Thèses sur le sujet « Information technology – Law and legislation »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Information technology – Law and legislation ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.
Wong, Man-him, et 黃文謙. « Government's role in information technology : a case study of the deregulation of the Hong Kong telephone services ». Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1985. http://hub.hku.hk/bib/B31974648.
Texte intégralGarcia, Natanya. « Anti-circumvention technology legislation in Canada : drafting a new law in the wake of the DMCA ». Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=19625.
Texte intégralParnell, Paul P. « Information technology law : 'micro-agreements' in systems integration and outsourcing projects : recognising and managing the legal implications of day to day interactions between parties to large and complex information technology projects ». Thesis, View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/25573.
Texte intégralSullivan, Camille. « Two's legal but three's a crowd : law, morality and three-parent embryos : regulation of mitochondrial replacement therapy ». Thesis, Canberra, ACT : The Australian National University, 2013. http://hdl.handle.net/1885/109247.
Texte intégralVan, Loenen Bastiaan. « Access to Geographic Scientific and Technical Data in an Academic Setting ». Fogler Library, University of Maine, 2001. http://www.library.umaine.edu/theses/pdf/vanLoenenB2001.pdf.
Texte intégralMostert, Charl. « The benefits of contractual causes in mitigating project failures using business system projects ». Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1778.
Texte intégralThis study evaluates the utilisation and effectiveness of contract clauses in Information Technology (IT) and Information System (IS) projects in South Africa to address and mitigate key risks associated with these types of projects. This study established whether specific clauses were being utilised to address key risks, and where clauses were being utilised, whether these clauses were effective in addressing and mitigating the impact of these key risks. The need for the study arose because the researcher had experienced on several occasions in his workplace that contracts which appeared fail-safe during the negotiation stage did not reach the proposed targets, let alone maturity of the agreement. To establish whether colleagues in similar positions in computer-based organisations experienced similar disruptions a quantitative questionnaire was distributed to organisations in the Johannesburg area to gain an insight into their risk profile. Risk could arise from the contract construction and/or wording. Reference was made to the contracts in the engineering environment where standard contracts have been in place for a number of years. Specifically the New Engineering Contract (NEC) of 2011 and the Professional Services Contract were consulted. The study concentrated on four categories of risk identified in a literature review, namely corporate management risk, project management risk, resource utilisation risk and technology risk, which resulted in 42 sub-factors examined. The population of suitable and relevant IT and IS companies could not be definitely established but the researcher made telephonic contact with known organisations and 24 participants agreed to participate in the exercise; 12 service providers and 12 clients of providers, where 78% of participants experienced one or more of the risk factors, and 53% used NEC standard contracts.
Lundström, Justus, Jonas Widriksson et Viktor Zaunders. « Changes in media consumption and file sharing : The impact of legislation and new digital media services ». Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12534.
Texte intégralIn this study we investigate how the attitude and behaviour concerning illegal file shar-ing have changed among the young population in Sweden. The study will analyze the impact of the IPRED law that was introduced in April 2008 and new digital media ser-vices that have emerged in the last couple of years. It is also evaluated which of these have had the most impact on the attitude and behaviour of the selected population.
The main part of our research consists of a quantitative survey handed out to a sample population among high school students (ages 16-20) in Jönköping, Sweden. This pri-mary data is later compared to secondary data from a similar study that was done on the same demographics two years prior to this research in order to measure the change in behaviour and attitude. The previous study was conducted prior to the IPRED law im-plementation by one of the authors. We also used prior research within this subject and related fields to further understand and interpret our data.
What we have discovered through our research is that there has been a decrease in ille-gal file sharing, especially when considering music, however this decrease is much more an effect of the adopting of new media services then it can be attributed to the IPRED law. Furthermore, the attitudes towards file sharing have remained unchanged and a large number of young adults do not feel that file sharing should be illegal.
It is also concluded that good legal alternatives to file sharing have a large market po-tential if these services can fulfil consumers demand on availability and price. Addition-ally we have found that good legal alternatives are important if the public is to refrain from returning to their old file sharing habits once the initial scare from new legislation has worn off.
Desai, Mohammed Reza. « An integrated approach for information security compliance in a financial services organisation ». Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.
Texte intégralThe aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtfulness regarding corporate consistency. Legislature and policies have been set up to counter information security issues. This legislature and policies are not adequately addressing the compliance issues that arise, but are needed within organisations. Compliance targets are not met due to inconsistent guidelines that turns out to be significant in diminishing the financial position, reputation and security of information. This research further aims to explore whether employees comply with laws and regulations regarding information in an organisation. This is done in order to confirm whether governance and human factors play any significant part in compliance. The research is an exploratory study and specifically analyses the governance function and which stakeholders influence its operations in information compliance. The research investigates certain questions on organisational culture and the human factor, do influence employee’s compliance to laws and regulations. The objectives of the research are to investigate which factors, and how such factors influence compliance of information security policies and compliance with the goal of designing an integrated framework to assist in counteracting these findings. The research is underpinned by the Neo-institutional theory, Agency Theory and Rational choice theory. The Denison organisational cultural model and a framework proposed by von Solms are used as lenses to interpret the data of the research.
Wang, Jia. « Copyright : rebalancing the public and private interests in the areas of education and research ». Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85834.
Texte intégralThe general public should have wide access to copyrighted materials for education and research. However, since the current copyright law system subtly favors copyright holders, it is time to re-evaluate copyright law to ensure it meets its original purpose of promoting the learning of the society. The research primarily focuses on how to broaden copyright limitations and exceptions for the public to access and use learning materials. Within the framework of the copyright law system, other mechanisms that allow users to access copyrighted materials at a reasonable price also are considered. Such mechanisms include an efficient collective copyright management system and various licensing schemes. In an information network environment, it is time for developing countries to reform copyright law in order to promote education and research. It is hoped the findings of this study not only benefit South Africa and People's Republic of China, but also provide insights and guidelines to other developing countries with similar conditions.
Cruz, Thelma Letícia Lemes da. « Formação docente normativa por meio da Wiki ». Universidade Tecnológica Federal do Paraná, 2016. http://repositorio.utfpr.edu.br/jspui/handle/1/2251.
Texte intégralEsta investigação tem por objetivo o desenvolvimento de um produto educacional para a formação continuada de professores, na escola, por meio de um instrumento tecnológico Wiki. O problema consistiu em que medida a formação continuada desenvolvida por meio do instrumento tecnológico, a Wiki, poderia contribuir para a capacitação docente em sua hora-atividade? Assim, analisou-se o processo de construção e de aplicação de um curso de formação continuada sobre a legislação educacional, aplicada a professores do Ensino Médio, em uma escola pública do Norte do Paraná. O curso foi elaborado pela investigadora e instrumentalizado por meio da Wiki. O instrumento tecnológico Wiki se apresenta com recurso pouco utilizado na Educação Básica do Estado do Paraná. Parti-se da ideia de que o uso planejado desse instrumento poderá viabilizar um recurso capaz de promover formação continuada realizada na escola. O referencial teórico-metodológico está centrado na formação continuada na escola como abordada por Imbérnon (2013), Sampaio e Leite (2013) e Libâneo, Oliveira e Toschi (2012). Como resultado, tem-se a viabilidade da formação continuada na escola, com o emprego da hora-atividade docente, desde que haja uma mudança na cultura organizacional no contexto de uma escolar gestão democrática.
This research aims at the development of an educational product for the continuing education of teachers, in the school, through a technological tool Wiki. The problem was how far the continuous training developed through the technological instrument, Wiki, could contribute to the teacher training in its time-activity? Like this, the process of construction and application of a continuing education course on educational legislation applied to high school teachers in a public school in the north of Paraná was analyzed. The course was developed by the researcher and instrumentalized through the Wiki. The Wiki technology tool presents itself with a little used resource in the Basic Education of the State of Paraná. I started from the idea that the planned use of this instrument could enable a resource capable of promoting continued formation in the school. The theoretical-methodological reference is centered on the continued formation in the school as approached by Imbérnon (2013), Sampaio and Leite (2013) and Libâneo, Oliveira and Toschi (2012). As a result, there is the viability of continuing education in the school, with the use of teaching time-activity, as long as there is a change in organizational culture in the context of a democratic school-based management.
Cofone, Ignacio Nicolas <1987>. « Privacy Tradeoffs in Information Technology Law ». Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7246/4/Cofone_Ignacio_tesi.pdf.
Texte intégralCofone, Ignacio Nicolas <1987>. « Privacy Tradeoffs in Information Technology Law ». Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7246/.
Texte intégralMaldonado, Maya. « Elastiska bibliotek : en undersökning av två folkbiblioteks formbarhet och gränser med hjälp av begreppet elasticitet ». Thesis, Uppsala universitet, Institutionen för ABM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-183389.
Texte intégralAndre, Edward E. « Investigating information management weaknesses in a local government organisation : A critical hermeneutic ethnographic case study of internet documents from information warfare and legal perspective(s) ». Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/633.
Texte intégralWunderlin, Beverly J. « The Regulation of Medically Assisted Procreation in Europe and Related Nations and the Influence of National Identity, Social Cultural, and Demographic Differences ». Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3192/.
Texte intégralKalaf, William M. « Arizona law enforcement biometrics identification and information sharing technology framework ». Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FKalaf.pdf.
Texte intégralThesis Advisor(s): Bergin, Richard ; Josefek, Robert. "March 2010." Description based on title screen as viewed on April 28, 2010. Author(s) subject terms: Arizona Criminal Justice Commission, biometrics technology, biometrics identification, facial recognition, fingerprint identification, law enforcement, information sharing, criminal information sharing, Arizona, Mexico, New Mexico, Texas, California, RISC, AFIS, IAFIS, NGI, governors border conferences, Central America, south west border initiative. Includes bibliographical references (p. 87-92). Also available in print.
Saint-Jacques, Guillaume B. « Information technology and the rise of the power law economy ». Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/103212.
Texte intégralCataloged from PDF version of thesis.
Includes bibliographical references (pages 36-38).
We show that the dramatically increasing share of income going to top earners can be explained by the rise of the "power law economy" and argue this reflects increased digitization and networks. Specifically, tax data (1960-2008) show that a bigger share of individual incomes are drawn from a power law, as opposed to the long-established log-normal distribution. We present a simple theoretical model to argue that the increased role of power laws is consistent with the growth of information technology, because digitization and networks facilitate winner-take-most markets. We generate four testable hypotheses, and find they match the data. (1) Our model, incorporating power laws, fits the data better than any purely log-normal distribution, (2) the increase in the variance of the log-normal portion of the distribution has slowed, suggesting a slowing of skill-biased technical change, (3) more individuals now select into the power law economy, (4) there is more skewness within that economy.
by Guillaume B. Saint-Jacques.
S.M. in Management Research
Amoraal, Lezel. « Internet-regulering in Suid-Afrika : staat of internasionaal ? » Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53471.
Texte intégralENGLISH ABSTRACT: The Internet has become such an integral part of computer users' daily existence that it seems as if it has always been there. The Internet with its unique borders - or lack of borders - places an enormous burden on geographically based legal systems. Regulation, that has specifically been designed for the Internet, is a necessity because virtually every aspect of the law is challenged by the Internet and that many legal frameworks are inadequate to deal with the Internet. The other aspect which complicates the Internet even more, is that there is no specific organisation, business or government to whom the Internet belongs. Individuals and organisations have rights to the web pages that they own on the Internet, but there is no ownership of the Internet in its entirety. The development of the Internet in South Africa took place during a difficult time in the country's history. The apartheid era initially limited the growth of the Internet. Much of the existing legislation in South Africa has been partially adapted to accommodate the Internet, but the government could not envisage what the actual impact of the Internet would be and consequently they reacted when it came to the regulation of the Internet. In 2002 the Electronic Communication and Transaction Act 25 of2002 came into operation. In fact, the physical component of the Internet has already been regulated to a degree by the pure coincidence as a result of its physical presence. This is because the backbone of the Internet had not originally been created by the Internet, but by the telephone. There are a number of legislative Internet-organisations that are, among others, responsible for the technical standards of the Internet, dispute resolutions and in general what is important for the Internet community. Various international conventions regulate specific aspects of the Internet such as copyright, intellectual property rights, domain names, trademarks and cyber crime. The international conventions and agreements are an important step in the direction of standardised regulation. However, the lack of borders creates problems surrounding jurisdiction of the cyber space.
AFRIKAANSE OPSOMMING: Die Internet het al so deel van rekenaargebruikers se alledaagse bestaan geword dat dit soms wil voorkom asof dit maar nog altyd daar was. Die Internet met sy unieke grense - of sy gebrek aan grense - plaas 'n groot las op geografies gebaseerde regstelsels. Regulering wat spesifiek vir die Internet ontwerp is, is 'n noodsaaklikheid, aangesien byna elke aspek van die reg deur die Internet uitgedaag word en baie regsraamwerke onvoldoende is om die Internet te hanteer. Wat die regulering van die Internet verder kompliseer, is dat daar nie een spesifieke organisasie, onderneming of regering is aan wie die Internet behoort nie. Individue en organisasies het regte tot die webwerwe wat hulle op die Internet besit, maar daar is nie eienaarskap van die Internet in sy geheel nie. Die ontwikkeling van die Internet in Suid-Afirka het tydens 'n moeilike tydperk in die Suid- Afrikaanse geskiedenis plaasgevind. Die apartheidsera het die aanvanklike ontwikkeling en groei van die Internet in Suid-Afrika beperk. Verskeie bestaande Suid-Afrikaanse wetgewing is deels aangepas om die Internet te akkommodeer, maar die regering het nooit besef wat die werklike impak van die Internet sou wees nie en het gevolglik re-aktief te werk gegaan wanneer dit by die regulering van die Internet gekom het. In 2002 het Suid-Afrika se Elektroniese Kommunikasie en Transaksies Wet 25 van 2002 in werking getree. Die regulering van die fisieke komponente van die Internet is tot 'n mate as gevolg van sy fisieke teenwoordigheid deur blote toeval, gereguleer. Dit is omdat die ruggraat van die Internet nie oorspronklik vir die Internet geskep is nie, maar vir die telefoon. Daar bestaan verskeie wetgewende Internet-organisasies wat onder meer verantwoordelik is vir die tegniese standaarde van die Internet, dispuutresolusie en wat oor die algemeen aan die belange van die Internet-gemeenskap wil voldoen. Verskeie internasionale konvensies reguleer spesifieke aspekte van die Internet soos kopiereg, intellektuele eiendomsreg, domeinname en handelsmerke en kubermisdaad. Die internasionale konvensies en verdrae is 'n belangrike stap in die rigting van gestandaardiseerde regulering. Tog skep die grenslose omstandighede van die Internet probleme rondom jurisdiksie in die kuberruim.
Lenik, Jean-Sébastien. « Prix de transfert & ; accords de repartition des couts (ARC) ». Thesis, McGill University, 1999. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30314.
Texte intégralTo this end, the first part presents the general rules governing the transfer pricing area in Australia, Canada, France, and the United States. The provisions of these countries will serve as a guiding line of this study. The first part presents, as well, the OECD Transfer Pricing Principles.
The second part examines the structural alternatives of the CCA tax vehicle.
The third part addresses the CCA concept itself.
The fourth part deals with the operational functioning of a CCA. The new challenges and the multiple issues raised by this new tax structure are addressed as well as the tax planning perspectives opening up through transfer pricing.
Finally, the fifth part questions the new dynamics of the conflicts between tax administrations generated by the CCA vehicle.
Yannopoulos, George Nicholas. « Modelling the legal decision process for information technology applications in law / ». The Hague : Kluwer Law International, 1998. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=008004619&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Texte intégralKeck, Andrew G. « Electronic discovery ». Thesis, Utica College, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10101099.
Texte intégralCyber incidents continue to increase across the entire globe. The increase in security threats requires organizations to rethink strategies and policies continually fortifying against known and unknown threats. Cyber incident policies and response plans range from non-existent to hundreds of pages in length. A policy may include sections discussing roles and responsibility, incident detection, escalation, and many additional categories, and often discuss the collection and preservation of forensic evidence. Policies briefly address, in many cases, the proper collection of evidence; however, the written regulation concerning the potential liabilities, the risks associated with current and future litigation, and the legal consequences to a cyber incident remains sparse. The desired outcome of this paper is to enlighten the reader through identification of the risks, the potential pitfalls, and steps to policy development pertaining to the handling of electronic evidence, with a cross examination of overlapping sectors between forensics, electronic discovery, and cyber security.
Lazarus, Seth A. « Cyber Mobs| A Model for Improving Protections for Internet Users ». Thesis, Utica College, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10271260.
Texte intégralCyber mobs have grown to have a significant impact on individuals in real space and cyber space. Law enforcement and legislators have been confronted with challenges in mitigating the intangible harms inflicted by individuals of cyber mobs. Law enforcement, in most cases, is focused on solving cybercrimes associated with tangible harms. Thus, legislators seek to better protect cyber mob victims by increasing law enforcement training and focus on cyber mob incidents, as well as to create new legislation to better cope with the harms caused by cyber mobs. Much of the current research available focuses on the social aspects of cyber mobs, and before creating changes to statutes and law enforcement training, research is necessary to craft those changes better to counter cyber mob activities. The study reviewed several different types of cyber mobs, legislative measures, and cyber policing methods to provide recommendations. The research found that cyber mobs seem to overlap in their techniques, tactics, and procedures, though the harms they cause to accomplish their goals vary. In order to protect against their actions, research suggested, overall, that the examination of current legislation to create new methods of enforcement is necessary before creating additional statutes. In parallel with using current legislation, online communities already employ methods to police themselves, and these methods offer new avenues for law enforcement to work with these communities to better assist them when issues arise. These results demonstrated that much of what is necessary to protect against cyber mobs is already available, but it must be utilized differently to improve effectiveness.
Bronk, R. Christopher. « In confidence information technology, secrecy and the state / ». Related electronic resource : Current Research at SU : database of SU dissertations, recent titles available full text, 2005. http://wwwlib.umi.com/cr/syr/main.
Texte intégralChamoux, Capucine. « Access to environmental information in international law : the significance of the MOX Plant case (Ireland v. United Kingdom) ». Thesis, University of the Western Cape, 2005. http://etd.uwc.ac.za/index.php?module=etd&.
Texte intégralIn July 2003 the Arbitral Tribunal constituted under the OSPAR Convention rejected Ireland&rsquo
s request to have access to more information about the Mox plant. The procedure introduced by Ireland in October 2001 before an Arbitral Tribunal constituted under the UNCLOS is still pending. In this context, waiting for the final decision of this Arbitral Tribunal, the ITLOS ordered in December 2001, as a provisional measure, that Ireland and the United Kingdom must cooperate and exchange information. In November 2003, the Arbitral Tribunal constituted under the UNCLOS has suspended the proceedings, waiting for a decision of the European Court of Justice (ECJ). Indeed the European Commission, backing up the position of the United Kingdom, initiated proceedings against Ireland before the ECJ in 2003.
The Mox Plant Case illustrates and addresses several predominant matters in international environmental law. Firstly it illustrates the complexity of a system where several treaties between the same parties regulate the same issues. As a consequence in this case not less than four international jurisdictions have been and are still involved in the matter, leading to procedural difficulties. Secondly the Mox Plant Case illustrates the considerable difference of opinion which exists in the area of international environmental law with respect to the meaning and nature of the notion of &lsquo
access to information&rsquo
, and its relationship to other ancillary and concomitant notions, e. g. &lsquo
collaboration&rsquo
, &lsquo
cooperation&rsquo
, &lsquo
participation&rsquo
, etc., by and amongst states. The meaning of this concept, which is the cause of the dispute, differ depending on the context of treaty within which it is used.
From the analysis of the Mox Plant Case, in the context of the evolution of international law in general, and international environmental law in particular, the point is made on the strong link between the principle of cooperation and the right of access to environmental information, the first one necessarily including the latter to be effective. The other important element is the shift which is now established in international environmental law and governance from a strict application of the principle of state sovereignty, towards a more integrated vision. The interdependent nature of the environment makes necessary an interdependent governance and regulation of the issues related to it.
Gausi, Hambani Adamson. « Effects of the brittle national information policy framework on information services in Malawi ». Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1005989.
Texte intégralClark, Andrew Gerald. « Advances in information technology and the growth of para-legal services in Britain ». Thesis, University of Exeter, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.387424.
Texte intégralBopape, Tsekere Solomon. « Utilization of information technology to support information and knowledge management by law firms in Polokwane City ». Thesis, University of Limpopo (Turfloop Campus), 2009. http://hdl.handle.net/10386/689.
Texte intégralThis research report serves as an empirical investigation into the utilization of information technology to support information and knowledge management in law firms, as well as an attempt to design an information and knowledge management model for law firms. Members of the legal profession attached to law firms in the Polokwane City were investigated to find out how optimally they utilize information and communication technologies to support information and knowledge management in their daily operations. The research indicated that there are several ways in which information technology could be used to support the creation, organization, and transfer of information and knowledge in law firms, for the benefit of both lawyers and their clients . In order to provide for an empirical basis for this research, a survey research method, through the use of the questionnaires and interviews, was conducted, followed by a detailed content analysis of law firm websites. An in-depth literature review on the utilization of information technology to support information and knowledge management in law firms was also carried out to determine the findings of other studies that have been conducted elsewhere on the current topic. The results of this research showed that lawyers attached to law firms in the city of Polokwane appear to be non-users of information technology in as far as information and knowledge management is concerned. Most of the members of the law firms in the city seem to be utilizing information technology for basic purposes such as word processing, legal research, client billing, and communication through the e-mail. Other information and knowledge management tools, such as intranets, extranets and web portals, appear not to be utilized by most of the law firms in the city. Based on the findings of this research project, an information and knowledge network model, in a form of Wireless Local Area Network for the law firms in the Polokwane City, is proposed. This network could be utilized by law firms operating in the city to deposit, organize, retrieve, and share information and knowledge collaboratively through the use of information technology. Factors that should be taken into consideration in attempting to implement the proposed model are also discussed. At the end of the research report, some recommendations on encouraging lawyers to utilize information technology optimally are provided, together with recommendations for future research.
Lacroix, Mireille 1971. « Genetic information and the family : a challenge to medical confidentiality ». Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80935.
Texte intégralCofone, Ignacio Nicolas [Verfasser], et Klaus [Akademischer Betreuer] Heine. « Privacy Tradeoffs in Information Technology Law / Ignacio Nicolas Cofone ; Betreuer : Klaus Heine ». Hamburg : Staats- und Universitätsbibliothek Hamburg, 2017. http://d-nb.info/1124591397/34.
Texte intégralCofone, Ignacio Nicolas Verfasser], et Klaus [Akademischer Betreuer] [Heine. « Privacy Tradeoffs in Information Technology Law / Ignacio Nicolas Cofone ; Betreuer : Klaus Heine ». Hamburg : Staats- und Universitätsbibliothek Hamburg, 2017. http://d-nb.info/1124591397/34.
Texte intégralMorgan, Deanne. « Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology ». Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4729/.
Texte intégralHelmholz, Niels. « Contract formation and the Internet : an analysis of contract formation in English, South African and German law with special regard to the Internet ». Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52746.
Texte intégralENGLISH ABSTRACT: This dissertation examines the conclusion of contracts on the Internet in English and South African law on the one hand, and German law on the other. Because these legal systems have not developed specific rules for the formation of contracts by way of this medium of communication, the question is whether the traditional doctrines are adequate to the demands of tecnological innovation. The study accordingly proceeds from a detailed discussion of the traditional rules of offer and acceptance developed in each of the systems. To this end, the leading cases and of English and South African law are considered with an emphasis on the points of difference between the approach of the courts in these systems. Where there is uncertainty or different points of view, regard is had to the critical points of view of English and South African commentators. In respect of the codified German civil law, the authoritative provisions of the general part of the civil code are discussed against the background of the commentary of academic authors. An investigation of the technical structure of the Internet and the various methods of communication afforded by it, provides a foundation for an examination of the application of the general principles of the various legal systems to contract formation on the Internet. It is concluded that despite fundamental differences in the of approach of the systems under consideration, the general principles of each system are capable of application in the context of electronic contracting. The dissertation endeavours to develop proposals regarding adequate solutions to the problems typical of the process of contract formation on the Internet.
AFRIKAANSE OPSOMMING: Hierdie tesis is afgestem op die hantering van kontraksluiting op die Internet in die Engelse en Suid-Afrikaanse Reg aan die een kant, en die Duitse Reg aan die ander kant. Omrede geeneen van hierdie stelsels tot op hede spesifieke maatreëls daargestel het vir kontraksluiting deur middel van hierdie kommunikasiemiddel nie, is die vraag of tradisionele beginsels afdoende is met die oog op eise van die nuwe tegnologie. Die ondersoek gaan derhalwe uit van 'n behandeling van die tradisionele reëls van aanbod en aanname soos wat dit in elkeen van die stelsels ontwikkel het. Met die oog hierop, word sleutelvonnisse van die Engelse en Suid-Afrikaanse reg ontleed, veral dan ook met klem op verskille in die benadering van die howe in hierdie twee stelsels. In geval van onsekerheid en verskille van mening, word verwys na die kritiese standpunte van Engelse en Suid-Afrikaanse kommentatore. Met verwysing na die gekodifiseerde Duitse stelsel word die gesaghebbende bepalings van die Burgerlike Wetboek behandel teen die agtergrond van die kommentaar van Duitse akademiese skrywers. 'n Ontleding van die tegniese struktuur van die Internet en die verskillende kommunikasiemetodes wat dit bied, verskaf die grondslag vir 'n ondersoek na die toepaslikheid van die algemene beginsels aangaande kontraksluiting van die onderskeie regstelsels in die konteks van elektroniese kontraktering. Die gevolgtrekking is dat ten spyte van fundamentele verskille in benadering, die algemene beginsels van die verkillende stelsels wel aanwendbaar is in die nuwe omgewing. Die verhandeling poog om 'n bydrae te lewer tot die ontwikkeling van aanvaarbare oplossings tot die probleme wat tipies is aan kontraksluiting deur middel van die Internet.
McGill, Amanda S. « Legal professionals' perception of critical information in child custody disputes ». Thesis, Virginia Tech, 1987. http://hdl.handle.net/10919/45800.
Texte intégralMaster of Science
Lehmann, Caron Mary. « An evaluation of the time frame of the disclosure process in the evidence of 97 child witnesses in cases in the Belville sexual offences court ». Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1279.
Texte intégralChen, Yongxi, et 陳詠熙. « An empty promise of freedom of information ? : assessing the legislative and judicial protection of the right of access of government information in China ». Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hdl.handle.net/10722/197074.
Texte intégralpublished_or_final_version
Law
Doctoral
Doctor of Philosophy
Golding, Greg. « The reform of misstatement liability in Australia's laws ». Connect to full text, 2001. http://setis.library.usyd.edu.au/adt/public_html/adt-NU/public/adt-NU20040206.161344/index.html.
Texte intégralManker, Concetta. « Factors Contributing to the Limited Use of Information Technology in State Courtrooms ». ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1416.
Texte intégralNezafati, Mohammad Reza. « Fundamental principles for intellectual property and information technology law : a comparative study between United Kingdom, Islamic and Iranian law ». Thesis, University of Strathclyde, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.442013.
Texte intégralZomba, Lincoln Benn. « Computer related crimes : a comparative analysis of Tanzanian and South African frameworks ». Thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/13039.
Texte intégral'Unknown to most of us, we are living inside and alongside a revolution of stupendous power and energy. It is not a communist, socialist, capitalist or even a religious revolution. It is the ICT revolution, the revolution of information communication technologies that is changing the nature and patterns of our social, commercial and political interactions. Like most revolutions, its true scope cannot yet be grasped nor can all the issues it raises be clearly understood even by those at its cutting edges". The Internet and other new technologies play an important role in today's global information society, are now essential in every sector of human life and can be used for the preparation and commission of serious and transnational crimes.
Urquhart, Lachlan. « Towards user centric regulation : exploring the interface between information technology law and human computer interaction ». Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/41787/.
Texte intégralBanerjea-Brodeur, Nicolas Paul. « Advance passenger information passenger name record : privacy rights and security awareness ». Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Texte intégralPassenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
Aderam, Henry Ndejapo Tshapumba. « Consumer protection in online payment methods ». Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/73435.
Texte intégralMini Dissertation (LLM)--University of Pretoria, 2019.
Mercantile Law
LLM
Unrestricted
Steh, Stephen R. « Unauthorized Access Crimes ». Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Texte intégralMatheus, Ricardo. « Uso das tecnologias de informação e comunicação para a promoção da participação cidadã : estudo de caso da consulta pública online da lei das lan houses no Legislativo Federal Brasileiro ». Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/12/12139/tde-15012013-154220/.
Texte intégralWith the introduction of information and communication technologies (ICTs) in government, in particular the Internet, it became possible not only to expand the capacity and quality levels of services, but also focus on transparency, leading to several changes within the social control and citizen participation. This new perspective on ICT use in governments for the purpose of expanding participation channels is known as electronic governance (e-governance). The objective of this dissertation is to identify the impacts of citizen participation in public online consultations for the production of laws and limits and challenges of public online consultations of federal legislative power. The instruments of data collection were the structured visit website of the online public consultation, the e-Democracy, and semi-structured interviews of managers responsible for public consultation, as well as representatives involved in drafting the Law on Lan Houses and joined her. Also interviewed were participants of the public consultation and the association of Internet cafes in Brazil. Secondly, there will be a documentary analysis of contributions to see what the main changes from the pre-project in relation to the final design in order to measure the impact of citizen participation by counting the 10 most frequently used words in each document area; Legislative Proposals Members, Citizens Contributions on e-Democracy and Final Project sent to Federal Senate. It is believed that public consultations are an online environment that can be performed e-participation, however, there are still limits and challenges to which this participation occurs due to management problems of these tools for citizen participation online and other external problems which addresses the specific literature and are portrayed in the literature review. The findings indicate that there is evidence that citizen participation has impacts on collaborative production of laws in the federal government, however, it is believed that they are conditioned to a number of dimensions as politics, culture, resources and technology.
Saganich, Robert Lee. « An investigation of electronic Protected Health Information (e-PHI) privacy policy legislation in California for seniors using in-home health monitoring systems ». Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1075.
Texte intégralYalcinkaya, Ramazan O'Connor Brian C. « Police officers' adoption of information technology a case study of the Turkish POLNET system / ». [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3900.
Texte intégralSkolmen, Dayne Edward. « Protection of personal information in the South African cloud computing environment : a framework for cloud computing adoption ». Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.
Texte intégralCupido, Robin Vicky. « Misrepresentation by non-disclosure in South African law ». Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80261.
Texte intégralBibliography
ENGLISH ABSTRACT: This thesis investigates the approach to non-disclosure as a form of misrepresentation in South African law. The primary focus is the question of liability, and whether parties should be able to claim relief based on non-disclosure. In order to determine this, attention is also paid to the standards which have traditionally been employed in cases of non-disclosure, and it is questioned whether a general test can be formulated which could be used in all such instances. The point of departure in this discussion is a general historical and comparative overview of the law relating to non-disclosure. This overview places the position in modern South African law in context, and highlights some of the similarities between our current position regarding non-disclosure and the position in other jurisdictions. The overview also sets out the provisions relating to non-disclosure in international legal instruments, which could be of use in interpreting concepts used in our law. The study then shifts to an exploration of the specific situations, such as the conclusion of insurance agreements, or agreements of sale involving latent defects, where South African law automatically imposes a duty of disclosure. These instances are the exception to the general rule against imposing duties of disclosure on contracting parties. The study reveals that certain principles are applied in more than one of these exceptional cases, and attention is paid to each in order to determine which principles are most prevalent. It is suggested that the nature of the relationship between the parties is the underlying reason for always imposing duties of disclosure in these circumstances. Attention is then paid to the judicial development of the law relating to non-disclosure, specifically in those cases which fall outside the recognised special cases referred to above. The remedies available to a party when they have been wronged by another’s non-disclosure are identified and investigated here, namely rescission and damages. A distinction is drawn between the treatment of non-disclosure in the contractual sphere and the approach taken in the law of delict. The different requirements for each remedy are explored and evaluated. A detailed examination of the key judgments relating to non-disclosure shows us that the judiciary apply similar principles to those identified in the discussion of the exceptional instances when deciding to impose liability based on non-disclosure. Reliance is also placed on the standards set out in the earlier historical and comparative discussion. The most prevalent of these standards are the nature of the relationship between the parties and the good faith principle. It is then considered whether all of these principles and elements could be used in order to distill one general standard that could be used to determine whether non-disclosure could give rise to relief. The conclusion is drawn that it may not be advisable to adopt such a standard, and that the seemingly fragmented treatment of non-disclosure in South African law thus far has enabled its development and will continue to do so. A number of key considerations have been identified as possible standards, and these considerations can be applied by the judiciary on a case by case basis.
AFRIKAANSE OPSOMMING: Hierdie tesis ondersoek wanvoorstelling deur stilswye in die Suid-Afrikaanse kontraktereg. Die primêre fokus is op wanneer stilswye aanleiding gee tot aanspreeklikheid, en watter remedies daaruit voortvloei. Om dit vas te stel, word aandag geskenk aan die standaarde wat tradisioneel gebruik word in gevalle van stilswye, en word veral bevraagteken of 'n algemene toets formuleer kan word wat in al sulke gevalle toepassing sou kon vind. Die ondersoek begin met ‘n algemene historiese en regsvergelykende oorsig, wat die konteks verskaf vir die analise van die posisie in die moderne Suid-Afrikaanse reg, en ooreenkomste tussen hierdie posisie en die benadering in ander jurisdiksies na vore bring. Die bepalings van sekere internasionale regsinstrumente wat spesifiek met stilswye handel, word ook ondersoek om te bepaal hulle van nut kan wees by die uitleg van konsepte wat in die Suid- Afrikaanse reg gebruik word. Die fokus van die studie verskuif dan na spesifieke, uitsonderlike gevalle waar die Suid- Afrikaanse reg outomaties ‘n openbaringsplig tussen partye erken. Prominente voorbeelde is versekeringskontrakte en koopkontrakte waar die merx ‘n verborge gebrek het. Hierdie gevalle is uitsonderings op die algemene reël dat kontrakspartye nie openbaringspligte het nie. Dit kom voor dat sekere gemeenskaplike beginsels van toepassing is in sekere van die uitsonderingsgevalle, en dit word ondersoek hoekom hierdie beginsels gereeld na vore tree. Dit word ook voorgestel dat die aard van die verhouding tussen die partye die onderliggende rede is waarom ons reg openbaringspligte in hierdie spesifieke omstandighede oplê. Aandag word dan geskenk aan die regterlike ontwikkeling van die regsposisie ten opsigte van stilswye in gevalle wat nie by een van die bogenoemde erkende uitsonderings tuisgebring kan word nie. Die remedies beskikbaar aan partye wanneer hulle deur ‘n ander se stilswye benadeel is, word hier geïdentifiseer en ondersoek. Hierdie remedies is die kontraktuele remedie van aanvegting (moontlik gevolg deur teruggawe) en die deliktuele remedie van skadevergoeding. ‘n Onderskeid word ook getref tussen die hantering van stilswye in die kontraktereg en die benadering wat in die deliktereg gevolg word. Aan die hand van hierdie onderskeid word die vereistes vir albei remedies bepreek. Die belangrikste uitsprake van die howe in gevalle wat nie by die spesifieke, uitsonderlike kategorieë tuisgebring kan word nie, word dan oorweeg. Dit is duidelik dat die howe in die konteks van hierdie residuele gevalle soortgelyke beginsels geïdentifiseer het as dié wat voorgekom het by gevalle soos versekering en koop. Uit hierdie uitsprake blyk dit ook duidelik dat die howe ag slaan op soortgelyke standaarde as dié wat in die historiese en vergelykende oorsig na vore getree het. In dié verband is die aard van die partye se verhouding en die goeie trou beginsel veral prominent. Ten slotte word oorweeg of die beginsels en elemente wat hierbo geïdentifiseer is, gebruik kan word om ‘n algemene standaard te ontwikkel wat gebruik sal kan word om te bepaal of ʼn openbaringsplig ontstaan. Die gevolgtrekking word bereik dat so ‘n algemene standaard nie noodwendig die beste oplossing is nie. Die oënskynlik gefragmenteerde hantering van stilswye in die Suid-Afrikaanse het tot dusver tog regsontwikkeling bevorder, en sal waarskynlik ook voortgaan om dit te doen. ʼn Aantal kernoorwegings kan wel geïdentifiseer word, wat dan sou kon dien as moontlike standaarde wat regsontwikkeling verder sou kon bevorder, en wat deur die howe toegepas sou kon word na gelang van die spesifieke omstandighede van elke saak.
« Ensuring the advancement of Chinese information technology : copyright restrictions anchored purely to utilitarian justification ». 2012. http://library.cuhk.edu.hk/record=b5549466.
Texte intégral本文認爲,在中國版權立法和適用中,版權功利主義理論起著根本性作用。根據功利主義,版權法的目標是促使社會文明的最大化發展。而且中國政府必須發展數字經濟,且須保證其版權法合理地促使網絡中間商運行和投資中國數字經濟。中國版權法需爲資訊技術提供足夠的發展空間。
基於為資訊技術發展尋求足夠發展空間的目的,本文分析了Sony案抗辯,通知-删除避風港,誘導侵權和合理使用。中國必須合理解釋中國現有制度,從而避免給網絡中間商加以不合理的責任。關於版權侵權抗辯,中國應該引入美國的 Sony抗辯,作為衡量是否侵犯版權的一個因素。且避風港保護的範圍應該被擴展至包含所有網路中間商,以保證未來技術的未知發展擁有足夠的呼吸空間。而且,至少,中國應該採用某些善意轉換性使用的窮盡式合理使用抗辯,以促進現有技術的運行。且更合適的是,採用非窮盡式的合理使用抗辯,其範圍包括所有對社會有用的網路中間服務的必須運營活動,並通過確保資訊技術發展的方式。
一個好的法律框架可以對人類的進步有著積極的影響,不然它會對社會發展起著阻礙作用。我們需要的法律框架應該同時促進版權和信息傳播技術的發展。這意味著,在保證版權産業正常運行的同時,該法律框架應爲技術發展提供肥沃的成長土壤。
Information technology and its usage on the internet have revolutionized the way in which various copyrighted works are captured, stored, copied and distributed. By expanding the breadth, diversity and sheer number of copyrighted works in existence, the internet has fundamentally changed the nature of copyright markets.
This thesis attempts to argue that the laws in Mainland China should reserve enough space for information technologies to develop, without unreasonably prejudicing the interests of copyright holders.
This thesis contends that the utilitarian justification for copyright plays an underlying role in both Chinese copyright legislation and judicial application. Under the utilitarian model in China, fostering a maximization of culture development is the aim of the copyright law. As such, in the era of information overload, the Chinese government should aim to develop the Digital Economy. In order to achieve this aim, it needs to start by ensuring that its copyright law appropriately enables Internet Intermediaries to operate and to invest in creating Chinese Digital Economy. Copyright law in China needs to create room to move.
This thesis examines Sony defense, notice-and-take-down safe harbors, inducement liability and fair use, for the purpose of seeking enough space for information technology development. The existing rules in China, e.g. inducement liability, should be interpreted as avoiding placing unreasonable burden on internet intermediaries. As to the defenses against copyright infringement, Sony defense in the US should be introduced as a factor in assessing copyright infringement in China. And the scope of safe harbor protection should be extended to include all internet intermediaries, for the purpose of providing breathing room for unanticipated technology developments. Moreover, at the very least, certain fair dealing exceptions for certain transformative use in good faith should be adopted in China to foster the existing operations of information technology. And it is more desirable to introduce a non-exhaustive fair dealing exception to cover activities necessary to run all socially useful internet intermeiary services, in the way of ensuring information technology development.
A well-designed legal system should have positive impacts on the human progress; or otherwise, it would have deterrence effects on the social development. A legal system which promotes both copyright and communication technologies creations is what we need in the future. This kind of system requires a fertile land for technologies innovation without destroying the developments of the entertainment industries
Detailed summary in vernacular field only.
Detailed summary in vernacular field only.
Detailed summary in vernacular field only.
Detailed summary in vernacular field only.
Xie, Lin.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2012.
Includes bibliographical references.
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstract also in Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Thesis Argument --- p.1
Chapter 1.2 --- Background --- p.2
Chapter 1.3 --- Summary --- p.6
Chapter 2 --- Theoretical Framework in China --- p.11
Chapter 2.1 --- Justifications for Copyright --- p.11
Chapter 2.2 --- Traditional Chinese Culture --- p.15
Chapter 2.3 --- The Development of Modern Copyright Law in China --- p.21
Chapter 2.4 --- International Relationship --- p.27
Chapter 2.5 --- Utilitarian Justification in Digital Era in China --- p.31
Chapter 3 --- Aggressive Measures on the Unauthorized File-sharing Problem --- p.36
Chapter 3.1 --- Criminal Liability of Internet users --- p.36
Chapter 3.2 --- Benefits and Costs --- p.49
Chapter 3.3 --- Graduated Response Scheme --- p.52
Chapter 3.4 --- The Nature of Unauthorized Online File-sharing Problem --- p.59
Chapter 3.5 --- Alternative Solutions --- p.65
Chapter 3.6 --- Implications for China --- p.68
Chapter 4 --- Sony Defense under Traditional Indirect Liabilities --- p.71
Chapter 4.1 --- Traditional Liabilities for Third Parties’ Infringement --- p.72
Chapter 4.2 --- Sony Defense --- p.82
Chapter 4.3 --- Assessing Sony Defense --- p.98
Chapter 5 --- The Notice-and-Take-Down Safe Harbors of Online Service Providers --- p.102
Chapter 5.1 --- Introduction on the Notice-and-Take-Down Safe Harbors --- p.102
Chapter 5.2 --- Threshold Requirements of the Notice-and-Take-Down Safe Harbors --- p.108
Chapter 5.3 --- A Proposed Safe Harbor Framework in China --- p.142
Chapter 6 --- Inducement Liability of Service Providers --- p.145
Chapter 6.1 --- Inducement Liability in China --- p.145
Chapter 6.2 --- Inducement Liability in the US --- p.151
Chapter 6.3 --- Implications for China --- p.170
Chapter 7 --- Transformative Use of Copyrighted Works: A Proposed Fair Dealing Exception for Internet Intermediaries --- p.176
Chapter 7.1 --- Introduction --- p.176
Chapter 7.2 --- Transformative Use in the US --- p.178
Chapter 7.3 --- Transformative Use under Australian and Chinese Copyright Law --- p.188
Chapter 7.4 --- A Proposed Fair Dealing Exception --- p.198
Chapter 7.5 --- Conclusion --- p.201
Chapter 8 --- Liabilities of a Search Engine’s Cache --- p.202
Chapter 8.1 --- Introduction --- p.202
Chapter 8.2 --- Liabilities of a Search Engine’s Cache in China --- p.208
Chapter 8.3 --- Direct Infringement --- p.215
Chapter 8.4 --- The Safe Harbor Protection --- p.223
Chapter 8.5 --- Implied License --- p.236
Chapter 8.6 --- Fair Use --- p.242
Chapter 9 --- Fair Use or Fair Dealing? --- p.246
Chapter 9.1 --- Introduction --- p.246
Chapter 9.2 --- Fair Dealing in China --- p.248
Chapter 9.2 --- Introduce a Flexible Exception into Copyright in China --- p.263
Chapter 10 --- Conclusion --- p.272
Parnell, Paul P., University of Western Sydney et Faculty of Law. « Information technology law : 'micro-agreements' in systems integration and outsourcing projects : recognising and managing the legal implications of day to day interactions between parties to large and complex information technology projects ». 2000. http://handle.uws.edu.au:8081/1959.7/25573.
Texte intégralMaster of Laws (Hons)