Dissertations / Theses on the topic 'Private'

To see the other types of publications on this topic, follow the link: Private.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Private.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Loesing, Karsten. "Privacy-enhancing technologies for private services." Bamberg Univ. of Bamberg Press, 2009. http://d-nb.info/994593937/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Diel, Jochen Nicolas. "Private Equity Infrastruktur als alternative Anlagemöglichkeiten für privates Kapital /." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/02607075002/$FILE/02607075002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stewart, Michael Clark. "How Private is Private?: Effects of Degree of Information Sharing on Group Ideation." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23238.

Full text
Abstract:
Many Computer-Supported Cooperative Work (CSCW) applications go to great lengths to maximize transparency by making available participants\' actions and respective application states to all others in real-time. Designers might intend to enhance coordination through increased transparency, but what other outcomes might be influenced by these choices? We developed two versions of a CSCW application to support a group idea generation task for collocated groups. One version had diminished transparency in comparison to the other. We studied the effects of this varied transparency on the groups\' generativity and collaboration. We found that in modulating transparency there was a trade-off between generativity and collaboration. Groups with diminished transparency felt that their groupmates built on their ideas more, but groups with increased transparency were more generative. These findings are tentative but suggest that the full story of group vs. solitary, private vs. public manipulations of technology, at least in the area of idea generation, is not yet sufficiently theorized or understood.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
4

Halvarsson, Niklas. "Privatisering av svensk säkerhet : Vilka faktorer driver expansionen av privata säkerhetsföretag?" Thesis, Försvarshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1431.

Full text
Abstract:
Sedan kalla krigets slut har en ny typ av aktör dykt upp i internationella konflikter och krig världen över. Denna aktör är privata företag som i dagsläget erbjuder allt från supplementär logistik till att helt ersätta nationella arméer. Utgångspunkten i denna uppsats är att ta reda på vilka faktorer som har skapat en marknad för dessa företag generellt, samt vilka av dessa faktorer som kan förklara framväxten i Sverige specifikt. I uppsatsen undersöks befintlig forskning kring vad som drivit utvecklingen. Därefter kommer befintlig teori att prövas som förklaringsmodell för expansionen i Sverige. Den befintliga teorin som prövats på Sverige består av sju faktorer beskrivandes politiska och samhälleliga förutsättningar vilka förklarar expansionen. Av dessa återfinns samtliga i Sverige, men genom en analys av deras respektive giltighet i svensk kontext uppstår en mer nyanserad bild, där endast fyra av faktorerna är relevanta som förklaringar. Dessa är en transformation av försvarets fokus och organisation, en politisk trend av privatisering samt ett överflöd av militärt utbildad personal utan sysselsättning. Av dessa är den förstnämnda den starkaste katalysatorn medan den sistnämnda endast i viss mån påverkar den redan pågående expansionen.
Since the end of the Cold War a new phenomenon has shown in international conflict and war, worldwide. This phenomenon is the private companies nowadays offering supplementary logistics, armed troops to the front and everything in between. This essay aims to identify which factors that have contributed to the creating of a market for these companies in general, and which of these that can explain the growth of Swedish companies in particular. In the essay previous research on the topic of privatization of security are examined and thereafter applied onSwedenin order to examine to what extent it can be used to explain the changes inSweden. The existent theory applied onSwedenconsists of seven factors, describing political and social basis, which explain the expansion. All of these are found in Sweden, however, through a further analysis of their individual relevance, a more nuanced result can be seen, whereas only four out of seven are relevant as explanations. These are a transformation in defence focus and organization, a political trend of privatization and a flood of trained unemployed military personnel. The first one of these is the strongest catalyst for expansion while the latter only to a certain degree reinforces the already ongoing process.
APA, Harvard, Vancouver, ISO, and other styles
5

Loesing, Karsten [Verfasser]. "Privacy-enhancing technologies for private services / von Karsten Loesing." Bamberg : Univ. of Bamberg Press, 2009. http://d-nb.info/994593937/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tuomisto, Tino, Adrian Ringström, and Aleksi Vekki. "Is your privacy private on mobile social media platforms?" Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96089.

Full text
Abstract:
Purpose: The purpose of this paper is to explain the effect of trust, knowledge, and control on privacy concerns on mobile social media platforms. Methodology: This paper used a quantitative research approach with a Cross Sectional Research Design, in form of a survey, to collect a number of 76 responses. The sample consisted primarily of swedish respondents in the ages of 18-25 with high school education living in a household earning below 19 999 SEK. Findings: Our study found significant negative relationships between trust and privacy concerns and knowledge and privacy concerns. This furthers the research field for trust that Milne and Boza (1999), Proudfoot, et al. (2018) and Wenjing and Kavita (2019) laid the foundation on. This also applies to knowledge, by confirming the results of Smit, Van Noor and Voorveld (2014) and Aguirre, et al. (2016). We provide a model where trust and knowledge is described to negatively affect privacy concerns on mobile social media. We also document a so-called privacy paradox from the results. Research Implications: Our results suggest that in order for managers to reduce privacy concerns on mobile social media platforms, increasing the levels of trust or knowledge can moderately alleviate such concerns. Knowledge to a slightly larger degree than trust. However, for such companies to customize visible cues only to appear reliable, as per Aguirre, et al (2015), can thereby be argued of little use as this would have little impact on the level of privacy concern displayed in mobile social media users. Originality/Value: This paper tests findings from Nowak and Phelps (1995), Milne and Boza (1999), Taylor, Davis and Jillapalli (2009), Smit, Van Noor and Voorveld (2014), Gu, et al. (2017), Proudfoot, et al. (2018), Nam (2018) and Wenjing and Kavita (2019) within a previously yet to be tested context, mobile social media platforms. Keywords: Privacy, Concerns, Violations, Social Media, Mobile, Platforms, Facebook, Trust, Knowledge, Control
APA, Harvard, Vancouver, ISO, and other styles
7

Siemes, Marc. "Going private unter Beteiligung von Finanzinvestoren in Deutschland /." Wiesbaden : Dt. Univ.-Verl, 2003. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=010250240&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Quazzo, Dante. "Examining Gains in Operational Efficiency in Public-to-Private and Private-to-Private Transactions." Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/cmc_theses/1000.

Full text
Abstract:
Using private firm financial data, I compare operational improvements in public-to-private and private-to-private leveraged transactions in Western Europe between 2003 and 2010. Results are consistent with the recent literature and find operational gains to be significantly smaller then when buyouts were originally analyzed by Jensen (1989) and Kaplan (1989). Public firms experience an increase in raw EBITDA margin of 7.2 percentage points three years post-buyout, while a doubling of firm size yields an increase in EBITDA margin of 4.6 percentage points in year three post-buyout. Using industry-adjusted data, prior corporate form is positive and significant in year two post-buyout. Contrary to prior literature’s expectations, governance state does not impact increases in net profit margin or return on assets. My analysis offers support for the free cash flow theory, as the positive and significant effect of a public structure on EBITDA margin suggests that public firms have greater growth potential for private equity investors and more agency costs than their private counterparts.
APA, Harvard, Vancouver, ISO, and other styles
9

Dunar, Charles J. Mitchell Jared L. Robbins Donald L. "Private military industry analysis private and public companies /." Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FDunar%5FMBA.pdf.

Full text
Abstract:
"Submitted in partial fulfillment of the requirements for the degree of Master of Business Administration from the Naval Postgraduate School, December 2007."
Advisor(s): Dew, Nicholas ; Hudgens, Bryan J. "December 2007." "MBA professional report"--Cover. Description based on title screen as viewed on January 10, 2008. Includes bibliographical references (p. 87-127). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
10

Dunar, Charles J., Donald L. Robbins, and Jared L. Mitchell. "Private military industry analysis: private and public companies." Thesis, Monterey, California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/10195.

Full text
Abstract:
MBA Professional Report
Approved for public release; distribution is unlimited
Since the end of the Cold War, the Private Military Industry has skyrocketed. This study gathers, compiles and examines demographic and financial information on 585 private and public companies that operate in the Private Military Industry. The demographic analysis reveals that an overwhelming majority of firms are privately held and offered no financial information. Firm inception dates are closely correlated with past and current world events. Majority of the private firms founders have military or government backgrounds and are located in the United States and United Kingdom. Using Singer's and Avant's classification of the Private Military Industry, the study determines that most firms are not restricted to one classification as they operate in more then one arena. The analysis of public firms reveals that revenues and profits have been increasing steadily since 2003 as well as operating expenses, shrinking profit margins. The public firm analysis presents the financial relationships between the Initial Public Offerings, locations, and employee numbers to the success of the companies. Overall this study and the analysis of the Private Military Firms offer insight into the prevalence of the Private Military Industry in the business world and how financially rewarding it can be.
APA, Harvard, Vancouver, ISO, and other styles
11

Abadi, Aydin Kheirbakhsh. "Delegated private set intersection on outsourced private datasets." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=27943.

Full text
Abstract:
The significance of cloud computing is increasing and the cloud is receiving growing attention from individuals and companies. The cloud enables ubiquitous and on-demand access to a pool of configurable computing resources that can be scaled up easily. However, the cloud is vulnerable to data security breaches such as exposing confidential data, data tampering,and denial of service. Thus, it cannot be fully trusted and it is crucial for the clients who use the cloud to protect the security of their own data. In this thesis, we design cryptographic protocols to allow clients to outsource their private data to the cloud and delegate certain computation tothe cloud securely. We focus on the computation of set intersection which has a broad range of applications such as privacy-preserving data mining,and homeland security. Traditionally, the goal of Private Set Intersection(PSI) protocols has been to enable two parties to jointly compute the intersection without revealing their own set to the other party. Many such protocols have been designed. But, in the cases where data and computation are outsourced to the cloud, the setting and trust assumptions are considerably changed. The traditional PSI protocols cannot be used directly to solve security problems, without sacrificing the advantages the cloud offers. The contribution of this thesis is a set of delegated PSI protocols that meet a variety of security and functional requirements in the cloud environment. For most clients, the most critical security concern when outsourcing data and computation to the cloud is data privacy. We start from here and design O-PSI, a novel protocol in which clients encrypt their data before outsourcing it to the cloud. The cloud uses the encrypted data to compute the intersection when requested. The outsourced data remain private against the cloud all the time since the data stored in the cloud is encrypted and the computation process leaks no information. O-PSI ensures that the computation can be performed only with the clients’ consent. The protocol also takes into account several functional requirements in order to take full advantage of the cloud. For example, clients can independently prepare and upload their data to the cloud, and the clients are able to delegate to the cloud the computation an unlimited number of times, without the need to locally re-prepare the data. We then extend O-PSI in several ways to provide additional properties:* EO-PSI is a more efficient version of O-PSI that does not require public key operations.* UEO-PSI extends EO-PSI with efficient update operations, making it possible to efficiently handle dynamic data.* VD-PSI extends O-PSI with verifiability, i.e. the clients can efficiently verify the integrity of the computation result. For each protocol, we provide a formal simulation-based security analysis. We also compare the protocols against the state of the art. In addition to that, we have implemented the O-PSI and EO-PSI protocols and provide an evaluation of their performance based on our implementation.
APA, Harvard, Vancouver, ISO, and other styles
12

Schneider, Andreas. "Entwicklung der privaten Nachfrage nach Private Equity Investitionen in der Schweiz." St. Gallen, 2005. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/02604205001/$FILE/02604205001.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Högger, Marco. "Private Equity." St. Gallen, 2006. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/03603602001/$FILE/03603602001.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ehler, Glen. "Private investigator." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ26913.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Curtis, Barbara. "Private spaces /." Online version of thesis, 1989. http://hdl.handle.net/1850/11509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Klingaman, Dane. "Private signals." Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571858.

Full text
Abstract:

Using collage and other material processes, I transform the iconic image into a more complex reading. By appropriating found images within a specific urban area, my work exposes particular histories of class discrepancy. Filtered through my personal experiences, narratives are formed using signifiers like flags, pidgin languages, and professional sports. Pictorially, I use the grid to reference the layout of the dense urban environment. This formal structure is capable of hosting a range of disparate images and mediums. My exhibition Private Signals refers to the development of personal relationships that are formed through the manipulation of public images.

APA, Harvard, Vancouver, ISO, and other styles
17

Mattar, Mahdi H. (Mahdi Haidar) 1975. "Private risk." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/29268.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2002.
Includes bibliographical references (leaves 71-79).
In the first essay of this thesis, we extend the traditional decision analysis theory of buying price and selling price of a lottery. We allow the decision maker to rebalance his financial portfolio in the course of determination of a lottery's buying (selling) price. We build on the classical portfolio allocation problem in complete markets, generalizing to include both traded and non-traded unique risks. Our principal focus is on private risks-risks that are not tradable in financial markets. The first essay: Generalizes the treatment of the buying price and the selling price of a private risk lottery by allowing portfolio rebalancing in the course of determining these prices and Outlines the implications of this generalization for distributive bargaining. The second essay is a study of methods for pricing unique risks in real options problems. This essay is a critical evaluation of how methods currently in vogue for pricing private risks affect real option value. We build a framework for valuing investments under uncertainty in the presence of private risks and demonstrate by example that different methods for pricing private risk can lead to decisively different real option values. To this end we use the classical oil and gas exploration and development example pioneered by Paddock, Siegel and Smith(1978). We show how, when private risks are present in this setting, alternative methods for valuation can lead to large differences in choice of a development policy and in associated valuations.
by Mahdi H. Mattar.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
18

Hall, Lesley Anne. "Private grounds." The Ohio State University, 1988. http://rave.ohiolink.edu/etdc/view?acc_num=osu1299786943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Tregler, František. "Private Equity." Doctoral thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-71675.

Full text
Abstract:
This final thesis analyzes and evaluates current techniques used in attribution analysis of the private equity funds. The first section defines all the relevant parameters and relationships. The second section provides the reader with a historical overview of the private equity industry together with a unique typology of private equity funds. Description of the current situation in the private equity industry is based on my discussions with investment professionals. These two sections are followed by a chapter describing the private equity investment process and the leveraged buyouts. Analysis is focused on value creation during buyouts, buyout price negotiations and the role of investment banks. I define individual phases of the private equity investment process and various valuation techniques used during the life cycle of the investment. Special attention is given to the private equity valuation process and its differences to the traditional and formal legal valuation. A special reaction function of cost of equity was derived from the traditional discounted earnings methods. Separate section is dedicated to calculation of return and efficiency of private equity funds. I analyze various methods used in the return/efficiency evaluation process, including the most frequently used Internal Rate of Return (IRR) approach. I then propose an adjustment (or several adjustments) to the IRR method and I test my proposals on several real-life case studies. In the same manner I theoretically derive and then practically prove major factors affecting the return of private equity investments. Special attention is given to the effect of company's indebtedness and operational improvements on total return of the private equity investment.
APA, Harvard, Vancouver, ISO, and other styles
20

Ehler, Glen (Glen Elliott) Carleton University Dissertation Sociology and Anthropology. "Private investigator." Ottawa, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Kummerow, Daniel Richard. "Private settings /." Online version of thesis, 1991. http://hdl.handle.net/1850/11743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Barone, Ryan. "Private viewing /." Online version of thesis, 2009. http://hdl.handle.net/1850/9746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

De, Luca Federica. "Pene private." Doctoral thesis, Universita degli studi di Salerno, 2012. http://hdl.handle.net/10556/1862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Dondeti, Lakshminath Reddy. "Efficient private group communication over public networks." [Lincoln, Neb. : University of Nebraska-Lincoln], 1999. http://international.unl.edu/Private/1999/dondetiab.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Smith, John Z. (John Zachary). "Private school choice and the returns to private schooling." Thesis, Massachusetts Institute of Technology, 1993. http://hdl.handle.net/1721.1/12709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Areal, Ludeña Santiago. "Oil platforms and private security in spanish law: An approach." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/118997.

Full text
Abstract:
Within the scope of the Spanish legislation, in this article we will develop the regulation about private security on oil rigs. In this sense, it is necessary to give a possible legal responses to this fact, because of the current drawbacks for proper regulation in the European country. It is therefore necessary to provide answers from the different perspectives of law such as the Public, Private International Law, Administrative Law, Commercial Law and Labor Law, International Law which will lead us to determine what should be the role of State.
Dentro del ámbito de aplicación de la legislación española, en el presente artículo desarrollaremos la regulación que existe respecto a la seguridad privada en las plataformas petroleras. En este sentido, es necesario dar unas posibles respuestas jurídicas ante este hecho, debido a los actuales inconvenientes para su adecuada regulación en el país europeo. Por ello, es necesario proporcionar respuestas desde las distintas perspectivas del derecho como son el Derecho Internacional Público, Derecho Internacional Privado, Derecho Administrativo, Derecho Mercantil y Derecho Laboral, lo que nos guiará a determinar cuál debería ser el papel de Estado.
APA, Harvard, Vancouver, ISO, and other styles
27

Asonov, Dmitri. "Querying databases privately : a new approach to private information retrieval /." Berlin : Springer, 2004. http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Thibes, Mariana Zanata. "Orkut: o público, o privado e o íntimo na era das novas tecnologias da informação." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/8/8132/tde-12072010-135357/.

Full text
Abstract:
Os conceitos de privado, público e íntimo sofreram transformações importantes a partir do surgimento das novas tecnologias da informação. Se, por um lado, é possível notar um refinamento das técnicas de controle e vigilância, que levariam ao questionamento da privacidade enquanto um direito individual e à violação da esfera privada, por outro, essas tecnologias permitem certo exercício reflexivo que conduz a novas vivências do privado, do público e do íntimo. Partindo, portanto, do exame da sociabilidade que surge no orkut, esta pesquisa tencionou analisar como se configuram essas novas vivências, observando que, embora a dinâmica desta sociabilidade revele afinidades com os objetivos da sociedade de controle, ela também possibilita a liberdade para criar identidades e para redefinir as regras que orientam a vida, estimulando um tipo de reflexão que aponta para o fortalecimento da política.
The concepts of private, public and the intimacy have suffered important changes since the new information technologies took part of the everyday life. If, on the one hand, it is possible to observe a certain refinement of the techniques of control and vigilance, on the other, these technologies allow a reflexive exercise that leads to new experiences of the private, public and the intimacy. Through the examination of the sociability that takes place at orkut, this research tried to analyze how these new experiences have been configured, observing that, despite of the dynamic of this sociability reveals affinities with the objectives of the control society, it also allows the liberty to create identities and to redefine the rules that guide the life, stimulating a kind of reflection that points out the strengthening of the politics.
APA, Harvard, Vancouver, ISO, and other styles
29

Sodré, Lilian Santana. "A aplicação dos direitos fundamentais nas relações jurídicas privadas." Universidade Federal de Alagoas, 2008. http://repositorio.ufal.br/handle/riufal/751.

Full text
Abstract:
The analysis of the possibility of application the fundamental rights in the juridical privates relationships is the main theme of this essay. It also treats about the process of Constitutionalization of the private law, taking in account that the strengthening of the Constitution provided a reestructuration of fundamental rights before the juridical system. It also analyses important aspects of fundamental rights, as the universal character that is inherent to them. It studies relevant dogmatic arguments as the normative strength of the Constitution, the immediate applicability of the fundamental rights clause and the proper characteristics of the jusfundamental norms that strengthen the acceptation of the thesis that the fundamental rights link straightly also private person. It is also about the private autonomy and its constitutional protection, in order to prove that fundamental rights are not absolute in case of conflict, for the private autonomy is also benefited by the constitutional protection. It treats about the collision of fundamental rights as a collision problem between principles to, then, sustain the argument that, in such cases, the solution occurs through the utilization of the hermeneutic method of ponderation. Hence, it is sustained that ponderation can be controlled, searching for a result that does not affect the principle of proportionality. At last, it is made an analysis of some practical cases judged by the Supremo Tribunal Federal , that treat about collisions between fundamental rights in relationships privates to, from theses analyses, conclude all the reasoning constructed along the work, that the immediate application of the fundamental rights in private relations is the best option among the presented theories.
Fundação de Amparo a Pesquisa do Estado de Alagoas
Esta dissertação tem como tema a análise da possibilidade de se aplicar os direitos fundamentais em relações jurídicas privadas. Aborda também o processo de Constitucionalização do direito privado, tendo-se em vista que o fortalecimento da Constituição proporcionou uma reestruturação dos direitos fundamentais frente ao ordenamento jurídico. Analisa também importantes aspectos dos direitos fundamentais, como o caráter universal que lhe é inerente. Estuda relevantes argumentos dogmáticos como a força normativa da Constituição, a cláusula da aplicabilidade imediata dos direitos fundamentais e as características próprias das normas jusfundamentais que fortalecem a aceitação da tese de que os direitos fundamentais vinculam diretamente também particulares. Discorre acerca da autonomia privada e sua proteção constitucional, a fim de comprovar que os direitos fundamentais não são absolutos em caso de conflito, já que a autonomia privada também se favorece de proteção constitucional. Trata da colisão de direitos fundamentais como um problema de colisão de princípios, para, então, sustentar o argumento de que, em casos tais, a solução se dá mediante a utilização do método hermenêutico da ponderação. Nesse sentido, sustenta que a ponderação pode ser controlada, visando o alcance de um resultado que não afete o princípio da proporcionalidade. Por fim, faz uma análise de alguns casos paradigmáticos julgados pelo Supremo Tribunal Federal, que tratam de colisões de direitos fundamentais nas relações privadas, para, a partir de tais análises, concluir todo o raciocínio construído ao longo do trabalho, de que a aplicação imediata dos direitos fundamentais nas relações privadas é a melhor opção dentre as teorias apresentadas.
APA, Harvard, Vancouver, ISO, and other styles
30

Kotzenberg, Jochen. "Die Bindung des Sportlers an private Dopingregeln und private Schiedsgerichte." Baden-Baden Nomos, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&docl̲ibrary=BVB01&docn̲umber=016074868&linen̲umber=0001&funcc̲ode=DBR̲ECORDS&servicet̲ype=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Roux, Jean-Pierre. "The operation of private governance: exploratory research into private investigations." Master's thesis, University of Cape Town, 2012. http://hdl.handle.net/11427/11542.

Full text
Abstract:
Includes abstract.
Includes bibliographical references.
Security governance is a salient topic within South Africa, both in public media, discourse and academic literature. Currently, South African government holds a domineering mentality towards security and wishes to monopolize it. Nonetheless, there is a growing call for private security, both by citizens and the business sector in South Africa. Furthermore, private security is a polemic issue with debates around its effects on public good as well as its role within society. This dissertation underlines and addresses these issues. In order to accomplish this, an ethnographic field study was conducted to uncover the situation and the forms and issues that revolve around private security on a ground level, breaking away from the academic cacophony that has saturated the field.
APA, Harvard, Vancouver, ISO, and other styles
32

Edeen, Erik, Magnus Kassle, and Pawel Wyszynski. "Private Equity : Portföljbolagsstudie." Thesis, Uppsala University, Department of Business Studies, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-8865.

Full text
Abstract:

Private equity-investeringar innebär kapitalsatsningar i onoterade företag med ett aktivt och tidsbegränsat ägarengagemang. Detta kan indelas beroende på tidpunkten och kapitalbehovet för investeringen och benämns: affärsänglar, venture capital och buyout. Det finns en allmän uppfattning att dessa bolag agerar som affärspirater, vilka suger ut tillgångarna i företag för att sedan sälja av det utan att tänka på konsekvenserna. Det finns en ovetskap om vad som egentligen tillför värde och på vilket sätt detta sker. På uppdrag av Svenska Riskkapitalföreningen skrivs därför denna uppsats. Syftet är att studera riskkapitalinvesteringar med avseende på hur portföljbolagen utvecklas beträffande tillväxt i omsättning och antal anställda, efter det att ett private equity-bolag blivit delägare. Undersökningen har genomförts genom en kvantitativ ansats där enkäter och bokslutsdata analyserats. Då denna del är den första av två inom en 20-poängsuppsats där teori och metod behandlas, kommer empiri, analys och slutsats behandlas i nästa del.

APA, Harvard, Vancouver, ISO, and other styles
33

Vasquez, Willy R. "Auditable private ledgers." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/119540.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2017.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 61-64).
This thesis describes the design and implementation of Auditable Private Ledgers (APL), a privacy solution for distributed ledgers that lets third parties audit private ledger data. With the use of permissioned blockchains, zero-knowledge proofs, and additively homomorphic commitments, we are able to provide a balance between privacy and regulation. For this work, I implemented the cryptographic tools in Go, helped develop zero-knowledge proofs to provide data authenticity and integrity, and performed an evaluation of this system to measure its performance. Our work shows that the system is reasonable to run between a small number of participants, and that we can efficiently run private sums without revealing fine-grained inputs.
by Willy R. Vasquez.
M. Eng.
APA, Harvard, Vancouver, ISO, and other styles
34

Celestino, Pedro. "Private virtual network." Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.

Full text
Abstract:
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cryptographic algorithms, safe means of communication are essential items so that the information can travel in environmentals free of external interferences. One of the alternatives is the Virtual Private Networks. In this work, the main prominences of this technology will be presented using the protocol IPSec with the purpose of presenting a more atractive tool to the organizations due to its safety and economical viability.
Com as redes de computadores, surge também a possibilidade de administrar remotamente as organizações inteligentes, no entanto a troca de informações segura tornou-se um problema para as instituições que trafegam dados estruturados através das redes de computadores. Um dos maiores desafios é a busca de soluções economicamente viáveis e ao mesmo tempo seguras. Protocolos de segurança, algoritmos criptográficos meios de comunicação seguros, são itens essenciais para que a informação possa trafegar em ambientes livres de interferências externas. Uma das soluções é a Rede Virtual Privada. Neste trabalho, serão apresentados os principais destaques desta tecnologia, utilizando o protocolo IPSec, com o propósito de apresentar mais uma solução atrativa para as organizações, pois trata-se de uma solução economicamente viável e segura.
APA, Harvard, Vancouver, ISO, and other styles
35

Schuknecht, Christine. "Quantum Private Broadcasting." Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/42762.

Full text
Abstract:
In Private Broadcasting, a single plaintext is broadcast to multiple recipients in an encrypted form, such that each recipient can decrypt locally. When the message is classical, a straightforward solution is to encrypt the plaintext with a single key shared among the parties, and to send each recipient a copy of the ciphertext. Surprisingly, the analogous method is insufficient in the case where the message is quantum (i.e. in Quantum Private Broadcasting (QPB)). In this work, we give three solutions to t-recipient QPB and compare them in terms of encryption key length. We examine independent encryption with the quantum one-time pad, unitary t-designs, and a new concept we define as symmetric unitary t-designs. Of these three, symmetric t-designs are the best choice when t is large, and these symmetric designs may be of independent interest beyond QPB.
APA, Harvard, Vancouver, ISO, and other styles
36

Přibyl, Jan. "Public Private Partnership." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-989.

Full text
Abstract:
Tématika Public Private Partnership (PPP) se v poslední době stává stále více medializovaným tématem také v České republice. V neposlední řadě tomu přispělo i schválení nového koncesního zákona v roce 2006. Vzhledem k novosti této tématiky v České republice je úkolem této diplomové práce vytvořit kompaktní celek, jež zahrnuje právní, politické a ekonomické aspekty PPP s důrazem na Českou republiku.
APA, Harvard, Vancouver, ISO, and other styles
37

Ševčíková, Kateřina. "Public Private Partnership." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-76594.

Full text
Abstract:
Main subject of my diploma thesis is an actual situation in application of Public Private Partnership in both the Czech Republic and Europe. Firstly, the main characteristics and a general process of creating PPP project are described. Risk management, one of the most important aspects of PPP is a subject for the second chapter. Furthermore, I analyse the approaches to the application of PPP from the view of the crucial European institutions such as European Commission and European Investment Bank, especially I am concerned about their reactions to the Global financial crises. My thesis includes the analyses of the PPP markets in both Great Britain and France. Lastly, the situation of PPP market in the Czech Republic is examined, and a business case about just emerging local PPP project is included.
APA, Harvard, Vancouver, ISO, and other styles
38

Farrell-Poe, Kitt, and Susan Pater. "Private Well Protection." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2011. http://hdl.handle.net/10150/156922.

Full text
Abstract:
3 pp.
1. Drinking Water Wells; 2. Private Water Well Components; 3. Do Deeper Wells Mean Better Water; 4. Maintaining Your Private Well Water System; 5. Private Well Protection; 6. Well Water Testing and Understanding the Results; 7. Obtaining a Water Sample for Bacterial Analysis; 8. Microorganisms in Private Water Wells; 9. Lead in Private Water Wells; 10. Nitrate in Private Water Wells; 11.Arsenic in Private Water Wells; 12. Matching Drinking Water Quality Problems to Treatment Methods; 13. Commonly Available Home Water Treatment Systems; 14. Hard Water: To Soften or Not to Soften; 15. Shock Chlorination of Private Water Wells
This fact sheet is one in a series of fifteen for private water well owners. The one- to four-page fact sheets will be assembled into a two-pocket folder entitled Private Well Owners Guide. The titles will also be a part of the Changing Rural Landscapes project whose goal is to educate exurban, small acreage residents. The authors have made every effort to align the fact sheets with the proposed Arizona Cooperative Extension booklet An Arizona Well Owners Guide to Water Sources, Quality, Sources, Testing, Treatment, and Well Maintenance by Artiola and Uhlman. The private well owner project was funded by both the University of Arizonas Water Sustainability Program-Technology and Research Initiative Fund and the USDA-CSREES Region 9 Water Quality Program.
APA, Harvard, Vancouver, ISO, and other styles
39

SCALONE, VALERIO. "Rescuing private DSGE." Doctoral thesis, Luiss Guido Carli, 2015. http://hdl.handle.net/11385/200995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

PANI, VALENTINA. "Le pene private." Doctoral thesis, Università degli Studi di Cagliari, 2020. http://hdl.handle.net/11584/285094.

Full text
Abstract:
This PhD dissertation is aimed at investigating private penalties and, in particular, punitive damages. These issues, in the past very rarely analyzed by Italian private law scholars in the past, currently represent a field ripe for investigation and constitute the starting point for an evolutionary reinterpretation of the civil liability scheme in our legal system. The first part of the dissertation analyses the concept of legal sanction in a philosophic perspective, and then proceeds with an overview of the remedies provided in the various branches of the Italian legal system. On the basis of these premises, the dissertation proceeds with a description of the instruments and remedies used in private law, among which the concept of private penalty emerges. In order to understand the importance that the sanction with a punitive function assumes in the private law world, it is necessary to start from an analysis of the current regulatory framework. In this direction, the second chapter of this work is dedicated to the deepening, in particular from a functional point of view, of multiple legal concepts - included in the civil code, in the code of civil procedure and in special legislation - which are characterized by pursuing a purpose, at least partially, punitive. Starting from the third chapter, attention is drawn to a particular kind of private penalty: punitive damages. In relation to this issue, there are many aspects that appear problematic, and that indeed have been the subject of broad doctrinal debate and jurisprudential conflict; in particular, with focus on the possibility of enforcing foreign sentences imposing punitive damages and on the direct applicability of the same by the Italian judge. The goal of this work is to theorize an enrichment of the civil remedy by envisioning the potential import of punitive damages into the Italian legal system, in compliance with the principles that govern it. From a methodological point of view, the investigation into punitive damages was carried out by comparing various legal systems. Therefore, the last chapter of the paper is dedicated to punitive damages applied by the courts of the United Kingdom and the United States, in particular because it was in these common law countries that the legal institution of punitive damages was originated and developed. The dissertation concludes the study of punitive damages in other foreign legal systems and, with particular regard to some countries adopting a civil law system, noting that in recent times there have been some significant openings that invite a deeper reflection.
APA, Harvard, Vancouver, ISO, and other styles
41

Prieto, Carlos. "Mexican private higher education : the potential of private and public goods." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/28124.

Full text
Abstract:
In this qualitative case study, I explore the organizational processes and policy discourses at one private higher education institution in Mexico. By using a theoretical framework relative to contestations between the global “ideology of privatization” in education (Rizvi, 2006; Rizvi & Lingard, 2009) and the “global public good” of private education (Marginson, 2007; Menashy, 2009), I examine how external forces are influencing a private institution and its opportunities relative to the public/private good. The study provides answers to three main research questions: 1. What are the assumptions, beliefs and knowledge of upper level management of the private education institution with regard to the global and local forces (economic, political, technological, and social) that influence the organization and its opportunities? 2. What are the assumptions, beliefs and knowledge of upper level management in internal processes in response to external pressures relative to the provision of public versus private goods? 3. How does the institution position itself relative to other educational opportunities (public and private) at the local, national, and global levels? The study was undertaken at an established private business school in Mexico. Data collection took place from February through April 2010 using a strategic sample of participants (men and women) with high-level positions in the school. The study consisted of semi structured interviews, which were digitally recorded and subsequently transcribed, coded, and analyzed thematically. The findings of this study reveal interesting issues and processes of the social imaginary of senior level executives related to neoliberal discourses, predominantly in relation to the effects of competition in higher education. Particular attention is paid to the institution’s potential to generate public and private goods, and to the value of positional goods relative to other educational opportunities (public and private) at the local, national and global levels.
APA, Harvard, Vancouver, ISO, and other styles
42

Morton, Edwin D. III. "Private motive, humanitarian intent: a theory of ethically justified private intervention." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34708.

Full text
Abstract:
Approved for public release; distribution is unlimited
The usual instruments of humanitarian military intervention are the regular armed forces of a state, or a group of states, but even when gross crimes such as genocide are committed and an intervention becomes morally obligatory, states are reluctant to risk the lives of their own soldiers. This moral tension is at the root of the international communitys failure to act in most cases. However, for states to fulfill the duty to prevent crimes against humanity, and at the same time protect their soldiers in the interests of national defense, a third party could be employed. In this thesis, the case will be made that the use of private military companies (PMCs) for humanitarian intervention is morally preferable to the employment of a states armed forces. To serve as a moral guideline for the concept, a theory of ethically justifiable private intervention has been formulated based on elements of Just War Theory and James Pattisons Moderate Instrumentalist Approach to humanitarian intervention. Three case studies are analyzed to conclude that, under certain conditions, humanitarian intervention conducted by PMCs is a morally permissible option.
APA, Harvard, Vancouver, ISO, and other styles
43

Landes, Charlotte. "Private Corrections, Public Implications: The Local Economic Effects of Private Prisons." Oberlin College Honors Theses / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1368362798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Focareto, Nicole. "Private vs. Non-Private: A Correlational Study Between ACT and GPA." Marietta College / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=marietta1147440821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Pfeiffer, Georg. "Privatisierung des Krieges? zur Rolle von privaten Sicherheits- und Militärfirmen in bewaffneten Konflikten." Stuttgart Steiner, 2009. http://d-nb.info/994828748/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Remmert, Barbara. "Private Dienstleistungen in staatlichen Verwaltungsverfahren : eine rechts- und verwaltungswissenschaftliche Untersuchung zur privaten Entscheidungsvorbereitung /." Tübingen : Mohr-Siebeck, 2003. http://www.gbv.de/dms/spk/sbb/recht/toc/360903525.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Andersen, Eliasson Christopher, Kristin Birath, and Anders Elgenäs. "Ungas attityd till privat pensionssparande : Attitudes to private pensions svaings among young people." Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-1110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Romig, Phillip R. "Parallel task processing of very large datasets." [Lincoln, Neb. : University of Nebraska-Lincoln], 1999. http://international.unl.edu/Private/1999/romigab.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Schultz, Jeffrey Allen. "Approaches to the synthesis of hydroperoxyeicosatetraenoic acids (HPETES) : 1. directed oxygenations, 2. additions to peroxycarbenium ions." [Lincoln, Neb. : University of Nebraska-Lincoln], 1999. http://international.unl.edu/Private/1999/schultzab.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Yu, Mingjun. "Magnetism of films with controlled nanostructure." [Lincoln, Neb. : University of Nebraska-Lincoln], 1999. http://international.unl.edu/Private/1999/mingjunab.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography