Rozprawy doktorskie na temat „Gestion des identités numériques”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Gestion des identités numériques”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Ates, Mikaël. "Identités numériques : gestion inter-organisationnelle centrée sur l'utilisateur et respectueuse de la vie privée". Phd thesis, Université Jean Monnet - Saint-Etienne, 2009. http://tel.archives-ouvertes.fr/tel-00443910.
Pełny tekst źródłaMarillonnet, Paul. "La gestion des données personnelles par l'usager au sein des collectivités locales". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS011.
Pełny tekst źródłaThis Ph.D. addresses the user-centric management of Personally Identifiable Information (PII) within local collectivities. It has been realized as part of a CIFRE program between SAMOVAR and Entr’ouvert. There is a strong need to provide the users of the collectivities' online service with some PII management tools for respecting their privacy when submitting online requests to their collectivities. This need is also coupled with the challenges of free software (including open access to the code, and possibility to evaluate the software's security), which is part of Entr’ouvert’s philosophy. For illustration, a realistic use case is identified for the specific context of territorial collectivities and the public administration (TCPA). It enables to establish a list of useful functional requirements, and a set of users capabilities regarding the management of their own PII. The first contribution is about a technical comparative survey of academic and industrial solutions. This survey identifies thirteen solutions belonging to four different categories, and evaluates them according to eighteen functional criteria. Eventually, the survey provides per-category synthesis and identifies an optimal solution for our use case. The second contribution proposes a solution for supporting PII management, which respects the guidelines identified earlier as part of the survey's optimal solution. It also takes into consideration the PII retrieval from third-party sources. The solution, called the PII manager, operates thanks to its three main components: [i] the Source Backend (SB), [ii] the PII Query Interface (PQI) and [iii] the PII Management User Interface (PMUI). A detailed description of each of these three components is given in the manuscript. Additionally, the user-identifier mapping performed by the PQI is identified as a critical part of the solution. It requires security considerations, as failing to verify the consistency of this mapping can enable four types of attacks. The third contribution proposes an identity-matching solution to counteract the previously identified attacks. Indeed, there is a need to verify the validity of user identity information retrieved across several PII sources. This identity-matching solution requires to identify which components of the architecture is involved in that processing, the workflow across these components to support the full processing, and to perform a security analysis of the workflow that proves its strength against identified attempted attacks. The fourth contribution is the software validation of the proposed solutions through a proof of concept. The identity-matching solution is implemented thanks to the Django template filters and Entr’ouvert’s existing User-Relationship Management (URM) tool. The PII manager is also implemented as a new component to the existing software platform. Eventually, new perspectives are drawn. For instance, this research work could benefit from upcoming protocols such as the Grant Negotiation & Authorization Protocol (GNAP). Other new perspectives include the integration of the System for Cross-domain Identity Management (SCIM) into the platform and a larger-scale software validation
Masmoudi, Souha. "Malleable privacy-enhancing-technologies for privacy-preserving identity management systems". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS023.
Pełny tekst źródłaDigital identities are, nowadays, used at a large scale (i.e., in public services, social medias, at work, online shopping, etc.). This brings usability issues as users are constrained to deal with multiple identities and attributes for access control and data sharing objectives. In addition, security and privacy challenges have arisen as the interacting entities, those that issue, process and collect these identities can, due to their behavior or security deficiencies, lead to identity theft, massive data collection and tracking of users' behaviors on the Internet.This thesis aims at finding the best trade-off between security, privacy and usability for identity management systems, based on cryptographic primitives. The first two contributions focus on identity management for access control and consider real identities and attributes that contain personal (e.g., age) and sensitive (e.g., biometric traits) information.The first contribution proposes a user-centric and privacy-preserving identity management system in which users keep control over their attributes. A user, that receives attributes certified by an identity provider, is able to interact, in a pseudonymized manner, with a service provider and prove the authenticity of the provided attributes while ensuring that he discloses only the minimum number of attributes. This solution is based on a new malleable signature scheme that allows users to modify the certificate issued by the identity provider on his attributes in a restricted and controlled manner. It also preserves privacy by satisfying the unlinkability property between curious service providers that try to link different transactions to the same user.The second contribution presents a new biometric authentication scheme that offers robustness and privacy guarantees. Three steps are required. First, the user physically visits the identity provider that pushes an encrypted and certified biometric template onto his smartphone. Then he remotely enrolls at a service provider, in an anonymous manner. Finally, he authenticates offline to the service provider that captures a new biometric template in order to be locally verified via the smartphone. By relying on malleable signatures, the proposed solution prevents the use of fake biometric identities and guarantees the authentication soundness. Unlinkability and anonymity are also preserved.The third contribution provides a solution to meet the need of data sharing in an identity management system. In particular, it studies the management of users ephemeral attributes in the context of proximity tracing for e-healthcare systems. The proposed solution ensures data consistency and integrity and preserves the privacy of users who share their contact information with people in proximity. Alerts are issued to users who have been in contact with infected persons. The use of a hybrid architecture, which relies on a centralized server and decentralized proxies, allows to prevent malicious users from injecting false alerts, and to prevent the linkability of contact information to the same user and the re-identification of users involved in contact with an infected person
Abakar, Mahamat Ahmat. "Etude et mise en oeuvre d'une architecture pour l'authentification et la gestion de documents numériques certifiés : application dans le contexte des services en ligne pour le grand public". Phd thesis, Université Jean Monnet - Saint-Etienne, 2012. http://tel.archives-ouvertes.fr/tel-00975965.
Pełny tekst źródłaChanton, Olivier. "Stratégies de gestion des identités et influence sociale". Paris 10, 1999. http://www.theses.fr/1999PA100120.
Pełny tekst źródłaAissaoui, Mehrez Hassane. "Sécurité pour les réseaux du futur : gestion sécurisée des identités". Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066606.
Pełny tekst źródłaToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Aissaoui, Mehrez Hassane. "Sécurité pour les réseaux du futur : gestion sécurisée des identités". Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066606.
Pełny tekst źródłaToday, the Internet is changing radically our habits, especially with the massive influx of the nomadic techniques, the Internet of objects, the growing use of grid computing, wireless networks and the emergence of new approaches in recent years. In particular, the virtualization of the computing infrastructures, which allowed defining a new model called Cloud Computing, introducing an enough frank breakdown with the traditional models, can be perceived as a preparatory stage towards the Internet of future.The implementation of these approaches allows, in a different way : mutualization and organization of the computer system. It allows to dematerialize the physical infrastructures and to deport applications on distant containers. Therefore, the global architecture of Internet should be evolved. It will rely strongly on these new approaches and in particular, Cloud Computing and virtualization. However, no system is infallible especially if resources are distributed and mutualized. They raise a number of problems and involve directly security issues, which remain one of the main barriers to the adoption of these technologies.Like any new technology, Cloud Computing and virtualization create new risks, which come to graft to traditional threats of the outsourcing management of the privilege separation, the identity and accesses management, the robustness of the virtualization software, the virtual machine isolation, the personal data protection, reversibility, privacy... The traditional Internet architecture cannot provide the adequate solutions to the challenges raised by these new approaches: mobility, flexibility, security requirements, reliability and robustness. Thus, a research project (SecFuNet : Security For Future Networks) was validated by the European Commission, to provide some answers, to make a state of the art of these security mechanisms and a comprehensive study of orchestration and integration techniques based on protection components within overall security architecture
Soenen, Guillaume. "Identités organisationnelles et communautés de pratique : Le cas d'une société de conseil". Jouy-en Josas, HEC, 2006. http://www.theses.fr/2006EHEC0014.
Pełny tekst źródłaThis thesis deals with organizational learning, and more specifically with learning organizations. I mobilize the concept of organizational identity and focuses on a specific mode of organizing: intra-organizational communities of practice. First, I develop a model conceptualizing organizational identity as a system composed of five interacting facets. Second, I articulate a renewed definition of communities of practice as collective answers to prescription failures. A quantitative study of four communities of practice allows the establishment of a link between membership into a community and individuals' preference for certain sources of knowledge. This result confirms that communities of practice are more than a mere linguistic formula and are a distinct psycho-sociological reality. In a third phase, a comparative study is used to reveal the factors which contribute to this specific form of social network that can be defined as an “organizational mousse”
Sagastizábal, Claudia A. "Quelques méthodes numériques d'optimisation : Application en gestion de stocks". Paris 1, 1993. http://www.theses.fr/1993PA010067.
Pełny tekst źródłaRaad, Joe. "Gestion d'identité dans des graphes de connaissances". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLA028/document.
Pełny tekst źródłaIn the absence of a central naming authority on the Web of data, it is common for different knowledge graphs to refer to the same thing by different names (IRIs). Whenever multiple names are used to denote the same thing, owl:sameAs statements are needed in order to link the data and foster reuse. Such identity statements have strict logical semantics, indicating that every property asserted to one name, will also be inferred to the other, and vice versa. While such inferences can be extremely useful in enabling and enhancing knowledge-based systems such as search engines and recommendation systems, incorrect use of identity can have wide-ranging effects in a global knowledge space like the Web of data. With several studies showing that owl:sameAs is indeed misused for different reasons, a proper approach towards the handling of identity links is required in order to make the Web of data succeed as an integrated knowledge space. This thesis investigates the identity problem at hand, and provides different, yet complementary solutions. Firstly, it presents the largest dataset of identity statements that has been gathered from the LOD Cloud to date, and a web service from which the data and its equivalence closure can be queried. Such resource has both practical impacts (it helps data users and providers to find different names for the same entity), as well as analytical value (it reveals important aspects of the connectivity of the LOD Cloud). In addition, by relying on this collection of 558 million identity statements, we show how network metrics such as the community structure of the owl:sameAs graph can be used in order to detect possibly erroneous identity assertions. For this, we assign an error degree for each owl:sameAs based on the density of the community(ies) in which they occur, and their symmetrical characteristics. One benefit of this approach is that it does not rely on any additional knowledge. Finally, as a way to limit the excessive and incorrect use of owl:sameAs, we define a new relation for asserting the identity of two ontology instances in a specific context (a sub-ontology). This identity relation is accompanied with an approach for automatically detecting these links, with the ability of using certain expert constraints for filtering irrelevant contexts. As a first experiment, the detection and exploitation of the detected contextual identity links are conducted on two knowledge graphs for life sciences, constructed in a mutual effort with domain experts from the French National Institute of Agricultural Research (INRA)
Su, Ziyi. "Application de gestion des droits numériques au système d'information d'entreprise". Phd thesis, INSA de Lyon, 2012. http://tel.archives-ouvertes.fr/tel-00737777.
Pełny tekst źródłaPetiot, Guillaume. "Fusion d'informations symboliques et de données numériques pour la gestion des crues". Toulouse 3, 2005. http://www.theses.fr/2005TOU30291.
Pełny tekst źródłaGaliere, Sophia. "Travailler via des plateformes numériques : une approche en termes d'instruments de gestion". Thesis, Nantes, 2020. http://www.theses.fr/2020NANT3017.
Pełny tekst źródłaThe thesis addresses the issue of algorithmic management of on-location platform work. Rather than mere market intermediaries, we consider that platforms’ artifacts exert a structuring power on - yet self-employed - workers’ behavior. We utilize an analytical grid in terms of management instruments, drawing as much on the socio-cognitive perspective of management tools, Foucauldian dispositives and French ergonomics of the activity, to question the relationship between managerial structures and workers’ subjectivities. We will put into perspective the assumption that workers are passive and helpless victims of algorithmic control. Following a preliminary investigation aimed at establishing a typology of platforms based on their instrumentation, three case studies were conducted to explore the lived experience of algorithmic management. Our research underlies both the heterogeneity of algorithmic management and the fallible nature of the work rationalization project it supports. Still, worker compliance must also be understood as the result of adherence to management tools, perceived as vectors of a hyper-meritocratic ideal. Finally, we define characteristics of empowering platforms’ instrumentation, more respectful of the autonomy and development of workers
Zonou, Bienvenu. "Interactions entre problématiques foncières et identités socio-territoriales dans l'Ouest du Burkina Faso". Toulouse 2, 2008. https://tel.archives-ouvertes.fr/tel-01295009.
Pełny tekst źródłaThis paper shows what is now at stake for land management in the Burkina Faso. An extensive fieldwork allows us to suggest three ways to consider the land question, to prospect for giving security to the land. Three villages in western Burkina Faso have been analysed, chronologicaly, to show the progress changes and take into account the identity question. Indeed, the agro-ecological factors make western Burkina Faso a much appealing zone, at nation scale, for its agricultural potentialities. The growing migration phenomenon contributes to the rarefaction of available land. The growing appraisal of those territories, the evolution of production systems, land planning, popularization new techniques, commercial crops development; exchanges monetization have contributed to the land rarefaction. Interactions between migration, production system changes, new social and territorial identities lead to a much more complex land management system. The actors'strategies, in order to reach and appropriate land, is a vivid sign of the social and territorial reorganizations connected to the land rarefaction in these villages. Thus we ask questions about resource sustainable management and civil peace guaranty. From this set of information, our paper brings the local land management variety and peculiarity modes. The historical aspects, the local scale and an interdisciplinary approach are essential. The identity question constitutes a novel approach in this work and an interesting contribution to demography-land, production-land relationship. It shows the social dynamics at work beyond the triptych "man-space-resources"
Zelasco, José Francisco. "Gestion des données : contrôle de qualité des modèles numériques des bases de données géographiques". Thesis, Montpellier 2, 2010. http://www.theses.fr/2010MON20232.
Pełny tekst źródłaA Digital Surface Model (DSM) is a numerical surface model which is formed by a set of points, arranged as a grid, to study some physical surface, Digital Elevation Models (DEM), or other possible applications, such as a face, or some anatomical organ, etc. The study of the precision of these models, which is of particular interest for DEMs, has been the object of several studies in the last decades. The measurement of the precision of a DSM model, in relation to another model of the same physical surface, consists in estimating the expectancy of the squares of differences between pairs of points, called homologous points, one in each model which corresponds to the same feature of the physical surface. But these pairs are not easily discernable, the grids may not be coincident, and the differences between the homologous points, corresponding to benchmarks in the physical surface, might be subject to special conditions such as more careful measurements than on ordinary points, which imply a different precision. The generally used procedure to avoid these inconveniences has been to use the squares of vertical distances between the models, which only address the vertical component of the error, thus giving a biased estimate when the surface is not horizontal. The Perpendicular Distance Evaluation Method (PDEM) which avoids this bias, provides estimates for vertical and horizontal components of errors, and is thus a useful tool for detection of discrepancies in Digital Surface Models (DSM) like DEMs. The solution includes a special reference to the simplification which arises when the error does not vary in all horizontal directions. The PDEM is also assessed with DEM's obtained by means of the Interferometry SAR Technique
Sadok, Moufida. "Veille anticipative stratégique pour réduire le risque des agressions numériques". Grenoble 2, 2004. http://www.theses.fr/2004GRE21020.
Pełny tekst źródłaThis research work addresses the problem related to management in the digital era and show the need to consider risk, generated by the digital aggressions targeting the security of the information resources of a corporate which highly using the ICT, as a risk management rather then a technical risk. We have constructed and implemented a method, called MARRAN, for the analysis and the reduction of digital aggressions risk. This method aims to support the process of collective interpretation of information considered as a week signal type in order to reduce the reaction time against digital aggressions and even anticipate there occurrence. MARRAN is based on major actor, the mediator, who accomplishes a set of actions that aim to help the IRT (Incident Response Team) members to construct individual views, conciliate individual divergent views, and refine the needed reasoning. The mediator needs to have skills such as the credibility, which is based on experience and expertise and the well knowledge of the corporate, its objectives and the characteristics of its information system. We have validated MARRAN method based on real cases of digital aggressions and have specified its replication conditions. Also, we have evaluated MARRAN with experts in information security. MARRAN is supported by software that was developed to use various applications in internet technology and allowing mainly the construction of a knowledge base through the capitalization of the attack scenarios processed by the IRT members
Martínez, González María Mercedes. "Principes d'exploitation dynamique des relations inter-documents dans les bibliothèques électroniques : application au domaine juridique". Vandoeuvre-les-Nancy, INPL, 2001. http://docnum.univ-lorraine.fr/public/INPL_T_2001_MARTINEZ_GONZALEZ_M_M.pdf.
Pełny tekst źródłaDigital libraries's development is asking for including in these systems new services, able to complement those that can be considered "basic" digital libraries services. This thesis makes proposais that allow to improve the exploitation of semantic relationships between documents in digital libraries. Queries that express user's interest in relationships themselves are eased. Moreover, these relationships are exploited in order to allow the dynamic composition of new documents (for ex. , historical versions). The proposals made cover three aspects: normalising documents, modelling relationships and their exploiting, and, finally, the architectural propositions that allow to integrate new relationship-oriented functionalities in digital libraries. The convenience of the proposed solutions is shown on a prototype consisting in a legislative digital library
Corre, Gwenolé. "Gestion des unités de mémorisation pour la synthèse d'architecture". Phd thesis, Université de Bretagne Sud, 2005. http://tel.archives-ouvertes.fr/tel-00077288.
Pełny tekst źródłaMondou, Damien. "Gestion adaptative des contenus numériques : proposition d’un framework générique par apprentissage et re-scénarisation dynamique". Thesis, La Rochelle, 2019. http://www.theses.fr/2019LAROS029.
Pełny tekst źródłaThis thesis aims to propose an architecture that addresses the design, supervision, management and adaptation of an interactive experience. We therefore propose a complete framework to facilitate the modeling phase of an interactive system and guarantee sufficient flexibility to achieve the objectives of complexity, scalability, adaptability and improvement through automatic learning. For this purpose, the formal model, CIT, based on two layers of description was introduced. The dynamic supervision process consists in controlling the interactive experience with regard to the formal model, based on networks of timed input/output automata. Two softwares, CELTIC (Common Editor for Location Time Interaction and Content) and EDAIN (Execution Driver based on Artificial INtelligence), implementing the CIT model and the activity supervision engine respectively, were developed during this thesis
Peng, Hongxia. "Les enjeux de gestion des espaces numériques interstitiels à thématiques professionnelles : introduction à une approche systémique. Recherche exploratoire menée sur les espaces numériques spécialisés dans la gestion des ressources humaines de la fonction publique territoriale". Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020036.
Pełny tekst źródłaProfessional digital social networks, defined as interstitial professional digital spaces (IPDS) in this research, arouse, because of their emergent and ambivalent characteristics, empirical and academic questions. From an exploratory study conducted with an inductive and qualitative approach about the IPDS specified in the human resources management of the French public territorial sector, this research suggests, firstly, a systemic conceptualization in analysis of the IPDS’s functionaries, and second, an analysis of its management functionalities in the development of new HRM practices in this sector. Based on the autopoietic system theory of Niklas Luhmann (1928-1998), this research proposes a theoretical framework for analysis whereas the IPDS is a system with self-maintenance and a self-renewal process through communications between individuals who are both contributors and consumers, assembled by digital tools in interstitial spaces. The results stemming from the observation data show that, for HR professionals, IPDS are above all complementary professional tool with different features which can be illustrated as a public garden for broadening the mind, a window for observation, a mirror for self-examination, and a transmission belt for articulating HRM and IS. This work ends with reflection on the IPDS’s potentialities in a development of HR practices in the public territorial sector
Bostel, Nathalie. "Méthodes de simulation et d'optimisation appliquées à la gestion opérationnelle des chantiers de transbordement rapide". Châtenay-Malabry, Ecole centrale de Paris, 1996. http://www.theses.fr/1996ECAP0461.
Pełny tekst źródłaVeaudor, Manon. "Les « frontières » de l’ordre carcéral : Affectation, négociation des identités et surveillance en maison d’arrêt". Thesis, université Paris-Saclay, 2020. http://www.theses.fr/2020UPASU001.
Pełny tekst źródłaAbstract: This thesis deals with the practices of assigning detainees inside short-term prisons. Our findings are based on an ethnographic survey in men’s prisons. We examine the ways in which order is produced through observing prison warders’ practices – ways in which prisoners are classified, categorized, assigned and monitored. The analysis takes also into account the observed practices from the inmates’ perspective. By combining the study of the modes of identifying inmates with how the detention sectors are organized, this study wants to show that space management also shapes individual “careers” within the institution.To this end, it analyses the ways in which the prison order is produced in relation to its external environment, and in particular the prisoners’ territories of origin. Three approaches are put to the test: one focuses on the study of the arrivals’ quarters; another one revolves around the assignment practices as they are implemented and perceived; the third one eventually looks at the implementation of prison intelligence. These entry points make it possible to grasp the way in which prison practices and categories filter, i.e. select, information on the external environment of the institution but also on the trajectory of prisoners. The reconfiguration of surveillance practices in the light of contemporary reforms of penal confinement will therefore be examined from this perspective. The material used in this study is the result of a nine-month ethnographic survey in two short-term prisons in different French regions. It combines the observation of professional practices in detention and the role of professionals in assignment commissions. It is also based on semi-directive interviews conducted with detainees, supervisory and management staff
Paillot, Damien. "Gestion de données pour la visualisation de maquettes numériques en environnement virtuel immersif : application au design automobile". Phd thesis, Paris, ENSAM, 2004. http://pastel.archives-ouvertes.fr/pastel-00001563.
Pełny tekst źródłaSawadogo, Daouda. "Architectures logicielles et mécanismes pour la gestion adaptative et consolidée de ressources numériques dans une application interactive scénarisée". Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROS021/document.
Pełny tekst źródłaThe emergence of Information and Communication Technology (ICT) represents a real opportunity for spreading digital resources and knowledge for all. Many results have already been achieved through the study of digital computing environments. They primarily aim at facilitating the provision of digital content, supporting users by ensuring interaction means with the system, and validating the knowledge acquired. The broad and massive deployment of digital content management information systems has left its mark as first generation of digital document management tools. In this context, PhD thesis researches have been carried out in the laboratory L3i to enable these environments to manage interactivity with their users and adapt their performances to users’ profiles and usage contexts. Some results of these works have been implemented within the laboratory platform called POLARIS. This latter has created a climate that fosters the production of massive heterogeneous digital resources which their management (organization, selection, and use) raises new challenges. The main aim of the thesis is to propose solutions that enable users of interactive applications to manage their digital documents in such a way that they are not overwhelmed by the large amount of material they produce and use everyday. In other terms, to better manage these documents, we encapsulate them in complex structures named digital resources. That allows us to implement our adaptation mechanisms : to pre-select the most relevant digital resources to the user’s activities and adapt the selected digital resources to both user and activity characteristics.The contributions of our thesis can be described in four levels. First of all, we propose a data representation model that characterizes a user in a digital resources management system. Secondly, we propose algorithms and mechanisms to enable a user to select relevant digital resources when performing an activity. Selection mechanisms we proposed allow consolidated management of digital resources, since they take into account the consistency among the resources being used in a given activity to enable better use and maintain coherent execution of the activity. Thirdly, we propose a model for digital resources that adapts itself based on both user and activity characteristics. Finally, we propose a software architecture model for the design of an interactive application with adaptive execution centered on digital resource management. To experiment and validate our proposals, we developed a prototype of a platform for personalized and collaborative management of digital resources dedicated to researchers called PRISE (PeRsonal Interactive Research Smart Environment)
Wurm, Isabelle. "Le littoral dakarois : lieu de productions identitaires". Thesis, Sorbonne Paris Cité, 2016. http://www.theses.fr/2016USPCC268/document.
Pełny tekst źródłaWest Africa is marked by increasing urbanisation in its coastal areas, a phenomenon born out of the expansion of international trade in the colonial era. From this point onwards, we can note a likeness in the human activities that have an influence on coastal zones everywhere on the planet, although diverse responses to identical activities can also be observed. The subject of this thesis is the organisation of Dakar’s coastline, and it takes the interactions that go on between the city’s different stakeholders as its starting point, be they professionals of traditional fishing practices, local authorities active in the public sphere, technical and development experts, people who use the coastal area or residents. Pushes to impose ‘good governance’, the introduction of judicial frameworks that manage the appropriation and protection of coastal spaces and debates around local and participative control of such areas are developments that represent norms driven on a global scale which are then imposed on a local level. Such phenomena have tended to create a context of coastal management that is tenuous in Senegal. The field of study is built around several neighbourhoods that correspond to former Lebou villages, sites that belong above all to the custodians of local history and that are emblematic of the way the working classes have participated in the fabrication of African cities. The practices observed in these territories lead us into debates regarding indigenous sovereignty and ethnic identity. This piece of research includes a written thesis and a web documentary that together form a complete work
Husseini, Hassan Al. "Adaptation de la méthode de corrélation d'images numériques pour la gestion des discontinuités du milieu et de la transformation". Thesis, Poitiers, 2014. http://www.theses.fr/2014POIT2270/document.
Pełny tekst źródłaThe development of the digital image correlation method (DIC) for the management of discontinuities of the material and the transformation is discussed in this thesis. As we know, the framework for the use of the optical measurement methods i.e. of continuum mechanics requires a continuity of: i) domain and ii) transformation. To treat those discontinuities, we can consider a piecewise continuity (material and transformation). In the case of DIC method, this can be done by adapting locally the shape and size of the correlation subsets to the zone of interest and its kinematics. A novel way to do it, is by using masks: an object mask to process material discontinuities and a discontinuity mask to process transformation discontinuities. However before the implementation of masks in the correlation process, several experimental displacement tests on models reproducing the two types of discontinuity at small scale were performed. Those tests proved the influence of discontinuities on the degradation of the measurement accuracy by DIC. Then, tensile tests were conducted on a polycarbonate made specimen knowing a mode I opening or closing crack. After implementing masks in the correlation software Correla, the calculation of displacement and deformation fields was successfully performed on the surface of this specimen for all its edges, demonstrating the effectiveness of the adapted DIC
Chiche, Alice. "Théorie et algorithmes pour la résolution de problèmes numériques de grande taille : application à la gestion de production d’électricité". Paris 6, 2012. http://www.theses.fr/2012PA066166.
Pełny tekst źródłaThis manuscript deals with large-scale optimization problems, and more specifically with solvingthe electricity unit commitment problem arising at EDF. First, we focused on the augmented Lagrangian algorithm. The behavior of that algorithm on an infeasible convex quadratic optimization problem is analyzed. It is shown that the algorithm finds a point that satisfies the shifted constraints with the smallest possible shift in the sense of theEuclidean norm and that it minimizes the objective on the corresponding shifted constrained set. The convergence to such a point is realized at a global linear rate, which depends explicitely on theaugmentation parameter. This suggests us a rule for determining the augmentation parameter tocontrol the speed of convergence of the shifted constraint norm to zero. This rule has the advantage ofgenerating bounded augmentation parameters even when the problem is infeasible. As a by-product,the algorithm computes the smallest translation in the Euclidean norm that makes the constraintsfeasible. Furthermore, this work provides solution methods for stochastic optimization industrial problemsdecomposed on a scenario tree, based on the progressive hedging algorithm introduced by[Rockafellar et Wets, 1991]. We also focus on the convergence of that algorithm. On the one hand,we offer a counter-example showing that the algorithm could diverge if its augmentation parameter is iteratively updated. On the other hand, we show how to recover the multipliers associated with thenon-dualized constraints defined on the scenario tree from those associated with the corresponding constraints of the scenario subproblems. Their convergence is also analyzed for convex problems. The practical interest of theses solutions techniques is corroborated by numerical experimentsperformed on the electric production management problem. We apply the progressive hedging algorithmto a realistic industrial problem. More precisely, we solve the French medium-term electricityplanning problem that consists in minimizing the expected electricity production cost, consideringphysical constraints like the boundaries of 155 production units and the dynamic evolution of nuclearstocks, and imposing the equilibrium between production and demand. We also illustrate themultiplier convergence result on the problem that consists in determining the marginal cost of thesupply-demand equilibrium in the medium-term electricity planning at Électricité de France
Corsi, Marco. "Evaluation et optimisation de portefeuille dans un modèle de diffusion avec sauts en observations partielles : aspects théoriques et numériques". Paris 7, 2007. http://www.theses.fr/2007PA077038.
Pełny tekst źródłaThis thesis investigates some aspects of the portfolio optimization under incomplete observation. The work is organized in three parts that analyze the following topics: Part 1. Portfolio optimization under partial observation in a jump-diffusion model. Part 2 Indifference price under partial observations in a jump-diffusion model. Part 3 Numerical approximation by quantization of discrete time control problems under partial observations and applications in finance. In the first two parts we consider the case of continuous time observation while in the third one we analyze the case of discrete time observation
Laflaquière, Julien. "Conception de système à base de traces numériques dans les environnements informatiques documentaires". Troyes, 2009. http://www.theses.fr/2009TROY0025.
Pełny tekst źródłaThis thesis addresses the general topic of digital traces related to the achievement of user activity in a digital documentary space. This work is part of the modelised Trace Based Systems approach (mTBS). This work contributes to the approach by creating a specific digital trace modelization methodology. The mTBS approach aims to make some reusable digital traces in user activity context. In order to produce digital trace as qualitative activity representation, it proposes to use a trace model which predefine observed objects. The pro-posed methodology design is based firstly on theoretical foundations drawn from research domains involving human-computer activity modeling (CHI, KM, CSCW), and secondly based on an implementation work in two actual activities, on the one hand a collaborative elearning activity, one the other hand a activity of professionnal training content production. During this second applied research study, we developped a trace specific display tool. This tool has been used for support an experiment de-signed to assess the modeled traces potential as an activity reflectivity medium. Early results of this exploratory work in collective activity situations have led us to propose to extend the conceptual prime framework of the mBTS approach. We suggested the "conjoined trace" which means traces generated and used by groups of users. It offers new collaborative practice prospects extending the general problem of trace-based apporaches
Rakotoarivelo, Thierry. "Découverte et gestion distribuée de chemins alternatifs à contrainte de Qualité de Service dans l'internet". Toulouse, INPT, 2007. http://ethesis.inp-toulouse.fr/archive/00000429/.
Pełny tekst źródłaThis thesis shows that it is possible to provide Quality of Service to an overlay application by using alternate Internet paths resulting from the compositions of independent consecutive paths. This thesis also demonstrates that it is possible to discover, select and compose these independent paths in a distributed manner within an community comprising a limited large number of autonomous cooperating peers. Thus, the main contributions of this thesis are : 1) a comprehensive description and QoS characteristic analysis of these composite alternate paths, and 2) an original architecture, termed SPAD (Super-Peer based Alternate path Discovery), which allows the discovery and selection of these alternate paths in a distributed manner. SPAD is a fully distributed system with no single point of failure, which can be easily and incrementally deployed on the current Internet. It empowers the end-users at the edge of the network, allowing them to directly discover and utilize alternate paths
Gervais, Marc. "PERTINENCE D'UN MANUEL D'INSTRUCTIONS AU SEIN D'UNE STRATÉGIE DE GESTION DU RISQUE JURIDIQUE DÉCOULANT DE LA FOURNITURE DE DONNÉES GÉOGRAPHIQUES NUMÉRIQUES". Phd thesis, Université de Provence - Aix-Marseille I, 2003. http://tel.archives-ouvertes.fr/tel-00008877.
Pełny tekst źródłaForestier, Stéphane. "Gestion dynamique de la génération de puissance en hyperfréquence pour des modulations numériques : Applications à l'optimisation des performances d'un amplificateur millimétrique". Limoges, 2003. http://aurore.unilim.fr/theses/nxfile/default/0550ccba-ec85-4e00-a664-f090f687c9d2/blobholder:0/2003LIMO0019.pdf.
Pełny tekst źródłaMimeche, Wassim. "Les contributions des salariés aux médias sociaux dans le cadre de leur présence numérique et de celle de leur entreprise". Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTD026.
Pełny tekst źródłaThis work describes the logic and the processes of employees’contributions on social media in order to analyze the relationships and issues between their own numerical presence and that of their company. Our thesis is based on a multidisciplinary framework: we mobilized the the gift theory as well as the theories of social and symbolic capital in order to understand contribution logic, the notions of interaction order and contribution genres in order to understand the contribution process and, finally, the concepts of numerical presence and governmentality in order to address the contribution issues.Our research methodology adopts an interpretativist approach, based on three complementary studies: an exploratory study, six case studies and a Delphi study. The results show that employees’ contribution to social media is primarily based on a logic of legitimizing the "figure of the contributor", the contribution process materialized in a repertoire of "contributions genres" and that "digital traces" define the challenges of the numerical presence of employees and that of their company
Fragoso, Rodriguez Uciel. "Modèle de respect de la vie privée dans une architecture d'identité fédérée". Phd thesis, Institut National des Télécommunications, 2009. http://tel.archives-ouvertes.fr/tel-00541850.
Pełny tekst źródłaCapdevielle, Olivier. "Formulation d'objectifs de traitement d'images : une exploitation interactive d'un système de planification automatique de chaînes d'opérateurs". Toulouse 3, 1995. http://www.theses.fr/1995TOU30003.
Pełny tekst źródłaFaget, Zoé. "Un modèle pour la gestion des séquences temporelles synchronisées : Application aux données musicales symboliques". Phd thesis, Université Paris Dauphine - Paris IX, 2011. http://tel.archives-ouvertes.fr/tel-00676537.
Pełny tekst źródłaRuz, Sébastien. "Pour une sociologie des societes civiles immobilières : logiques patrimoniales, dynamiques familiales et professionnelles, identités socio-juridiques : le cas de la région lyonnaise (1978-1998)". Lyon 2, 2005. http://theses.univ-lyon2.fr/documents/lyon2/2005/ruz_s.
Pełny tekst źródłaSociété Civile Immobilière (SCI) is a French legal technique intended to purchase and manage different kinds of real estates. Since the beginning of the 1980’s this concept has been very successful. The béneficiaries range from individuals (with various degrees of wealth) to legal advisers, lawyers, chartered accountants and bankers in charge of theirs client’s investments. The first are referred to as “users”, whilst the latter ones are referred to as “inventors”. This phenomenon represents an important economic, legal, urban and social phenomenon which has not yet been analysed by social science specialists. Therefore the main challenge of this analysis is to convert a legal and financial topic to a sociological one. Our methodology is based upon the main economic, legal, scientific and technological sociologies. The shareholders in a SCI, i. E. Owners of an intangible estate investment, have a particular social-legal identity. They have a hybrid status, at the junction between the home owner and the investor. This positions them more or less consciously in the middle of a contemporary rationalisation process of investment and estate management practices. This system illustrates the growing business-awareness of the home owner. He is defined as a project manager, more or less innovative who evolves in an ever-changing environment and is capable of formulating various scenarios. He follows a career path. However he can be helped in defining his projects both on a strategic and tactical level by experts in property ownership. The use or even the over-use of this technique means there is an increasing diversification in the property ownership counselling jobs. These growing trends are occurring in a growing market and in an inter-professional system where material and intellectual issues rival with collaborations, co-operations and synergies. The hinges of a relationship with unite professionals and shareholders are, amongst others: interactivity, performance, trust and honesty. The diffusion of company information and its materialistic repercussions go through diverse and various socialising instances. SCI practices and techniques used lead towards a legal acculturation. Shareholders assimilate and juggle with SCI norms leading sometimes to confrontation with social, cultural, family, contractual, ethical or moral ones. Syncretism has been more or less successful. The second main objective of this analysis is to observe what place the law takes in an individual/collective system, i. E. To look at the inter-normalisation phenomenon. SCI rules can be considered as contractual rules which help build a dynamic collective action, or can feed the illusion. They can just easily structure or disorganise groups of shareholders
Ghufran, Mohammad. "Découverte et réconciliation de données numeriques relatives aux personnes pour la gestion des ressources humaines". Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLC062/document.
Pełny tekst źródłaFinding the appropriate individual to hire is a crucial part of any organization. With the number of applications increasing due to the introduction of online job portals, it is desired to automatically match applicants with job offers. Existing approaches that match applicants with job offers take resumes as they are and do not attempt to complete the information on a resume by looking for more information on the Internet. The objective of this thesis is to fill this gap by discovering online resources pertinent to an applicant. To this end, a novel method for extraction of key information from resumes is proposed. This is a challenging task since resumes can have diverse structures and formats, and the entities present within are ambiguous. Identification of Web results using the key information and their reconciliation is another challenge. We propose an algorithm to generate queries, and rank the results to obtain the most pertinent online resources. In addition, we specifically tackle reconciliation of social network profiles through a method that is able to identify profiles of individuals across different networks. Moreover, a method to resolve ambiguity in locations, or predict it when absent, is also presented. Experiments on real data sets are conducted for all the different algorithms proposed in this thesis and they show good results
Ilponse, Fabrice. "Analyse du bruit dû aux couplages capacitifs dans les circuits intégrés numériques fortement submicroniques". Paris 6, 2002. http://www.theses.fr/2002PA066417.
Pełny tekst źródłaDabbebi, Oussema. "Gestion des Risques dans les Infrastructures VoIP". Phd thesis, Université de Lorraine, 2013. http://tel.archives-ouvertes.fr/tel-00875141.
Pełny tekst źródłaChevalier, Cédric. "Conception et mise en œuvre d'outils efficaces pour le partitionnement et la distribution parallèles de problèmes numériques de très grande taille". Bordeaux 1, 2007. http://www.theses.fr/2007BOR13434.
Pełny tekst źródłaCouble, Yoann pierre. "Optimisation de la gestion des ressources voie retour". Thesis, Toulouse, INPT, 2018. http://www.theses.fr/2018INPT0058.
Pełny tekst źródłaOptimizing satellite links is a major challenge to increase satellite systems profitability. Increasing the frequency reuse is one of the most promising approaches. Reusing multiple times the same frequency enables to transmit more information on the same frequency, as long as the two or more signals do not generate too high mutual interferences. It is therefore of capital importance to control these interference impacts, be it through the use of frequency reuse scheme or through the use of advanced dynamic interference coordination techniques, where the user selection is done with the knowledge of interference levels
Spieth, Grégory. "Le rôle des flux numériques participatifs dans le management des communautés urbaines françaises : une analyse à travers la gestion du service des transports". Nice, 2010. http://www.theses.fr/2010NICE0036.
Pełny tekst źródłaThe desinstitutionalization movement of public administrations (marked by the 1982 law of decentralization) considerably modified French society. This new conception of the management of public actions put in practice by the French government tries to limit the economic inefficiency of administrations. In practice this new conception is a shift from effectiveness logic to an efficiency logic in addition with a consolidation of competences. Local authorities which are the first administrative and territorial level in France (cities) became major actors. Their importance is identified through their budget, their missions of public service and through their investments. With the modernization of juridical techniques and managing processes, representatives in cities began to wonder about the role of citizen (whom is a user, a taxpayer and a client at the same time) in the performance research of public management. This emerging phenomena which signs the institutionalization of the consultation of population on a local level, includes very different devices; their common goal is to associate ordinary citizens with the discussion of collective issues. . .
Gérard, Fabienne. "Environnements numériques et finalités de l'éducation : le web, un outil au service d'une gestion complexe des processus de l'enseignement-apprentissage des langues-cultures". Paris 3, 2006. http://www.theses.fr/2006PA030017.
Pełny tekst źródłaThe argument supported in this research is that the Web can support the goals of school education in the foreign language class, namely the development of both a social and an individual conscience of the child. Firstly, the analysis of the two dominating approaches in the history of second language research - one centered on " teaching ", one centered on " learning " - shows that the teaching paradigm follows a egalitarian logic (articulated by the principles of universality and rationality) whereas the learning paradigm follows a logic of freedom (dominated by the principles of plurality and relativity). Looking then at the Web's functionalities through the glass of the medias' usual roles in the foreign language classroom reveals a framework that suggests possibilities of coordinating the two logics. The conception, development and use of the French Cyberbooks, online textbooks for the study of French as a Foreign Language, are an attempt to articulate and put in place such coordination
Boubehrezh, Abbas. "Usages et pertinence d’une représentation volumique (3D) cadastrale dans un contexte de gestion municipale québécoise". Thesis, Université Laval, 2014. http://www.theses.ulaval.ca/2014/30135/30135.pdf.
Pełny tekst źródłaSeveral researches and organizations have demonstrated the role of 3D volumetric representation in cadastral systems. Nevertheless, only a few have examined the usefulness and applications of 3D cadastral representations in municipal management. Thereupon, the principal objective of this study is to better understand the current and anticipated needs for the applications of 3D cadastral representations in municipal management in case of super-imposed properties (where the 3rd geometric dimension is foreseen as appealing). The research specifically investigates the case of vertical cadaster as noted in Quebec’s cadastral system arranged by the Ministry of Natural Resources (MNR) of Quebec Province as well as its application in number of cities and municipalities across the province. This study presents the interests as well as the requirements based on an inquiry among several municipal partners. Moreover, a mechanism is proposed to automate, as much as possible, the procedure to reconstruct cadastral 3D models from the complementary plans (vertically super-imposed data) which exist in Quebec’s cadastral system. A user survey targeting the actual applications of cadastral maps of Quebec as well as the complementary plans of the vertical cadaster was carried out among the municipal authorities who are responsible for geomatics and land management across the province. Totally, 48 participants from 36 municipalities responded to the survey. This includes 21 cities (32 participants), fifteen regional county municipalities (fifteen participants), and one metropolitan community (one participant). The results show that 91% of the participating municipal actors use cadastral maps. In case of super-imposed properties, where vertical cadaster is available, 84% of the respondents effectively benefit from the complementary plans for regulating the respective professional activities. The respondents have confirmed a real need for volumetric cadastral representation as 81% of them would like to have such representation at their disposal. 3D cadastral models have been considered useful to enhance the principal usages of cadastral maps such as taxation, issuance of construction permits, and regional and urban planning. In terms of content, 85% of the respondents indicate that the capabilities to represent the official measures (i.e. length of limits and edges, area, and volume), to distinguish between private and common lots, and to provide the volumetric geometry of the lots are among the necessary requirements of volumetric cadastral representations. Finally, a two-step procedure (vector digitization followed by 3D modeling) is proposed to improve the automation of volumetric cadastral reconstruction from image-form complementary plans (stored in PDF files). This procedure has been tested on a three-story condominium and takes 64 interventions in 17 minutes to complete.
Affo, Mondukpé Ignacia Bénédicte. "Le capital social numérique, rôle de substitution ou de complémentarité? : les enjeux pour la gestion du stress chez les utilisateurs des réseaux sociaux numériques". Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0281/document.
Pełny tekst źródłaFormerly, the concept of social network was described as the formalization of regular interactions between individuals. However, contemporary literature presents a set of specific tools that plays a singular and considerable part in social relations: i.e., the digital social networks. Internet facilities and the access to multiple social resources and social support have triggered an advent of virtual networks and have reformed the composition of social capital. This dissertation proposes to analyze the effects of this new social capital on the employees’ wellbeing at work. More precisely, it shows how the new social capital resulting from the digital social networks could reduce employee’s work stress. The first model, of digital social capital, is based on the framework of Effort/Reward Imbalance by Siegrist (1996), and enabled us to measure the level of work stress among the users of digital social networks. The results reveal that the activity on the digital social networks demonstrated reduced stress among users. The second model, initially enabled us to analyze the effects of Networking and the Sociability of an employee on his/her job satisfaction. Then, we compared the effects of two forms of social support (i.e., one being a network’s member and other being an outsider) on stress. The results reveal that the effects of the digital social capital on the demonstration of stress depends on the low sociability of an individual. Therefore, digital social capital complements the classical social capital of an individual, in general, and is a substitute for an employee having low sociability
Affo, Mondukpé Ignacia Bénédicte. "Le capital social numérique, rôle de substitution ou de complémentarité? : les enjeux pour la gestion du stress chez les utilisateurs des réseaux sociaux numériques". Electronic Thesis or Diss., Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0281.
Pełny tekst źródłaFormerly, the concept of social network was described as the formalization of regular interactions between individuals. However, contemporary literature presents a set of specific tools that plays a singular and considerable part in social relations: i.e., the digital social networks. Internet facilities and the access to multiple social resources and social support have triggered an advent of virtual networks and have reformed the composition of social capital. This dissertation proposes to analyze the effects of this new social capital on the employees’ wellbeing at work. More precisely, it shows how the new social capital resulting from the digital social networks could reduce employee’s work stress. The first model, of digital social capital, is based on the framework of Effort/Reward Imbalance by Siegrist (1996), and enabled us to measure the level of work stress among the users of digital social networks. The results reveal that the activity on the digital social networks demonstrated reduced stress among users. The second model, initially enabled us to analyze the effects of Networking and the Sociability of an employee on his/her job satisfaction. Then, we compared the effects of two forms of social support (i.e., one being a network’s member and other being an outsider) on stress. The results reveal that the effects of the digital social capital on the demonstration of stress depends on the low sociability of an individual. Therefore, digital social capital complements the classical social capital of an individual, in general, and is a substitute for an employee having low sociability
Tatsos, Patrice. "Utilisation d’une ontologie différentielle pour l’élaboration de licences d’exploitation de contenus numériques : du formalisme à la transparence cognitive". Reims, 2007. http://theses.univ-reims.fr/exl-doc/GED00000732.pdf.
Pełny tekst źródłaDigital Rigths Management (DRM) systems appear quite recently. They aim to use the rights expression languages (REL) to express and manage the rights of use for exchanging contents. Each DRM has his own REL. Unfortunatly, those differents languages are not interoperables,that is to say that the rightholders have to express for one content a license for each device (each device has his own DRM : PCuse Windows DRM, mobiles use OMA DRM, Ipod use Apple DRM…). To help rihgtholders to express liceses only once, we use a differential ontology to define a REL with is generic. This ontology of licenses is then used to translate the licences expressed by our REL into RELs. This thesis deals about the way to use the ontolgy (wich is a formal object) to generate licenses. We start from a formal structure to define a dynamic dialog with users. Using the semantics, and the differential ontology principles of the ontology, we infor and lead the user, so he can express his licence and translate it into the REL chose
Larnac, Mireille. "Gestion de la Condition de Chemin dans la simulation symbolique". Phd thesis, Montpellier 2, 1992. http://tel.archives-ouvertes.fr/tel-00866197.
Pełny tekst źródłaAvier, Grégory. "Les émotions, "ce que nous faisons nous-mêmes de ce qu'elles ont fait de nous" : identités et nouvelles logiques d'action du manager public dans les collectivités territoriales". Electronic Thesis or Diss., Aix-Marseille, 2013. http://www.theses.fr/2013AIXM1126.
Pełny tekst źródłaAt a time in history when emotion wants to be an auxiliary driver in running local government, this research reverses the concept where snapshots and events are seen as ways of expressing and dealing with "fluid societies." Based on a critical, interdisciplinary and humanistic approach, it studies organisational behaviour in a social world seriously affected by a "managerialism" that is mutilating the history, culture, and identity of managers in local authorities. Reinstating the biographical approach as a strategy for getting to the core of reality, the research highlights a "psychological contract" based on a "stable equilibrium", the result of a "double biographical and relational transaction" which focusses on "the ethics of the common good", the midpoint between the ethics of conviction and responsibility. It then examines the working principles that are surfacing in local government today, where "the organisation's image" as a "mental prison" leads to behaviour ranging from defection to resistance