Academic literature on the topic 'Confidentialité des clients'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Confidentialité des clients.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Confidentialité des clients"
Brasel, Kelsey R., and Brian E. Daugherty. "Cook and Thomas, LLC: Balancing Auditor Liability, Client Confidentiality, and the Public Interest." Issues in Accounting Education 32, no. 1 (October 1, 2015): 17–32. http://dx.doi.org/10.2308/iace-51318.
Full textP., Usha Rani S., Rashmi Kundapur, Anusha Rashmi, and Harsha Acharya. "Client Satisfaction among the clients attending tertiary care centers in Mangalore, South India." Journal of Health and Allied Sciences NU 07, no. 03 (September 2017): 003–6. http://dx.doi.org/10.1055/s-0040-1708716.
Full textEzhova, E. V. "SOME PROBLEMS OF ENSURING THE PROTECTION OF ATTORNEY-CLIENT PRIVILEGE IN THE CRIMINAL PROCESS OF RUSSIA AND BELARUS." Juvenis scientia, no. 9 (September 30, 2018): 41–43. http://dx.doi.org/10.32415/jscientia.2018.09.08.
Full textUys, Leana R. "Confidentiality and HIV/AIDS in South Africa." Nursing Ethics 7, no. 2 (March 2000): 158–66. http://dx.doi.org/10.1177/096973300000700209.
Full textBingulac, Nenad, and Dragan Miljenović. "Lawyer confidentiality." Pravo - teorija i praksa 38, no. 3 (2021): 42–52. http://dx.doi.org/10.5937/ptp2103042b.
Full textGrimley-Baker, Kathy. "Ethical Implications of Mandatory Reporting of Intimate Partner Violence." Creative Nursing 20, no. 4 (2014): 254–57. http://dx.doi.org/10.1891/1078-4535.20.4.254.
Full textHamon, Jessie K., Jenna Hoyt, Shari Krishnaratne, Ariko Angela Barbra, Job Morukileng, Nathaly Spilotros, Miriam Mbembe, Seth Marcus, and Jayne Webster. "Perceptions of quality and the integrated delivery of family planning with childhood immunisation services in Kenya and Uganda." PLOS ONE 17, no. 6 (June 6, 2022): e0269690. http://dx.doi.org/10.1371/journal.pone.0269690.
Full textZaidi, Syeda Masooma. "Innovative Commercial and Private Genetic Testing Raises Privacy and Confidentiality Concerns." Sciential - McMaster Undergraduate Science Journal, no. 1 (November 25, 2018): 31–33. http://dx.doi.org/10.15173/sciential.v1i1.1902.
Full textOrdway, Ann M., and Arielle F. Casasnovas. "A Subpoena: The Other Exception to Confidentiality." Family Journal 27, no. 4 (August 21, 2019): 352–58. http://dx.doi.org/10.1177/1066480719868701.
Full textNishkala, H. M., S. H. Anu, D. A. Bindushree, and S. L. Manoj. "Data Partitioning and Reduplication for Providing Integrity to Data in the Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 4070–74. http://dx.doi.org/10.1166/jctn.2020.9021.
Full textDissertations / Theses on the topic "Confidentialité des clients"
Sarkar, Mainak. "Three essays on artificial intelligence models for customer relationship management." Thesis, Cergy-Pontoise, Ecole supérieure des sciences économiques et commerciales, 2022. http://www.theses.fr/2022ESEC0002.
Full textThe dissertation consists of three essays on “Artificial Intelligence Models for Customer Relationship Management”. In particular, the essays are built on novel deep learning algorithms known as long-short term memory (LSTM) neural networks. The first essay shows that LSTM neural networks, which rely exclusively on raw data as input, can replace feature-engineering based models for predicting customer behavior in the direct marketing context. In the second essay, I develop a dual-LSTM neural networks model for customer lifetime value (CLV) predictions that incorporates the firm’s adaptive policy as well as captures latent attrition. I show that integrating the firm’s adaptive marketing policy into customer valuation models leads to diverging paths of future profitability, highlighting bimodalities and modes at the tail of the CLV distribution. The presence of bimodalities and modes at the tail captured by my model has implications for a deeper understanding of customer potential (i.e., best-case scenario vs. traditional CLV expectation) and for fine-tuning customer prioritization. In the third essay, I leverage the ability of LSTM neural networks’ memory states to summarize useful information from the past transaction data to develop a novel approach that addresses customer privacy concerns in customer relationship management (CRM)
Barquissau, Eric. "L’évaluation de la qualité de la relation client en ligne par les utilisateurs d’espaces clients de sites web : une application dans le secteur bancaire et dans le secteur de la téléphonie mobile." Thesis, Paris 10, 2013. http://www.theses.fr/2013PA100205.
Full textThe Internet has dramatically changed the way companies interact with their customers. Because of the importance of e-customer relationship management, companies have to reconsider their strategies in terms of relationship marketing. The purpose of this research is to investigate the way users of personal websites’ accounts evaluate e-relationship quality within two sectors: the banking sector and the mobile phone sector. This research deals with an important concept: appropriation.A qualitative study has been conducted in order to build a research model and to create a measurement scale to study the appropriation of a personal websites’ account. Therefore, an online survey (N=534) was conducted to test the hypothesis. The findings suggest that the appropriation of a personal websites’ account is a mediating variable between perceived ease of use, perceived usability and relationship quality, both in the banking sector and in the mobile phone sector. In the same way, privacy has a positive influence on e-relationship quality. Moreover, perceived interactivity has a positive influence on e-relationship quality, but that particular hypothesis is partially validated. Finally, social presence does not have a positive influence on e-relationship quality
Gonzalez, Laura. "The effects of confidentiality on the working alliance /." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79771.
Full textHenziger, Eric. "The Cost of Confidentiality in Cloud Storage." Thesis, Linköpings universitet, Databas och informationsteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148907.
Full textCanillas, Rémi. "Privacy and Security in a B2B environment : Focus on Supplier Impersonation Fraud Detection using Data Analysis." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI118.
Full textSupplier Impersonation Fraud (SIF) is a kind of fraud occuring in a Business-To-Business context (B2B), where a fraudster impersonates a supplier in order to trigger an illegitimate payment from a company. Most of the exisiting systems focus solely on a single, "intra-company" approach in order to detect such kind of fraud. However, the companies are part of an ecosystem where multiple agents interacts, and such interaction hav yet to be integrated as a part of the existing detection techniques. In this thesis we propose to use state-of-the-art techniques in Machine Learning in order to build a detection system for such frauds, based on the elaboration of a model using historical transactions from both the targeted companies and the relevant other companies in the ecosystem (contextual data). We perform detection of anomalous transactions when significant change in the payment behavior of a company is detected. Two ML-based systems are proposed in this work: ProbaSIF and GraphSIF. ProbaSIF uses a probabilistic approach (urn model) in order to asert the probability of occurrence of the account used in the transaction in order to assert its legitimacy. We use this approach to assert the differences yielded by the integration of contextual data to the analysis. GraphSIF uses a graph-based approach to model the interaction between client and supplier companies as graphs, and then uses these graph as training data in a Self-Organizing Map-Clustering model. The distance between a new transaction and the center of the cluster is used to detect changes in the behavior of a client company. These two systems are compared with a real-life fraud detection system in order to assert their performance
Berry-Harris, Traci Aaron. "Examining therapists' perceptions of confidentiality across various therapeutic environments, professional organizations, and client development (an exploratory study) /." Morgantown, W. Va. : [West Virginia University Libraries], 2007. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4982.
Full textTitle from document title page. Document formatted into pages; contains vi, 149 p. Includes abstract. Includes bibliographical references (p. 117-125).
Veeder, Stacy B. "Confidentiality expectations and willingness to disclose personal information to a health-care provider." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textDowman, Nadia. "Reporting obligations: A challenge for South African lawyers." University of Western Cape, 2019. http://hdl.handle.net/11394/7574.
Full text“Threats to the independence of the legal profession have become a preoccupation for bar leaders, regulators and academics, driven by the dual pressures of globalization and the changing business structure of the profession.”1 Money laundering is a transnational economic crime that has plagued the world economy for many decades. It is a crime that eluded the attention of most world leaders. Hence, it is this elusiveness and this non-interest in money-laundering as a serious economic crime, that afforded many individuals such as former dictators and military leaders in developing countries the chance to avoid prosecution for depleting the economic resources of their particular state.2
Holmberg, Daniel, and Victor Nyberg. "Functional and Security Testing of a Mobile Client-Server Application." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148710.
Full textAndersson, Frida. "Lojalitetsplikt i uthyrningsbranschen : - En uppsats om lojalitetsförhållandet mellan kundföretag och inhyrd arbetskraft." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-33654.
Full textFöretag har under senare delen av 1900-talet gått från traditionell varuproduktion till att allt mer bygga sin verksamhet på information och kunskap. Den tekniska utvecklingen har gjort det lättare att överföra och sprida kunskap i samhället vilket ökar sårbarheten hos företagen. Icke- traditionella anställningar såsom tidsbegränsade anställningar och inhyrd arbetskraft ökar och företag har en högre personalomsättning nu än tidigare. Fler personer får tillgång till företagsspecifik information och spridning av den skulle kunna skada arbetsgivaren. I min uppsats undersöker jag skyddet av hemlig information för arbetsgivare som hyr in arbetskraft från ett personaluthyrningsföretag. Skydd för hemlig information ingår i den så kallade lojalitetsplikten i form av tystnadsplikt, skydd för företagshemlighet och konkurrensklausuler. Lojalitetplikt föreligger i anställningsavtalet mellan uthyrd arbetstagare och uthyrningsföretaget men arbetstagarens arbetsprestation utförs hos kunden. Kan regleringar kring lojalitetsplikt tillämpas på förhållandet mellan kund och inhyrd arbetstagare? Vad blir konsekvenserna av de regler som finns idag? Uppsatsen är skriven med juridisk metod som har sin utgångspunkt i rättskälleläran samt med rättssociologisk angreppssätt. Andra delar av lojalitetsplikt såsom upplysningsskyldighet, bisysslor eller kritikrätt behandlas inte i uppsatsen, ej heller lojalitetsplikt för arbetsgivaren. Slutsatsen är att uthyrningsföretaget står för den uthyrde arbetstagarens handlingar mot kundföretaget eftersom det föreligger lojalitetsförpliktelser i uthyrningsavtalet mellan kund och uthyrare. Uthyraren står för exempelvis skadestånd om en arbetstagare röjer eller utnyttjar en företagshemlighet hos kunden. Vissa regleringar ger uttryck för att det föreligger lojalitetsplikt mellan kund och inhyrd arbetstagare. Exempelvis är den uthyrda arbetstagaren bunden av tystnadsplikt vad det gäller förhållanden hos kunden. I ett förslag från regeringen på kommande ändringar i lagstiftningen kommer den inhyrde arbetstagaren bli direkt skadeståndsansvarig vid röjande eller utnyttjande av företagshemlighet hos kunden. I uthyrningsbranschen finns dubbelt så stor andel utlandsfödda arbetstagare som på arbetsmarknaden generellt. På grund av hur regleringen kring lojalitetsplikt ser ut idag kan den bidra till inlåsningseffekter för utlandsfödda arbetstagare som arbetar i uthyrningsbranschen. Skilda villkor för svensk- och utlandsfödda såsom statisk diskriminering på arbetsmarknaden gör att utlandsfödda arbetstagare löper större risk än svenskfödda arbetstagare att få stå utanför den traditionella arbetsmarknaden.
Books on the topic "Confidentialité des clients"
Carol, Gorenberg, and National Association of Social Workers, eds. Client confidentiality and privileged communications. 2nd ed. Washington, D.C: NASW Press, 2011.
Find full textClient incest and the lawyer's duty of confidentiality. [Chicago]: American Bar Association, 1985.
Find full textHorwitz, Kenneth M. The new cpa-client confidentiality privilege: Opportunity or risk? New York: Research Institute of America, 1999.
Find full textHorwitz, Kenneth M. The new cpa-client confidentiality privilege: Opportunity or risk? New York: Research Institute of America, 1999.
Find full textEvertsz, Jari. Therapist and client attitudes towards discrete areas of threat to therapeutic confidentiality. [Guildford]: [University of Surrey], 1990.
Find full textPattenden, Rosemary. The law of professional-client confidentiality: Regulating the disclosure of confidential personal information. Oxford: Oxford University Press, 2003.
Find full textLucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. Paris: E ditions Eyrolles, 2006.
Find full textVirginia. General Assembly. Secretary of Health and Human Resources. Report of the Secretary of Health and Human Resources on the impact of laws protecting client confidentiality on cooperative relationships of agencies working to address problems of children and families : to the Governor and the General Assembly of Virginia. Richmond: Commonwealth of Virginia, 1991.
Find full textGuidance, Institute of Careers, ed. Client confidentiality. Stourbridge: ICG, 2002.
Find full textPattenden, Rosemary, and Duncan Sheehan. Law of Professional-Client Confidentiality. Oxford University Press, 2016.
Find full textBook chapters on the topic "Confidentialité des clients"
Jenkins, Peter. "Client confidentiality and data protection." In The Handbook of Professional, Ethical and Research Practice for Psychologists, Counsellors, Psychotherapists and Psychiatrists, 53–64. 3rd edition. | Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429428838-5.
Full textRosenthal, Howard. "Beyond Confidentiality: Professional Counselors and Therapists Have a Duty to Warn." In Before You See Your First Client, 77–78. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003169048-32.
Full textCiriani, Valentina, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. "Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients." In Data and Applications Security XXIII, 225–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03007-9_15.
Full textThaman, Stephen C. "Confidentiality of Attorney-Client Communications in the United States." In Ius Comparatum - Global Studies in Comparative Law, 395–440. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43123-5_14.
Full textThaman, Stephen C., and Lorena Bachmaier. "Attorney-Client Confidentiality as a Fair Trial Right in Criminal Proceedings." In Ius Comparatum - Global Studies in Comparative Law, 589–610. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48675-4_21.
Full textBarret, Bob, Karen Strohm Kitchener, and Scott Burris. "Suicide and confidentiality: With the client with advanced AIDS: The case of Phil." In Ethics in HIV-related psychotherapy: Clinical decision making in complex cases., 299–314. Washington: American Psychological Association, 2001. http://dx.doi.org/10.1037/10399-016.
Full textSasakura, Hiroki. "The Continuing Evolution of Right to Counsel and Confidentiality of Attorney-Client Communications in Japan." In Ius Comparatum - Global Studies in Comparative Law, 177–204. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43123-5_7.
Full textBarnett, Jeffrey E., and Jeffrey Zimmerman. "It Is Best to Provide Minimal Information When a Referral Source Requests Information About a Client." In If You Build It They Will Come, edited by Jeffrey E. Barnett and Jeffrey Zimmerman, 123–27. Oxford University Press, 2019. http://dx.doi.org/10.1093/med-psych/9780190900762.003.0022.
Full textAbadi, Aydin. "Smarter Data Availability Checks in the Cloud." In Handbook of Research on Digital Transformation, Industry Use Cases, and the Impact of Disruptive Technologies, 320–39. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-7712-7.ch017.
Full text"Confidentiality and Disclosure." In Financial Abuse of Older Clients: Law, Practice and Prevention. Bloomsbury Professional, 2017. http://dx.doi.org/10.5040/9781784515522.chapter-08d.
Full textConference papers on the topic "Confidentialité des clients"
Nikeshin, Alexei Viacheslavovich, and Victor Zinovievich Shnitman. "TLS 1.3 Clients Testing." In 24th Scientific Conference “Scientific Services & Internet – 2022”. Keldysh Institute of Applied Mathematics, 2022. http://dx.doi.org/10.20948/abrau-2022-9.
Full textHenziger, Eric, and Niklas Carlsson. "The Overhead of Confidentiality and Client-side Encryption in Cloud Storage Systems." In UCC '19: IEEE/ACM 12th International Conference on Utility and Cloud Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3344341.3368808.
Full textArslan, Çetin, and Didar Özdemir. "The Protection of Confidential Business Information by Criminal Law." In International Conference on Eurasian Economies. Eurasian Economists Association, 2017. http://dx.doi.org/10.36880/c08.01824.
Full textMurtala, M. M., and Olumide Babatope Longe. "Data Security in Decentralized Cloud Systems: A Case for the Deployment of Blockchain Technology." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p13.
Full textDeakin, Barry. "Model Tests in Support of the Design of a 50 Meter Barque." In SNAME 13th Chesapeake Sailing Yacht Symposium. SNAME, 1997. http://dx.doi.org/10.5957/csys-1997-005.
Full textPytlar, Theodore S. "Status of Existing Biomass Gasification and Pyrolysis Facilities in North America." In 18th Annual North American Waste-to-Energy Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/nawtec18-3521.
Full textReports on the topic "Confidentialité des clients"
Studsrød, Ingunn, Ragnhild Gjerstad Sørensen, Brita Gjerstad, Patrycja Sosnowska-Buxton, and Kathrine Skoland. “It’s very complex”: Professionals’ work with domestic violence (DV): Report – FGI and interviews 2022. University of Stavanger, November 2022. http://dx.doi.org/10.31265/usps.249.
Full text