Artículos de revistas sobre el tema "Card Party"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Card Party.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Card Party".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

McCormack, W. J., Gerald Dawe, Edna Longley y Robyn Marsack. "Party Card". Books Ireland, n.º 98 (1985): 195. http://dx.doi.org/10.2307/20625648.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

NEUHAUS, DENISE. "The card party". Critical Quarterly 32, n.º 2 (junio de 1990): 29–47. http://dx.doi.org/10.1111/j.1467-8705.1990.tb00586.x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Bayley, Barrington J. "Party smart card". Nature 440, n.º 7084 (marzo de 2006): 714. http://dx.doi.org/10.1038/440714a.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

MacCABE, COLIN. "Politics: Why I'm tearing up my Labour party card". Critical Quarterly 48, n.º 2 (agosto de 2006): 81–84. http://dx.doi.org/10.1111/j.1467-8705.2006.00707.x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Smithberger, Anna y Ann Wahlstrom. "Marking a Milestone: Hosting a Kindergarten Library Card Party". Children and Libraries 18, n.º 2 (19 de junio de 2020): 24. http://dx.doi.org/10.5860/cal.18.2.24.

Texto completo
Resumen
Take one Caldecott Honor winner and add scores of kindergarteners. Throw in an effort to sign up more library users. Toss in a bunch of enthusiastic volunteers. That’s the recipe for Ramsey County (MN) Library’s (RCL) recent Kindergarten Library Card Party.It’s a program that has been running since 2008, starting humbly as a partnership between the Friends of the Ramsey County Libraries and the Junior League of St. Paul. The latter, a local women’s nonprofit organization focusing on volunteerism, was interested in developing a program where they could put books into the hands of kindergarteners.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Onamade, Akintoye Abraham, Abiodun Adedayo Adediran y Oluwafunmilola Aderannibi Adepegba. "ATM Model for a Trusted Third Party System (TTPs)". Advances in Multidisciplinary and scientific Research Journal Publication 9, n.º 2 (30 de junio de 2021): 81–86. http://dx.doi.org/10.22624/aims/digital/v9n2p7.

Texto completo
Resumen
The history of banking transaction has been with the use of cheque books, which direct the bank to pay or transfer specific amount to the bearer – third party on behalf of account owner. Identity card (ID) is the means of authentication and the third party is asked to append his or her signature and address on the back of the cheque for the bank to grant the request. Therefore, human beings cannot do without the help of third party, for their daily activities as nature can call for such service at any time. Even today, may be as a result of sickness, people do give their ATM card and PIN to third party to withdraw money on their behalf. The negative effect of involving third party to withdraw money with an ATM card on behalf of an account owner is at alarming rate. This action to say the least is prone to many security risks which must be avoided at all costs. Therefore, a system is designed in this study to recognize the use of third party in an ATM bank transaction in order to alleviate the negative effect of using the third party. An algorithm was designed for third party ATM transaction using Bracket IDE and Xampp as programming tools. The developed system, allows a trusted third party to have access to ATM card and to withdraw money on behalf of an account owner. The account owner initiates the process through the platform created in this study by registering the third party details and the transaction to be carried out on behalf of an account owner. The system generates an OTP that allows the third party to perform a restricted transaction on behalf of the account owner. The amount to be withdrawn is embedded in the OTP generated for the third party, such that there is no checking of account balance, no withdrawal of an amount less or above amount specified in the OTP, and no money transfer. Therefore, since the system allows restricted transactions to be performed by the third party, it becomes very difficult for third party to use the privilege of performing ATM transaction against the account owner. Keywords: ATM, One Time Password (OTP), Trusted Third Party (TTP), Third Party
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Zhang, Hui Lin, Yu Zhang, Wen Feng Zhong y Ming Yuan Li. "The Study of Online Recharging for Campus Cards Based on the Third-Party Payment Platform". Advanced Materials Research 926-930 (mayo de 2014): 2253–58. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2253.

Texto completo
Resumen
In order to enrich campus card recharging methods and improve the cardholders experience, this paper first briefly introduces the campus card online recharging modes based on the third-party payment platform, then analyzes the business processes of the self-help recharging mode and the automatic recharging mode, introduces the validation processes of the transactions, and expounds the fund flows and the double reconciliation mechanism at last.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Rob, Mohammad A. y Emmanuel U. Opara. "Online credit card processing models: Critical issues to consider by small merchants". Human Systems Management 22, n.º 3 (13 de julio de 2003): 133–42. http://dx.doi.org/10.3233/hsm-2003-22305.

Texto completo
Resumen
Electronic commerce is continuing as a thriving business for those companies that streamlined their online business processes; however, making payments over the Internet is still fearsome to customers. Although a variety of payment mechanisms have been developed, payment by credit cards remain the leading mechanism for online payments. For real-time online credit card processing, a merchant needs to install a third-party proprietary software in the merchant e-commerce server. However, many issues need to be resolved before integrating a third-party payment solution to a merchant e-commerce system. In this paper, we attempt to address the current state of the online credit card processing system, especially we discuss the available models of online real-time credit card processing systems. We also discuss several factors such as cost, complexity and security issues related to implementing such a system. The results can be extremely valuable to small businesses that are venturing into Internet commerce.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Lu, Yuan, Qiang Tang y Guiling Wang. "Enhancing the Retailer Gift Card via Blockchain". Journal of Database Management 32, n.º 1 (enero de 2021): 49–68. http://dx.doi.org/10.4018/jdm.2021010103.

Texto completo
Resumen
Though the retailer gift card has been an ultra-practical marketing tactic to attract customers to spend more, it, on the contrary, also places a great number of customers in troublesome situations due to its current limitations. First, dealing with unwanted gift cards is often time-consuming, costly, or even risky due to the frequent occurrences of gift card resale frauds. Worse still, the issuance and redemption of gift cards happen inside the retailer as in a “black-box,” indicating that a compromised retailer can cheat customers (or even third-party auditors) to deny the issuances of some unredeemed gift cards. This paper proposes a practical middle-layer solution based on blockchain to address the fundamental issues of the existing gift card system, with incurring minimal changes to the current infrastructure.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Gvosdev, Nikolas K. "The New Party Card? Orthodoxy and the Search for Post-Soviet Russian Identity". Problems of Post-Communism 47, n.º 6 (noviembre de 2000): 29–38. http://dx.doi.org/10.1080/10758216.2000.11655906.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Elsanti, Nadia Ananda. "PENERAPAN TA’WIDH PADA PEMEGANG SYARIAH CARD". Jurisprudentie : Jurusan Ilmu Hukum Fakultas Syariah dan Hukum 4, n.º 2 (5 de diciembre de 2017): 146. http://dx.doi.org/10.24252/jurisprudentie.v4i2.4060.

Texto completo
Resumen
As with most credit card holders, sharia card holders also have obligations that must be fulfilled, one of which is to settle the bill payment for the transaction that has been done. But did not rule out the customer is negligent in completing the bill payment for transsaksi ever done. In the face of the risk of customers who default or negligent in making a bill payment, one form of protection offered in Islamic Sharia is the mechanism of giving Ta'widh or compensation to the party whose rights are violated. Ta'widh concept issued by the National Sharia Council is expected to be one way to prevent losses suffered by Bank Syariah as the issuer of sharia card caused by customers who neglect to fulfill their payment obligations.Keywords: Ta'widh; Sharia Card; Late payment; Legal effortSeperti pada pemegang kartu kredit pada umumnya, pemegang syariah card juga memiliki kewajiban yang harus dipenuhi, salah satunya adalah menyelesaikan pembayaran tagihan atas transaksi yang telah dilakukan. Namun tidak menutup kemungkinan nasabah tersebut lalai dalam menyelesaikan pembayaran tagihan atas transsaksi yang pernah dilakukannya. Di dalam menghadapi risiko nasabah yang wanprestasi atau lalai dalam melakukan pembayaran tagihan, salah satu bentuk perlindungan yang ditawarkan dalam syariat Islam adalah adanya mekanisme pemberian Ta’widh atau ganti rugi kepada pihak yang hak-haknya dilanggar. Konsep Ta’widh yang dikeluarkan oleh Dewan Syariah Nasional diharapkan menjadi salah satu cara untuk mencegah kerugian yang dialami Bank Syariah selaku penerbit syariah card yang diakibatkan oleh nasabah yang lalai melaksanakan kewajiban pembayarannya.Kata Kunci : Ta’widh; Syariah Card; Keterlambatan Pembayaran; Upaya Hukum
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Fahrian, Aminah Tanjung y Azhari. "LEGAL ASPECTS OF USE OF CREDIT CARD IN TRADE AT BANDA ACEH CITY". International Journal of Applied Science and Engineering Review 04, n.º 05 (2023): 32–40. http://dx.doi.org/10.52267/ijaser.2023.4503.

Texto completo
Resumen
Credit cards are one of the new instruments in the trading world that have a monetary value, so they can be used as a tool for transactions. However, credit cards cannot be called securities because they cannot be transferred. As a means of payment, the development of its use is increasingly widespread so that this has legal consequences for the parties involved in the use of the credit card, considering that the legal regulations are still relatively weak. The research method used is qualitative research with a normative juridical approach with descriptive analysis research specifications. This research uses secondary data as the main research material, which is obtained through documents. From the data obtained will be analyzed qualitatively normative. The legal aspect of using credit cards in trade in Banda Aceh City is that every agreement that occurs is incidental (a certain time) agreement, which arises at the time of buying and selling transactions or services. The mechanism of each credit card issuing bank is always different in giving approval, but the terms and procedures are relatively the same. Legal protection for the parties in using credit cards occurs at the time of signing the credit card approval agreement between the issuer and the credit card user, because legally there is no law that explicitly regulates it. It is recommended that there be wider legal protection efforts from the government, not only consumers in the sense of credit card holders, but in certain cases the sellers of goods/services and card issuers are also parties that need to receive balanced legal protection, including the affirmation of the rights of consumers. each party to sue the other party.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Amin, Ruhul y G. P. Biswas. "Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card". Arabian Journal for Science and Engineering 40, n.º 11 (24 de junio de 2015): 3135–49. http://dx.doi.org/10.1007/s13369-015-1743-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Sehani, A., R. Ratianingsih y J. W. Puspita. "Mengkaji Perputaran Uang Bank Melalui Model Kaldor-kalecki: Tinjauan Numerik Untuk Sistem Kartu Kredit". JURNAL ILMIAH MATEMATIKA DAN TERAPAN 17, n.º 1 (1 de junio de 2020): 41–50. http://dx.doi.org/10.22487/2540766x.2020.v17.i1.15166.

Texto completo
Resumen
Credit Card is a card payment instrument, where the cardholder's payment obligation is firstly fulfilled by the acquirer or publisher which use third party funds in the form of investments to pay the obligation payment of cardholder. These investment funds are managed as the initial fund of credit card customers. Some of the generated profits could be saved as bank deposits, while others are used for joint capital investment funds. The preview description shows the circulation of bank deposit of the credit card system which mathematically corresponds to the concept represented by Kaldor-Kalecki model. The aims of this study is that money circulation process is represented numerically by such model solution using the Runge-Kutta method. The interpretation of the numerical solution of the Kaldor-Kalecki model of the credit card system is simulated for Bank Mega's financial report data in 2017, the results shows that Bank Mega was found a decline of the number of credit card production. It could be said that the numerical solutions well represented the condition of the credit card system issued by Bank Mega. Negative values of numerical solution also reviews as period of the Bank investment
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Goncharov, A. A. y A. I. Boyko. "OBJECTIVE SIGNS OF CRIMES AGAINST PROPERTY: THEFT OF FUNDS FROM A BANK CARD". Vektor nauki Tol’attinskogo gosudarstvennogo universiteta. Seria Uridicheskie nauki, n.º 2 (2021): 14–19. http://dx.doi.org/10.18323/2220-7457-2021-2-14-19.

Texto completo
Resumen
The relevance of scientific research is caused primarily by the general transition of the society to the funds’ transfer network. Physical money is replaced by virtual one, the access to which is granted remotely. Therefore, in some situations, a lawbreaker can gain possession of non-cash resources far easier than stealing the cash of a possible victim. For the past two decades, lawbreakers successfully apply lots of ways allowing a lawbreaker both to possess personal information of another person – bank cardholder and, subsequently, to steal money from a holder’s account. The paper determines the objective signs of a crime against property and the list of attributes typical for stealing money funds from a bank card. The authors distinguish the objective signs of two bodies of a crime, which can fall within the definition of embezzlement from a bank card: a theft from a bank account, and fraud using electronic payment facilities. The authors conclude that the embezzlement from a bank card throw the commission of fraudulent acts is possible only when interacting with a third party. The actual presence of another person (a victim or an employee of credit, bank, commercial, or other organization) and the interaction of a criminal with this person is a prerequisite for classifying a crime as a fraud. Any actions aimed at the unlawful seizure of non-cash monetary assets and not accompanied by direct contact with a third party should be classified as theft.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Henriques, David. "Cards on the Table: Efficiency and Welfare Effects of the No-Surcharge Rule". Review of Network Economics 17, n.º 1 (26 de marzo de 2018): 25–50. http://dx.doi.org/10.1515/rne-2017-0036.

Texto completo
Resumen
Abstract In Electronic Payment Networks (EPNs), the No-Surcharge Rule (NSR) requires that merchants charge at most the same amount for a payment card transaction as for cash. In this paper, I use a three-party model (consumers, local monopolistic merchants, and a proprietary EPN) with endogenous transaction volumes, heterogeneous card use benefits for merchants and network externalities of card-accepting merchants on cardholders to assess the efficiency and welfare effects of the NSR. I show that the NSR: (i) promotes retail price efficiency for cardholders, and (ii) inefficiently reduces card acceptance among merchants. The NSR can enhance social welfare and improve payment efficiency by shifting output from cash payers to cardholders. However, if network externalities are sufficiently strong, the reduction of card payment acceptance affects cardholders negatively and, with the exception of the EPN, all agents will be worse off under the NSR. This paper also suggests that the NSR may be an instrument to decrease cash usage, but the social optimal policy on the NSR may depend on the competitive conditions in each market.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Stern, Simon. "The Third-Party Doctrine and the Third Person". New Criminal Law Review 16, n.º 3 (2013): 364–412. http://dx.doi.org/10.1525/nclr.2013.16.3.364.

Texto completo
Resumen
According to the third-party doctrine, a person has no reasonable expectation of privacy in information that has been shared with others—including a bank, phone company, or credit card company. The doctrine got its start through an appeal to a locatable observer who corresponds, in literary terms, to a narrator with a limited perspective. This is the kind of perspective that courts have traditionally emphasized when explaining how to assess probable cause. The third-party doctrine turns the limited perspective into an omniscient one. The doctrine takes apparently private conduct and classifies it as public, effectively treating the perspective of the “arresting officer” as if it could encompass large quantities of information, widely distributed in space and time. The discussion here examines a recent defense of the third-party doctrine that similarly collapses the limited and omniscient viewpoints. Then, after exploring the narrative analogy by reference to literary analyses of the omniscient narrator in Victorian fiction, the discussion ends by considering the analogy in relation to contemporary modes of omniscient narration.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Rahadian, Krishna y Ahmad Juang Pratama. "MEASUREMENT OF APPLICATION OF ISO 27001 OF CUSTOMER CELLULAR CARD CONFIDENTIALITY DATA IN PT. XYZ AREA JAKARTA". CommIT (Communication and Information Technology) Journal 8, n.º 2 (30 de octubre de 2014): 44. http://dx.doi.org/10.21512/commit.v8i2.595.

Texto completo
Resumen
The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Nordt, Sean Patrick, Lisa E. Vivero y Daniel Joseph. "Differences in Medical Marijuana Card Registration by Geographic Regions in California". Californian Journal of Health Promotion 14, n.º 1 (1 de mayo de 2016): 69–73. http://dx.doi.org/10.32398/cjhp.v14i1.1866.

Texto completo
Resumen
California was the first state to legalize marijuana for medical purposes. Individuals are issued identification card for medical marijuana use for patients with chronic medical conditions if directed by a physician. Surveys have suggested there are regional differences between northern California residents, particularly the Bay Area, and southern California residents with respect to medical marijuana use and legalization. The purpose of this paper is to discuss the California Department of Public Health statistics regarding medical marijuana card registrations over various geographic areas of California. The California Department of Public Health Medical Marijuana Card Registration database reflects this with more individuals in the Bay Area registered compared to those in the ten southernmost counties of California. The reasons for this are unclear but could fall along political party lines as more registered Democrats support medical marijuana legalization compared to registered Republicans. The benefits of medical marijuana and potential adverse medical and socioeconomic effects have not been fully elucidated. Conclusion: There is a need for further study of the potential benefits for medical marijuana use and the reasons for apparent regional different beliefs of medical marijuana use and medical marijuana card registration.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Zeng, Sipeng. "How Shopping Platforms Play a Role in the Credit Card Industry". Financial Economics Letters 3, n.º 2 (14 de marzo de 2024): 37–48. http://dx.doi.org/10.58567/fel03020002.

Texto completo
Resumen
<p class="MsoNormal" style="margin-top: 12pt; text-align: justify;"><span lang="EN-US" style="font-family: 'times new roman', times, serif; font-size: 14pt;">We develop a four-party model involving banks, merchants, consumers, and platform firms to explain why large shopping malls can offer interest-free installment services to consumers. Using a collaboration between an online shopping platform firm and multiple banks to issue co-branded credit cards as a natural experiment, we find that consumers&rsquo; spending on the platform fulfills the requirements for merchants and banks to choose a four-way model. This study highlights the pivotal role of platform firms in the credit card market.</span></p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Koch, Alexander, Michael Schrempp y Michael Kirsten. "Card-Based Cryptography Meets Formal Verification". New Generation Computing 39, n.º 1 (abril de 2021): 115–58. http://dx.doi.org/10.1007/s00354-020-00120-0.

Texto completo
Resumen
AbstractCard-based cryptography provides simple and practicable protocols for performing secure multi-party computation with just a deck of cards. For the sake of simplicity, this is often done using cards with only two symbols, e.g., $$\clubsuit $$ ♣ and $$\heartsuit $$ ♡ . Within this paper, we also target the setting where all cards carry distinct symbols, catering for use-cases with commonly available standard decks and a weaker indistinguishability assumption. As of yet, the literature provides for only three protocols and no proofs for non-trivial lower bounds on the number of cards. As such complex proofs (handling very large combinatorial state spaces) tend to be involved and error-prone, we propose using formal verification for finding protocols and proving lower bounds. In this paper, we employ the technique of software bounded model checking (SBMC), which reduces the problem to a bounded state space, which is automatically searched exhaustively using a SAT solver as a backend. Our contribution is threefold: (a) we identify two protocols for converting between different bit encodings with overlapping bases, and then show them to be card-minimal. This completes the picture of tight lower bounds on the number of cards with respect to runtime behavior and shuffle properties of conversion protocols. For computing AND, we show that there is no protocol with finite runtime using four cards with distinguishable symbols and fixed output encoding, and give a four-card protocol with an expected finite runtime using only random cuts. (b) We provide a general translation of proofs for lower bounds to a bounded model checking framework for automatically finding card- and run-minimal (i.e., the protocol has a run of minimal length) protocols and to give additional confidence in lower bounds. We apply this to validate our method and, as an example, confirm our new AND protocol to have its shortest run for protocols using this number of cards. (c) We extend our method to also handle the case of decks on symbols $$\clubsuit $$ ♣ and $$\heartsuit $$ ♡ , where we show run-minimality for two AND protocols from the literature.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Ash Shiddiq, Fadhilah Pijar, Sinta Dewi Rosadi y Rika Ratna Permata. "THE EFFECTIVENESS OF THE MINISTER OF COMMUNICATION AND INFORMATICS REGULATION NUMBER 20 OF 2016 ON THE PROTECTION OF PERSONAL DATA IN ELECTRONIC SYSTEMS". Yustisia Jurnal Hukum 8, n.º 1 (27 de abril de 2019): 119. http://dx.doi.org/10.20961/yustisia.v0ixx.28346.

Texto completo
Resumen
<p>Privacy, as a part of Human Rights, is the right of freedom of private matters. The basic concept of privacy is “the right to be let alone” which state that every individual have the right to have his own solitude without intervention. One of the most important information which also can be associated with Information Privacy is Personal Data that shall be protected as a form of protection to the privacy itself. Some of the personal data has been used as the requirements of the SIM Card Registration, thus making new problems regarding its personal data protection since the comprehensive regulation still covered only by the Ministral Regulation. Research method used in this paper is Descriptive Analytic in which the writer analyze the research object by explaining the situation and the condition of the personal data protection obtained from literatures on the facts that can be associated with the implementation of SIM Card Registration Policy according to Indonesia’s Positive Law and International Law. According to the result of the study, the Ministral Regulation already covered most of the basic data protection needed in the SIM card registration policy, however the protection provided by the Ministral Regulation still has not covered the third party involved. The Involvement of this third party is inevitable and should be protected immediatelyin order to prevent any abuse of personal data.</p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Yusuf Prasetiawan, Ahmad y Fatni Erlina. "IMPLEMENTASI BAI` AL-INAH DAN KAFALAH-IJARAH DALAM SYARIAH CHARGE CARD". Jurnal Ekonomi Syariah Darussalam 4, n.º 1 (28 de febrero de 2023): 1–21. http://dx.doi.org/10.30739/jesdar.v4i1.1846.

Texto completo
Resumen
This study aims to find out how the implementation of the bai` al-inah contract with kafalah-ijarah in the issuance of Islamic credit cards. These two types of contracts are used in two different countries, namely Malaysia and Indonesia, with very different performance achievements in Islamic banking in the two countries. The method used in this study is comparative analysis. Source of data is literature literature. The discussion is carried out with a legal and benefits approach. The results show that the bai` al-inah contract, materially, receives a lot of rejection, although not in absolute terms. But there are loopholes other than a few Ulama who allow it, namely the type of bai` al-wafa` with the involvement of a third party. However, the contract between the two in sharia credit card transactions is not the only factor. Islamic financial performance is more determined by customer behavior.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Syrwid, Robert. "“We need to investigate people from all possible sides”..." Masuro-⁠Warmian Bulletin 307, n.º 1 (20 de mayo de 2020): 122–47. http://dx.doi.org/10.51974/kmw-134790.

Texto completo
Resumen
The paper discusses the execution of the laws of the 3rd Plenum of the Central Committee of the Polish United Workers’ Party (KC PZPR) (11–13 November 1949) in terms of verifying its members on the example of Julian Sekita (1897–1989) – a lawyer with pre–war experience in the judiciary – the first President of Regional Court in Olsztyn in the years 1945–1949. From the viewpoint of particular Party members or candidates that were affected by the cleansing of ranks, both the content of the accusations and the mechanism of deciding on their exclusion were crucial. Depriving someone of the Party card while the totalitarian state was being built often meant losing their professional standing and actual elimination from the broadly understood public sphere. In practice, it led to defensive mechanisms among the excluded, such as appeals to Party instances directly superior to the basic organisations. Eventually, the decisions on approving, changing or repealing the punishments belonged to voivodeship–level Party control committees. It was a crucial issue, especially for those Party members who faced charges of ideological nature that situated them in the category of class enemies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Hanagan, Michael y Behrooz Moazami. "Introduction to a 1995 Conversation with Eric Hobsbawm". International Labor and Working-Class History 83 (2013): 5–13. http://dx.doi.org/10.1017/s0147547913000057.

Texto completo
Resumen
Eric Hobsbawm, who died on October 1, 2012, was one of a handful of extraordinary labor historians who emerged from the British Communist Party Historians' Group in the 1940s and 1950s. Today he is widely acknowledged as one of the great historians of our era. His influence is truly international. For a long time, a significant limitation on the extent of his renown was the USSR where, during the era of “actually-existing socialism,” his works were never translated or published. This was ironic since he was a card-carrying member of the Communist Party of Great Britain (CPGB) from 1936 until its dissolution in 1991.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Fadakinte, M. M. y Uche Nwali. "The Grassroots and Party Funding in Nigeria: Trajectories for Money Politics". Advances in Social Sciences Research Journal 8, n.º 11 (6 de diciembre de 2021): 490–506. http://dx.doi.org/10.14738/assrj.811.11225.

Texto completo
Resumen
This paper addresses grassroots indifference to party funding in Nigeria. It argues that all existing explanations on political apathy do not address the escalating tendency of the ordinary but educated and politically aware Nigerians to be averse to party funding. Drawing on political culture theory, the paper attributes the current trajectory of the phenomenon to a form of "inverse participant" culture by the grassroots, consequent upon their alienation that is driven by a convergence of three key variables: the cartel nature of party formation which is responsible for the disconnect in state-society relations, the appropriation and weaponisation of parties through funding, and decades of unfulfilled campaign promises. It further contends that grassroots indifference creates a funding vacuum which gives room for the monopoly of the party by the wealthy few and the moneybags. The paper concludes that, to arrest grassroots disinterest in party funding, it will require a reform of the Nigerian state to wean it of predatory and exclusionary character and arrest the prevailing cartelization of party formation and appropriation of political parties. It is also important to evolve a political culture that will create positive civic consciousness so as to shape voter-party-candidates relations in order to arrest the current negative voter attitudes that expect and demand for money from party candidates. This paper adopted the qualitative method of research , making use of extant literature on the subject matter and in addition used the interview method in seeking the opinions of a few individuals, some of them party card carrying members.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Odabaş, Meltem, Thomas J. Holt y Ronald L. Breiger. "Markets as Governance Environments for Organizations at the Edge of Illegality: Insights From Social Network Analysis". American Behavioral Scientist 61, n.º 11 (octubre de 2017): 1267–88. http://dx.doi.org/10.1177/0002764217734266.

Texto completo
Resumen
In the past two decades, researchers have examined the practices of online forums operating markets for the sale of stolen credit card data. Participants cannot rely on traditional legal system regulations in the event of disputes between buyers and sellers. Thus, this analysis focuses on two forms of monitoring within these forums: one based on an emergent social network of transactions among community members (second-party monitoring) and the other consisting of regulatory (third-party) monitoring by forum administrators. Using social network analyses of a series of posts from a data market forum, the findings demonstrate that governance of these forums is enabled by their functioning as a particular kind of market that economists characterize as a platform, or two-sided market. Specifically, second- and third-party trust-creating mechanisms are vital in establishing sustainability in illicit markets by increasing perceived market trustworthiness, which in turn leads to increased market demand.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

DICKSON, BRUCE J. y MARIA ROST RUBLEE. "Membership Has Its Privileges". Comparative Political Studies 33, n.º 1 (febrero de 2000): 87–112. http://dx.doi.org/10.1177/0010414000033001004.

Texto completo
Resumen
This article compares the relative importance of political capital (in the form of membership in the Chinese Communist Party) and human capital (in the form of higher education) in urban China. Survey data from urban China strongly support two key elements of the intellectual New Class theory: intellectuals will have privileged access into the party, and the importance of education relative to political reliability will increase over time. The data also show how political capital and human capital are converted into high paying and prestigious jobs. There is also evidence of a separate path of career mobility: for the most socially prestigious jobs, a college degree—not a party card—is the key. Economic reforms of the post-Mao era are creating a gap between political power, on one hand, and social prestige and economic power, on the other. This gap can be expected to grow as the reforms continue.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Arimbi, Sesaria y Widhi Handoko. "Analisis Yuridis Permasalahan Pembuatan Akta Otentik Oleh Notaris/PPAT (Analisis Terhadap Putusan Nomor 210/Pid.B/2018/Pn.Smg)". Notarius 15, n.º 1 (30 de abril de 2022): 365–79. http://dx.doi.org/10.14710/nts.v15i1.46047.

Texto completo
Resumen
The legal action of making a sale and purchase deed (AJB) must meet the requirements in the form of a photocopy of the family card, identity card, land and building tax, certificate, marriage certificate and husband and wife approval. Such conditions must be fulfilled in order for a deed to be authentic. Decision Number 210/Pid.B/2018/PN.Smg did not fulfill the presence of Tumiyem and her husband as the party entitled to the land and gave signatures in the making of the AJB made by Notary/PPAT SUGIHARTO. This research used socio-legal method by examining in depth various facts for problem solving in this research. The research specification used is descriptive analytical, data and facts obtained, then described descriptively and systematically. The data used are primary and secondary data. The absence of the parties and the not reading the deed by the Notary / PPAT in the drafting of the AJB resulted in the deed losing its authenticity and could become the basis for the claim of the injured party because there is no guarantee of legal certainty of the party entitled to the land.Keywords : authentic; deed of sale and purchase; loss.AbstrakPerbuatan hukum pembuatan akta jual beli (AJB) harus memenuhi syarat-syarat berupa foto copy KTP, KK, PBB, sertifikat, Surat Nikah dan persetujuan Suami Istri. Syarat-syarat demikian harus dipenuhi agar suatu akta dinyatakan otentik. Putusan Nomor 210/Pid.B/2018/PN.Smg ini tidak memenuhi kehadiran Tumiyem dan suaminya selaku pihak yang berhak atas tanah dan memberikan tanda tangan dalam pembuatan AJB yang dibuat oleh Notaris/PPAT SUGIHARTO.. Jenis penelitian menggunakan Socio legal research dengan cara memeriksa secara mendalam berbagai fakta untuk pemecahan masalah dalam tesis ini. Spesifikasi penelitian yang dipakai ialah deskriptif analitis, data dan fakta-fakta yang diperoleh, kemudian diuraikan secara deskriptif dan tersistematis. Adapun data yang digunakan yakni data primer, dan data sekunder.Ketidakhadiran pihak dan tidak dibacakannya akta oleh Notaris/PPAT dalam pembuatan AJB mengakibatkan akta kehilangan sifat otentiknya dan bisa saja menjadi dasar gugatan pihak yang dirugikan karena tidak adanya jaminan kepastian hukum pihak yang berhak atas tanah itu.Kata kunci : otentik; akta jual beli; kerugian.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Mohi Ud Din, Syed Fawad Mashhadi, Shahzeb Arif Khan, Sadia Zubair, Ayesha Khan y Sajjad Hussain. "Sehat Sahulat Program: Assessing the awareness and utilization effectiveness of Sehat Insaf Card among the general population of District Rawalpindi." Professional Medical Journal 29, n.º 07 (30 de junio de 2022): 1061–66. http://dx.doi.org/10.29309/tpmj/2022.29.07.6806.

Texto completo
Resumen
Objective: To determine the awareness of using Sehat Insaf Card and to determine the utilization effectiveness of Sehat Sahulat Program. Study Design: Cross Sectional study. Setting: Sehat Insaf Card Authorized Hospitals. Period: July 2020 to December 2020. Material & Methods: Data was collected via self-administered questionnaire. The sample size was 316. Non-probability purposive sampling was done. The questionnaire consisted of three parts; Part A: Demographics, Part B: Awareness, Part C: Utilization Effectiveness. IBM, SPSS statistics version 25 was used for data entry. Descriptive statistics like frequency, percentage and proportion were measured. Results: Most of the participants belong to the rural area and fall into the category of 10 – 20 thousand monthly income. The awareness about program came from 2 main sources; Word of mouth and campaign by a local party representative. Majority of the services availed were curative services i.e. 72.8%. Before the launch of SSP, 3/4 of the participants self-paid their medical bills and with this program, its 100% free. 72.8% of the total participants were satisfied with the transportation charges covered in SSP. 92% of the total participants felt no discrimination in hospital in any regard, either from the doctor or the paramedical staff. 99.4% of the total participants were of the opinion that Govt of Pakistan should launch similar new programs. Conclusion: Sehat Insaaf Card distribution among the under-privileged citizens was almost similar in the urban and rural population of Rawalpindi. More involvement of females is need of the hour.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Trimble, Linda y Angelia Wagner. "“Wildrose Wild Card”: Alberta Newspaper Coverage of the 2009 Wildrose Alliance Leadership Contest". Canadian Political Science Review 6, n.º 2-3 (19 de marzo de 2013): 197–207. http://dx.doi.org/10.24124/c677/2012473.

Texto completo
Resumen
This study uses quantitative and qualitative methods to examine Alberta newspaper coverage of the Wildrose Party’s 2009 leadership contest. We compared the overall visibility of the two candidates, Danielle Smith and Mark Dyrholm, and contrasted news framing of their public and private personas and assessments of their ideological positions and leadership skills. Smith was more visible than her male opponent, reflecting her front-runner status during the leadership race. Somewhat surprisingly, Smith was not framed as a woman candidate, nor were evaluations of her performance marked by sexism or gender stereotypes. We argue that these findings are atypical and other women leadership contenders are not likely to receive the glowingly positive assessments Smith enjoyed. Smith’s conservative ideological position, and the possibility that she had the skills and public appeal necessary to topple the longstanding governing party, prompted the remarkably adulatory coverage accorded her candidacy by the Alberta press corps.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Bulgakova, Tatiana D. "From Drums to Frying Pans, From Party Membership Card to “Magic Branch” Withe: Three Generations of Nanai Shamans". Folklore: Electronic Journal of Folklore 41 (2009): 79–96. http://dx.doi.org/10.7592/fejf2009.41.bulgakova.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Acar, Gunes, Steven Englehardt y Arvind Narayanan. "No boundaries: data exfiltration by third parties embedded on web pages". Proceedings on Privacy Enhancing Technologies 2020, n.º 4 (1 de octubre de 2020): 220–38. http://dx.doi.org/10.2478/popets-2020-0070.

Texto completo
Resumen
AbstractWe investigate data exfiltration by third-party scripts directly embedded on web pages. Specifically, we study three attacks: misuse of browsers’ internal login managers, social data exfiltration, and whole-DOM exfiltration. Although the possibility of these attacks was well known, we provide the first empirical evidence based on measurements of 300,000 distinct web pages from 50,000 sites. We extend OpenWPM’s instrumentation to detect and precisely attribute these attacks to specific third-party scripts. Our analysis reveals invasive practices such as inserting invisible login forms to trigger autofilling of the saved user credentials, and reading and exfiltrating social network data when the user logs in via Facebook login. Further, we uncovered password, credit card, and health data leaks to third parties due to wholesale collection of the DOM. We discuss the lessons learned from the responses to the initial disclosure of our findings and fixes that were deployed by the websites, browser vendors, third-party libraries and privacy protection tools.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Denisanjaya, Marcellina y Yovita Arie Mangesti. "PERTANGGUNGJAWABAN PIDANA PIHAK KREDITUR YANG MEMPEKERJAKAN DEBTCOLLECTOR DALAM PENYELESAIAN KREDIT MACET". Bureaucracy Journal : Indonesia Journal of Law and Social-Political Governance 2, n.º 1 (30 de abril de 2022): 654–72. http://dx.doi.org/10.53363/bureau.v2i1.159.

Texto completo
Resumen
In this study, it will examine the criminal liability of creditors who employ debtcollectors in collecting bad debts. Card-Based Payment Instruments (APMK) regulated in PBI (Bank Indonesia Regulation) Number 14 of 2012, one example of a payment instrument that is often used by the public is the use of Credit Cards. With this payment instrument, it can pose several risks for the community, a problem that often occurs is delays or overdue in paying credit card bills. Until it finally causes credit bottlenecks in payments and also the nominal collection that is increasing due to late fees. The existence of credit congestion can cause other problems for the creditor and the debtor. In general, in the event of a bad debt, the creditor will use the services of a Debtcollector as a third party to collect debts. Debtcollector as a third party charged by the creditor (bank) in collecting debts to the debtor, but the power of attorney that has been given makes the debtcollector do various ways of collecting. There are some debt collection individuals who commit arbitrary acts or unlawful acts in collection. In this study, it uses normative juridical research methods with a statutory approach and a conceptual approach. The results of this study show that the form of criminal liability of creditors who employ debtcollectors can be in the form of imprisonment and/or fines of a certain amount of money for compensation to the aggrieved party. It has not been clearly regulated in the laws and regulations regarding the form of criminal liability of creditors in hiring debtcollectors who commit unlawful acts at the time of debt collection.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Silva, Marcos y Marcos Junior. "A Secure Protocol for Exchanging Cards in P2P Trading Card Games Based on Transferable e-cash". Journal of Information Security and Cryptography (Enigma) 3, n.º 1 (3 de septiembre de 2016): 26. http://dx.doi.org/10.17648/enig.v3i1.57.

Texto completo
Resumen
Trading card games (TCG) distinguish from traditional card games mainly because the cards are not shared between players in a match. Instead, users play with the cards they own (e.g., purchased or traded with other players), which corresponds to a subset of all cards produced by the game provider. Even though most computer-based TCGs rely on a trusted third-party (TTP) for preventing cheating during trades, allowing them to securely do so without such entity remains a challenging task. Actually, potential solutions are related to e-cash protocols, but, unlike the latter, TCGs require users to play with the cards under their possession, not only to be able to pass those cards over. In this work, we present the security requirements of TCGs and how they relate to e-cash. We then propose a concrete, TTP-free protocol for anonymously trading cards, using as basis a secure transferable e-cash protocol.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Anastasia, Njo y Samiaji Santoso. "Effects of Subjective Norms, Perceived Behavioral Control, Perceived Risk, and Perceived Usefulness towards Intention to Use Credit Cards in Surabaya, Indonesia". SHS Web of Conferences 76 (2020): 01032. http://dx.doi.org/10.1051/shsconf/20207601032.

Texto completo
Resumen
Credit cards are becoming one of the most-used method of payment, both domestic and overseas. Consumers need not hassle with carrying cash to pay, hence reducing the risk of losing your money. Credit cards however, have their own drawback as it can be hacked, resulting in the breach of personal information by a third party, and abusing it to make transactions unknown to the card owner. This phenomenon is still in debate among credit card holders. As such, the purpose of this study is to test the effects of subjective norms, perceived behavioral control, perceived risk, and perceived usefulness towards the intention to use credit cards. Psychological factor and risk level becomes a challenge to card holders when they are making a transaction. Purposive sampling technique is used to gather data through questionnaire spread in both hardcopy and online to 100 credit card owners in Surabaya. Data is then processed using Partial Least Square (PLS). Analyzation result shows subjective norms, perceived behavioral control, and perceived usefulness significantly affects the intention to use credit cards, while perceived risk does not. The result of this study shows that by fully understanding both the advantages and disadvantages of credit cards, consumers can use it to make better financial planning, and not making transactions that leads to a certain lifestyle.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Langguna, Ayu Patricya, Metsi Daud, Djami Olii y Parabelem Tinno Dolf Rompas. "The Influence of Instagram Social Media and Creativity on Learning Outcomes to Design Party Clothes at State 3 Vocational School Manado". International Journal of Information Technology and Education 3, n.º 1 (10 de diciembre de 2023): 223–36. http://dx.doi.org/10.62711/ijite.v3i1.150.

Texto completo
Resumen
This research aims to: 1) Find out the creativity in designing party clothing before using Instagram social media for students in SMK NEGERI 3 Manado. 2) Knowing the creativity in designing party clothes after using social media Instagram for students in SMK NEGERI 3 Manado. 3) Knowing the influence of the use of social media Instagram and creativity on student learning outcomes in designing student party clothing at SMK NEGERI 3 Manado. The sampling technique in the research was a saturated sample consisting of 35 students. Validity The instrument uses this validity with valid results. The reliability of the instrument using Cronbach's Alpha was 0.93 and 0.88. The normality test uses Kolmogorov-Smirnov with values 0.657>0.224 and 2.619>0.224. The linearity test obtained Y=42.886723 and Y=35.05175+0.598818. Hypothesis testing produces P-Value> 0.05 so Ho is accepted and Ha is rejected. Research results show: 1) Creativity in designing party clothes before using Instagram social media was an average of 70 in the less creative category. 2) Creativity in designing party clothes after using social media Instagram averaged 86 in the creative category. 3) The influence of the use of social media Instagram and creativity on student learning outcomes in designing party clothing can be seen in the increase in students' report card scores, which before use averaged 70 and after use averaged 85. Based on the results of the hypothesis test, it was stated that there was an influence.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

COPPER, John F. "Accounting for the Recent Uptick in US–Taiwan Relations". East Asian Policy 11, n.º 04 (octubre de 2019): 74–87. http://dx.doi.org/10.1142/s1793930519000382.

Texto completo
Resumen
This article assesses the Donald J Trump administration’s pursuit of closer relations with Taiwan beginning in March 2018, which some observers labelled as “playing the Taiwan card”. The US trade dispute with China was the backdrop. Taiwan President Tsai Ing-wen and her party exaggerated the significance of this as they head towards an election in January 2020. It was uncertain, however, how lasting US policies might be and if the trend would continue if and when the trade war ended.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Xia, Huiwen y Nada Chunsom. "Third-Party Payments Impact on Commercial Banks’ Non-Interest Income: Evidence from China". International Journal of Economics and Finance 10, n.º 8 (24 de julio de 2018): 190. http://dx.doi.org/10.5539/ijef.v10n8p190.

Texto completo
Resumen
This study aims to explore the effects of Chinese third-party payments on commercial banks’ non-interest income over the period 2008-2017. In China, third-party payment is a digital payment provided by private non-bank firms that consist of desktop payment and mobile payment. More people prefer to use third-party payment, especially the mobile payment, instead of cash and bank card as the payment can be transacted easily and safely on the mobile phone by scanning QR code. To find whether this new digital payment trend impacts on commercial banks’ non-interest income or not, this paper first employs the random effects panel data technique. The regression results show that for overall banks, higher desktop payment yields higher non-interest income, while the mobile payment deters the non-interest income. Then in order to investigate whether third-party payment exerts the effects differently across bank types, we include interaction terms and dummy variables in the regression. Findings show that from the perspective of bank types, small-medium commercial banks reap the positive spillover effects. But for large state-owned commercial banks, the non-interest income suffers a loss when desktop payment and mobile payment are growing. Base on the findings, the insightful policy implications are put forth for commercial banks’ non-interest income expansion and profitability enhancement.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Henold, Mary J. "In Praise of the Card Party: A Reflection on the 100th Anniversary of the National Council of Catholic Women". American Catholic Studies 131, n.º 4 (2020): 95–103. http://dx.doi.org/10.1353/acs.2020.0066.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

LIU, MING-SHENG, HUI LIU y JIAN-WU ZHENG. "A STRATEGY FOR SECURING APDU TRANSMISSION". International Journal of Pattern Recognition and Artificial Intelligence 22, n.º 01 (febrero de 2008): 33–54. http://dx.doi.org/10.1142/s0218001408006120.

Texto completo
Resumen
The smart card is being used all over the world, because of its power to store data securely and execute calculations confidentially. This paper proposes an easy way to implement the strategy which can guarantee data integrity and privacy in the transmission path between the terminal application of the smart card and the smart card. This strategy consists of cryptographic functions of message and methods for transmitting APDU and managing secret keys. Some cryptographic functions of message are defined and developed for transmitting APDU confidentially. These cryptographic functions can keep the byte length of input and output messages identical. This strategy for transmitting APDU points out how to call cryptographic functions to encode or decode the data body of APDU, and how to construct a modified APDU message structure according to the original APDU message structure, which will be sent to its intended recipient instead of the original APDU message structure. With the proper secret keys, the authorized party can recover this modified APDU to its corresponding original APDU properly, without any information leakage. The transfer of secret keys to other parties is the most difficult aspect of secure APDU transmission, whereas data encryption/decryption is relatively straightforward. Two distinct strategies for managing secret keys, namely the static and the dynamic are introduced and compared. The dynamic strategy is preferred for a terminal application and smart card which do not need to authenticate each other. The implementation of this dynamic strategy has been detailed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Noddings, Nel. "A Response". Hypatia 5, n.º 1 (1990): 120–26. http://dx.doi.org/10.1111/j.1527-2001.1990.tb00396.x.

Texto completo
Resumen
My response addresses a few technical problems raised by Card—the function of chains in extending caring, a constructivist interpretation of formal relations, a variation of reciprocity—and then concentrates on the major charges of unidirec' tionality and continued exploitation of women. Caring is not construed as an individual virtue that makes continuous demands on one party, but as a relational attribute. An ethic of caring is liberational rather than exploitative because the expectation is that all people, not just women, should act as carers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Utama, Anugrah Prima. "PROVIDER'S RESPONSIBILITY FOR DATA PERSONAL CONSUMER ASSOCIATED WITH PRIME CARD REGISTRATION". Indonesia Private Law Review 4, n.º 1 (29 de marzo de 2023): 1–10. http://dx.doi.org/10.25041/iplr.v4i1.2794.

Texto completo
Resumen
To minimize starter packs, the Government, through Regulation of the Minister of Communication and Information Number 12 of 2016 jo. Regulation of the Minister of Communication and Informatics Number 14 of 2017 concerning the Registration of Telecommunications Service Customers requires consumers to send personal data to the operator as a National Identity Number and Family Card Number or biological mother's name. However, this condition needs to be addressed appropriately, bearing in mind that the use of personal data by irresponsible parties without approval or authorization or because electronic system failures are prone to occur. The problems in this research are further examining the legal relationship between the provider and the consumer, the provider's responsibility to the consumer's data regarding starter pack registration, and the legal remedies consumers can take when personal data protection fails. The method used in this research is normative, carried out by reviewing existing laws and regulations and the literature related to the research topic. This study's results indicate a legal relationship between providers and consumers marked by registration recruitment. The provider, in this case, is the party that formulates the agreement, while the consumer only agrees and follows the agreed terms. Furthermore, the operator has responsibility for the telecommunications services it provides, including maintaining legitimacy, truth, accuracy, and relevance, as well as suitability to obtain, collect, analyzing, process, display, store, post, send, disseminate, to destroying personal data by the provisions legislation. And suppose there is a failure to protect the confidentiality of personal data. In that case, consumers can file legal remedies through complaints, civil lawsuits through court and alternative dispute resolution, or prosecution of providers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Stanišić, Slobodan. "Legal recourse and subrogation in insurance for self-responsibility / Regres i zakonska subrogacija u osiguranju od autodgovornosti". Годишњак факултета правних наука - АПЕИРОН 5, n.º 5 (28 de julio de 2015): 84. http://dx.doi.org/10.7251/gfp1505084s.

Texto completo
Resumen
This paper discusses the legal solutions and certain disputable legal issues for the realization of the right to recourse insurer against the responsible person in the court proceedings in the case of compulsory liability insurance of owners or users of motor vehicles for the damage caused to third parties.The paper deals with the legal solutions governing the transition of the damaged claims as a creditor in the Secured Fund and the Green Card Bureau of Insurers in the case when the aforementioned insurers pays the compensation for damage to the injured party.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Al-Uluwiyah, Nabila Zulfatien Nisa’ y Moh Faizur Rohman. "Pendapat para Ulama Kabupaten Gresik terhadap Penggunaan Uang Elektronik menurut Hukum Islam". Maliyah : Jurnal Hukum Bisnis Islam 11, n.º 1 (29 de junio de 2021): 79–109. http://dx.doi.org/10.15642/maliyah.2021.11.1.79-109.

Texto completo
Resumen
This study aims to determine the opinion of the Ulama in Gresik Regency on the Use of Electronic Money according to Islamic Law. This field research uses a descriptive analysis method related to the views of the scholars of Gresik Regency on the use of electronic money. The data is then analysed using the Fatwa of the National Sharia Council (DSN) Number 116/DSN-MUI/IX/2017 concerning Sharia Electronic Money. Scholars in Gresik Regency stated that electronic money is only a modern payment tool in the card format that stores the money value in digital form. In general, electronic money can make it easier to use in all types of transactions, although it is not entirely reliable in terms of security. If the electronic money card is lost, the money value in the card will also be lost, and the owner cannot ask for accountability from any party. The scholars in Gresik Regency also stated that electronic money is halal and legal as long as it does not contain elements of gharar, is not used for things prohibited by religion. In purchasing electronic money, balances must be in the amount of cash paid so that usury does not occur. Thus this is also per the DSN-MUI Fatwa No. 116/DSN-MUI/IX/2017, which states that sharia electronic money is following sharia principles.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

WANTCHEKON, LEONARD. "Strategic Voting in Conditions of Political Instability". Comparative Political Studies 32, n.º 7 (octubre de 1999): 810–34. http://dx.doi.org/10.1177/0010414099032007003.

Texto completo
Resumen
This article presents a game theoretic model to explain the broad electoral support for the extreme right-wing party, the Nationalist Republican Alliance (ARENA), in the 1994 elections in El Salvador. Making use of poll data, the author shows that the deciding factor in this electoral outcome was not the procedural defects, the apathy of the electorate, or the disorganization of the opposition parties but, instead, uncertainty about the peace process. The model helps to explain why during the political campaign, ARENA played the “fear card” and why the peasants voted in such great numbers for a party opposed to the land reform that would greatly benefit them. The author argues that the Farabundo Marti National Liberation Front (FMLN) participated in the election not just to win but more to provide legitimacy for the new democratic process. The article concludes by discussing implications of the findings for the prospects for democratic consolidation in El Salvador.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Xie, Qi, Bin Hu y Ting Wu. "Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server’s public key and smart card". Nonlinear Dynamics 79, n.º 4 (30 de noviembre de 2014): 2345–58. http://dx.doi.org/10.1007/s11071-014-1816-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Moroz, Serhii, Anatolii Tkachuk, Mykola Khvyshchun, Stanislav Prystupa y Mykola Yevsiuk. "METHODS FOR ENSURING DATA SECURITY IN MOBILE STANDARDS". Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 12, n.º 1 (31 de marzo de 2022): 4–9. http://dx.doi.org/10.35784/iapgos.2877.

Texto completo
Resumen
The analysis of mobile communication standards is carried out, the functional structure and interfaces of interaction between the structural elements of the cellular network are considered. To understand the principle of communication according to the GSM standard, a block diagram of a mobile switching center (MSC), base station equipment (BSS), control and service center (MCC), mobile stations (MS) is presented. The main algorithms for ensuring the confidentiality and security of mobile subscribers' data, in different types of standards, as well as the vulnerabilities of information flows are considered. In particular, the following dangerous types of attacks have been identified, to which mobile network subscribers are sensitive: sniffing; leakage of personal data; leakage of geolocation data; spoofing; remote capture of SIM-card, execution of arbitrary code (RCE); denial of service (DoS). It is established that the necessary function of the mobile network is the identification of subscribers, which is performed by IMSI, which is recorded in the SIM card of the subscriber and the HLR of the operator. To protect against spoofing, the network authenticates the subscriber before starting its service. In the case of subscriber identification, the subscriber and the network operator are protected from the effects of fraudulent access. In addition, the user must be protected from eavesdropping. This is achieved by encrypting the data transmitted over the radio interface. Thus, user authentication in UMTS, as well as in the GSM network, is carried out using encryption with a common key using the "hack-response" protocol (the authenticating party sends a random number to the authenticated party, which encrypts it according to a certain algorithm using a common key and returns the result back).
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

FREDERICK AZUBUIKE, OBI. "THE 2022 HOUSE OF ASSEMBLY PRIMARIES AND CHALLENGES OF INTERNAL PARTY DEMOCRACY IN NIGERIA". International Journal of Social Sciences and Management Review 06, n.º 02 (2023): 136–48. http://dx.doi.org/10.37602/ijssmr.2023.6209.

Texto completo
Resumen
This article examined what happened at the state party primaries when political parties elected their delegates and candidates to vie for state Houses of Assembly seats for the 2023 general elections in Nigeria. Successful aspirants to state Houses of Assembly are expected in the next four years to make laws on matters that are closest to the grass root. The article however limited its examination of state Assembly primaries to the two dominant political parties – the APC (All Progressive Congress) and the PDP (Peoples Democratic Party) because as of January 2022, these two parties, of the currently registered 18 political parties in Nigeria, controlled 92.8% of the entire state Assembly seats in the 36 states of the Federation. It was established from findings that the problems of imposition of candidates and sponsorship by godfathers characterized the conduct and outcome of party primaries at this level, the extant legal instruments that supposedly ruled against such infractions notwithstanding. This article, by providing a background to this study, established with examples that these problems have existed within the Nigerian political space and in party primaries in particular, during the first second, and third Republics respectively. This creates challenges of accountability when aspirants emerging through this process are elected into office. The article concluded with recommendations on what should be done to limit or eliminate the control of governors, money bags, and godfathers, especially at the level of state Assembly primaries. The emphasis in the recommendations was placed amongst others on the rank-and-file card-carrying members being attracted and retained, as strong financial members of their parties, committed to the party’s ideology and programs, and being made therefore to own the party and its structures.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Sun, Yi, Qiaoyan Wen, Yudong Zhang y Wenmin Li. "Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks". Computational and Mathematical Methods in Medicine 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/214841.

Texto completo
Resumen
With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients’ health information and doctors’ diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía