To see the other types of publications on this topic, follow the link: Confidential communications.

Dissertations / Theses on the topic 'Confidential communications'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Confidential communications.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Shaughnessy, Patricia L. "The attorney-client privilege : a comparative study of American, Swedish and EU law /." Stockholm : Stockholm University, Law Dept, 2001. http://bibpurl.oclc.org/web/31292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Floyd, Kelly. "A content analysis of the use of confidential sources in 2006 by Time and Newsweek." Muncie, Ind. : Ball State University, 2008. http://cardinalscholar.bsu.edu/359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gonzalez, Laura. "The effects of confidentiality on the working alliance /." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79771.

Full text
Abstract:
The present study investigated how the issues of perceived and desired confidentiality are related to the working alliance between adolescent clients and their counselors. Fifty-one students between the ages of 14 and 18 years were recruited through two school boards in Canadian cities. Results indicated that adolescents preferred greater levels of confidentiality than they thought they would actually get in hypothetical situations, but preferred significantly less in actual situations. In addition, the level of confidentiality adolescents preferred in both hypothetical and actual situations did not impact the working alliance. The level of confidentiality adolescents thought they would get in hypothetical situations was a significant predictor of the working alliance. In actual situations, however, the level of confidentiality did not impact the working alliance. Theoretical and practical implications for counselors and other researchers, limitations of this study, and future research directions are discussed.
APA, Harvard, Vancouver, ISO, and other styles
4

Dahlstrom, Glenda. "Privacy and confidentiality of patient health information." MU has:, 2002. http://wwwlib.umi.com/cr/mo/fullcit?p3052167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wardlow, Lane Liane Christine. "Not saying what's on your mind how speakers avoid grounding references in privileged information /." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2007. http://wwwlib.umi.com/cr/ucsd/fullcit?p3258707.

Full text
Abstract:
Thesis (Ph. D.)--University of California, San Diego, 2007.
Title from first page of PDF file (viewed June 5, 2007). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
6

Sheehy, Michael W. "From Watergate to Lewinsky : unnamed sources in the Washington post, 1970-2000 /." View abstract, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Berry-Harris, Traci Aaron. "Examining therapists' perceptions of confidentiality across various therapeutic environments, professional organizations, and client development (an exploratory study) /." Morgantown, W. Va. : [West Virginia University Libraries], 2007. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4982.

Full text
Abstract:
Thesis (Ph. D.)--West Virginia University, 2007.
Title from document title page. Document formatted into pages; contains vi, 149 p. Includes abstract. Includes bibliographical references (p. 117-125).
APA, Harvard, Vancouver, ISO, and other styles
8

Chirichiello, Michela. "Confidentiality and public interest in mixed international arbitration." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=19633.

Full text
Abstract:
Confidentiality is unanimously recognized to be one of the most characteristic and attractive features of international commercial arbitration. The confidential character of arbitral proceedings has often been presumed on the basis of the privacy of the hearings, but this presumption has proven ill-founded in arbitrations between private and public actors ("mixed arbitration"). National courts and international tribunals have come to recognize and to enforce a public interest exception to confidentiality based on the principle that the public has a right to be informed of the contents and outcome of the arbitral proceedings whenever the subject-matter of the dispute is of public concern. This thesis will assess the basis upon which and the limits within which the public interest exception to confidentiality might operate. The thesis will then provide an analysis of the benefits—the accommodation of moral and legal expectations of public participation—and risks—the politicization of the arbitrated dispute and disclosure of trade secrets—of greater transparency and openness in mixed arbitral proceedings. The thesis will show that the public interest exception to confidentiality is a valuable and important development along the path of democratic governance, but also that, in order to avoid the indiscriminate disclosure of information, the precise range of its application needs to be carefully defined and limited to only those cases wherein it appears to be fully justified.
APA, Harvard, Vancouver, ISO, and other styles
9

Edvalson, Michael George. "TrustBroker : a defense against identity theft from online transactions /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1149.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Arslanian, Samuel Thomas. "An implementation of the El Gamal elliptic curve cryptosystem over a finite field of characteristic P." Fogler Library, University of Maine, 1998. http://www.library.umaine.edu/theses/pdf/ArslanianST1998.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Blackmon, Jason B. "Public key infrastructure utilization to provide an added level of authenticity to transmitted data." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FBlackmon.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2010.
Thesis Advisor(s): Buddenberg, Rex. Second Reader: Housel, Thomas. "March 2010." Description based on title screen as viewed on April 27, 2010. Author(s) subject terms: Public key infrastructure, user agent, authenticity, confidentiality, integrity. Includes bibliographical references (p. 47-48). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
12

Carlin, Andrew Philip. "On the linguistic constitution of research practices." Thesis, University of Stirling, 1999. http://hdl.handle.net/1893/26671.

Full text
Abstract:
This thesis explores sociologists' routine research activities, including observation, participant observation, interviewing, and transcription. It suggests that the constitutive activities of sociological research methods - writing field-notes, doing looking and categorising, and the endogenous structure of members' ordinary language transactions are suffused with culturally methodic, i.e. ordinary language activities. "Membership categories" are the ordinary organising practices of description that society-members - including sociologists - routinely use in assembling sense of settings. This thesis addresses the procedural bases of activities which are constituent features of the research: disguising identities of informants, reviewing literature, writing-up research outcomes, and compiling bibliographies. These activities are themselves loci of practical reasoning. Whilst these activities are assemblages of members' cultural methods, they have not been recognised as "research practices" by methodologically ironic sociology. The thesis presents a series of studies in Membership Categorisation Analysis. Using both sequential and membership categorisational aspects of Conversation Analysis, as well as textual analysis of published research, this thesis examines how members' cultural practices coincide with research practices. Data are derived from a period of participant observation in an organisation, video-recordings of the organisation's work; and interviews following the 1996 bombing in Manchester. A major, cumulative theme within this thesis is confidentiality - within an organisation, within a research project and within sociology itself. Features of confidentiality are explored through ethnographic observation, textual analysis and Membership Categorisation Analysis. Membership Categorisation Analysis brings seen-but-unnoticed features of confidentiality into relief. Central to the thesis are the works of Edward Rose, particularly his ethnographic inquiries of Skid Row, and Harvey Sacks, on the cultural logic shared by society-members. Rose and Sacks explicate the visibility and recognition of members' activities to other members, and research activities as linguistic activities.
APA, Harvard, Vancouver, ISO, and other styles
13

Fitzgerald, Michael J. "The sacramental seal of confession in the corpus iuris canonici." Theological Research Exchange Network (TREN), 1988. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hollindale, Janice. "Auditor orientation, strategies and tactics in audit negotiations /." Gold Coast, Australia : Bond University, 2008. http://epublications.bond.edu.au/theses/hollindale.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Schubert, Daniel. "Legal privilege und Nemo tenetur im reformierten europäischen Kartellermittlungsverfahren der VO 1-2003 : eine Untersuchung der Rechtslage im Gemeinschaftsrecht unter Berücksichtigung der Massgaben von EMRK, IPBPR und Grundrechtscharta sowie der aktuellen Rechtsprechung von EuGH, EuG und EGMR /." Berlin : Duncker & Humblot, 2009. http://d-nb.info/995050147/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Smith, Bryan. "Responding to policies at runtime in TrustBuilder /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd414.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Wild, Maximiliane-Stephanie. "Die anwaltliche Verschwiegenheitspflicht in Deutschland und Frankreich : unter besonderer Beachtung der sich aus dem grenzüberschreitenden Rechtsverkehr ergebenden Kollisionsfälle /." Frankfurt, M. ; Berlin Bern Bruxelles New York, NY Oxford Wien : Lang, 2008. http://d-nb.info/989697002/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Eramo, Beverly Edith, and mikewood@deakin edu au. "Confidentiality and disclosure : assessment and intervention issues." Deakin University. School of Psychology, 2002. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20060706.141546.

Full text
Abstract:
This portfolio addresses the moral, ethical and legal issues that impact upon decisions to maintain or disclose confidential communications. The tensions and moral dilemmas that are created when a conflict between these aspects arises are considered. Risk assessment procedures that inform decisions to maintain or disclose confidential information are discussed, as are issues related to the practical implementation of planned interventions. The topic is addressed by firstly reviewing professional codes of conduct and legal requirements to maintain confidentiality. The limits of confidentiality and privileged communication are then reviewed together with legal requirements of “duty to warn” or “duty of care”. These requirements are then related to risk assessment procedures and relevant interventions. Four case studies that illustrate the practical application of assessment techniques in the decision process and planned interventions are presented. They cover such diverse topics as disclosure and suicidal intent, threat of harm to a third party, risk of transmission of the AIDS virus and “duty to warn” and maintenance of a minor’s confidential communications. The ways in which these issues were addressed and the outcome is presented. NOTE: All names and details that have the potential to identify the people whose cases are presented here have been changed to protect their anonymity.
APA, Harvard, Vancouver, ISO, and other styles
19

Lacroix, Mireille 1971. "Genetic information and the family : a challenge to medical confidentiality." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80935.

Full text
Abstract:
Because of its perceived ability to predict future health and its relevance for family members, genetic information challenges the traditional justifications for medical confidentiality. This thesis examines the question whether a health care professional should have the discretion or a duty to breach confidentiality in order to inform a patient's relatives of their increased genetic risk. There is currently no exception to the statutory, common law and ethical duties of confidentiality for the non-consensual disclosure of genetic information to relatives. Precedents developed in the context of threats of harm and communicable diseases are of limited value. The law should not recognise the existence of a duty to warn in the context of genetics. As a last resort, health care professionals should be authorized, but not required, to disclose genetic risk information when there is a serious risk of preventable harm and when the potential harm of non-disclosure outweighs that of disclosure.
APA, Harvard, Vancouver, ISO, and other styles
20

Le, Poire Beth Ann 1964. "Communication strategies to restore or preserve informational and psychological privacy; the effects of privacy invasive questions in the health care context." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276798.

Full text
Abstract:
This investigation explored the role of informational and psychological privacy in the health context by examining the relationship between type of relationship (physician versus acquaintance), type of observation (self-report versus observation), and communication strategies used to restore or preserve privacy (interaction control, dyadic strategies, expressions of negative arousal, blocking and avoidance, distancing, and confrontation). It was hypothesized and confirmed that individuals report exhibiting more behaviors to restore or preserve informational privacy in response to an informationally privacy-invasive question posed by an acquaintance than by a physician. The hypothesis that presentation of an informationally privacy invasive question by the physician causes patients to exhibit more communication strategies after the privacy invasive question than before, was unsupported. Finally, the hypothesis that individuals actually exhibit more privacy restoration behaviors than they report using in a similar situation with their physician was also unsupported. Patients reported using more communication strategies than they actually exhibited. One confound to the self reports was that videotaped participants reported the use of fewer direct privacy restoring communication strategies than non-videotaped.
APA, Harvard, Vancouver, ISO, and other styles
21

Mason, Barbara Ann Borgstede. "Ethics, privacy, and confidentiality issues related to the application of information technology in health care /." free to MU campus, to others for purchase, 1999. http://wwwlib.umi.com/cr/mo/fullcit?p9962543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Thompson, A. Keith. "Religious confession privilege at common law : a historical analysis /." Access via Murdoch University Digital Theses Project, 2006. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20070831.94056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Schenk-Geers, Antonia Cornelia Maria. "Internationale fiscale gegevensuitwisseling en de rechtsbescherming van de belastingplichtige /." Deventer : Kluwer, 2007. http://www.gbv.de/dms/spk/sbb/recht/toc/52713810X.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Spellerberg, Andrea. "Vertraulichkeit für Informanten des Europäischen Amtes für Betrugsbekämpfung (OLAF) : der Schutz des Informanten nach Art. 287 EG und die Verteidigungsrechte der Betroffenen /." Frankfurt am Main [u.a.] : Lang, 2006. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014772658&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Jensen, Carlos. "Designing for Privacy in Interactive Systems." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7588.

Full text
Abstract:
People are increasingly concerned about online privacy and how computers collect, process, share, and store their personal information. Such concerns are understandable given the growing number of privacy invasions and the pervasiveness of information capture and sharing between IT systems. This situation has led to an increasingly regulated environment, limiting what systems may do, and what safeguards they must offer users. Privacy is an especially important concern in the fields of computer supported collaborative work (CSCW), Ubiquitous Computing, and e-commerce, where the nature of the applications often requires some information collection and sharing. In order to minimize risks to users it is essential to identify privacy problems early in the design process. Several methods and frameworks for accomplishing this have been proposed in the last decades. These frameworks, though based on hard-earned experience and great insight, have not seen widespread adoption despite the high level of interest in this topic. Part of the reason for this is likely the lack of evaluation and study of these frameworks. In our research we examine the key design and analysis frameworks and their elements, and compare these to the kinds of problems users face and are concerned with in terms of privacy. Based on this analysis of the relative strengths and weaknesses of existing design frameworks we derive a new design framework; STRAP (STRuctured Analysis of Privacy). In STRAP we combine light-weight goal-oriented analysis with heuristics to provide a simple yet effective design framework. We validate our analysis by demonstrating in a series of design experiments that STRAP is more efficient and effective than any one of the existing design frameworks, and provide quantitative and qualitative evidence of the value of using such frameworks as part of the design process.
APA, Harvard, Vancouver, ISO, and other styles
26

Flora, Margarethe. "Das Bankgeheimnis im gerichtlichen Strafverfahren /." Wien [u.a.] : Springer, 2007. http://www.gbv.de/dms/spk/sbb/recht/toc/522910718.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Porter, Paul A. "Trust Negotiation for Open Database Access Control." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Michero, Emily. "Master Therapists' Decision Making Process Concerning Adolescent Confidentiality: A Grounded Theory Approach." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc849705/.

Full text
Abstract:
Ethical codes and laws provide counselors with guidance for how to approach confidentiality, but there is a gap in the literature surrounding counselors' process of decision-making when managing confidentiality with adolescent clients. This study explored the decision-making process of master therapists concerning adolescent clients. I conducted semi-structured interviews with peer identified master therapist (N=10), all of whom were licensed professional counselors with 15 or more years of counseling experience and whose case load contained 25% or more adolescent clients. Participants included seven females and three males; nine participants identified as Caucasian, and one participant identified as Hispanic. Participants ages ranged from 39-61. I analyzed the data, along with two research partner, according to Grounded Theory (GT) methodology. Through constant comparative analysis, a grounded theory emerged from the data in which participants converged understanding of client safety, relationships, clinical intuition in a process of integrated experience and consultation. With the exception of mandated reported and mortal danger, ethical guidelines and laws did not seem to factor into participants' decision making. Implications for counseling practice, preparation, and research are provided.
APA, Harvard, Vancouver, ISO, and other styles
29

Leithead, Travis S. "Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1007.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Molina-Jimenez, Carlos. "Anonymous and confidential communication using PDAs." Thesis, University of Newcastle Upon Tyne, 2000. http://hdl.handle.net/10443/507.

Full text
Abstract:
Anonymizers based on an intermediate computer (a set of them) located between the sender and the receiver of an e-mail message have been used for several years by senders of e-mail messages who do not wish to disclose their identity to the receivers. The job of the computer in the middle (the mediator) is to receive the message from the sender, delete the sender's address and other personal data from the header of the message, and forward the message to its final destination. In this paradigm, there are no means to hide the identity of the user from the mediator simple because the message sent arrives in the middle computer, with information that easily leads to the identity of the sender. The origin of this problem is that the sender uses a computer identified by an IP-address that unambiguously leads to the identity of its user. In fact, the sender discloses his identity to the mediator computer from the very moment lie sends his message in the hope that the mediator will protect it. Because of this, in this paradigm the strength of the system for protecting the identity of the sender depends on the ability and willingness of the mediator to keep the secret. In this dissertation we propose a novel approach to sending truly anonymous and confidential messages over the Internet which does not depend on a third party. Our idea departs from the mediator approach in that we do not use an IP-addressed computer to send anonymous messages, we use an IP-addressless computer instead, to be specific, we use a Personal Digital Assistant (PDA) which is IP-addresslessly connected to the Internet with the support of a Mobile Support Station (MSS). The PDA is identified by the MSS by a temporary, non-personal, random identifier (TmpId) which is assigned by the MSS and is valid only for one communication session. Thanks to the use of the TmpId, the sender of the anonymous messages does not need to disclose his identity to the MSS or to anybody else; thus, the strength of the system does not depend on any mediator. Having observed that a public telephone box provides complete anonymity when operated by coins, we took its functionality as a paradigm for our system. Thus, the main idea of our approach is to make the PDA, the MSS, and the Internet communication infrastructure imitate the work of a public telephone box connected to the telephone network. For this to be possible the PDA user uses anonymous electronic cash to pay for his anonymous message. To prove the feasibility of our approach and its correctness, the protocol of the proposed system was designed, specified in Promela specification language, and its basic safety properties and proper end-states were validated using the Spin validator.
APA, Harvard, Vancouver, ISO, and other styles
31

Morris, Cameron. "Browser-Based Trust Negotiation." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1238.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Celosia, Guillaume. "Privacy challenges in wireless communications of the Internet of Things." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI069.

Full text
Abstract:
Également connue sous le nom d'Internet des Objets (IdO), la prolifération des objets connectés offre des opportunités sans précédent aux consommateurs. Des moniteurs d'activité physique aux assistants médicaux, en passant par les appareils électroménagers pour maisons intelligentes, les objets IdO évoluent dans une pléthore de domaines d'application. Cependant, les avantages qu'ils peuvent apporter à notre société augmentent conjointement avec leurs implications en matière de vie privée. Communiquant continuellement de précieuses informations par le biais de liaisons non filaires telles que le Bluetooth et le Wi-Fi, ces appareils connectés accompagnent leurs propriétaires dans leurs activités. La plupart du temps émises sur des canaux ouverts, et parfois en l'absence de chiffrement, ces informations sont alors facilement accessibles pour tout attaquant passif à portée. Dans cette thèse, nous explorons deux problèmes de vie privée majeurs résultant de l'expansion de l'IdO et de ses communications sans fil : le traçage physique et l'inférence d'informations utilisateurs. Sur la base de deux grands ensembles de données composés de signaux radio issus de périphériques Bluetooth/BLE, nous mettons d'abord en échec les fonctionnalités anti-traçage existantes avant de détailler plusieurs applications invasives pour la vie privée. En s'appuyant sur des attaques passives et actives, nous démontrons également que les messages diffusés contiennent des informations en clair allant des caractéristiques techniques des appareils aux données personnelles des utilisateurs telles que des adresses e-mail et numéros de téléphone. Dans un second temps, nous concevons des contre-mesures pratiques pour résoudre les problèmes de vie privée identifiés. Dans ce sens, nous fournissons des recommandations aux fabricants, et proposons une approche afin de vérifier l'absence de failles dans l'implémentation de leurs protocoles. Enfin, dans le but d'illustrer davantage les menaces de vie privée enquêtées, nous implémentons deux démonstrateurs. Par conséquent, Venom introduit un système de traçage physique visuel et expérimental, tandis qu'Himiko propose une interface humaine permettant d'inférer des informations sur les appareils IdO et leurs propriétaires
Also known as the Internet of Things (IoT), the proliferation of connected objects offers unprecedented opportunities to consumers. From fitness trackers to medical assistants, through smarthome appliances, the IoT objects are evolving in a plethora of application fields. However, the benefits that they can bring to our society increase along with their privacy implications. Continuously communicating valuable information via wireless links such as Bluetooth and Wi-Fi, those connected devices support their owners within their activities. Most of the time emitted on open channels, and sometimes in the absence of encryption, those information are then easily accessible to any passive attacker in range. In this thesis, we explore two major privacy concerns resulting from the expansion of the IoT and its wireless communications: physical tracking and inference of users information. Based on two large datasets composed of radio signals from Bluetooth/BLE devices, we first defeat existing anti-tracking features prior to detail several privacy invasive applications. Relying on passive and active attacks, we also demonstrate that broadcasted messages contain cleartext information ranging from the devices technical characteristics to personal data of the users such as e-mail addresses and phone numbers. In a second time, we design practical countermeasures to address the identified privacy issues. In this direction, we provide recommendations to manufacturers, and propose an approach to verify the absence of flaws in the implementation of their protocols. Finally, to further illustrate the investigated privacy threats, we implement two demonstrators. As a result, Venom introduces a visual and experimental physical tracking system, while Himiko proposes a human interface allowing to infer information on IoT devices and their owners
APA, Harvard, Vancouver, ISO, and other styles
33

Spinks, Karolyn Annette. "The impact of the introduction of a pilot electronic health record system on general practioners' work practices in the Illawarra." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060712.153053/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Boucher, Duane Eric. "An information privacy model for primary health care facilities." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1007181.

Full text
Abstract:
The revolutionary migration within the health care sector towards the digitisation of medical records for convenience or compliance touches on many concerns with respect to ensuring the security of patient personally identifiable information (PII). Foremost of these is that a patient’s right to privacy is not violated. To this end, it is necessary that health care practitioners have a clear understanding of the various constructs of privacy in order to ensure privacy compliance is maintained. This research project focuses on an investigation of privacy from a multidisciplinary philosophical perspective to highlight the constructs of information privacy. These constructs together with a discussion focused on the confidentiality and accessibility of medical records results in the development of an artefact represented in the format of a model. The formulation of the model is accomplished by making use of the Design Science research guidelines for artefact development. Part of the process required that the artefact be refined through the use of an Expert Review Process. This involved an iterative (three phase) process which required (seven) experts from the fields of privacy, information security, and health care to respond to semi-structured questions administered with an interview guide. The data analysis process utilised the ISO/IEC 29100:2011(E) standard on privacy as a means to assign thematic codes to the responses, which were then analysed. The proposed information privacy model was discussed in relation to the compliance requirements of the South African Protection of Personal Information (PoPI) Bill of 2009 and their application in a primary health care facility. The proposed information privacy model provides a holistic view of privacy management that can residually be used to increase awareness associated with the compliance requirements of using patient PII.
APA, Harvard, Vancouver, ISO, and other styles
35

Werly, Stéphane. "La protection du secret rédactionnel /." Genève [u.a.] : Schulthess, 2005. http://www.gbv.de/dms/spk/sbb/recht/toc/502310243.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Gondwe, Mimmy. "The Protection of Privacy in the Workplace: A Comparative Study." Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17849.

Full text
Abstract:
Thesis (LLD )--Stellenbosch University, 2011.
ENGLISH ABSTRACT: The importance of privacy lies in the fact that it represents the very idea of human dignity or the preservation of the ‘inner sanctum’. Not surprisingly, however, operational concerns of employers and technological developments combine continuously to challenge the preservation of privacy in the workplace. Employees the world over are exposed to numerous privacy invasive measures, including drug testing, psychological testing, polygraph testing, genetic testing, psychological testing, electronic monitoring and background checks. Hence, the issue at the heart of this dissertation is to determine to what extent privacy is protected in the South African workplace given advancements in technology and the implications (if any) for the right to privacy as such. A secondary aim of the dissertation is to attempt to provide a realistic balance between the privacy concerns of employees and the operational needs of employers in this technological age. As such the main focus of dissertation falls within the sphere of employment law. In order to provide an answer to the research issue discussed above, the dissertation addresses five ancillary or interrelated issues. First, the broad historical development of the legal protection of privacy is traced and examined. Second, a workable definition of privacy is identified with reference to academic debate and comparative legislative and judicial developments. Third, those policies and practices, which would typically threaten privacy in the employment sphere are identified and briefly discussed. Fourth, a detailed evaluation of the tension between privacy and a number of selected policies and practices in selected countries is provided. More specifically, the dissertation considers how these policies and practices challenge privacy, the rationale for their existence and, if applicable, how these policies and practices – if necessary through appropriate regulation – may be accommodated while simultaneously accommodating both privacy and the legitimate concerns of employers. The selection of these practices and policies is guided by two considerations. At the first level the emphasis is on those challenges to privacy, which can be traced back to technological developments and which, as such, foster new and unique demands to the accommodation of privacy in the workplace. The secondary emphasis is on those policies, which are representative of the fundamental challenges created by new technologies to privacy. To effectively address the above issues the dissertation uses the traditional legal methodology associated with comparative legal research, which includes a literature review of applicable law and legal frame work and a review of relevant case law and a comparative study of selected foreign jurisdictions.
AFRIKAANSE OPSOMMING: Geen opsomming
Fulbright Foundation
Stellenbosch University
Mellon Foundation
NFR
APA, Harvard, Vancouver, ISO, and other styles
37

Henshaw, James Presley. "Phishing Warden : enhancing content-triggered trust negotiation to prevent phishing attacks /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd840.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Mkosi, Barbara Nomsa. "Confidentiality as value in the management of HIV/AIDS in South Africa." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51663.

Full text
Abstract:
Thesis (M.Phil.)--Stellenbosch University, 2000.
ENGLISH ABSTRACT: AIDS is the most important threat to world health. Recent years have seen a dramatic spread of HIVand AIDS in South Africa. Health education directed at modifying risk behaviour appears to be the only way in which the disease can be contained. Controlling AIDS is not only by controlling the virus, but also involves tackling social, economic and political issues and putting AIDS into the broader context of sexuality and gender roles. This requires a broader understanding of this aspect of HIV-AIDS ranging from population dynamics, through to research on individual behaviour and its socio-economic impact; so that we can dispel the myths and rumours that surround AIDS and answer searching questions that will be asked by the community. In South Africa, HIV-AIDS remains a stigmatized disease. There have been calls from courageous and influential people for those who are living with HIV-AIDS to be open about their status and to destigmatise the disease. Institutions too have been drawn into the controversy about whether to remain silent or speak out. Southern African Anglican bishops, as well as some politicians declared their intention to undergo testing for HIV status in order to sensitise the public to the seriousness of the epidemic. Were AIDS not regarded as intolerable, the entire issue of confidentiality would fall away. Calls to destigmatise the disease through openness cannot stand alone. Government must put effective treatment programmes in place. In the absence of treatment, AIDS may represent only frustration and hopelessness to those who test positive; and fear, danger and resultant animosity to those who are HIV negative. The text is in four chapters. Chapter 1 focuses on confidentiality as an important principle in the management of disease. In HIV -AIDS, confidentiality is a more sensitive issue as AIDS is particularly viewed as a social stigma, accompanied by discrimination and harassment. The chapter also addresses HIV infection, transmission, counseling and screemng. Chapter 2 deals with the principles of biomedical ethics namely, autonomy, to enable the patient to determine his/her course of treatment; informed consent, designed to protect the interests of patients from exploitation and harm, and encourage health professionals to act responsibly; beneficence and nonmaleficence, to protect the welfare of others; and justice, to ensure access to health care for all. It also highlights the aspects of and limitations to confidentiality. Chapter 3 discusses broadly the ethical dilemmas pertammg to professional-patient relationships, women and HIV-AIDS, religion, prisoners and employer-employee relationships. When the AIDS epidemic started, very few people suffered from the disease, and the disease was treated with great caution and confidentiality. Today, AIDS is a pandemic and emphasis should shift from the ethic of autonomy and confidentiality, to a social ethic, which emphasizes the responsibility of minimizing the risk of spread of infection. The chapter also examines the role of the Department of Health, the participation of health professional bodies and the legal aspects relating to confidentiality in HIV-AIDS. Chapter 4 attempts to construct an argument to destigmatise HIV-AIDS by arguing the responsibility of the government to make sufficient resources available for the treatment and control of the pandemic. Health professionals are challenged to engage their expertise and skills in the service of the sick with dignity and respect. The community is encouraged to support the drive towards controlling the spread of HIV infection and enable people living with AIDS to disclose their status without fear of harassment.
AFRIKAANSE OPSOMMING: Vigs is die gevaarlikste bedreiging van wéreldgesondheid. Die afgelope paar jaar het 'n dramatiese verspreiding van mv en VIGS in Suid-Afrika plaasgevind. Gesondheidsopvoeding wat gemik is op die verandering van risiko-gedrag is skynbaar die enigste metode wat die siekte kan beheer. Die kontrolering van VIGS is nie net die kontrolering van die virus nie, maar dit betref ook herbesinning oor sosiale, ekonomiese en politiese en geslagsrolle. Dit vereis 'n omvattender verstaan van hierdie aspek van HIV-VIGS, wat strek vanaf van bevolkingspatrone tot by die navorsing oor individuele gedrag en die sosio-ekonomiese impak van 19. So kan ons hopelik help om die mites rondom VIGS te besweer. In Suid-Afrika bly mV-VIGS 'n gestigmatiseerde siekte. Daar rus 'n veranbtwoordelikheid op invloedryke mense wat met mV-VIGS leef en wat as rolmodelle sou kon dien, om hul mv -status te openbaar en sodoeonde te help om die siekte te destigmatiseer. Instansies is ook by hierdie twispunt betrek om vas te stelof die mense moet praat of swyg. Suider-Afrikaanse Anglikaanse Biskoppe, asook somige politici het hulle intensies aangekondig om die mv -toets te ondergaan om sodoende die publiek te help opvoed oor die gevaar van hierdie epidemie. Oproepe om die siekte te destigmatiseer deur openbaarheid kan nie in isolasie funksioneer nie. Die staat moet effektiewe kuratiewe en voorkomingsprogramme hier rondom loods en kontinueer. In die afwesigheid van 'n geneesmiddel, sal VIGS slegs frustrasie, hopeloosheid, en vrees skep by diegene wat positief getoets is, sowel as vyandigheid onder diegene wat nie mv positief is nie. Die teks het vier hoofstukke. Hoofstuk 1 fokus op vertroulikheid as 'n belangrike beginsel in die bestuur van die siekte. In mV-VIGS is vertroulikheid 'n meer sensitiewe beginsel aangesien VIGS in die besonder as 'n sosiale skandvlek, aangevreet deur diskriminasie, gesien word. Die hoofstuk bespreek ook mv -infeksie, transmissie, raadgewing en toetsing. Hoofstuk 2 gaan oor die beginsels van die biomediese etiek, naamlik, outonomie, waaronder ingeligte toetstemming, ontwerp om die belange van die pasiente te beskerm teen eksploitasie en gevaar: om gesondheids professionele aan te moedig om hulle op 'n verantwoordelike manier te gedra. Ander beginsels is goedwilligheid en niekwaadwiligheid om die welsyn van ander te beskerm, asook geregtigheid, om toegang tot gesondheidshulp vir almal te verseker. Dit beklemtoon ook die aspekte verwant aan beperkinge tot vertroulikheid. Hoofstuk 3 bespreek breedweg die etiese dilemmas met betrekking tot die verhouding tussen pasiënye en professionele gesondheidswerkers, vrouens en mV-VIGS, godsdiens, gevangenes en werkgewer-werker verhoudings. Toe die VIGS-epidemie begin het, het min mense aan die siekte gely, en die siekte is met groot sorg en vertroulikheid behandel. Vandag is VIGS 'n pandemie en die klem moet geskuif word vanaf outonomie en vetrouilikheid na 'n sosiale etos wat verantwoordlikheid en die vermindering van die risiko van die verspreiding van die infeksie beklemtoon. Die hoofstuk kyk ook na die rolle van gesondheidsdepartmente, deelname van gesondheids professionele organisasies en die juridiese aspekte met betrekking tot vertroulikheid van HIV-VIGS. Hoofstuk 4 poog om 'n argument te ontwikkel wat daartoe sou kon bydra dat HIV-VIGS gedestigmatiseer sal word. Klem word gelê op die verabtwoordelikheid van die staat om soveel moontlike bronne beskikbaar te stel vir die behandeling van en beheer oor hierdie pandemie. Gesondheids professionele word uitgedaag om hulle deskundigheid en bekwaamheid in die diens van die siekes met waardigheid en respek te gebruik. Die gemeenskap word aangemoedig om die poging tot die beheer van die verspreiding van die HIV -infeksie te ondersteun en om die mense wat met VIGS leef in staat te stelom hul status sonder die dreigement van stigmatisering bekend te maak.
APA, Harvard, Vancouver, ISO, and other styles
39

Mousa, Hayam Abdalla. "Management of selfish and malicious behaviors in distributed collaborative systems." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI036.

Full text
Abstract:
La détection participative est un nouveau paradigme dans lequel les citoyens utilisent volontairement leur téléphone portable pour capturer et partager les données détectées deleur environnement afin de surveiller et d'analyser certains phénomènes. Divers systèmes de réputation ont été proposés pour surveiller le comportement des participant’s dans lesapplications de détection participative afin d'identifier ceux qui fournissent de mauvaises contributions. Cependant, les systèmes de réputation existants ne fournissent pas de garanties de confidentialité aux contributeurs. Ainsi, les utilisateurs hésitent généralement à se joindre à des campagnes de détection participatives car ils sont invités à fournir leurs données détectées, notamment l'heure, l'emplacement, etc. Il a été démontré dans différents travaux que jusqu'à 95% de l'identité des participants peut être réidentifiée par le partage de quatre. Contributions contenant des données multi-capteurs. Pour cette raison, l'intégration entre les systèmes de protection de la vie privée et les systèmes de reputation est un besoin crucial pour la création d'applications de détection participative sécurisées et fiables. Cette intégration nécessite la garantie d'objectifs apparemment contradictoires. En effet, les systèmes de réputation surveillent les comportements des participants tout au long des interactions. Alors que l'objectif des systèmes de préservation de la vie privée est de dissocier le lien entre les interactions ultérieures. Dans cette thèse, nous étudions des stratégies possibles pour intégrer des systèmes préservant la confidentialité dans des systèmes sensibles à la réputation. Cette intégration poseun nouveau défi en matière de vie privée en raison de la contradiction entre leurs objectifs. Ensuite, une nouvelle attaque a été définie (attaque RR). L'attaque RR exploite cette contradiction pour détecter la succession des contributions fournies par le même participant. Ensuite, un nouveau protocole préservant la confidentialité (PrivaSense) est proposé. PrivaSense définit une méthode qui garantit à la fois la confidentialité et la réputation et résout simultanément leur contradiction. Enfin, nous proposons un nouveau système de réputation DTSRS, qui repose sur un ensemble de participants fiables pour évaluer la réputation des participants. DTSRS introduit de nouvelles mesures pour évaluer la confiance des contributions des participants. DTSRS a la capacité de se défendre plus fortement contre un ensemble d'attaques qui n'ont pas été considérées dans la littérature (par exemple, Collision, On-off, etc.). DTSRS permet au serveur d'applications d'agréger les données plus précisément. De plus, le DTSRS évalue correctement la confiance et la réputation même si un grand nombre d'adversaires sont inclus dans la campagne de détection
Participatory sensing is an emerging paradigm in which citizens voluntarily use their mobile phones to capture and share sensed data from their surrounding environment in order to monitor and analyze some phenomenon. Various reputation systems have been proposed to monitor participants' behavior in participatory sensing applications in order to identify those who provide bad contributions. However, the existing reputation systems do not provide privacy guarantees to the contributors. Thus, users usually hesitate to join participatory sensing campaigns since they are asked to provide their sensed data including time, location, etc. It has been shown in different works that up to 95% of participants’ identities can be re-identified through sharing four contributions containing multi-sensor data. Due to this reason, the integration between privacy preserving systems and reputation systems is a crucial need for building secure and reliable participatory sensing applications. This integration requires the assurance of seemingly conflicting objectives. Indeed, reputation systems monitor participants’ behaviors along subsequent interactions. Whereas, the objective of privacy preserving systems is to in fact detach the link between subsequent interactions. In this thesis, we study possible strategies to integrate privacy preserving systems within reputation-aware systems. This integration raises a new privacy challenge because of the contradiction between their objectives. Then, a new attack has been defined (RR attack). RR attack exploits this contradiction in order to detect the succession of contributions provided by the same participant. Next, a new privacy preserving reputation-aware protocol (PrivaSense) is proposed. PrivaSense defines a method that ensures both privacy and reputation and simultaneously solves their contradiction. Finally, we propose a novel reputation system DTSRS, which depends on a set of the most trusted participants in order to assess the reputation of participants. DTSRS introduces new measures to evaluate the trust of participants' contributions. DTSRS has the ability to defend more strongly against a set of attacks that was not considered in the literature (e.g. Collision, On-off, etc.). DTSRS enables the application server to aggregate the data more accurately. Moreover, DTSRS assesses both trust and reputation correctly even if a large number of adversaries are included in the sensing campaign
APA, Harvard, Vancouver, ISO, and other styles
40

Gewald, Rieka Susan. "The possibility of psychotherapeutic privilege in South Africa." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1008208.

Full text
Abstract:
Privilege is an evidential principle which, on the grounds of public policy, excludes evidence relevant and otherwise admissible. This thesis aims to discover whether privilege should be applied to the psychotherapeutic profession in South Africa. At present, the only profession in South Africa afforded privilege is the legal profession. There are two main theoretical justifications for privilege: the utilitarian and the individual/human rights approach. This thesis considers whether the psychotherapeutic profession wan-ants privilege under either theory, and recommends that the law of privilege integrate both theories rather than adopt one or the other. The impact of the Constitution and the right to privacy receive particular attention. Very little literature or case law on the question of psychotherapeutic privilege was found in South Africa. Consequently, extensive comparative research into the common-law systems of England, Canada and United States of America was done. This research yielded some interesting findings. The first is that case-by-case development of the law of privilege is uncel1ain and fragmented. The next is that psychotherapeutic privilege exists in almost absolute form in the United States of America, but is littered with lacunae causing as much uncertainty as the case-by-case approach to privilege law. The most helpful method of dealing with the problem was found in Canada, where a two-stage approach to protecting personal information, including psychotherapeutic records, has been developed. In light of this research, this thesis reassesses the original viability of psychotherapeutic privilege in South Africa. Privilege, it was found, is not the best solution to protecting psychotherapeutic communications. This thesis recommends legislative adoption of an amended two-stage approach based on the Canadian model for sexual offence trials as the best method of protecting psychotherapeutic communications in both civil and criminal proceedings. The thesis ends by suggesting draft legislative provisions.
APA, Harvard, Vancouver, ISO, and other styles
41

Jarvis, Ryan D. "Protecting Sensitive Credential Content during Trust Negotiation." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd192.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Rama, Sobhana. "Managing Information Confidentiality Using the Chinese Wall Model to Reduce Fraud in Government Tenders." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1006956.

Full text
Abstract:
Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly, these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in the government information system. This results in the biased award of a tender. Typically, the information in the tender process should be used to make decisions about a tender’s specifications, solicitation, evaluation and adjudication. The sharing of said information to unauthorised persons can be used to manipulate and corrupt the process. This in turn corrupts the tender process by awarding a tender to an unworthy recipient. This research studies the generic steps in the tender process to understand how information is used to corrupt the tender process. It proposes that conflict of interest, together with a lack of information confidentiality in the information system, paves the way for possible tender fraud. Thereafter, a system of internal controls is examined within the South African government as well as in foreign countries to investigate measures taken to reduce the breach of confidential information in the tender process. By referring to the Common Criteria Security Model, various critical security areas within the tender process are identified. This measure is assisted with the ISO/IEC 27002 (2005) standard which has guiding principles for the management of confidential information. Thereafter, an information security policy,the Chinese Wall Model will be discussed as a means of reducing instances where conflict of interest may occur. Finally, an adapted Chinese Wall Model, which includes elements of the tender process, is presented as a way of reducing fraud in the government tender process. Finally, the research objective of this study is presented in the form of Critical Success Factors that aid in reducing the breach of confidential information in the tender process. As a consequence, tender fraud is reduced. These success factors have a direct and serious impact on the effectiveness of the Chinese Wall Model to secure the confidentiality of tender information. The proposed Critical Success Factors include: the Sanitisation Policy Document, an Electronic Document Management System, the Tender Evaluation Ethics Document, the Audit Trail Log and the Chinese Wall Model Prosecution Register.
APA, Harvard, Vancouver, ISO, and other styles
43

Fischedick, Walter. "Die Zeugnisverweigerungsrechte von Geistlichen und kirchlichen Mitarbeitern /." Frankfurt am Main [u.a.] : Lang, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/506739074.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

McConnell, Justin W. "You've got mail the study of the attorney-client privilege and the use of electronic mail." Honors in the Major Thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/470.

Full text
Abstract:
The prolific use of the internet and electronic mail within the legal profession presents novel challenges to the application of the attorney-client privilege; especially, in regards to protecting intended confidential communications relayed through e-mail. This thesis addresses the question of whether an attorney in Florida, through electronic mail use, can waive his client's right to the protections of the attorney-client privilege. After a review of current case law, law review articles, statutes, and texts, this thesis concluded that an attorney's communication through e-mail warrants a reasonable expectation of privacy, permitting the attorney to speak in reasonable confidence to clients through the web. However, attorneys, ethically, should consider the strong repercussions for using such a potentially transparent medium for communication. By examining the relationship between current law, the application of the attorney-client privilege, and a reasonable expectation of privacy, this study provides a comprehensive analysis for attorneys concerned with electronic mail usage. Lastly, this thesis provides attorneys with best practices for their electronic mail communications.
B.A. and B.S.
Bachelors
Health and Public Affairs
Legal Studies
APA, Harvard, Vancouver, ISO, and other styles
45

Shankar, Jay Eriah. "Providers choices in web-medical records: An analysis of trade-offs made by physicians in San Bernardino County." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Hsiao, Chih-Wen, David Turner, and Keith Ross. "A secure lightweight currency service provider." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.

Full text
Abstract:
The main purpose of this project is to build a bank system that offers a friendly and simple interface to let users easily manage their lightweight currencies. The Lightweight Currency Protocol (LCP) was originally proposed to solve the problem of fairness in resource cooperatives. However, there are other possible applications of the protocol, including the control of spam and as a general purpose medium of exchange for low value transactions. This project investigates the implementation issues of the LCP, and also investigates LCP bank services to provide human interface to currency operations.
APA, Harvard, Vancouver, ISO, and other styles
47

Gundu, Tapiwa. "Towards an information security awareness process for engineering SMEs in emerging economies." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1007179.

Full text
Abstract:
With most employees in Engineering Small and Medium Enterprises (SME) now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms’ important information has increased. These Engineering SMEs tend to be more concerned with vulnerabilities from external threats, although industry research suggests that a substantial proportion of security incidents originate from insiders within the firm. Hence, technical preventative measures such as antivirus software and firewalls are proving to solve only part of the problem as the employees controlling them lack adequate information security knowledge. This tends to expose a firm to risk and costly mistakes made by naïve/uninformed employees. This dissertation presents an information security awareness process that seeks to cultivate positive security behaviours using a behavioural intention model based on the Theory of Reasoned Action, Protection Motivation Theory and the Behaviourism Theory. The process and model have been refined and verified using expert review and tested through action research at an Engineering SME in South Africa. The main finding was information security levels of employees within the firm were low, but the proposed information security awareness process increased their knowledge thereby positively altering their behaviour.
APA, Harvard, Vancouver, ISO, and other styles
48

Howieson, Jillian Alice. "Family law dispute resolution : procedural justice and the lawyer-client interaction." University of Western Australia. Law School, 2009. http://theses.library.uwa.edu.au/adt-WU2009.0109.

Full text
Abstract:
While several Australian and international studies have explored the family lawyer-client interaction, these studies have been limited to investigations of discrete areas of the lawyerclient relationship and have been necessarily limited in their methodologies. The present study employed a quantitative empirical methodology in an Australian wide field study of 230 family lawyers and 94 clients that investigated the family lawyer-client interaction from a procedural justice framework. Using multivariate analyses, the study establishes that the Tyler and Blader two-component model of procedural justice applies in the lawyer-client dyad and is influenced by the approach of the lawyer, the emotional response of the client, and the level of co-party conflict that the client is experiencing. Further, the study gives meaning to the terms 'conciliatory and constructive' and 'adversarial' as they apply to family law dispute resolution. The study establishes a construct to measure the conciliatory and adversarial approach of family lawyers and identifies that lawyers tend to incorporate a mixture of the two into their work. The results also identify four distinct behavioural factors that characterise the two approaches: the client-centred and interest-based factors characterise the conciliatory approach; and the lawyer-directed and court-focused factors characterise the adversarial. The study found that in terms of perceptions of fairness, and feelings of satisfaction, the clients preferred the lawyers who took a client-centred and interest-based approach, but in circumstances where the clients were experiencing high-levels of conflict, or fear for the safety of their children, they also appreciated the lawyer who was lawyer-directed and court-focused. Overall, the study shows that in order to create a fair and satisfying dispute resolution service for their clients, family lawyers need to maintain a fine balance of family lawyering behaviour. On a general level, the study provides a profile of Australian family lawyers in terms of their approach to dispute resolution, their attitude towards ADR processes and their favoured negotiation styles. It also profiles family law clients in terms of their emotional adjustment to the divorce and their perceptions of the family lawyers assisting them to resolve their disputes. The study substantially expands the procedural justice theory base and has significant implications for practical family law education, government policy, family lawyering, and the ADR and collaborative law movements. The study indicates where future research could benefit these communities.
APA, Harvard, Vancouver, ISO, and other styles
49

Gstöhl, Caroline. "Geheimnisschutz im Verfahren der internationalen Rechtshilfe in Strafsachen /." Bern : Stämpfli, 2008. http://deposit.d-nb.de/cgi-bin/dokserv?id=3062777&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Andino, López Juan Antonio. "Efectos de la vulneración del secreto profesional del abogado en el proceso civil." Doctoral thesis, Universitat de Barcelona, 2013. http://hdl.handle.net/10803/123748.

Full text
Abstract:
La tesis doctoral estudia los efectos en el proceso civil de la vulneración del secreto profesional del abogado, abordando los siguientes aspectos: (i) breve estudio de la relación jurídica existente entre el abogado y su cliente, y análisis de la obligación principal asumida por el letrado (por ejemplo, defensa letrada en un procedimiento judicial), y obligaciones accesorias (obligación de información del abogado a su cliente, obligación de aconsejar, y custodiar y devolver la documentación que le entregue el cliente); (ii) estudio del secreto profesional del abogado (definición, análisis histórico, sujetos, objeto de secreto, revelación lícita e ilícita del secreto, secreto profesional del abogado de empresa, secreto profesional y normativa de blanqueo de capitales, y sobre todo, encaje del secreto profesional del abogado en el artículo 18.1 o 24 de la Constitución); (iii) consecuencias procesales de su infracción, tales como la inadmisión de la prueba propuesta que vulnere el secreto profesional, su posible ilicitud y asimismo ser una conducta contraria a la buena fe procesal. Se anexan a la tesis normativa española sobre secreto profesional del abogado, normativa europea y estadounidense sobre el secreto profesional, así como jurisprudencia destacada sobre el mismo.
The thesis proceeds with the analysis of legal privilege and the effects of its breach in a Spanish civil proceedings. Therefore, the thesis explains the following issues: (i) analysis of the contractual relationship between the client and his/her Lawyer; (ii) the legal privilege in Spain (applicable law, history, subjects obliged by said privilege, object of the privilege, legal and illegal reveal of the secret, etc); (iii) the effects of the breach of the legal privilege in the Spanish civil proceedings: consideration of the evidence as illegal, as a breach of constitutional rights, or against the good faith that has to be applied in the judicial proceedings. The work attaches the text of the Spanish Law regarding legal privilege of Lawyers, as well as the Law of the countries of Europe and the United States; finally, it also attaches several court cases regarding legal privilege.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography