Tesi sul tema "Privacy practices"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Privacy practices".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Lee, Songho. "Current practices for DNS Privacy : Protection towards pervasive surveillance". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85621.
Testo completoDen nuvarande användningen av DNS-systemet är ett signifikant kryphål för internetanvändares integritet, eftersom alla frågor och svar som krävs för att konvertera en webbadress till IP-adress inte skyddas i de flesta fall. Rapporten identifierar internetanvändarnas integritetsintressen och presenterar den nuvarande tekniken som syftar till att förbättra DNS-sekretessen genom en systematisk litteraturgranskning. Rapporten undersöker också begränsningarna i den nuvarande praxis och redovisar flera förslag såsom DNS-över-Tor och metoder som möjliggör periodiskt ändring av rekursiva resolvrar, och de metoderna förväntas att minimera integritetsläckor.
Andersen, Adelina. "Exploring Security and Privacy Practices of Home IoT Users". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-303002.
Testo completoInternet of Things (IoT) enheter har blivit vanligt förekommande i hem vilket gör deras säkerhet och integritet allt viktigare. Det har tidigare visats att användare av IoT i hemmet kan utgöra ett hot mot sig själva om de saknar kunskap om enheterna och kännedom om potentiella hot. För att undersöka hur användarnas vanor kring säkerhet och integitet kan förbättras är det först nödvändigt att utforska de nuvarande vanorna och vad som påverkar dessa. Detta undersöks i tio intervjuer som visar att vanorna främst påverkas av bekvämlighet, motivation och ansträngningen som krävs av användaren. Utifrån dessa insikter föreslås det att fysisk interaktion används som ett komplement till digitala lösningar för att förbättra vanorna kring säkerhet och integritet. Genom att ha ett fysiskt objekt som på ett enkelt sätt kan förmedla enheternas nuvarande status och är lika tillgängligt för alla medlemmar i ett hushåll kan säkerhet och integritet bli mer uppnåeligt för alla användare, oavsett deras nivå av kunskap och erfarenhet.
Lysyk, Mary C. "Practices for Protecting Privacy in Health Research: Perspectives of the Public, Privacy Guidance Documents and REBs". Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31093.
Testo completoGhiami-Mirhosaini, Roozbeh. "Information privacy, an exploratory survey of concerns about organisational practices". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape2/PQDD_0016/MQ48484.pdf.
Testo completoGhiami-Mirhosaini, Roozbeh Carleton University Dissertation Management Studies. "Information privacy: an exploratory survey of concerns about organizational practices". Ottawa, 2000.
Cerca il testo completoGandarillas, Carlos. "The impact of web site design and privacy practices on trust". FIU Digital Commons, 2002. http://digitalcommons.fiu.edu/etd/3448.
Testo completoVisser, Diane. "A study on database marketing practices that raise consumer privacy concern : a proposed model for regulating database marketing practices in South Africa". Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52711.
Testo completoENGLISH ABSTRACT: One of the phenomena's in the marketing industry of the past decade is the increased use of database marketing. Database marketing involves the collection, processing and dissemination of vast amounts of consumer information in order to compile detailed consumer databases. The increasing popularity of database marketing can be attributed to various factors. Consumer information can now be obtained easier, cheaper and faster due to the availability of information technology. It has become easier to segment consumer markets and it is possible to identify consumer trends. It is possible to make predictions of consumer behaviour or buying patterns because consumer databases provide a more complete consumer profile with information ranging from demographics, psycho graphics to life-style information. Database technology improves the efficiency and effectiveness of marketing campaigns because marketers can analyse the available information and select the most appropriate marketing strategies and tactics, while concentrating efforts on the most profitable consumer. Marketers therefore waste less effort, money, and other resources by not promoting to individuals who are unlikely to react upon such offers. Widespread databases assist marketers in offering products that are more reasonably priced and more precisely tailored for smaller, more homogeneous market segments. Improved product and service offerings as well as the availability of a wider variety of products and services will likely result in higher consumer satisfaction and could build consumer loyalty. Therefore, marketers use consumer information to improve the overall marketing strategy and individual customer service. Consumers are concerned about database marketing practices because consumers believe some data practices invade personal privacy. The need for privacy has always been inherent to human nature and the concept of privacy dates back to early mankind. One should however differentiate between an individual's basic need for privacy from a general perspective and privacy within a consumer-marketer context. Privacy from a general perspective refers to one's territoriality and need for physical seclusion, whereas consumer privacy mainly relate to the privacy of personal information. Bennett, as well as Stone and Stone proposed that a state of privacy exist when a consumer can control social interaction, unwanted external stimuli, and the dissemination of personal information as well as being able to make independent decisions without outside interference. Consumers' need for privacy is however, in conflict with the need for social interaction and the need to participate in commercial exchange relationships. The more a person interacts with other members of society, the more the person could expect to compromise some privacy. This implies that when consumers participate in a business transaction, or where an exchange relationship exists between the database marketer and consumer, consumers could expect that a degree of privacy will be lost. Consumer groups however, argue that some marketing practices invade the reasonable amount of privacy consumers should be able to expect. The raising consumer concern for privacy is attributable to several reasons. The primary driver of consumer concern is the general lack of knowledge on data collection and use. Other reasons for the raising privacy concern include the type of information collected and the amount of control consumers have over subsequent use of data; the use of personal information to identify specific individuals; collection and use of sensitive information, such as medical and financial data; the volume of information collected and used; secondary information use; the use and dissemination of inaccurate databases; the collection and use of children's data; the lack of tangible benefits received in exchange for information provided; and the use of consumer information for financial gain. Consumers have also expressed concern about electronic database marketing practices because of the secrecy in data collection and use. However, privacy concerns may vary depending on consumers' cultural orientation, age, perception on what constitutes good marketing ethics or the specific methods employed to obtain consumer data. One could distinguish between several consumer clusters when considering consumers" attitudes on database marketing practices and personal privacy. In this regard the typical South African consumer is classified as a "pragmatist". Pragmatists are concerned with privacy to the extent they are exposed to database marketing activities. The South African database marketing industry is still in its infancy phase and as the industry progress, and consumers become more knowledgeable, privacy concerns are likely to increase. It is important to address the issues that raise consumer privacy concerns and to find solutions for ensuring sustainable database marketing practice in future. Marketers' information needs and consumers' privacy needs should somehow be balanced in order to withhold government intervention. Compromises from both sides are necessary to reach a more balanced relationship between the two parties. The successful outcome of the privacy debate will depend on marketers' understanding of consumer privacy issues and by addressing these accordingly.Several approaches exist for regulating database marketing practices that invade consumer privacy: the implementation of information technology, self-regulation and government intervention. Self-regulation is preferred for regulating database marketing practices, whereas privacy-enhancing information technology is recommended as a supplemental tool for protecting consumer privacy. Government regulating seems to be the last resort because of unnecessary restrictions that might be imposed on database marketing activities. Recommended models for regulating database marketing activities and for protecting consumer privacy in South Africa are the Registration Model, together with elements of the Data Commissioner Model. These models were proposed after careful consideration of characteristics, unique to the South African database marketing industry. The models place the responsibility for data protection with the database marketer and the South African government, rather than with the consumer. The Registration Model and the Data Commissioner Model seems a viable combination for implementation in South Africa because these models acknowledge the fact that South African pragmatic consumers are not well educated and informed enough on privacy invading database marketing practices. This combination rarely involves any consumer participation and therefore suits the typical apathetic nature of South African consumers. The Registration Model acts like a notice system where an agency, currently the Direct Marketing Association of South Africa, develops principles of fair information practices to which registered marketers need to comply with. A commission, an element of the Data Commissioner Model, has power to investigate consumer complaints, constrain development of databases, review data practices and advise on improvements on data collectors' systems. The commission could also monitor advancements in information technology that may enhance consumer privacy. The only problem with these models seems to be that the agency and or the commission have no authoritative power to enforce compliance with principles and codes of conduct. Industry self-regulation in conjunction with some governmental control and the application of information technology seems to be useful in providing adequate levels of consumer privacy and data protection. Such a combination might strike a balance between South African consumers' need for privacy and South African marketers' need for consumer information.
AFRIKAANSE OPSOMMING: Een van die verskynsels in die bemarkingsindustrie oor die afgelope dekade is die toenemende gebruik van databasisbemarking. Databasisbemarking behels die insameling, prosessering en verspreiding van groot hoeveelhede verbruikersinligting met die doelom gedetailleerde verbruikersdatabasisse saam te stel. Die toenemende gewildheid van databasisbemarking kan toegeskryf word aan verskeie faktore. Inligtingstegnologie maak dit baie makliker, goedkoper en vinniger om verbruikersinligting te bekom. Dit raak al hoe makliker om verbruikersmarkte te segmenteer en dit is moontlik om verbruikers tendense te identifiseer. Voorspellings kan ook gemaak word ten opsigte van verbruikersgedrag en aankooppatrone omdat die omvang van inligting in verbruikersdatabasisse strek vanaf demografiese, psigografiese tot lewenstylinligting en daarom 'n baie meer volledige verbruikersprofiel bied. Databasistegnologie verbeter die doeltreffendheid en effektiwiteit van bemarkingsveldtogte omdat bemarkers beskikbare inligting kan analiseer en die mees gepaste bemarkingstrategieë en taktieke kan selekteer, terwyl programme gerig kan word op die mees winsgewinde verbruiker. Bemarkers sal dus minder moeite, geld en ander hulpbronne vermors deurdat bemarkingsprogramme nie gerig word op individue wat heel waarskynlik nie op sulke aanbiedinge sal reageer nie. Omvangryke databasisse help bemarkers om goedkoper produkte te bied wat meer presies ontwerp is op kleiner, meer homogene marksegmente te dien. Verbeterde produk en diens aanbiedinge tesame met die beskikbaarheid van 'n wyer verskeidenheid van produkte en dienste, sal heel waarskynlik hoër verbruikersatisfaksie tot gevolg hê en kan verbruikerslojaliteit bewerkstellig. Dus, bemarkers gebruik verbruikersinligting om die algehele bemarkingstrategie en individuele diens aan verbruikers te verbeter. Verbruikers het belang by databasis bemarkingspraktyke omdat verbruikers glo dat sommige data praktyke inbreuk maak op persoonlike privaatheid. Die behoefte aan privaatheid was nog altyd inherent aan die menslike natuur en die konsep van privaatheid dateer terug tot vroeë beskawings. Daar behoort egter 'n onderskeid getref te word tussen 'n individu se basiese behoefte aan privaatheid vanuit 'n algemene perspektief en privaatheid vanaf 'n verbruiker-bemarker konteks. Privaatheid, vanaf 'n algemene perspektief, verwys na 'n individu se persoonlike ruimte en die behoefte aan fisiese afsondering, teenoor verbruikersprivaatheid wat hoofsaaklik verband hou met die privaatheid van persoonlike inligting. Bennett, sowel as Stone en Stone het voorgestel dat 'n mate van privaatheid heers wanneer 'n verbruiker beheer het oor sosiale interaksies, ongewenste eksterne prikkels, die verspreiding van persoonlike inligting, sowel as om in staat te wees om onafhanklike besluite te neem sonder invloed van buite. Verbruikers se behoefte aan privaatheid is egter in konflik met die behoefte aan sosiale interaksie en die behoefte om deel te neem aan kommersiële transaksies. Hoe meer 'n persoon in wisselwerking tree met ander lede van die gemeenskap, hoe meer kan die persoon verwag om 'n mate van privaatheid op te offer. Dit impliseer dat wanneer verbruikers deelneem in 'n besigheidstransaksie of waar 'n ruilverhouding bestaan tussen die databasisbemarker en verbruiker, kan verbruikers verwag dat 'n mate van privaatheid verlore sal gaan. Verbruikers kan 'n redelike mate van privaatheid verwag, maar verbruikersgroepe argumenteer dat sommige bemarkingspraktyke inbreuk maak op hierdie redelike verwagting van privaatheid. Die toenemende verbruikersbelang by privaatheid is toeskryfbaar aan verskeie redes. Die primêre dryfkrag agter verbruikers se belang is die algemene gebrek aan kennis oor data insameling en gebruik. Ander redes wat bydrae tot die toenemende belang by privaatheid sluit in die tipe inligting ingesamel en die hoeveelheid beheer verbruikers het oor die daaropeenvolgende gebruik van data; die gebruik van persoonlike inligting om spesifieke individue te identifiseer; die insameling en gebruik van sensitiewe inligting, soos byvoorbeeld mediese en finansiële data; die hoeveelheid inligting wat ingesamel en gebruik word; sekondêre gebruik van inligting; die gebruik en verspreiding van onakkurate databasisse; en die insameling en gebruik van verbruikersinligting om finansieël voordeel daaruit te trek. Verbruikers het ook belang getoon teenoor elektroniese databasis bemarkingspraktyke as gevolg van die geheimhouding oor data insameling en gebruik. Die belang by privaatheid mag egter varieër afhangende van verbruikers se kulturele oriëntasie, ouderdom, persepsie van wat goeie bemarkingsetiek behels of die spesifieke metodes gebruik om data aangaande verbruikers te bekom. Daar kan onderskei word tussen verskeie verbruikersgroepe wanneer verbruikershoudings teenoor databasis bemarkingspraktyke en persoonlike privaatheid oorweeg word. In hierdie verband kan die tipiese Suid-Afrikaanse verbruiker geklassifiseer word as 'n pragmatis. Pragmatiste is besorg oor privaatheid tot die mate waartoe hulle blootgestel is aan databasisbemarkingsaktiwiteite. Die Suid-Afrikaanse databasis industrie is nog in die beginfase en soos die industrie groei en verbruikers meer ingelig raak, sal besorgdheid oor privaatheid heelwaarskynlik ook toeneem. Dit is belangrik om die kwessies wat besorgdheid oor verbruikersprivaatheid veroorsaak aan te spreek en om oplossings te vind om volhoubare databasisbemarkingspraktyke in die toekoms te verseker. Daar moet gepoog word om bemarkers se behoefte aan inligting en verbruikers se behoefte aan privaatheid in ewewig te bring om sodoende owerheidsinmenging te voorkom. Opofferings van beide partye is nodig om 'n meer gebalanseerde verhouding tussen die twee partye te bewerkstellig. Die suksesvolle uitkoms van die privaatheidsdebat sal afhang van bemarkers se begrip vir verbruikersprivaatheidskwessies en om dit dienooreenkomstig aan te spreek. Die regulering van databasisbemarkingspraktyke wat inbreuk maak op verbruikersprivaatheid kan verskillend benader word: die implementering van inligtingstegnologie, self-regulering en owerheids-inmenging. Self-regulering word verkies as basis om databasisbemarkingspraktyke te reguleer, terwyl privaatheids-bevorderende inligtingstegnologie aanbeveel word as bykomende gereedskap om verbruikersprivaatheid te beskerm. Owerheidsregulering word gesien as die laaste uitweg as gevolg van onnodige beperkinge wat dit mag plaas op databasisbemarkingsaktiwitei te. Die voorgestelde modelle vir die regulering van databasis bemarkingsaktiwiteite en vir die beskerming van verbruikersprivaatheid in Suid Afrika, is die Registrasie Model, tesame met elemente van die Data Kommissaris Model. Hierdie modelle is voorgestel nadat eienskappe, uniek aan die Suid Afrikaanse databasisbemarkingsindustrie, deeglik oorweeg IS. Die modelle plaas die verantwoordelikheid van data beskerming in die hande van die databasisbemarker en die Suid-Afrikaanse owerheid, eerder as by die verbruiker. Die Registrasie Model en die Data Kommissaris Model blyk 'n uitvoerbare kombinasie vir implementering in Suid Afrika te wees, omdat hierdie modelle die feit inagneem dat Suid Afrikaanse pragmatiese verbruikers nie goed genoeg opgevoed en ingelig is oor die databasisbemarkingsaktiwiteite wat inbreuk maak op privaatheid nie. Hierdie kombinasie behels selde verbruikersdeelname en is daarom gepas by die tipiese apatiese aard van Suid Afrikaanse verbruikers. Die Registrasie Model dien as 'n kennisgee-stelsel waar 'n agentskap, tans die Direkte Bemarkings Assosiasie van Suid Afrika, beginsels vir regverdige inligtingspraktyke ontwikkel waaraan geregistreerde databasisbemarkers moet voldoen. 'n Kommissie, 'n element van die Data Kommissaris Model, het mag om verbruikersklagtes te ondersoek, die ontwikkelling van databasisse aan bande te lê en om datapraktyke te hersien en advies te gee oor verbeteringe in die stelsels van data-insamelaars. Die kommissie kan ook ontwikkelinge in inligtingstegnologie wat verbruikersprivaatheid bevorder, monitor. Die enigste probleem met hierdie modelle blyk te wees dat die agenstkap en die kommissie geen gesag het om te verseker dat beginsels en kodes van goeie gedrag afgedwing word nie. Industrie self-regulering, tesame met 'n mate van owerheidsbeheer en die implementering van inligtingstegnologie blyk nuttig te wees om voldoende vlakke van verbruikers-privaatheid en data beskerming te verseker. Dié kombinasie kan moontlik 'n balans vind tussen Suid Afrikaanse verbruikers se behoefte aan privaatheid en Suid Afrikaanse bemarkers se behoefte aan verbruikersinligting.
Papoutsi, Chrysanthi. "Reconfiguring privacy and confidentiality practices : a case study of technological integration in HIV health services". Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:265ff900-72cd-4ec7-bc95-8717d9640240.
Testo completoSeveri, Claudia. "Privacy e protezione dei dati personali: il nuovo regolamento europeo e best practices per un sito web". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Cerca il testo completoBrown, Shonda Dellena. "An Information Privacy Examination of the Practices of Pharmaceutical Companies Regarding Use of Information Collected Through Their Websites". NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/47.
Testo completoRao, Ashwini [Verfasser], Jürgen [Akademischer Betreuer] Pfeffer, Jürgen [Gutachter] Pfeffer e Simon [Gutachter] Hegelich. "Assessing the Impact of Data Practices on User Privacy / Ashwini Rao ; Gutachter: Jürgen Pfeffer, Simon Hegelich ; Betreuer: Jürgen Pfeffer". München : Universitätsbibliothek der TU München, 2018. http://d-nb.info/1171988052/34.
Testo completoStauber, Sebastian. "Compliance issues within Europe's General Data Protection Regulation in the context of information security and privacy governance in Swedish corporations : A mixed methods study of compliance practices towards GDPR readiness". Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-39809.
Testo completoWiratmojo, Yoseph Bambang [Verfasser], e Uwe [Akademischer Betreuer] Hasebrink. "Indonesian Adolescents' Digital Literacy, Privacy Practices on Social Network Sites (SNSs), and Bullying Experiences in Cyberspace / Yoseph Bambang Wiratmojo ; Betreuer: Uwe Hasebrink". Hamburg : Staats- und Universitätsbibliothek Hamburg, 2020. http://d-nb.info/1212180917/34.
Testo completoSpinks, Karolyn Annette. "The impact of the introduction of a pilot electronic health record system on general practioners' work practices in the Illawarra". Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060712.153053/index.html.
Testo completoHarvey, Brett D. "A code of practice for practitioners in private healthcare: a privacy perspective". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/521.
Testo completoSudas, Ilknur. "An Inquiry On Bourgeois Conception Of Social Housing Program For Working-class: Karl Marx Hof In Vienna". Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613898/index.pdf.
Testo completoAtaei, Mehrnaz. "Location data privacy : principles to practice". Doctoral thesis, Universitat Jaume I, 2018. http://hdl.handle.net/10803/666740.
Testo completoLocation data is essential to the provision of relevant and tailored information in location-based services (LBS) but has the potential to reveal sensitive information about users. Unwanted disclosure of location data is associated with various threats known as dataveillance which can lead to risks like loss of control, (continuous) monitoring, identification, and social profiling. Striking a balance between providing a service based on the user’s location while protecting their (location) privacy is thus a key challenge in this area. Although many solutions have been developed to mitigate the data privacy-related threats, the aspects involving users (i.e. User Interfaces (UI)) and the way in which location data management can affects (location) data privacy have not received much attention in the literature. This thesis develops and evaluates approaches to facilitate the design and development of privacy-aware LBS. This work has explicitly focused on three areas: location data management in LBS, the design of UI for LBS, and compliance with (location) data privacy regulation. To address location data management, this thesis proposes modifications to LBS architectures and introduces the concept of temporal and spatial ephemerality as an alternative way to manage location privacy. The modifications include adding two components to the LBS architecture: one component dedicated to the management of decisions regarding collected location data such as applying restriction on the time that the service provider stores the data; and one component for adjusting location data privacy settings for the users of LBS. This thesis then develops a set of UI controls for fine-grained management of location privacy settings based on privacy theory (Westin), privacy by design principles and general UI design principles. Finally, this thesis brings forth a set of guidelines for the design and development of privacy-aware LBS through the analysis of the General Data Protection Regulation (GDPR) and expert recommendations. Service providers, designers, and developers of LBS can benefit from the contributions of this work as the proposed architecture and UI model can help them to recognise and address privacy issues during the LBS development process. The developed guidelines, on the other hand, can be helpful when developers and designers face difficulties understanding (location) data privacy-related regulations. The guidelines include both a list of legal requirements derived from GDPR’s text and expert suggestions for developers and designers of LBS in the process of complying with data privacy regulation.
Leon-Najera, Pedro Giovanni. "Privacy Notice and Choice in Practice". Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/477.
Testo completoWeinert, Christian [Verfasser], Thomas [Akademischer Betreuer] Schneider e Benny [Akademischer Betreuer] Pinkas. "Practical Private Set Intersection Protocols for Privacy-Preserving Applications / Christian Weinert ; Thomas Schneider, Benny Pinkas". Darmstadt : Universitäts- und Landesbibliothek, 2021. http://d-nb.info/1240834098/34.
Testo completoGhadafi, Essam. "Practical privacy-preserving cryptographic protocols". Thesis, University of Bristol, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.555615.
Testo completoChen, Zhuo. "Towards practical location systems with privacy protection". HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/218.
Testo completoParris, Iain. "Practical privacy and security for opportunistic networks". Thesis, University of St Andrews, 2014. http://hdl.handle.net/10023/5357.
Testo completoClarke, Roger Anthony, e Roger Clarke@xamax com au. "Data Surveillance: Theory, Practice & Policy". The Australian National University. Faculty of Engineering and Information Technology, 1997. http://thesis.anu.edu.au./public/adt-ANU20031112.124602.
Testo completoRadics, Peter Jozsef. "A Novel Approach to Modeling Contextual Privacy Preference and Practice". Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/73046.
Testo completoPh. D.
Falkner, Jeannie. "A study to investigate counselor financial wellness as a predictor of counselor money practices among counseling professionals in private practice /". Full text available from ProQuest UM Digital Dissertations, 2006. http://0-proquest.umi.com.umiss.lib.olemiss.edu/pqdweb?index=0&did=1260798781&SrchMode=1&sid=6&Fmt=2&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1193424725&clientId=22256.
Testo completoAbdel, Malik Philip. "Multidimensional epidemiological transformations : addressing location-privacy in public health practice". Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/901.
Testo completoJoseph, Karen T. "Vaccination in a Private Pediatric Practice". Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/iph_theses/214.
Testo completoDaniel, Marguerite. "Private practice in counselling and psychotherapy". Thesis, University of Manchester, 2004. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.504822.
Testo completoClark, Spencer R. "Health Care Reform's Effect on Private Medical Practices". Scholarship @ Claremont, 2011. http://scholarship.claremont.edu/cmc_theses/209.
Testo completoBagcioglu, C. "Shared governance practices in Turkish private (foundation) universities". Thesis, University of Liverpool, 2017. http://livrepository.liverpool.ac.uk/3007612/.
Testo completoOlds, David A. "Food defense management practices in private country clubs". Diss., Kansas State University, 2010. http://hdl.handle.net/2097/6651.
Testo completoDepartment of Hospitality Management and Dietetics
Carol W. Shanklin
The purpose of this study was to survey country club professionals’ importance perceptions of food defense and the frequency with which preventive practices were implemented in their clubs to prevent bioterrorism. Gaps between importance perceptions and practice frequency were compared with concern of food terrorism and practice frequency implementation. Perceived self-efficacy measures and perceived barriers were compared with motivations to develop a food defense management plan and practice frequency implementation. Importance perceptions and practice frequencies were studied to ascertain if there were differences among operational factors. Club professionals with smaller gaps implemented preventive practices more frequently. Club professionals with higher self-efficacy levels were more motivated to develop food defense management plans and implemented preventive practices more frequently. Club professionals with higher barriers were less motivated to develop food defense management plans and implemented preventive practices less frequently. The field study component investigated food security practices in private country clubs. Club manager interviews and observations of operational practices were conducted. Most club managers stated that they did not think their clubs were at risk of a bioterrorist attack. Cost and lack of need were identified as barriers towards implementing a food defense management plan. Club employees were perceived to be more likely to initiate a bioterrorism attack than non-employees. Background checks and good employment practices were perceived as effective in increasing food security in clubs. Most clubs did not monitor arrivals and over half did not secure their chemicals. Based on the results of the field study, the researcher recommended several actions that could improve food security in country clubs including installing video surveillance and developing disaster management plans that include food defense. Recommendations for future research included continued examination of club managers’ self-efficacy perceptions towards biosecurity and identifying barriers to food defense implementation in other retail foodservice segments.
Popa, Raluca Ada. "Provable and practical location privacy for vehicular and mobile systems". Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61569.
Testo completoCataloged from PDF version of thesis.
Includes bibliographical references (p. 87-91).
In recent years, there has been a rapid evolution of location-based vehicular and mobile services (e.g., electronic tolling, congestion pricing, traffic statistics, insurance pricing, location-based social applications), which promise tremendous benefits to users. Unfortunately, most such systems pose a serious threat to the location privacy of users because they track each individual's path. A question that arises naturally is how can we preserve location privacy of users while maintaining the benefits of such services? In this thesis, we address this question by tackling two general problems that are the foundation of many of the aforementioned services. The first problem is how to enable an untrusted server to compute agreed-upon functions on a specific user's path without learning the user's path. We address this problem in a system called VPriv. VPriv supports a variety of applications including electronic tolling, congestion pricing, insurance premium computation, and some kinds of social applications. The second problem is how to enable an untrusted server to compute aggregate statistics over all users' paths without learning any specific user's path. We tackle this problem in a system called PrivStats. With PrivStats, one can compute statistics such as traffic statistics (e.g., average speed at an intersection, average delay on a road, number of drivers at a location) or average ratings of a location in a social application. The computation and threat models for VPriv and PrivStats are different, and required markedly different solutions. For both systems, we provide formal definitions of location privacy and prove that our protocols achieve these definitions. We implemented and evaluated both systems, and concluded that they are practical on commodity hardware and smartphones.
by Raluca Ada Popa.
M.Eng.
Verst, Amy L. "Outstanding Teachers and Learner-Centered Teaching Practices at a Private Liberal Arts Institution". Diss., The University of Arizona, 2010. http://hdl.handle.net/10150/195054.
Testo completoErvik, Sara. "Privacy by Design applied in Practice and the Consequences for System Developers". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-251672.
Testo completoAnvändares integritet har blivit allt viktigare i takt med att mer data hanteras, inklusive känslig personlig information. Organisationer är skyldiga att ta ansvar för sina användares integritet. Det är obligatoriskt enligt lag för organisationer att hantera personlig information i enlighet med kraven definierade i direktivet Allmän Dataskyddsförordning eller General Data Protection Regulation(GDPR) på engelska. Men det kvarstår en klyfta mellan de juridiska kraven och tekniska lösningar. Inbyggd integritet eller Privacy by Design(PbD) på engelska består av principer för att utforma system med hänsyn till integritet, men metoden saknar konkreta implementationer. Denna studie undersöker hur PbD kan appliceras i ett system och hur det påverkar systemutvecklingen. Studien använder Colesky, Hoepman och Hillens tillvägagångssätt för att applicera PbD i praktiken. Med denna metod utvecklades en modell av ett system som tar hänsyn till användarnas integritet likväl systemutvecklarnas behov och systemkrav. Utvärderingen visade att systemutvecklarna var positiva till den föreslagna systemmodellen implementerad med PbD. Systemutvecklarna estimerade att den föreslagna systemmodellen skulle medföra en lätt minskning i produktiviteten men förmodade att de positiva effekterna av inbyggd integritet skulle väga upp nackdelarna.
Engstrom, Craig L. "Shadowing practices: Ethnographic accounts of private eyes as entrepreneurs". OpenSIUC, 2010. https://opensiuc.lib.siu.edu/dissertations/136.
Testo completoDemmler, Daniel [Verfasser], Thomas [Akademischer Betreuer] Schneider e Amir [Akademischer Betreuer] Herzberg. "Towards Practical Privacy-Preserving Protocols / Daniel Demmler ; Thomas Schneider, Amir Herzberg". Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2019. http://d-nb.info/1189816504/34.
Testo completoRajpurkar, Ninad. "Identifying best practices in public-private partnerships in renewable energy". Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/98995.
Testo completoCataloged from PDF version of thesis.
Includes bibliographical references (pages 70-76).
Public-Private Partnerships (PPP) have emerged as a means to develop physical and social infrastructure assets in developing countries. PPPs enable governments to attract private sector investment in public infrastructure services, which would supplement public resources or release them for other public needs. They also allow governments to utilize the efficiency and expertise of the private sector in providing public services which have been traditionally delivered by the public sector. There has been an increased focus on developing alternatives to fossil fuels in recent times for sustainable development, which has put the spotlight on renewable energy sources. Renewable energy sources have largely been developed in the advanced economies, with emerging markets lagging behind. A possible reason could be that despite the rapid reduction in the cost of generating renewable energy in the past few years, the cost is still higher compared to the cost of conventional energy sources such as coal and natural gas. Increased private sector participation in the sector through the PPP mode may help to improve technologies and reduce costs in emerging markets, as has been the case in many developed countries. The aim of this thesis is to study some of the successful PPPs implemented in the renewable energy sector in emerging markets and identify best practices that have contributed to the success of these arrangements. These findings can be used as leamings for similar renewable energy programs in developing countries worldwide. Keywords: public-private partnerships, PPP, renewable energy, emerging markets, developing countries, South Africa, India, public policy, REIPPP, Charanka solar park, Gujarat, solar energy, solar parks, rooftop solar.
by .Ninad Rajpurkar
S.M. in Management Research
Saganha, João Pedro de Sousa Pinto. "Empathy and burnout in private practice Physical Therapists". Dissertação, Faculdade de Medicina da Universidade do Porto, 2011. http://hdl.handle.net/10216/60814.
Testo completoSaganha, João Pedro de Sousa Pinto. "Empathy and burnout in private practice Physical Therapists". Master's thesis, Faculdade de Medicina da Universidade do Porto, 2011. http://hdl.handle.net/10216/60814.
Testo completoLee, Kum-Yu Enid. "Privacy and security of an intelligent office form". Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9930.
Testo completoSilva, Nadja Rodrigues da. "Alfabetizar e avaliar: caminhos, descobertas e dificuldades para uma reflexão". Pontifícia Universidade Católica de São Paulo, 2015. https://tede2.pucsp.br/handle/handle/10253.
Testo completoThis study investigated the practices of literary and evaluation from the first two years of the elementary school level I teachers. The intent is to reveal how these practices are established in the classroom context, in order to evaluate the children passing through the literacy process. The research is developed in a qualitative perspective using as methodological procedures a semi-structured interview, a questionnaire, and observations in the classroom. The subjects of the research consisted of three female teachers that act in the early years of the elementary school level I in a private school of the São Paulo city. From the qualitative approach, the participant observation was the main strategy used in order to collect the data, which included recordings of situations experienced by the teachers and the schoolchildren. The descriptions arise from the literacy and evaluation events observed and from the interviews with the teachers, which consisted of speaking, reading, and writing skills. To discuss the literacy theme, we used the psychogenesis studies of Ferreiro and Telberosky (1999), and Soares (2003) as references. The theme evaluation was discussed using the works of Hoffmann (2009) and Luckesi (2011). Based on data analysis, the study evinced that the literacy and evaluations conceptions existent in the teachers practices resulted from different didactics pedagogical approaches
O presente estudo investigou as práticas de alfabetização e avaliação de professoras dos dois primeiros anos do ensino fundamental I. A pesquisa se desenvolveu numa perspectiva qualitativa e os procedimentos metodológicos foram entrevista semiestruturada, questionário e observação de aula, com registros de situações vivenciadas entre professoras e alunos. Os sujeitos da pesquisa são três professoras que atuavam nos primeiros anos do ensino fundamental I, em escola privada do município de São Paulo. No que se refere à alfabetização, tomamos como referência os estudos da psicogênese de Ferreiro e Teberosky (1999) e Soares (2013) e, para a avaliação as discussões apontadas por Hoffmann (2009) e Luckesi (2011). A partir das análises dos dados, o estudo evidenciou que as práticas de alfabetização e avaliação analisadas são decorrentes da apropriação e articulação de diferentes abordagens didático-pedagógicas
Silva, Ana Claudia Vieira. "Os discursos construÃdos em torno das prÃticas de responsabilidade social nas InstituiÃÃes de Ensino Superior Privadas". Universidade Federal do CearÃ, 2013. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=12047.
Testo completoO MinistÃrio de EducaÃÃo - MEC incluiu, em 2005, a responsabilidade social (RS) das instituiÃÃes de ensino superior â IES, como item de avaliaÃÃo. Trata-se de um conceito sinonÃmico, que se define por esta expressÃo e diversos outros termos correlatos. Em termos objetivos, foram analisados os discursos em torno dos projetos de responsabilidade social das IES, no que se refere Ãs formas de apropriaÃÃo e interpretaÃÃo das determinaÃÃes do MEC para este fim. Segundo o MEC (2010) os projetos de responsabilidade social devem discutir/intervir na: promoÃÃo da equidade social, na preservaÃÃo do meio ambiente e numa sÃrie de outras temÃticas. A pesquisa a foi realizada a partir de entrevistas semiestruturadas, observaÃÃo direta e anÃlise documental, perfazendo 12 instituiÃÃes de ensino superior privadas. Foram pontuados quatro lugares de fala: das coordenaÃÃes, das direÃÃes, do material publicitÃrio e dos projetos sociais formalizados. Uma caracterÃstica comum aos projetos e aÃÃes sociais privadas das propostas interventivas que foram pesquisadas, à que a necessidade objetiva de desenvolver os projetos sociais, nÃo pode ser entendida como uma escolha de participaÃÃo polÃtica, de transformaÃÃo das questÃes sociais que nos afligem, à uma atitude necessÃria, como prÃtica profissional, o mercado impÃe e o MEC regulamenta. Portanto, à uma determinaÃÃo que exige um cumprimento das regras e as IES nÃo tÃm o menor constrangimento de assumir que, enquanto cumprem determinaÃÃes legais ou prÃticas laborais, desenvolvem projetos sociais e nÃo ao contrÃrio. Nessa relaÃÃo entre os atores que se constituem como interventores e beneficiados, se desenvolve uma solidariedade verticalizada e contrassensual (ZALUAR, 2001), em que os discursos de libertaÃÃo sÃo ao mesmo tempo de discriminaÃÃo (MARTINS, 2008). A estigmatizaÃÃo, no sentido de Goffman (1982), dà o tom das escolhas e da percepÃÃo do outro nessas propostas de ajustamento social por meio de aÃÃes solidÃrias, apesar das boas prÃticas e do comprometimento dos sujeitos envolvidos nos projetos. Nesse sentido, os projetos e aÃÃes sociais se caracterizam por sua âfunÃÃo de redentoresâ quando as IES tomam para si o papel de salvar o mundo, mas nÃo reconhecem as singularidades e potencialidades das comunidades em que atuam, desse modo, colocam os indivÃduos numa condiÃÃo de nÃo aceitaÃÃo social plena, de inabilitado ou de carente.
The Ministry of Education - MEC included, in 2005, the social responsibility (SR) of higher education institutions - HEI, as an appraisal item. It is a synonymic concept, which is defined by this expression and several other related terms. In objective terms, the discourse about social responsibility projects of HEIs were analyzed, in relation to forms of appropriation and interpretation of the MEC determinations for this purpose. According to the MEC (2011) the social responsibility projects should discuss / act on: promoting social equity, preservation of the environment and a range of other issues. The survey was conducted from semi-structured interviews, direct observation and document analysis, comprising 12 private higher education institutions. Four places speech were scored: coordinations, the directions, advertising material and social projects formalized. A common feature of social projects and actions of private interventional proposals that were surveyed is that the objective necessity to develop social projects can not be understood as a choice of political participation, transformation of the social issues that plague us; it is an attitude required, as a profession, the market requires and regulates MEC. Therefore, it is a determination that requires compliance with the rules and HEIs do not have the slightest embarrassment to assume that while they comply with legal requirements or labor practices, they develop social projects and not otherwise. In this relationship between the actors formed as intervenors and benefited develops a vertical and contrasensual solidarity (ZALUAR, 2001), in which the discourses of liberation happen concomitantly with discrimination (Martins, 2008). Stigmatization, to Goffman (1982), sets the tone of the choices and the perception of the other proposals in these social adjustment through solidarity actions, despite the good practices and the commitment of those involved in the projects. In this matter, social projects and actions are characterized by their "redemptive function" when HEIs take upon themselves the role of saving the world, but do not recognize the uniqueness and potential of the communities in which they operate, thereby, placing individuals in the condition that the society does not accept them fully, the disqualified or needy conditions.
Ligier, Damien. "Functional encryption applied to privacy-preserving classification : practical use, performances and security". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0040/document.
Testo completoMachine Learning (ML) algorithms have proven themselves very powerful. Especially classification, enabling to efficiently identify information in large datasets. However, it raises concerns about the privacy of this data. Therefore, it brought to the forefront the challenge of designing machine learning algorithms able to preserve confidentiality.This thesis proposes a way to combine some cryptographic systems with classification algorithms to achieve privacy preserving classifier. The cryptographic system family in question is the functional encryption one. It is a generalization of the traditional public key encryption in which decryption keys are associated with a function. We did some experimentations on that combination on realistic scenario using the MNIST dataset of handwritten digit images. Our system is able in this use case to know which digit is written in an encrypted digit image. We also study its security in this real life scenario. It raises concerns about uses of functional encryption schemes in general and not just in our use case. We then introduce a way to balance in our construction efficiency of the classification and the risks
Harris, Sharon Eileen Jellings. "Start-Up Private Practice Business Plan for Advance Practice Nurse Practitioner in Northeast Iowa". Thesis, Montana State University, 2005. http://etd.lib.montana.edu/etd/2005/harris/HarrisS1205.pdf.
Testo completoYun, Catherine (Catherine T. ). "Splinter : practical private queries on public data". Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/113458.
Testo completoThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 39-43).
Every day, millions of people rely on third party services like Google Maps to navigate from A to B. With existing technology, each query provides Google and their affiliates with a track record of where they've been and where they're going. In this thesis, I design, engineer, and implement a solution that offers absolute privacy when making routing queries, through the application of the Function Secret Sharing (FSS) cryptographic primitive. I worked on a library in Golang that applied an optimized FSS protocol, and exposed an API to generate and evaluate different kinds of queries. I then built a system with servers that handle queries to the database, and clients that generate queries. I used DIMACS maps data and the Transit Node Routing (TNR) algorithm to obtain graph data hosted by the servers. Finally, I evaluated the performance of my system for practicality, and compared it to existing private map routing systems.
by Catherine Yun.
M. Eng.
Wong, Chiew Kung. "Privacy : the parameters for broadcasters and their implications for journalistic practice in New Zealand". Thesis, University of Canterbury. School of Political Science and Mass Communication, 2004. http://hdl.handle.net/10092/1767.
Testo completoAkbari, Koochaksaraee Amir. "End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice". Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39310.
Testo completoFällman, Karin. "Aspects of precommercial thinning : private forest owners' attitudes and alternative practices /". Umeå : Dept. of Silviculture, Swedish University of Agricultural Sciences, 2005. http://epsilon.slu.se/200590.pdf.
Testo completoBudhiraj, Karn, e la Torre Castro Gabriel De. "Suggested strategies and best practices in private supply chain disaster response". Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/60832.
Testo completoVitae. Cataloged from student submitted PDF version of thesis.
Includes bibliographical references (p. 85-89).
In times of disaster, demand for goods and services in affected areas spikes. Private companies generally have contingencies in place for business continuity; however, most lack a strategic approach to join the general population's relief efforts. Why are some companies more effective within disaster relief supply chains than others? How can a company approach this area of opportunity? This thesis explores what a disaster is and how disaster management works; recognizing what stakeholders participate during disaster recovery efforts; and extrapolating best practices applied during past disasters by companies that have been deemed successful. Based on the strategies identified during our research, we came up with a framework of nine best practices and suggest how to apply it across a range of ten industries.
by Karn Budhiraj and Gabriel de la Torre Castro.
M.Eng.in Logistics
Emenhiser, Nicholas Ian. "Best Practices in Public-Private Partnership Strategies for Transit-Oriented Development". The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1462966898.
Testo completo