Letteratura scientifica selezionata sul tema "Vie privée via le numérique"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Vie privée via le numérique".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Vie privée via le numérique":
Kessous, Emmanuel, e Bénédicte Rey. "Économie numérique et vie privée". Hermès 53, n. 1 (2009): 49. http://dx.doi.org/10.4267/2042/31475.
Liscouët, Maurice. "La vie privée à l’ère du numérique". Terminal, n. 112 (1 gennaio 2013): 144–45. http://dx.doi.org/10.4000/terminal.603.
Valjavec, Emmanuel. "Internet, un nouvel espace de liberté sous surveillance". Études Tome 418, n. 3 (1 marzo 2013): 317–27. http://dx.doi.org/10.3917/etu.4183.0317.
Portes, Audrey, Gilles N’Goala e Anne-Sophie Cases. "La transparence numérique : dimensions, antécédents et conséquences sur la qualité des relations clients". Recherche et Applications en Marketing (French Edition) 35, n. 4 (18 agosto 2020): 73–102. http://dx.doi.org/10.1177/0767370120935734.
Goepfert, Eva-Marie. "L’évènementialisation de la vie privée des acteurs politiques en contexte numérique". Sciences de la société, n. 102 (31 dicembre 2017): 17–30. http://dx.doi.org/10.4000/sds.6820.
Gusev, Alexander, Arnaud Leconte e Simone Lucatello. "Green Digital Transition and Data Governance". L'Europe en Formation 396, n. 1 (13 novembre 2023): 59–83. http://dx.doi.org/10.3917/eufor.396.0059.
Rey, Bénédicte. "La vie privée au travail. Retour sur la place du privé en contexte hiérarchique à l’ère du numérique". Les cahiers du numérique 9, n. 2 (30 giugno 2013): 105–36. http://dx.doi.org/10.3166/lcn.9.2.105-136.
Scaillerez, Arnaud, e Diane-Gabrielle Tremblay. "Numérique, télétravail, développement des territoires ruraux. Analyse et résultats des politiques publiques québécoises". Économie et Solidarités 44, n. 1-2 (20 ottobre 2017): 103–21. http://dx.doi.org/10.7202/1041607ar.
Legros, Pierre. "L’impératif de sécurité des données de santé, de la nécessité technique à l’obligation juridique". Revue internationale de droit économique XXXVI, n. 3 (21 aprile 2023): 13–37. http://dx.doi.org/10.3917/ride.363.0013.
Warusfel, Bertrand. "Le droit peut-il encore protéger le secret ?" Titre VII N° 10, n. 1 (24 agosto 2023): 1–10. http://dx.doi.org/10.3917/tvii.010.0001.
Tesi sul tema "Vie privée via le numérique":
Alamelou, Quentin. "Protocoles cryptographiques pour l’authentification numérique et le respect de la vie privée". Thesis, Limoges, 2017. http://www.theses.fr/2017LIMO0042/document.
Internet constant growth has naturally led to cryptographic issues such as authentication and privacy concerns. The common usage of connected devices (smartphones, tablet, watch, …) as authentication means made us consider cryptographic keys generations and/or managements from such devices to address aforementioned needs. For such a purpose, we identified fuzzy extractors and group signature schemes. On the one hand, this thesis then presents the first reusable fuzzy extractor based on set difference metric (in the nonprogrammable random oracle). In so doing, we were able to design a key generation module performing authentication from users’ devices. On the other hand, we came up with two group signature schemes, respectively based on Hamming and rank metrics, that seriously compete with post-quantum concurrent schemes based on lattices
Savoie, Patrick. "Une criminologie pragmatique de la vie privée : articulations d'hybrides dans un espace numérique relationnel". Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38244.
Rey, Bénédicte. "La privacy à l'ère du numérique : une gestion par les tensions". Paris 5, 2009. http://www.theses.fr/2009PA05H063.
The massive diffusion of information technology and of the Internet, of the mobile phone and of other communicating technologies produce lots of digital traces which keep the memory of people's acts. Some see in these changes the opportunity to increase security, Customer relationship management or comfort in everyday life. But some other fear the advent of a surveillance society in which privacy would erode. We examine here what privacy in the digital age means, and how the technological changes, but also services and uses changes unhinge the traditional privacy acceptation based on norms. Privacy problems predate the digital era. But somme changes nowadays harden privacy problems and call into question the way these problems are responded to. The wide scope of digital information and its accessibility affects privacy risks, which become difficult to pre-empt. Crises analysis shows that privacy reflexion shall from now on go in for complementary ways that should be easygoing for people to use them
Vincent, Johann. "Identité numérique en contexte Télécom". Phd thesis, Université de Caen, 2013. http://tel.archives-ouvertes.fr/tel-01007682.
Hasan, Omar. "Privacy preserving reputation systems for decentralized environments". Lyon, INSA, 2010. http://theses.insa-lyon.fr/publication/2010ISAL0066/these.pdf.
Il a été observé que les utilisateurs d'un système de réputation hésitent souvent à fournir un feedback négatif en raison de la crainte de représailles. Une solution à ce problème est la mise en œuvre de systèmes de réputation préservant la vie privée i. E. , calculant la réputation de telle sorte que le feedback individuel de chaque utilisateur ne soit pas révélé. Dans cette thèse, nous présentons des protocoles de réputation préservant la vie privée qui sont décentralisés, ne nécessitent pas de plates-formes spécialisées ni de tiers de confiance, qui protègent la vie privée sous une gamme de modèles de sécurité (" semi-honest ", " non-disruptive malicious ", " disruptive malicious ") et sont plus efficaces que les protocoles comparables (le protocole le plus coûteux nécessite O(n) + O(log N) messages, où n est le nombre d'utilisateurs qui fournissent un feedback et N est le nombre total d'utilisateurs). Les techniques que nous utilisons comprennent la trust awareness, la perturbation des données, le partage de secret, les techniques de calcul sécurisé multi-parties, les cryptosystèmes additifs homomorphiques, et les preuves de " zéro-connaissance ". Enfin, nous examinons certains problèmes liés aux techniques de recommandation et de propagation de la confiance. Nous proposons une solution au problème de la subjectivité intrinsèque à la notion de confiance. Les résultats expérimentaux obtenus confirment la pertinence de la stratégie proposée
Balgobin, Yann. "Contribution à l'économie de la vie privée et des données financières". Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0038.
This thesis investigates the economic consequences of consumers’ control over the level of personal information they are willing to share with firms. This subject is vital for the digital economy as many firms collect and use information about consumers to increase their revenues. Firms may face greater difficulty to generate profit from personal data. Firstly, because consumers are increasingly concerned about their privacy. Secondly, because more and more privacy-enhancing technologies (PETs) become available. We find in the thesis that the use of PETs could positively influence consumers’ willingness to share personal information, enabling a data collection that takes privacy concerns into account. We make similar conclusions in the case of financial information. Developing the use of non-bank payment instruments (and thus allowing consumers to hide some information to banks) could benefit e-commerce, leading consumers to buy more online. Finally, in a context where consumers are concerned with their privacy, banks may benefit from making screening less intrusive, as it would improve their lending strategy
Aguilar, Melchor Carlos. "Les communications anonymes à faible latence". Toulouse, INSA, 2006. http://www.theses.fr/2006ISAT0021.
In this thesis, we present different systems providing low-latency anonymous communications. We first study the performance of systems based on well known primitives such as superposed sending and encrypted padding for transmission, and broadcast with implicit addressing for reception, when the group of potential users is restricted to be small, closed, or localized. We propose the usage of Private Information Retrieval (PIR) protocols as an alternative to broadcast with implicit addressing, and we study the resulting systems. These systems allow us to trade communication cost, for computational cost. Through some examples, we show that the new solutions offer a better choice in some situations, specially when the users are connected to the service through the Internet. Then, we put forward how the different approaches are related, and show that the systems based on classic primitives are in fact just some instances of a family, which becomes much larger and versatile through the introduction of PIR protocols
Fragoso, Rodriguez Uciel. "Modèle de respect de la vie privée dans une architecture d'identité fédérée". Phd thesis, Institut National des Télécommunications, 2009. http://tel.archives-ouvertes.fr/tel-00541850.
Payraudeau, Christel. "La protection du droit au respect de la vie privée par le Conseil constitutionnel à l’épreuve du numérique". Thesis, Corte, 2022. http://www.theses.fr/2022CORT0006.
The constitutionalisation of the right to privacy has progressively found its place, but with the advent of digital technology, new issues have emerged. Our society has undergone major changes over the last few decades, and even though modern technologies are very attractive due to their undeniable efficiency, they are evolving very fast and the law can thus only intervene too late.In this context and with regard to the supremacy of digital technology, we must question the reality of individual freedoms and fundamental rights. Privacy is shaken up by new practices. These issues are inescapable whatever the global challenges be they security, economic or political ones. It is necessary to analyse how the constitutional Council positions itself in order to better identify its limits. In our digital age, how can the much needed protection of the constitutional Council appear as inadequate as regards the right to privacy ?The purpose of this thesis is to demonstrate that in an ever-evolving technological world, the three themes studied here are inextricably linked: the right to privacy, as with individual freedoms which prevail, digital technology which makes itself indispensable and the constitutional court to guarantee the proper functioning and the management of these notions which could easily become antagonistic. We will identify the constitutional objectives which can be opposed to the right to privacy as well as the guarantees which determine the conciliation of this right with legislative objectives. In our study, we will consider that privacy in the digital virtual world has two sides that the constitutional Council is attempting to guarantee: on the one hand, protecting our relationship with others and on the other hand protecting the individual.It is important to remain critical of the use made of our personal data. With digital technology, the protection of privacy must unquestionably be analysed beyond our national borders. To analyse the dangers which threatens it, it is interesting to look at the study of the constitutional Council decisions in order to be able to compare case law and French legislation to those of other countries. Digital tools, due to their possible impacts on many aspects of our lives, considerably reduce spatial and temporal boundaries, which increasingly appear as obsolete. The digital network can virtually connect people all over the world. Therefore, constitutional protection is today part of a very different context insofar as exercising our freedoms and rights, such as privacy, inevitably has a supranational dimension
Pierre, Julien19. "Le cadre privatif : des données aux contextes : approche interdimensionnelle des enjeux de médiation de la vie privée". Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENL002.
We build an analysis of contemporary identity devices (including social network sites) on several levels: computer (conceptual model ending social representations and sociability), microsocial (negotiating subjective singularities and anchoring social norms), economics (hegemonic strategies and partnerships with cultural industries), socio-political (experimenting individual postures based on emotional experiences in a « private club model » and making it possible to engage in deliberative processes constituting common sense). To understand these issues, we have implemented an immersive and multi-situated methodology located in a population composed of contemporary subject's figures: young apprentices in the Tertiary, subject to complex constraints, and committed personal level, social and professional identity in various devices. It is clear from these analyzes several theoretical proposals, including the « privatory framework » presented as a set of identity constraints defined or negotiated by interactants and situating in Computer Science (engineering publicized privacy), the micro (mutual insight), economic (socioeconomic model of the « private club »), socio-political (anecdotical sphere) and methodological (immersion to users)
Libri sul tema "Vie privée via le numérique":
Levy, A. Sur les traces de Big Brother: La vie privée de l'ère numérique. Paris: Editeur, 2010.
Capitoli di libri sul tema "Vie privée via le numérique":
Constant, Patrick. "Modèles économiques des GAFAM et vie privée". In Santé, numérique et droit-s, 307–18. Presses de l’Université Toulouse 1 Capitole, 2018. http://dx.doi.org/10.4000/books.putc.4463.
MUSSON, Margot. "La vie privée des mineurs sur Internet". In Les jeunes face au numérique, 75–84. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.6059.
Shepherd, Tamara, e Leslie Regan Shade. "La vie privée des jeunes en ligne et les politiques publiques". In L'éducation aux médias à l'ère numérique, 191–207. Les Presses de l’Université de Montréal, 2016. http://dx.doi.org/10.1515/9782760636798-012.
Casilli, Antonio A. "Réinterroger les sciences sociales à l’heure du numérique sociabilité, vie privée et digital labor". In Sociétés en mouvement, sociologie en changement, 207–30. Presses de l'Université Laval, 2018. http://dx.doi.org/10.2307/j.ctv1g247p7.14.
Casilli, Antonio A. "Réinterroger les sciences sociales à l’heure du numérique sociabilité, vie privée et digital labor". In Sociétés en mouvement, sociologie en changement, 207–30. Les Presses de l’Université de Laval, 2018. http://dx.doi.org/10.1515/9782763729770-010.
ADENIYA, Jihane kèmi. "Le numérique à l’ère de la Covid-19 : quelles conséquences pour le monde du droit ?" In Les épidémies au prisme des SHS, 183–90. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.6004.
Kessous, Emmanuel, e Bénédicte Rey. "Économie de l’attention et vie privée". In Identités numériques, 171–86. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20409.
SEILER-JUILLERET, Hélène. "Les premières politiques numériques des maisons d’édition Armand Colin et La Découverte (1998-2005)". In Les maisons d’édition francophones au prisme de leurs archives, 185–202. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.6526.
HOUZEL, Guillaume. "L’usage des algorithmes dans les parcours studieux et professionnels". In Algorithmes et Société, 69–78. Editions des archives contemporaines, 2021. http://dx.doi.org/10.17184/eac.4554.
BOUCAUD, Pascale. "Protection de la liberté et de la fragilité de la personne face au robot". In Intelligence(s) artificielle(s) et Vulnérabilité(s) : kaléidoscope, 137–48. Editions des archives contemporaines, 2020. http://dx.doi.org/10.17184/eac.3642.
Atti di convegni sul tema "Vie privée via le numérique":
Baranes, M., e T. Fortin. "Planification et chirurgie guidée - Avis d’experts : Apports des nouvelles technologies en implantologie : de la planification à la réalisation de la prothèse provisoire immédiate". In 66ème Congrès de la SFCO. Les Ulis, France: EDP Sciences, 2020. http://dx.doi.org/10.1051/sfco/20206601011.
Rapporti di organizzazioni sul tema "Vie privée via le numérique":
Castets-Renard, Céline, Émilie Guiraud e Jacinthe Avril-Gagnon. Cadre juridique applicable à l’utilisation de la reconnaissance faciale par les forces de police dans l’espace public au Québec et au Canada Éléments de comparaison avec les États-Unis et l’Europe. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, settembre 2020. http://dx.doi.org/10.61737/tnps5755.
Jacob, Steve, e Sébastien Brousseau. L’IA dans le secteur public : cas d’utilisation et enjeux éthiques. Observatoire international sur les impacts sociétaux de l'IA et du numérique, maggio 2024. http://dx.doi.org/10.61737/fcxm4981.