Добірка наукової літератури з теми "Confidentialité des clients"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Confidentialité des clients".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Confidentialité des clients"
Brasel, Kelsey R., and Brian E. Daugherty. "Cook and Thomas, LLC: Balancing Auditor Liability, Client Confidentiality, and the Public Interest." Issues in Accounting Education 32, no. 1 (October 1, 2015): 17–32. http://dx.doi.org/10.2308/iace-51318.
Повний текст джерелаP., Usha Rani S., Rashmi Kundapur, Anusha Rashmi, and Harsha Acharya. "Client Satisfaction among the clients attending tertiary care centers in Mangalore, South India." Journal of Health and Allied Sciences NU 07, no. 03 (September 2017): 003–6. http://dx.doi.org/10.1055/s-0040-1708716.
Повний текст джерелаEzhova, E. V. "SOME PROBLEMS OF ENSURING THE PROTECTION OF ATTORNEY-CLIENT PRIVILEGE IN THE CRIMINAL PROCESS OF RUSSIA AND BELARUS." Juvenis scientia, no. 9 (September 30, 2018): 41–43. http://dx.doi.org/10.32415/jscientia.2018.09.08.
Повний текст джерелаUys, Leana R. "Confidentiality and HIV/AIDS in South Africa." Nursing Ethics 7, no. 2 (March 2000): 158–66. http://dx.doi.org/10.1177/096973300000700209.
Повний текст джерелаBingulac, Nenad, and Dragan Miljenović. "Lawyer confidentiality." Pravo - teorija i praksa 38, no. 3 (2021): 42–52. http://dx.doi.org/10.5937/ptp2103042b.
Повний текст джерелаGrimley-Baker, Kathy. "Ethical Implications of Mandatory Reporting of Intimate Partner Violence." Creative Nursing 20, no. 4 (2014): 254–57. http://dx.doi.org/10.1891/1078-4535.20.4.254.
Повний текст джерелаHamon, Jessie K., Jenna Hoyt, Shari Krishnaratne, Ariko Angela Barbra, Job Morukileng, Nathaly Spilotros, Miriam Mbembe, Seth Marcus, and Jayne Webster. "Perceptions of quality and the integrated delivery of family planning with childhood immunisation services in Kenya and Uganda." PLOS ONE 17, no. 6 (June 6, 2022): e0269690. http://dx.doi.org/10.1371/journal.pone.0269690.
Повний текст джерелаZaidi, Syeda Masooma. "Innovative Commercial and Private Genetic Testing Raises Privacy and Confidentiality Concerns." Sciential - McMaster Undergraduate Science Journal, no. 1 (November 25, 2018): 31–33. http://dx.doi.org/10.15173/sciential.v1i1.1902.
Повний текст джерелаOrdway, Ann M., and Arielle F. Casasnovas. "A Subpoena: The Other Exception to Confidentiality." Family Journal 27, no. 4 (August 21, 2019): 352–58. http://dx.doi.org/10.1177/1066480719868701.
Повний текст джерелаNishkala, H. M., S. H. Anu, D. A. Bindushree, and S. L. Manoj. "Data Partitioning and Reduplication for Providing Integrity to Data in the Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 4070–74. http://dx.doi.org/10.1166/jctn.2020.9021.
Повний текст джерелаДисертації з теми "Confidentialité des clients"
Sarkar, Mainak. "Three essays on artificial intelligence models for customer relationship management." Thesis, Cergy-Pontoise, Ecole supérieure des sciences économiques et commerciales, 2022. http://www.theses.fr/2022ESEC0002.
Повний текст джерелаThe dissertation consists of three essays on “Artificial Intelligence Models for Customer Relationship Management”. In particular, the essays are built on novel deep learning algorithms known as long-short term memory (LSTM) neural networks. The first essay shows that LSTM neural networks, which rely exclusively on raw data as input, can replace feature-engineering based models for predicting customer behavior in the direct marketing context. In the second essay, I develop a dual-LSTM neural networks model for customer lifetime value (CLV) predictions that incorporates the firm’s adaptive policy as well as captures latent attrition. I show that integrating the firm’s adaptive marketing policy into customer valuation models leads to diverging paths of future profitability, highlighting bimodalities and modes at the tail of the CLV distribution. The presence of bimodalities and modes at the tail captured by my model has implications for a deeper understanding of customer potential (i.e., best-case scenario vs. traditional CLV expectation) and for fine-tuning customer prioritization. In the third essay, I leverage the ability of LSTM neural networks’ memory states to summarize useful information from the past transaction data to develop a novel approach that addresses customer privacy concerns in customer relationship management (CRM)
Barquissau, Eric. "L’évaluation de la qualité de la relation client en ligne par les utilisateurs d’espaces clients de sites web : une application dans le secteur bancaire et dans le secteur de la téléphonie mobile." Thesis, Paris 10, 2013. http://www.theses.fr/2013PA100205.
Повний текст джерелаThe Internet has dramatically changed the way companies interact with their customers. Because of the importance of e-customer relationship management, companies have to reconsider their strategies in terms of relationship marketing. The purpose of this research is to investigate the way users of personal websites’ accounts evaluate e-relationship quality within two sectors: the banking sector and the mobile phone sector. This research deals with an important concept: appropriation.A qualitative study has been conducted in order to build a research model and to create a measurement scale to study the appropriation of a personal websites’ account. Therefore, an online survey (N=534) was conducted to test the hypothesis. The findings suggest that the appropriation of a personal websites’ account is a mediating variable between perceived ease of use, perceived usability and relationship quality, both in the banking sector and in the mobile phone sector. In the same way, privacy has a positive influence on e-relationship quality. Moreover, perceived interactivity has a positive influence on e-relationship quality, but that particular hypothesis is partially validated. Finally, social presence does not have a positive influence on e-relationship quality
Gonzalez, Laura. "The effects of confidentiality on the working alliance /." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79771.
Повний текст джерелаHenziger, Eric. "The Cost of Confidentiality in Cloud Storage." Thesis, Linköpings universitet, Databas och informationsteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148907.
Повний текст джерелаCanillas, Rémi. "Privacy and Security in a B2B environment : Focus on Supplier Impersonation Fraud Detection using Data Analysis." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI118.
Повний текст джерелаSupplier Impersonation Fraud (SIF) is a kind of fraud occuring in a Business-To-Business context (B2B), where a fraudster impersonates a supplier in order to trigger an illegitimate payment from a company. Most of the exisiting systems focus solely on a single, "intra-company" approach in order to detect such kind of fraud. However, the companies are part of an ecosystem where multiple agents interacts, and such interaction hav yet to be integrated as a part of the existing detection techniques. In this thesis we propose to use state-of-the-art techniques in Machine Learning in order to build a detection system for such frauds, based on the elaboration of a model using historical transactions from both the targeted companies and the relevant other companies in the ecosystem (contextual data). We perform detection of anomalous transactions when significant change in the payment behavior of a company is detected. Two ML-based systems are proposed in this work: ProbaSIF and GraphSIF. ProbaSIF uses a probabilistic approach (urn model) in order to asert the probability of occurrence of the account used in the transaction in order to assert its legitimacy. We use this approach to assert the differences yielded by the integration of contextual data to the analysis. GraphSIF uses a graph-based approach to model the interaction between client and supplier companies as graphs, and then uses these graph as training data in a Self-Organizing Map-Clustering model. The distance between a new transaction and the center of the cluster is used to detect changes in the behavior of a client company. These two systems are compared with a real-life fraud detection system in order to assert their performance
Berry-Harris, Traci Aaron. "Examining therapists' perceptions of confidentiality across various therapeutic environments, professional organizations, and client development (an exploratory study) /." Morgantown, W. Va. : [West Virginia University Libraries], 2007. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4982.
Повний текст джерелаTitle from document title page. Document formatted into pages; contains vi, 149 p. Includes abstract. Includes bibliographical references (p. 117-125).
Veeder, Stacy B. "Confidentiality expectations and willingness to disclose personal information to a health-care provider." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Повний текст джерелаDowman, Nadia. "Reporting obligations: A challenge for South African lawyers." University of Western Cape, 2019. http://hdl.handle.net/11394/7574.
Повний текст джерела“Threats to the independence of the legal profession have become a preoccupation for bar leaders, regulators and academics, driven by the dual pressures of globalization and the changing business structure of the profession.”1 Money laundering is a transnational economic crime that has plagued the world economy for many decades. It is a crime that eluded the attention of most world leaders. Hence, it is this elusiveness and this non-interest in money-laundering as a serious economic crime, that afforded many individuals such as former dictators and military leaders in developing countries the chance to avoid prosecution for depleting the economic resources of their particular state.2
Holmberg, Daniel, and Victor Nyberg. "Functional and Security Testing of a Mobile Client-Server Application." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148710.
Повний текст джерелаAndersson, Frida. "Lojalitetsplikt i uthyrningsbranschen : - En uppsats om lojalitetsförhållandet mellan kundföretag och inhyrd arbetskraft." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-33654.
Повний текст джерелаFöretag har under senare delen av 1900-talet gått från traditionell varuproduktion till att allt mer bygga sin verksamhet på information och kunskap. Den tekniska utvecklingen har gjort det lättare att överföra och sprida kunskap i samhället vilket ökar sårbarheten hos företagen. Icke- traditionella anställningar såsom tidsbegränsade anställningar och inhyrd arbetskraft ökar och företag har en högre personalomsättning nu än tidigare. Fler personer får tillgång till företagsspecifik information och spridning av den skulle kunna skada arbetsgivaren. I min uppsats undersöker jag skyddet av hemlig information för arbetsgivare som hyr in arbetskraft från ett personaluthyrningsföretag. Skydd för hemlig information ingår i den så kallade lojalitetsplikten i form av tystnadsplikt, skydd för företagshemlighet och konkurrensklausuler. Lojalitetplikt föreligger i anställningsavtalet mellan uthyrd arbetstagare och uthyrningsföretaget men arbetstagarens arbetsprestation utförs hos kunden. Kan regleringar kring lojalitetsplikt tillämpas på förhållandet mellan kund och inhyrd arbetstagare? Vad blir konsekvenserna av de regler som finns idag? Uppsatsen är skriven med juridisk metod som har sin utgångspunkt i rättskälleläran samt med rättssociologisk angreppssätt. Andra delar av lojalitetsplikt såsom upplysningsskyldighet, bisysslor eller kritikrätt behandlas inte i uppsatsen, ej heller lojalitetsplikt för arbetsgivaren. Slutsatsen är att uthyrningsföretaget står för den uthyrde arbetstagarens handlingar mot kundföretaget eftersom det föreligger lojalitetsförpliktelser i uthyrningsavtalet mellan kund och uthyrare. Uthyraren står för exempelvis skadestånd om en arbetstagare röjer eller utnyttjar en företagshemlighet hos kunden. Vissa regleringar ger uttryck för att det föreligger lojalitetsplikt mellan kund och inhyrd arbetstagare. Exempelvis är den uthyrda arbetstagaren bunden av tystnadsplikt vad det gäller förhållanden hos kunden. I ett förslag från regeringen på kommande ändringar i lagstiftningen kommer den inhyrde arbetstagaren bli direkt skadeståndsansvarig vid röjande eller utnyttjande av företagshemlighet hos kunden. I uthyrningsbranschen finns dubbelt så stor andel utlandsfödda arbetstagare som på arbetsmarknaden generellt. På grund av hur regleringen kring lojalitetsplikt ser ut idag kan den bidra till inlåsningseffekter för utlandsfödda arbetstagare som arbetar i uthyrningsbranschen. Skilda villkor för svensk- och utlandsfödda såsom statisk diskriminering på arbetsmarknaden gör att utlandsfödda arbetstagare löper större risk än svenskfödda arbetstagare att få stå utanför den traditionella arbetsmarknaden.
Книги з теми "Confidentialité des clients"
Carol, Gorenberg, and National Association of Social Workers, eds. Client confidentiality and privileged communications. 2nd ed. Washington, D.C: NASW Press, 2011.
Знайти повний текст джерелаClient incest and the lawyer's duty of confidentiality. [Chicago]: American Bar Association, 1985.
Знайти повний текст джерелаHorwitz, Kenneth M. The new cpa-client confidentiality privilege: Opportunity or risk? New York: Research Institute of America, 1999.
Знайти повний текст джерелаHorwitz, Kenneth M. The new cpa-client confidentiality privilege: Opportunity or risk? New York: Research Institute of America, 1999.
Знайти повний текст джерелаEvertsz, Jari. Therapist and client attitudes towards discrete areas of threat to therapeutic confidentiality. [Guildford]: [University of Surrey], 1990.
Знайти повний текст джерелаPattenden, Rosemary. The law of professional-client confidentiality: Regulating the disclosure of confidential personal information. Oxford: Oxford University Press, 2003.
Знайти повний текст джерелаLucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. Paris: E ditions Eyrolles, 2006.
Знайти повний текст джерелаVirginia. General Assembly. Secretary of Health and Human Resources. Report of the Secretary of Health and Human Resources on the impact of laws protecting client confidentiality on cooperative relationships of agencies working to address problems of children and families : to the Governor and the General Assembly of Virginia. Richmond: Commonwealth of Virginia, 1991.
Знайти повний текст джерелаGuidance, Institute of Careers, ed. Client confidentiality. Stourbridge: ICG, 2002.
Знайти повний текст джерелаPattenden, Rosemary, and Duncan Sheehan. Law of Professional-Client Confidentiality. Oxford University Press, 2016.
Знайти повний текст джерелаЧастини книг з теми "Confidentialité des clients"
Jenkins, Peter. "Client confidentiality and data protection." In The Handbook of Professional, Ethical and Research Practice for Psychologists, Counsellors, Psychotherapists and Psychiatrists, 53–64. 3rd edition. | Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429428838-5.
Повний текст джерелаRosenthal, Howard. "Beyond Confidentiality: Professional Counselors and Therapists Have a Duty to Warn." In Before You See Your First Client, 77–78. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003169048-32.
Повний текст джерелаCiriani, Valentina, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. "Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients." In Data and Applications Security XXIII, 225–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03007-9_15.
Повний текст джерелаThaman, Stephen C. "Confidentiality of Attorney-Client Communications in the United States." In Ius Comparatum - Global Studies in Comparative Law, 395–440. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43123-5_14.
Повний текст джерелаThaman, Stephen C., and Lorena Bachmaier. "Attorney-Client Confidentiality as a Fair Trial Right in Criminal Proceedings." In Ius Comparatum - Global Studies in Comparative Law, 589–610. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48675-4_21.
Повний текст джерелаBarret, Bob, Karen Strohm Kitchener, and Scott Burris. "Suicide and confidentiality: With the client with advanced AIDS: The case of Phil." In Ethics in HIV-related psychotherapy: Clinical decision making in complex cases., 299–314. Washington: American Psychological Association, 2001. http://dx.doi.org/10.1037/10399-016.
Повний текст джерелаSasakura, Hiroki. "The Continuing Evolution of Right to Counsel and Confidentiality of Attorney-Client Communications in Japan." In Ius Comparatum - Global Studies in Comparative Law, 177–204. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43123-5_7.
Повний текст джерелаBarnett, Jeffrey E., and Jeffrey Zimmerman. "It Is Best to Provide Minimal Information When a Referral Source Requests Information About a Client." In If You Build It They Will Come, edited by Jeffrey E. Barnett and Jeffrey Zimmerman, 123–27. Oxford University Press, 2019. http://dx.doi.org/10.1093/med-psych/9780190900762.003.0022.
Повний текст джерелаAbadi, Aydin. "Smarter Data Availability Checks in the Cloud." In Handbook of Research on Digital Transformation, Industry Use Cases, and the Impact of Disruptive Technologies, 320–39. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-7712-7.ch017.
Повний текст джерела"Confidentiality and Disclosure." In Financial Abuse of Older Clients: Law, Practice and Prevention. Bloomsbury Professional, 2017. http://dx.doi.org/10.5040/9781784515522.chapter-08d.
Повний текст джерелаТези доповідей конференцій з теми "Confidentialité des clients"
Nikeshin, Alexei Viacheslavovich, and Victor Zinovievich Shnitman. "TLS 1.3 Clients Testing." In 24th Scientific Conference “Scientific Services & Internet – 2022”. Keldysh Institute of Applied Mathematics, 2022. http://dx.doi.org/10.20948/abrau-2022-9.
Повний текст джерелаHenziger, Eric, and Niklas Carlsson. "The Overhead of Confidentiality and Client-side Encryption in Cloud Storage Systems." In UCC '19: IEEE/ACM 12th International Conference on Utility and Cloud Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3344341.3368808.
Повний текст джерелаArslan, Çetin, and Didar Özdemir. "The Protection of Confidential Business Information by Criminal Law." In International Conference on Eurasian Economies. Eurasian Economists Association, 2017. http://dx.doi.org/10.36880/c08.01824.
Повний текст джерелаMurtala, M. M., and Olumide Babatope Longe. "Data Security in Decentralized Cloud Systems: A Case for the Deployment of Blockchain Technology." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p13.
Повний текст джерелаDeakin, Barry. "Model Tests in Support of the Design of a 50 Meter Barque." In SNAME 13th Chesapeake Sailing Yacht Symposium. SNAME, 1997. http://dx.doi.org/10.5957/csys-1997-005.
Повний текст джерелаPytlar, Theodore S. "Status of Existing Biomass Gasification and Pyrolysis Facilities in North America." In 18th Annual North American Waste-to-Energy Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/nawtec18-3521.
Повний текст джерелаЗвіти організацій з теми "Confidentialité des clients"
Studsrød, Ingunn, Ragnhild Gjerstad Sørensen, Brita Gjerstad, Patrycja Sosnowska-Buxton, and Kathrine Skoland. “It’s very complex”: Professionals’ work with domestic violence (DV): Report – FGI and interviews 2022. University of Stavanger, November 2022. http://dx.doi.org/10.31265/usps.249.
Повний текст джерела