.org/10.12753/2066-026x-14-138.

Texte intégral
Résumé :
Complexity of learning causes at all stages of development of human society, the search for new methods, new tools, new resources for relevant efficiency in education. Until now developed new theories and methods developed by educators and psychologists were reformed and modernized education systems of the countries have adapted curriculum learning goals were always set new directions in scientific research. Over time, changes in all scientific theories, methods and techniques of investigation of development of human knowledge that influence the overall development of human society. To achieve development and efficiency in life, one must continually adapt to the changes of knowledge. In education, particularly learning and improvement, the emergence of new information and communication technologies (ICT) to improve pedagogical theories and psychological forces pupils / students, teachers, parents and professionals to adapt to these changes. What do pupils and students? What do teachers and parents? What do experts? What are governments? An Example. INTIME Project (1999-2001). "The mission of INTIME is to help educators improve student learning at all levels (PK thru University work) and in all content areas. We work with PK thru 12th grade teachers and university faculty to accomplish this mission. We use contemporary technology, high quality conceptual models, online streaming videos, case studies and probing questions analysis to help educators learn the skills necessary for improving student learning". Technology as Facilitator of Quality Education Model: A Model (by William P. Callahan and Thomas J. Switzer, College of Education, University of Northern): o COMPUTER: means for forming a new vision of education, research and innovation. o TECHNOLOGY: mediator of quality education. o STUDENTS: active participants in their own learning process. Computer Aided Learning Many educational projects that use computer and software are the result of complex ideas and exploratory actions immediately after 2000. Already there were many changes in education by supporting it with systems, programs and applications, including the development of IDD shape (Open Distance Learning). At that time - the transition from Web 1.0 to Web 2.0 technology, the terms "e-Learning" and "Educational Software" appeared more often in various articles, studies, reports, etc.. Today, some experts in e-learning and educational software actually admit that at the time concepts were not clear and do not understand the context of their use in education and training. After 10 years, by following some step-difficult-sometimes even e-Learning products and educational software incorporates not only expertise in informatics and IT professionals, especially teachers and teaching scenarios for learning: IAC (Computer Aided Training). Systemic approach to learning and teaching strategy Computer assisted learning systems approach to training enables a new vision that psycho-pedagogy one theorized in recent years, but which becomes operative when teaching strategy is combined with multimedia technologies. While in training designed as a system can be determined: for the system (training objectives), the processes by which it is achieved for (type of activities, learning situations in which students must participate to achieve the targets) and the results that they want to reach (translated into effective procurement categories of students), educational software design allows even cover the main elements of the system, helping to optimize the learning process. News trends New trends in education highlights the need for a teaching tool that involves both players learning process: teachers and students.Changing the paradigm shift from learning and knowledge acquisition in the development of skills, values and attitudes necessary focus on training activities and voluntary dominant active participation of students to the needs, interests and their learning profiles. Differentiated Instruction and its contextualization is particularly useful support in using computers in the classroom. The Power of Learning "Teaching is more than imparting knowledge, it is inspiring change. Learning is more than absorbing facts, it is acquiring understanding." William Arthur Ward Knowledge and lifelong learning frees you from ignorance and superficiality. Today, technology and software resources help business efficiency and a better job in this regard. "Educational content it should encourage students to create their own knowledge by experiment, not by learning a text by heart." Radu Jugureanu The responsibility for education is nowadays shared: collaborative demarches and adequate commitment from all stakeholders is very much increasing the effects of education as a whole, oriented towards preparing competitive human resources equipped with competences for the 21st Century: cooperation, communication, critical thinking, creativity, innovation. In the United States and also in UNESCO strategies these are referred to as the 21st Century Skills. The European Union in the Lisbon framework outlines eight domains of Key Competences for Lifelong Learning. These 21st Century Skills are critically important to support the challenges of the modern workplace and its dynamic and the rapidly changing knowledge society. There is a growing and widely accepted understanding that a different set of skills need to be developed by our students in our school systems. Highly structured and disciplined schooling systems do not necessarily prepare students well for the dynamics and challenges of the 21st century workplace and society. For Dr. Howard Gardner (American Psychologist and Educator), intelligence is (Building the 21st-Century Mind: www.howardgardner.com, Gardner, 2009): o the ability to create an effective product or offer a service that is valued in a culture; o a set of skills that make it possible for a person to solve problems in life; o the potential for finding or creating solutions for problems, which involves gathering new knowledge. Skills are critically important to support the challenges of the modern workplace and its dynamic and the rapidly changing knowledge society. There is a growing and widely accepted understanding that a different set of skills need to be developed by our students in our school systems. Highly structured and disciplined schooling systems do not necessarily prepare students well for the dynamics and challenges of the 21st century workplace and society. More self-motivated, individualized, group and collaborative learning processes, supported by ICT will contribute significantly to the preparation of a more agile modern workforce (Hamilton, & O'Duffy 2009).
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie