Literatura científica selecionada sobre o tema "User Agreements"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "User Agreements".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "User Agreements":

1

Gaudin, Germain, e Alexander White. "Vertical Agreements and User Access". American Economic Journal: Microeconomics 13, n.º 3 (1 de agosto de 2021): 328–71. http://dx.doi.org/10.1257/mic.20180339.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Platforms acting as sales channels for producers often charge users for access via a subscription fee or a markup on hardware. We compare two common forms of vertical pricing agreement that platforms use with sellers: per unit and proportional fees. In particular, we analyze the critical role that user access plays on prices, profits, and welfare under both forms of agreement. We characterize this role and show how it potentially overturns standard results saying that proportional fees lead to lower prices and higher profits. (JEL D21, D43, K21, L42, L86)
2

Moorefield-Lang, Heather Michele. "User agreements and makerspaces: a content analysis". New Library World 116, n.º 7/8 (13 de julho de 2015): 358–68. http://dx.doi.org/10.1108/nlw-12-2014-0144.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Abstract – The purpose of this paper is to analyze the user agreements of makerspaces in public and academic libraries. User agreements, also known as maker agreements, user forms and liability forms, can be very important documents between library patrons, staff and faculty. User agreements are similar to the earlier creation of acceptable use policies for technology use in libraries. The author of this study will delve into the user agreements created for public and academic libraries across the USA. Design/methodology/approach – The researcher used content analysis to investigate 24 different user agreements written for public and academic library makerspaces. NVivo qualitative data analysis software was integrated into this research to aid in the breakdown of commonalities across terms, themes and purpose within the user agreements. Findings – Although makerspaces are a very exciting topic in the field of library science at this time, the implementation of a maker learning space is still new to many libraries. Creating a user agreement for a makerspace is newer still. Most user agreements in this study were six months to a year old. Some consistencies found across makerspace user agreements include liability waivers, permissions for minors, safety, copyright and technology replacement costs. Originality/value – At this time, most publications on makerspaces are held in the realm of popular publications (blogs, magazines, zines, etc.). The body of peer-reviewed and scholarly research on makerspaces is growing. Makerspace user agreements are new to this growing field of interest, and a content analysis of these documents will pave the way for the writing of future forms.
3

Hane, Francis. "Intellectual property rights and user facility agreements". Nature Biotechnology 31, n.º 2 (fevereiro de 2013): 116–17. http://dx.doi.org/10.1038/nbt.2494.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Nekit, Kateryna. "Terms of service as a ground for establishment of ownership to virtual property". Law and innovations, n.º 4 (32) (15 de dezembro de 2020): 62–67. http://dx.doi.org/10.37772/2518-1718-2020-4(32)-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Problem setting. Today, the use of numerous sites is allowed only with the consent of the user agreements (Terms of Service) offered by them. Most often, users tick them, which is tantamount to signing such agreements, without even reading. However, it turns out that in most cases, user agreements, which are essentially agreements between users and providers, are aimed only at securing the interests of providers and in fact impose significant restrictions on users without granting them any rights other than the right to use the service. In addition, providers create them in such a way as not to draw the attention of users to the presence of the contract in this relationship. Such agreements are generally placed as hyperlinks at the bottom of the page or are created as a step that the user must agree to during registration. On this basis, the question of the need to strengthen the protection of users’ rights as a weaker party to the contract, by analogy with consumer protection, is increasingly raised. Moreover, the possibility of considering a user agreement as a kind of contract is widely discussed. Analysis of recent researches and publications. Given the novelty of such a phenomenon as user agreement, today there are not many studies devoted to them, especially in domestic science. Among foreign researchers of the legal nature and specifics of user agreements can be mentioned K. Cornelius, L. Belli and J. Venturini, T. Romm, P. Randolph, M. Radin, A. Savelyev, N. Vlasova. Thus, there is a lack of domestic research on the legal nature of user agreements, so there is an urgent need for research in this area. Target of research is to study the legal nature of the user agreement and analyze the possibility of it to become a ground for legal relationships, in particular, a ground for establishment of ownership to virtual property. Article’s main body. The article analyzes the possibility of considering user agreements as potential grounds for the emergence of ownership to virtual property. The judicial practice to protect the rights of users of accounts and European approaches to the protection of user rights are analyzed in the article. The research data, which give grounds to speak about violation of user rights by user agreements are given. In turn, this gives reason to question the possibility of considering the user agreement as a kind of contract. However, the analysis performed allows us to conclude that it is possible to consider the user agreement as a mixed contract, which can potentially serve as a ground for the emergence of virtual property rights. Conclusions and prospects for the development. Terms of Service agreements should be considered as mixed agreements that contain elements of several agreements. In particular, in the context of the emergence of virtual property rights from such agreements, elements of the Terms of Service agreement should be distinguished, which determine the legal consequences for the virtual property created within the online platforms. In the doctrine, the concept of virtual property as a kind of property right is already quite common today, and this kind of right may well arise from the contract, which in this case may be the Terms of Service agreement. If the Terms of Service agreement is recognized as the ground for the emergence of virtual property rights, it is necessary to provide in it how the balance of interests of platform developers and users in relation to virtual property will be determined. Obviously, all the features of the implementation and protection of virtual property rights, cases of its restriction will be specified in the contract.
5

Nekit, Kateryna. "Terms of service as a ground for establishment of ownership to virtual property". Law and innovations, n.º 4 (32) (15 de dezembro de 2020): 62–67. http://dx.doi.org/10.37772/2518-1718-2020-4(32)-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Problem setting. Today, the use of numerous sites is allowed only with the consent of the user agreements (Terms of Service) offered by them. Most often, users tick them, which is tantamount to signing such agreements, without even reading. However, it turns out that in most cases, user agreements, which are essentially agreements between users and providers, are aimed only at securing the interests of providers and in fact impose significant restrictions on users without granting them any rights other than the right to use the service. In addition, providers create them in such a way as not to draw the attention of users to the presence of the contract in this relationship. Such agreements are generally placed as hyperlinks at the bottom of the page or are created as a step that the user must agree to during registration. On this basis, the question of the need to strengthen the protection of users’ rights as a weaker party to the contract, by analogy with consumer protection, is increasingly raised. Moreover, the possibility of considering a user agreement as a kind of contract is widely discussed. Analysis of recent researches and publications. Given the novelty of such a phenomenon as user agreement, today there are not many studies devoted to them, especially in domestic science. Among foreign researchers of the legal nature and specifics of user agreements can be mentioned K. Cornelius, L. Belli and J. Venturini, T. Romm, P. Randolph, M. Radin, A. Savelyev, N. Vlasova. Thus, there is a lack of domestic research on the legal nature of user agreements, so there is an urgent need for research in this area. Target of research is to study the legal nature of the user agreement and analyze the possibility of it to become a ground for legal relationships, in particular, a ground for establishment of ownership to virtual property. Article’s main body. The article analyzes the possibility of considering user agreements as potential grounds for the emergence of ownership to virtual property. The judicial practice to protect the rights of users of accounts and European approaches to the protection of user rights are analyzed in the article. The research data, which give grounds to speak about violation of user rights by user agreements are given. In turn, this gives reason to question the possibility of considering the user agreement as a kind of contract. However, the analysis performed allows us to conclude that it is possible to consider the user agreement as a mixed contract, which can potentially serve as a ground for the emergence of virtual property rights. Conclusions and prospects for the development. Terms of Service agreements should be considered as mixed agreements that contain elements of several agreements. In particular, in the context of the emergence of virtual property rights from such agreements, elements of the Terms of Service agreement should be distinguished, which determine the legal consequences for the virtual property created within the online platforms. In the doctrine, the concept of virtual property as a kind of property right is already quite common today, and this kind of right may well arise from the contract, which in this case may be the Terms of Service agreement. If the Terms of Service agreement is recognized as the ground for the emergence of virtual property rights, it is necessary to provide in it how the balance of interests of platform developers and users in relation to virtual property will be determined. Obviously, all the features of the implementation and protection of virtual property rights, cases of its restriction will be specified in the contract.
6

Ekstrand, Victoria Smith. "Online News: User Agreements and Implications for Readers". Journalism & Mass Communication Quarterly 79, n.º 3 (setembro de 2002): 602–18. http://dx.doi.org/10.1177/107769900207900305.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
This study is a legal analysis of the online news user agreements of the Top 50 U.S. daily circulation newspapers in the United States. News user agreements are contracts that specify the conditions under which readers may access news. The contracting of news online represents a fundamental shift in the way consumers, who once bought their news, must now agree to terms of access. This study concludes that such terms often expand ownership of content that might otherwise flow freely in the public domain. It also concludes that limitations on liability as expressed in these agreements raise questions about the commitment to free speech and journalistic values online.
7

Anesa, Patrizia. "Translating end-user license agreements: issues, strategies and techniques". ASp, n.º 65 (1 de março de 2014): 87–102. http://dx.doi.org/10.4000/asp.4205.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Lavesson, Niklas, Martin Boldt, Paul Davidsson e Andreas Jacobsson. "Learning to detect spyware using end user license agreements". Knowledge and Information Systems 26, n.º 2 (16 de janeiro de 2010): 285–307. http://dx.doi.org/10.1007/s10115-009-0278-z.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Torres-Hostench, Olga, Ramon Piqué Huerta e Pilar Cid Leal. "Decision-making in the translation of end-user license agreements". Culture & Society issue 4, n.º 2 (31 de dezembro de 2015): 216–39. http://dx.doi.org/10.1075/ts.4.2.03tor.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
EULAs (End-User License Agreements) present specific translation challenges, ones contingent on how the EULAs will be used. In a recent study, the decisions made by forty-seven translation students while translating a EULA were observed and analyzed. The aim of the study was threefold: (1) to observe the criteria used for decision-making when translating a EULA; (2) to observe how decision-making criteria changed after using specific resources designed for translating EULAs (lawcalisation.com); and (3) to evaluate the overall usefulness of the lawcalisation.com resource. Results suggest that by providing translators with a single website portal of specific resources, they were able not only to find the equivalents they needed but also to consult the relevant legal and translation information that ultimately helped them develop more solid criteria for translation decision-making. Decisions were guided by principles of law applicability, terminology, legislation, and translation studies Skopos theories.
10

Lavesson, Niklas, e Stefan Axelsson. "Similarity assessment for removal of noisy end user license agreements". Knowledge and Information Systems 32, n.º 1 (28 de julho de 2011): 167–89. http://dx.doi.org/10.1007/s10115-011-0438-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "User Agreements":

1

Hussain, Faisal Mateen &amp Irfan. "Automated Analysis of End User License Agreements". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5138.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Context Spyware is “computer software that obtains information from a user's computer without the user's knowledge or consent” [25]. Spyware is often embedded in another application and is usually stated in End User License Agreement (EULA) [20]. However it is quite common to accept the EULA without even reading it. Therefore beside the traditional spyware analysis techniques, automated EULA analysis can be helpful for common users in order to identify the spyware [18]. Objectives The techniques of automated EULA analysis do exist however the process of taking a binary application, analyze it, and prepare it in order to extract the EULA has not been studied in existing research. There is a need for such a tool that can extract and analyze the EULA text from an installer binary without executing it. Objectives of this research are to investigate the techniques to unpack the binary file, extract the EULA, analyze it and present the analysis results to the end user. Methods In order to establish basic understanding of the related concepts preliminary study is done. In this study a number of article sources are used, including ACM Digital Library, Compendex, Inspec, IEEE Xplore, and Springer Link. Material has been selected after reading titles and summaries. Prototype of an open source tool is designed and developed. This tool extracts the EULA from executable binary installers, analyzes the extracted text and gives suggestions about legitimate level of the software. Results To evaluate our application we downloaded 150 executables from different web sites, which were already classified as bad or good by [23]. We used our tool to extract EULA text from executables. We were able to extract EULA from 48 percent of selected binary files. Analysis of extracted EULAs was also done to classify the software as good or bad. This analysis assists the user to make a decision to accept or reject the installation of software without reading even a single word of EULA. During the extraction and analysis process there was no significant impact on performance of the host system. Conclusion We conclude that EULA can be extracted from a binary file without executing it. However because of limited time it was not possible to extract EULA from all installer binaries. The rate of EULA extraction can be improved in future research.
2

Rashid, Muhammad Usman, e Balakrishna Garapati. "Prevention of Spyware by Runtime Classification of End User License Agreements". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3395.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Spyware is a threat to Internet users because it may obtain valuable information from the users’ machines without their consent. The existing anti- spyware techniques are not found to be accurate enough in the prevention or detection of spyware. According to the law in many countries, vendors are bound to mention any inclusion of spyware in the End User License Agreement (EULA) of the associated software. Moreover, this agreement must be accepted by the user to have the software installed on the user machine. Thus, if the user accepts the agreement without reading it, he or she will unknowingly accept all the regulations mentioned in the EULA. Consequently, this study emphasizes that the EULA can be used to classify the software as spyware or legitimate by using data mining algorithms. We validate our approach by implementing an application and compare it with existing EULA analysis tools.
Spionprogram är ett hot mot Internet-användare, eftersom det kan få värdefull information från användarens maskiner utan deras samtycke. Den befintliga anti - spionprogram tekniker inte visat sig vara korrekta tillräckligt för att förebygga eller upptäcka spionprogram. Enligt lag i många länder, säljare är skyldiga att nämna något införande av spyware i slutanvändarens licensavtal (EULA) för tillhörande programvara. Dessutom är detta avtal måste godkännas av användaren att ha program installeras på användarens dator. Således, om användaren godkänner avtalet utan att läsa den, han eller hon kommer ovetande acceptera alla regler nämns i EULA. Följaktligen har denna studie betonar att licensavtalet kan användas för att klassificera den programvara som spionprogram eller legitima genom att använda data mining algoritmer. Vi validera vår inställning genom genomföra ett program och sedan jämföra det med befintliga EULA analysverktyg.

Muhammad Usman Rashid - 0046738958867 Balakrishna Garapati - 0046762327735

3

Gopallawa, Praveen. "Fatigue Failure Model for Local Roads in Ohio that Use Road User Maintenance Agreements Due to the Increase in Truck Traffic". Ohio University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1566389151107255.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Habermeier, Sabine. "Shrinkwraps & Co. - überflüssig oder genial? eine wertende Betrachtung der Verwendung von end user licence agreements im gestuften Vertrieb von Standardsoftware". Berlin wvb, Wiss. Verl, 2007. http://d-nb.info/98797209X/04.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Habermeier, Sabine. "Shrinkwraps & Co.-überflüssig oder genial? : eine wertende Betrachtung der Verwendung von end user licence agreements im gestuften Vertrieb von Standardsoftware /". Berlin : Wvb, Wiss. Verl, 2008. http://www.wvberlin.de/data/inhalt/habermeier.html.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Rafael, Diego Nogueira. "O efeito da reatância na satisfação com o convênio médico: uma análise por modelagem de equações estruturais". Universidade Nove de Julho, 2016. http://bibliotecatede.uninove.br/handle/tede/1583.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Submitted by Nadir Basilio (nadirsb@uninove.br) on 2017-03-31T14:29:31Z No. of bitstreams: 1 Diego Nogueira Rafael.pdf: 940524 bytes, checksum: 7b50bcecd94daa3d3e48a730485ad712 (MD5)
Made available in DSpace on 2017-03-31T14:29:31Z (GMT). No. of bitstreams: 1 Diego Nogueira Rafael.pdf: 940524 bytes, checksum: 7b50bcecd94daa3d3e48a730485ad712 (MD5) Previous issue date: 2016-12-15
Currently the Brazilian health system is complex, the constitution guarantee of care to the health care of all individuals within the national territory, and the State through the Unified Health System (SUS) is responsible for this difficult task. In this context, where the state is unable to serve the entire population, private organizations have taken part in this market, offering health plans and private assistance, which is called supplementary health. In this context, the themes studied are the psychological reactance that means the negative emotional reaction generated by the total or partial lack of freedom or the expectation of freedom of an individual who once got it and the health plan user’s satisfaction. User satisfaction and psychological reactance are topics exhaustively studied by the organizations, being one of the preferred themes in the study of consumer behavior, evidently being relevant because these studies allow the strategic analysis of the companies with more accurate data, resulting in greater profitability and success of these institutions. The study was conducted by means of a quantitative method, based on the satisfaction and psychological reactance of the users of the supplementary health system with the modeling of structural equations using the SmartPLS system, in order to test the hypotheses constructed based on the theories studied. The results obtained are in agreement with the theory of reactance and satisfaction, confirming the hypotheses proposed, there being a negative relation between both for the studied sample, the lower the reactance level observed, the higher the satisfaction level declared by the users. The conclusion of the study suggests as a contribution to the practice that managers approach the relationship between health plans and their users, creating programs to prevent diseases, combat sedentarism, chronic diseases and improve the quality of life of users, obtaining a participation collaborative of both.
O sistema de saúde brasileiro é complexo e a constituição garante o atendimento e assistência à saúde de todo o indivíduo dentro do território nacional, devendo o Estado, por meio do Sistema Único de Saúde (SUS), ser o responsável por essa difícil tarefa. Em um cenário no qual o Estado não consegue atender toda a população, as organizações privadas tomaram para si parte desse mercado, oferecendo planos de saúde e assistência privada, os quais constituem o que é chamado de sistema de saúde suplementar. Diante desse contexto, o tema deste trabalho é o estudo da reatância psicológica, que é a reação emocional negativa gerada pela falta total ou parcial da liberdade ou da expectativa de liberdade de um indivíduo que outrora a obtinha, e a satisfação dos usuários de planos de saúde. A satisfação dos usuários e a reatância psicológica são temas exaustivamente estudados pelas organizações, sendo um dos preferidos no estudo do comportamento do consumidor, sendo esse movimento relevante pelo fato de tais estudos possibilitarem a análise estratégica das empresas, trazendo dados mais precisos, resultando em maior lucratividade e sucesso dessas instituições. O estudo foi conduzido por meio de método quantitativo, fundamentado para analisar a satisfação e a reatância psicológica dos usuários do sistema de saúde suplementar por meio da Modelagem de Equações Estruturais, usando-se o software SmartPLS, com objetivo de testar as hipóteses construídas com base nas teorias estudadas. Os resultados obtidos vão ao encontro da teoria da reatância e satisfação, confirmando as hipóteses propostas, havendo uma relação negativa entre ambas para a amostra estudada. Assim, quanto menor o nível da reatância observada, maior o nível de satisfação declarada pelos usuários. A conclusão do estudo sugere, como contribuição para a prática, que os gestores aproximem a relação dos planos de saúde com seus usuários, criando programas para a prevenção de doenças, combate ao sedentarismo, doenças crônicas e melhoraria da qualidade de vida dos usuários, obtendo uma participação colaborativa de ambos.
7

Singer, Ruth. "Agreement in Mawng : productive and lexicalised uses of agreement in an Australian language /". Connect to thesis, 2006. http://eprints.unimelb.edu.au/archive/00003242.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Rose, Robert T. "Asset Protection Through the Use of Premarital Agreements". Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/431.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The number of multi-million dollar divorce settlements has been increasing rapidly in the last decade. Although Donald Trump's divorce from his first wife, Ivana, wherein $25 million was awarded to the former spouse, may have seemed like a significant sum in 1992, this amount appears quite minuscule today.1 In December of 2011, Mel Gibson's soon to be ex-wife Robyn Moore received $425 million in the couples' divorce settlement.2 In March of 2012, Frank McCourt was forced to sell his professional franchise, the Los Angeles Dodgers, in bankruptcy during his divorce proceedings with Jamie McCourt.3 It seems as if every month we hear details of another celebrity divorce settlement involving hundreds of millions of dollars, begging the obvious question: do athletes and celebrities who stand to make fortunes during a contemplated marriage, need to be more aware of the consequences of divorce and how to better protect themselves in such a case, before repeating the words "I do"? 1 Joanne Kaufman, "The Art of the Divorce," People,http://www.people.com/people/archive/article/0,20105577,00.html (accessed April 19, 2012). 2 Ken Lee, "Mel Gibson's Ex Wife Takes Half His Estimated $850 Million in Divorce Settlement," People, http://www.people.com/people/article/0,20556666,00.html (accessed April 19, 2012). 3 Stephen Dunn, "Why the McCourt Marital Agreement Failed," Forbes,http://www.forbes.com/sites/stephendunn/2011/12/14/why-the-mccourt-marital-agreement-failed/ (accessed April 19, 2012).
9

Dathathri, Arvind, e Jules Lazare Atangana. "Countering Privacy-Invasive Software (PIS) by End User License Agreement Analysis". Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5736.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
In our thesis we use a preventive approach to stop privacy-invasive software (PIS) from entering the system. We aim at increasing the user awareness about the background activities of the software. These activities are implicitly written in End User License Agreement (EULA). We are using a multi-layer user notification approach to increase the user awareness and help him make a good decision, which is in accordance with the European legal framework. A proof of concept tool is developed that will use the user preferences to present the EULA in a compact and understandable form thereby helping the user in deciding with the installation of a software.
10

Conroy, Sean F. "Used paper for sale are pacific settlement agreements really worth anything? /". Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA490787.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "User Agreements":

1

United States. Congress. Senate. Committee on Health, Education, Labor, and Pensions. FDA user fee agreements: Strengthening FDA and the medical products industry for the benefit of patients : hearing of the Committee on Health, Education, Labor, and Pensions, United States Senate, One Hundred Twelfth Congress, second session ... March 29, 2012. Washington: U.S. Government Printing Office, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

United, States Congress Senate Committee on Health Education Labor and Pensions. Animal drug user fee agreements: Advancing animal health for the public : hearing before the Committee on Health, Education, Labor, and Pensions, United States Senate, One Hundred Thirteenth Congress, first session ... February 27, 2013. Washington: U.S. Government Printing Office, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

(Firm), Grimley J. R. Eve. The use of planning agreements. London: H.M.S.O., 1992.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Doenau, Stan. Native title and negotiated agreements. Sydney: Edvance Publications, 1999.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Meeting, Indo-USSR Cooperation Agreement. Sixth Meeting of Indo-USSR Cooperation Agreement, Moscow, September 1985: Report. New Delhi: Federation of Indian Chambers of Commerce & Industry, 1988.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Treaties, Australia Parliament Joint Standing Committee on. Agreement for Co-operation in the Peaceful Uses of Nuclear Energy. Canberra: Parliament of the Commonwealth of Australia, 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Masiiwa, Medicine. WTO Agreement on Trade Related Intellectual Property Rights (TRIPS): A users guide. Harare: Friedrich-Ebert-Stiftung, 2002.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Hyŏphoe, Han-So Kyŏngje. Han-So kyŏngje kwallyŏn hyŏpchŏngjip: Economic agreements between the Republic of Korea and USSR. Sŏul-si: Han-So Kyŏngje Hyŏphoe, 1991.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kutten, L. J. Software taxation and the OEM agreement. [Wayne, PA]: Kutish Publications, 1995.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Gregow, Karin. The raw materials race: How the EU uses trade agreements to grab resources in Africa. Stockholm: Forum Syd förlag, 2010.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "User Agreements":

1

Lipinski, Tomas A. "Click Here to Cloud: End User Issues in Cloud Computing Terms of Service Agreements". In Communications in Computer and Information Science, 92–111. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44412-2_10.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Hawkins, W. Thomas. "Development agreements". In Land Use Law in Florida, 261–65. Milton Park, Abingdon, Oxon; New York, NY: Routledge 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9781003108603-26.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Richter-Gebert, Jürgen, e Ulrich H. Kortenkamp. "License Agreement". In User Manual for the Interactive Geometry Software Cinderella, 131–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-58318-6_7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Tsimpoukis, Dimitrios, Tim Baarslag, Michael Kaisers e Nikolaos G. Paterakis. "Automated Negotiations Under User Preference Uncertainty: A Linear Programming Approach". In Agreement Technologies, 115–29. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17294-7_9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Vanpeperstraete, Ben. "The Rana Plaza Collapse and the Case for Enforceable Agreements with Apparel Brands". In Interdisciplinary Studies in Human Rights, 137–69. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73835-8_9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
AbstractDisasters like the Rana Plaza collapse and the Tazreen Fashions and Ali Enterprises fires painfully demonstrate the limits of conventional models of labour regulation in global supply chains. Buyer-driven markets characterised by outsourcing, subcontracting and offshoring, and the price pressure that results from them, undermines both the regulatory role of the state and the potential for collective bargaining. As a result, poor and unsafe working conditions prevail in transnational corporate supply chains in the garment industry. The aforementioned disasters offer a textbook example of the challenges facing the current clothing industry and the limits of the dominant “Corporate Social Responsibility” (CSR) model used to address labour rights abuses.Yet, the responses to these disasters also provide fertile ground for alternative “worker-driven” strategies, where worker organisations enter into negotiated supply chain agreements with transnational corporations and hold the latter to account. The Bangladesh Accord and Rana Plaza Arrangement, as well as the corollary Tazreen Compensation Agreement and Ali Enterprises Compensation Agreement attempt to develop a counter-hegemonic alternative to dominant CSR practices and offer new strategies for social justice within global supply chains. This chapter describes and contextualises these agreements in a broader trajectory of labour organisations bargaining and negotiating such agreements with lead firms, highlighting how the post-Rana Plaza momentum made significant strides possible in terms of the depth, scope and enforceability of these negotiated agreements. The chapter identifies the strengths of these developments, but also identifies room for improvement for future negotiated enforceable agreements with apparel brands.
6

Landy, Gene K., e Amy J. Mastrobattista. "Commercial End-User Agreements". In The IT Digital Legal Companion, 313–49. Elsevier, 2008. http://dx.doi.org/10.1016/b978-1-59749-256-0.00012-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Campos-Pardillos, Miguel Ángel. "End-user Agreements in Videogames". In Approaches to Videogame Discourse. Bloomsbury Academic, 2019. http://dx.doi.org/10.5040/9781501338489.0011.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

"Enforcement of ABS Agreements in User States". In Genetic Resources, Traditional Knowledge and the Law, 473–88. Routledge, 2009. http://dx.doi.org/10.4324/9781849770095-36.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Flick, Catherine. "Informed consent in information technology: Improving end user licence agreements". In Professionalism in the Information and Communication Technology Industry. ANU Press, 2013. http://dx.doi.org/10.22459/picti.10.2013.08.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Barrios, Barclay. "Soul Remedy: Turnitin and the Visual Design of End User License Agreements". In Copy(write): Intellectual Property in the Writing Classroom, 79–98. The WAC Clearinghouse; Parlor Press, 2011. http://dx.doi.org/10.37514/per-b.2011.2355.2.04.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "User Agreements":

1

Boldt, Martin, Andreas Jacobsson, Niklas Lavesson e Paul Davidsson. "Automated Spyware Detection Using End User License Agreements". In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.91.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Varela, Martin, Patrick Zwickl, Peter Reichl, Min Xie e Henning Schulzrinne. "From Service Level Agreements (SLA) to Experience Level Agreements (ELA): The challenges of selling QoE to the user". In 2015 ICC - 2015 IEEE International Conference on Communications Workshops (ICC). IEEE, 2015. http://dx.doi.org/10.1109/iccw.2015.7247432.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Sang-Ho Na e Eui-Nam Huh. "A methodology of assessing security risk of cloud computing in user perspective for security-service-level agreements". In 2014 Fourth International Conference on Innovative Computing Technology (INTECH). IEEE, 2014. http://dx.doi.org/10.1109/intech.2014.6927759.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Choi, Kun-Mo, Robert D. Hurt, Thomas E. Shea e Richard Nishimura. "User Requirements and Criteria for Proliferation Resistance in INPRO". In 12th International Conference on Nuclear Engineering. ASMEDC, 2004. http://dx.doi.org/10.1115/icone12-49211.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
In designing future nuclear energy systems, it is important to consider the potential that such systems could be misused for the purpose of producing nuclear weapons. INPRO set out to provide guidance on incorporating proliferation resistance into innovative nuclear energy systems (INS). Generally two types of proliferation resistance measures are distinguished: intrinsic and extrinsic. Intrinsic features consist of technical design features that reduce the attractiveness of nuclear material for nuclear weapon program, or prevent the diversion of nuclear material or production of undeclared nuclear material for nuclear weapons. Extrinsic measures include commitments, obligations and policies of states such as the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) and IAEA safeguards agreements. INPRO has produced five basic principles and five user requirements for INS. It emphasizes that INS must continue to be an unattractive means to acquire fissile material for a nuclear weapon program. It also addresses as user requirements: 1) a balanced and optimised combination of intrinsic features and extrinsic measures, 2) the development and implementation of intrinsic features, 3) an early consideration of proliferation resistance in the development of INS and 4) the utilization of intrinsic features to increase the efficiency of extrinsic measures. INPRO has also developed criteria, consisting of indicators and acceptance limits, which would be used by a state to assess how an INS satisfies those user requirements. For the first user requirement, the most important but complex one, INPRO provides a 3-layer hierarchy of indicators to assess how unattractive a specific INS would be as part of a nuclear weapon program. Attributes of nuclear material and facilities are used as indicators to assess intrinsic features. Extrinsic measures imposed on the system are also assessed. Indicators to assess defence in depth for proliferation resistance include the number and robustness of barriers, and the redundancy or complementarity of barriers. The cost of incorporating proliferation resistant features is used to assess the cost-effectiveness of any particular INS in providing proliferation resistance. The stages in the development of an INS at which proliferation resistance is considered in the process are assessed. Awareness of extrinsic measures by designers and use of intrinsic features for verification illustrate how intrinsic features facilitate extrinsic measures. An INPRO-consistent methodology to assess the proliferation resistance of an INS is still under development, with feedback expected from the case studies undertaken by Argentina, India, Russia and the Republic of Korea.
5

Zheng, Zhi-Ying, Feng-Chen Li e Qian Li. "Reynolds-Averaged Simulation on Turbulent Drag-Reducing Flows of Viscoelastic Fluid Based on User-Defined Function in FLUENT Package". In ASME 2014 4th Joint US-European Fluids Engineering Division Summer Meeting collocated with the ASME 2014 12th International Conference on Nanochannels, Microchannels, and Minichannels. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/fedsm2014-21327.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
A new numerical simulation methodology for turbulent flows of viscoelastic fluid was developed for engineering application purpose based on commercial computational fluid dynamics code FLUENT package. An in-house subroutine was established and embedded into FLUENT code through userdefined function functionalization. In order to benchmark this methodology, numerical simulations on turbulent channel flows of viscoelastic fluid are conducted under different cases with drag reduction rates varied from low level to high level. FENE-P (finitely extensive nonlinear elastic-Peterlin) constitutive model is used to describe the viscoelastic effect of viscoelastic fluid flow. The turbulent model is developed in the framework of k–ε–ν′2¯–f model, for which the elliptic relaxation model is modified to account for the Reynolds stress equilibrium established by the presence of elasticity in the fluid. The numerical simulation results, including velocity profiles, turbulent flow characteristics, elastic stress and conformation field, show good agreements with published DNS results, which validates the newly established method on turbulent flows of viscoelastic fluid based on FLUENT software platform for engineering applications.
6

Hsu, Chien-Lung, e Tzu-Wei Lin. "Privacy-Preserved Key Agreement with User Authentication". In 2015 10th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2015. http://dx.doi.org/10.1109/asiajcis.2015.18.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Yoon, Eun-Jun, e Kee-Young Yoo. "Vulnerability of User Identification and Key Agreement Protocol with User Anonymity". In Future Generation Communication and Networking (FGCN 2007). IEEE, 2007. http://dx.doi.org/10.1109/fgcn.2007.231.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Wang, Shiuh-Jeng, Yuh-Ren Tsai, Chien-Chih Shen e Pin-You Chen. "Hierarchical Key Agreement Protocols in Group-User Systems". In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.152.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kim, Seung-Hyun, Han-Gyu Ko e Seung-Hun Jin. "Design and Implementation of Mobile User Agreement Service". In 2007 IEEE 11th International Symposium on Consumer Electronics. IEEE, 2007. http://dx.doi.org/10.1109/isce.2007.4382156.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Pham, Minh, Craig A. Knoblock, Muhao Chen, Binh Vu e Jay Pujara. "SPADE: A Semi-supervised Probabilistic Approach for Detecting Errors in Tables". In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/488.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Error detection is one of the most important steps in data cleaning and usually requires extensive human interaction to ensure quality. Existing supervised methods in error detection require a significant amount of training data while unsupervised methods rely on fixed inductive biases, which are usually hard to generalize, to solve the problem. In this paper, we present SPADE, a novel semi-supervised probabilistic approach for error detection. SPADE introduces a novel probabilistic active learning model, where the system suggests examples to be labeled based on the agreements between user labels and indicative signals, which are designed to capture potential errors. SPADE uses a two-phase data augmentation process to enrich a dataset before training a deep learning classifier to detect unlabeled errors. In our evaluation, SPADE achieves an average F1-score of 0.91 over five datasets and yields a 10% improvement compared with the state-of-the-art systems.

Relatórios de organizações sobre o assunto "User Agreements":

1

Aldendifer, Elise, McKenzie Coe, Taylor Faught, Ian Klein, Peter Kuylen, Keeli Lane, Robert Loughran et al. The Safe and Efficient Development of Offshore Transboundary Hydrocarbons: Best Practices from the North Sea and Their Application to the Gulf of Mexico. Editado por Gabriel Eckstein. Texas A&M University School of Law Program in Energy, Environmental, & Natural Resource Systems, setembro de 2019. http://dx.doi.org/10.37419/eenrs.offshoretransboundaryhydrocarbons.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Offshore hydrocarbon resources have been developed for many decades, and with technology improvements, many fields which were once impossible to develop, are now economically and technologically feasible. This has led to a growing difficulty in determining the legislative and regulatory framework for resources that straddle the recognized borders between two states. In this paper, we examine a successful framework agreement governing the transboundary resources between the United Kingdom (“U.K.”) and Norway in the North Sea, and the agreement between the United States and Mexico governing the Gulf of Mexico. Following the 2013 Energy Reform, the Mexican energy sector has been revitalized, leading to greater exploration, development, and production than ever before. This means that in the near future transboundary resources may be licensed for production, bringing the issues highlighted in this paper to the attention of multiple government and international entities. This paper seeks to recommend improvements to the transboundary framework in the Gulf of Mexico based on the successful framework agreement utilized in the North Sea. This paper begins by introducing international law for offshore resources in Part II. Part III discusses the offshore regulatory regimes in the U.K. and Norway, analyzing how the two states have successfully used bilateral agreements to facilitate cooperation regarding effective exploitation and apportionment of costs from cross-boundary offshore oil and gas projects in the North Sea. Part IV discusses the offshore regulatory regimes in the United States and Mexico and analyzes the current transboundary agreement in place for the Gulf of Mexico. Part V compares the transboundary agreement governing the North Sea and the same governing the Gulf of Mexico. We highlight the major differences in the agreements and suggest changes to the Gulf of Mexico agreement based on the successful North Sea agreement. Finally, this paper concludes and provides key policy recommendations to improve the rules and regulations surrounding the exploitation of transboundary hydrocarbons in the Gulf of Mexico.
2

Wakid, Shukri A., e Kathleen M. Roberts. North American ISDN Users' Forum agreements on integrated services digital network. Gaithersburg, MD: National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.sp.500-195.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Stokesberry, Daniel P., Daniel P. Stokesberry, Kathleen M. Roberts e Tish Antonishek. North American integrated services digital network users' forum agreements on ISDN. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.823-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Stokesberry, Daniel P., Daniel P. Stokesberry e Tish A. Antonishek. North American ISDN users' forum agreements on integrated services digital network. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.sp.823-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Nobre, J., L. Granville, A. Clemm e A. Gonzalez Prieto. Autonomic Networking Use Case for Distributed Detection of Service Level Agreement (SLA) Violations. RFC Editor, fevereiro de 2018. http://dx.doi.org/10.17487/rfc8316.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Herzog, J., e R. Khazan. Use of Static-Static Elliptic Curve Diffie-Hellman Key Agreement in Cryptographic Message Syntax. RFC Editor, junho de 2011. http://dx.doi.org/10.17487/rfc6278.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Housley, R. Use of the Elliptic Curve Diffie-Hellman Key Agreement Algorithm with X25519 and X448 in the Cryptographic Message Syntax (CMS). RFC Editor, agosto de 2018. http://dx.doi.org/10.17487/rfc8418.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Chandrasekhar, C. P. The Long Search for Stability: Financial Cooperation to Address Global Risks in the East Asian Region. Institute for New Economic Thinking Working Paper Series, março de 2021. http://dx.doi.org/10.36687/inetwp153.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Forced by the 1997 Southeast Asian crisis to recognize the external vulnerabilities that openness to volatile capital flows result in and upset over the post-crisis policy responses imposed by the IMF, countries in the sub-region saw the need for a regional financial safety net that can pre-empt or mitigate future crises. At the outset, the aim of the initiative, then led by Japan, was to create a facility or design a mechanism that was independent of the United States and the IMF, since the former was less concerned with vulnerabilities in Asia than it was in Latin America and that the latter’s recommendations proved damaging for countries in the region. But US opposition and inherited geopolitical tensions in the region blocked Japan’s initial proposal to establish an Asian Monetary Fund, a kind of regional IMF. As an alternative, the ASEAN+3 grouping (ASEAN members plus China, Japan and South Korea) opted for more flexible arrangements, at the core of which was a network of multilateral and bilateral central bank swap agreements. While central bank swap agreements have played a role in crisis management, the effort to make them the central instruments of a cooperatively established regional safety net, the Chiang Mai Initiative, failed. During the crises of 2008 and 2020 countries covered by the Initiative chose not to rely on the facility, preferring to turn to multilateral institutions such as the ADB, World Bank and IMF or enter into bilateral agreements within and outside the region for assistance. The fundamental problem was that because of an effort to appease the US and the IMF and the use of the IMF as a foil against the dominance of a regional power like Japan, the regional arrangement was not a real alternative to traditional sources of balance of payments support. In particular, access to significant financial assistance under the arrangement required a country to be supported first by an IMF program and be subject to the IMF’s conditions and surveillance. The failure of the multilateral effort meant that a specifically Asian safety net independent of the US and the IMF had to be one constructed by a regional power involving support for a network of bilateral agreements. Japan was the first regional power to seek to build such a network through it post-1997 Miyazawa Initiative. But its own complex relationship with the US meant that its intervention could not be sustained, more so because of the crisis that engulfed Japan in 1990. But the prospect of regional independence in crisis resolution has revived with the rise of China as a regional and global power. This time both economics and China’s independence from the US seem to improve prospects of successful regional cooperation to address financial vulnerability. A history of tensions between China and its neighbours and the fear of Chinese dominance may yet lead to one more failure. But, as of now, the Belt and Road Initiative, China’s support for a large number of bilateral swap arrangements and its participation in the Regional Comprehensive Economic Partnership seem to suggest that Asian countries may finally come into their own.
9

Birney, Cathleen, e Mark J. Krauss. Recommendations and Justifications To Remove Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office Federal Facility Agreement and Consent Order, Revision 0. Office of Scientific and Technical Information (OSTI), setembro de 2013. http://dx.doi.org/10.2172/1115573.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Bodie, Mark, Michael Parker, Alexander Stott e Bruce Elder. Snow-covered obstacles’ effect on vehicle mobility. Engineer Research and Development Center (U.S.), novembro de 2020. http://dx.doi.org/10.21079/11681/38839.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The Mobility in Complex Environments project used unmanned aerial systems (UAS) to identify obstacles and to provide path planning in forward operational locations. The UAS were equipped with remote-sensing devices, such as photogrammetry and lidar, to identify obstacles. The path-planning algorithms incorporated the detected obstacles to then identify the fastest and safest vehicle routes. Future algorithms should incorporate vehicle characteristics as each type of vehicle will perform differently over a given obstacle, resulting in distinctive optimal paths. This study explored the effect of snow-covered obstacles on dynamic vehicle response. Vehicle tests used an instrumented HMMWV (high mobility multipurpose wheeled vehicle) driven over obstacles with and without snow cover. Tests showed a 45% reduction in normal force variation and a 43% reduction in body acceleration associated with a 14.5 cm snow cover. To predict vehicle body acceleration and normal force response, we developed two quarter-car models: rigid terrain and deformable snow terrain quarter-car models. The simple quarter models provided reasonable agreement with the vehicle test data. We also used the models to analyze the effects of vehicle parameters, such as ground pressure, to understand the effect of snow cover on vehicle response.

Vá para a bibliografia