Дисертації з теми "Internet and terrorism – Canada"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Internet and terrorism – Canada".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Ducol, Benjamin. "Devenir jihadiste à l'ère numérique : une approche processuelle et situationnelle de l'engagement jihadiste au regard du Web." Doctoral thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/25744.
Повний текст джерелаDiab, Robert. "Terrorism and the administration of justice in Canada." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/32370.
Повний текст джерелаLaw, Peter A. Allard School of
Graduate
Kelly, Michael J. Carleton University Dissertation Political Science. "The media and terrorism; an examination of news coverage of Armenian terrorism in Canada." Ottawa, 1986.
Знайти повний текст джерелаAlgwaiz, Noura. "Modeling Internet Penetration in Canada." Thesis, University of Ottawa (Canada), 2010. http://hdl.handle.net/10393/28733.
Повний текст джерелаBanez, Justin D. "The internet and homegrown jihadist terrorism assessing U.S. detection techniques." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5027.
Повний текст джерелаThe idea of homegrown terrorism is not a new concept, especially considering the history of challenges faced by the United States and other Western countries. However, the current violent jihadist problem has overshadowed those past misfortunes in terms of its objective and volatility. What is emergent is the means by which the individuals involved in this movement reinforce or possibly operationalize their radicalized behavior. The Internet is often that vehicle. Efforts to reform U.S. intelligence have placed increasing value on open source information for threat assessments. Consequently, the open Internet has been targeted in search of radical actors, both foreign and homegrown. Some analysts contend that the availability of radical discourse on the Internet presents an opportunity for early identification by authorities. This thesis analyzes the value of open source exploitation of the Internet in the domestic counterterrorism role in relation to other detection techniques in order to extract best practices and lessons learned for improved intelligence and law enforcement activities.
Sampson, Kirk J. "Winning the battle of ideas through individual resiliency a multi-dimensional approach for countering radicalization in the homeland /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FSampson.pdf.
Повний текст джерелаThesis Advisor(s): Supinski, Stanley ; Strindberg, Anders. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Community Outreach, Counterradicalization, Counterterrorism, Deradicalization, Education, Extremism, Homeland Security, Internet, Media, Multi-Discipline, Multi-Dimensional, Radicalization, Resiliency, Terrorism. Includes bibliographical references (p. 123-143). Also available in print.
Wilson, II Samuel Forrest. "Terrorist Experts' Perceptions of how the Internet has Shaped International Terrorism." ScholarWorks, 2014. http://scholarworks.waldenu.edu/dissertations/110.
Повний текст джерелаReilly, Paul John. "Framing online communications of civil and uncivil groups in post-conflict Northern Ireland." Connect to e-thesis. Move to record for print version, 2008. http://theses.gla.ac.uk/131/.
Повний текст джерелаPh.D. thesis submitted to the Faculty of Law, Business and Social Sciences, Department of Politics, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
teBrake, Rebecca. "Campaigning online : the internet, elections and democracy in Canada." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/24891.
Повний текст джерелаCarpenter, Pauline. "Korean international graduate students in Canada: identity and internet use." Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=66863.
Повний текст джерелаLes étudiants internationaux d'Asie de l'Est se retrouvent souvent confrontés à de nombreux challenges quant il s'agit de s'identifier et de participer de manière active et égale aux autres étudiants au sein des communautés universitaires occidentals (Morita, 2004). Même si l'on sait que les étudiants internationaux dépendent souvent d'internet durant cette période cruciale (Yang, et al., 2004), la façon dont ils l'utilisent et l'influence que cela peut avoir sur leur identité reste un domaine largement peu connu. En utilisant des interviews semi structurés, cette étude phénoménologique explore les expériences de sept étudiants universitaires au Canada, leur utilisation d'internet et comment cette utilisation peut avoir une influence sur la construction de leur identité. Les résultats nous révèlent que ces étudiants se retrouvent fréquemment confrontés à des challenges identitaires et que l'utilisation d'internet à des fins de socialisation, d'amusement et d'information les aident dans les difficultés qu'ils rencontrent. L'utilisation d'internet peut à la fois affirmer leur identité ou alors être une source de contrainte suivant le degré de conscience et les raisons pour lesquelles ils se servent d'internet. La compréhension de ces processus décrits précédemment est non seulement utile pour les services aux étudiants au sein des Universités, mais également pour les étudiants eux-mêmes, puisqu'elle met en lumière différentes manières dont internet peut être utilisé afin de dépasser les difficultés que peuvent rencontrer les étudiants internationaux durant leur parcours universitaire.
Johnson, Ernest. "Privacy and Security Concerns Related to Internet Use in Canada." Thesis, Keele University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.489683.
Повний текст джерелаLeppington, Kristen Nicole. "Bill C-36: The Creation of Canada's 2001 Anti-Terrorism Act." Master's thesis, Université Laval, 2011. http://hdl.handle.net/20.500.11794/22916.
Повний текст джерелаThough the terrorist attacks of September 11th, 2001, took place on foreign soil, the Canadian government reacted to this event by proposing Bill C-36 (the Anti-terrorism Act), an omnibus bill outlining multiple changes to the existing Canadian Criminal Code and other acts. With an aim to better understand this anomaly of Canadian public policy in both its record speed (from 9/11 to its Royal Assent in 99 days) and its relation to a foreign catastrophe, this thesis seeks to explore both the internal and external factors that influenced the timing and the content of Bill C-36.
Leppington, Kristen Nicole. "Bill C-36 : The Creation of Canada's 2011 Anti-Terrorism Act." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28374/28374.pdf.
Повний текст джерелаThough the terrorist attacks of September 11th, 2001, took place on foreign soil, the Canadian government reacted to this event by proposing Bill C-36 (the Anti-terrorism Act), an omnibus bill outlining multiple changes to the existing Canadian Criminal Code and other acts. With an aim to better understand this anomaly of Canadian public policy in both its record speed (from 9/11 to its Royal Assent in 99 days) and its relation to a foreign catastrophe, this thesis seeks to explore both the internal and external factors that influenced the timing and the content of Bill C-36.
Cheung, Christopher Zodda Daniel J. "Joint Task Force Olympics : monitoring potential terrorists behavior via deceptive computer means /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FCheung.pdf.
Повний текст джерелаFarries, Greg, and University of Lethbridge Faculty of Arts and Science. "What voters want, what campaigns provide : examining Internet based campaigns in Canadian federal elections." Thesis, Lethbridge, Alta. : University of Lethbridge, Faculty of Arts and Science, 2005, 2005. http://hdl.handle.net/10133/250.
Повний текст джерелаvi, 130 leaves ; 29 cm.
Smith, G. Davidson. "The liberal democratic response to terrorism : a comparative study of the policies of Canada, the United States and the United Kingdom." Thesis, University of Aberdeen, 1986. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU366344.
Повний текст джерелаAlati, Daniel. "Domestic counter-terrorism in a global context : a comparison of legal and political structures and cultures in Canada and the United Kingdom's counter-terrorism policy-making." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:2a37e08e-8463-4000-9fdc-389072bc5960.
Повний текст джерелаSayers, Tamara Michelle. "Cyberfeminism in Canada, women, women's organizations, the women's movement and internet technology." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0014/MQ31248.pdf.
Повний текст джерелаAzriel, Joshua N. "Internet hate speech in the United States and Canada a legal comparison /." [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0013646.
Повний текст джерелаPatel, Shaista. "Legalizing the racialization of Muslim : an anti-Orientalist discourse analysis of the Anti-terrorism Act of Canada." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/31994.
Повний текст джерелаEducation, Faculty of
Curriculum and Pedagogy (EDCP), Department of
Graduate
Bilimoria, Cyrus M. "Use of computers and the Internet to facilitate export of prefabricated housing from Canada." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq64106.pdf.
Повний текст джерелаYuan, Xiaotong 1979. "Copyright protection to musical works in cyberspace." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82675.
Повний текст джерелаAvigdor, Allan. "Exploring the use of e-government services in social service settings." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=81250.
Повний текст джерелаKarim, Karim H. (Karim Haiderali) 1956. "Constructions of the Islamic peril in English-language Canadian print media : discourses on power and violence." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=42064.
Повний текст джерелаBorrowing from Jacques Ellul, this study examines the importance of myth as a fundamental basis of communication. However, unlike Ellul, it also explores alternatives to the operations of dominant communication structures. Edward Said's critique of Orientalism informs the analysis of Northern portrayals of Muslim societies; but the dissertation attempts to avoid overstating the Orientalist discourses' hegemony by proposing a model of competition among dominant, oppositional and alternative discourses on "Islam."
Mainstream media's adherence to dominant technological myths and their general reticence about the structural and direct violence of elite states are examined. Distinct similarities are found between the utopic orientations and technical operations of dominant Northern and Muslim discourses, as well as in Jewish, Christian and Muslim conceptions of holy/just war. The proliferation of contemporary Northern images about "Islam" are traced historically to four primary stereotypes about Muslims.
Examinations of the supposedly objective and secularist media reportage on terrorism show differences in portrayal according to the perpetrators' religions. Analyses of the coverage of wars involving peoples of Muslim backgrounds in the Middle East, Bosnia-Herzegovina, and the former USSR demonstrate the tendency of dominant journalistic scripts to attribute diverse political, economic and territorial conflicts to a monolithic "lslam" The dissertation traces how the global media narrative's transformation of Saddam Hussein from an ally of the West to a demonic despot was aided by according him "Islamic" characteristics. It also looks at the emergence of "Islam" as a post-Cold War Other. Lastly, proposals made by scholars and journalists for enhancing inter-cultural communication between Northern and Muslim societies are considered.
Brown, Peter. ""They're flooding the internet" : a cross-national analysis of newspaper representations of the 'internet predator' in Australia, Canada, the UK and USA." Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/46894/.
Повний текст джерелаBeylier, Pierre Alexandre. "La frontière Canada/Etats-Unis depuis le 11 septembre 2001 : mutations et continuité." Thesis, Paris 3, 2013. http://www.theses.fr/2013PA030142.
Повний текст джерелаThis thesis aims at studying the transformations that the Canada/US border has undergone in the wake of 9/11. Using a multiple analytical lens – at once geographical, historical, political and economic – it deals with the role that the international boundary has played in the War against Terror.In order to secure its homeland, not only did the United States used its borders as a central tool for its policy but it also defined a new kind of concept, that of “smart borders”. Looking for a balance between two goals that are presented as mutually non-exclusive – security and facilitation – Washington plays with the traditional binary functioning of borders – open borders vs. close borders – to impose a new paradigm in North America, and more particularly along the Canada/US border. The purpose of this work is to look into this process to see how the metaphorically called 49th parallel has moved on from being the longest undefended border in the world, an open and defunctionnalized border, to a highly securitized barrier. Thus, it explores the supposedly pivotal role attributed to the terrorist attacks on the World Trade Center and the Pentagon as well as the meaning of this shift in paradigm for the Canada/US relationship.To do so, this thesis analyzes what this “smart border” consists in and assesses the success of its double engine – security and facilitation. It also endeavors to shed a light on the forces that underlie this multifaceted institution that the border is. Amidst rhetoric, disinformation, hidden agendas, the border is at the crossroads of different strategies that may sometimes blur our perception of the situation
Holmström, Conny. "Terroristorganisationer på Internet, en möjlighet eller realitet? : en undersökning om vilka möjligheter informationsteknologin ger terroristorganisationer." Thesis, Försvarshögskolan, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1925.
Повний текст джерелаThe revolution in information technology that took place in the middle of the 1990’s has offered new possibilities for terrorist organisations in terms of consolidation and action. In this essay these possibilities are limited to the use of Internet, and defined as active use (logical attacks) and passive use (consolidation).This essay focuses on the passive use of the Internet. The attempt is to answer questions on which of the studied organisations that make use of the Internet, the purposes they have for publicising themselves and to examine if there are any similarities between the different categories use of the Internet.The essay shows different definitions of “terrorism” and gives an example on how to divide terrorist organisations into different categories.It also gives an overview on the revolution in information technology of the 1990’s and brings to light the possibilities it offers the terrorist organisations.A total of 37 organisations have been studied, and 21 of these have been found on the Internet. The difficulties that the author has met during the search for the organisations on the Internet are described in connection to the general description of the study. In conclusion, the author discusses the results in terms of purpose, infrastructural prerequisites, technical competence, the strength in resources, and need for secrecy. All these varibles affect the organisations use of the Internet as a way of publicising.
Avdelning: ALB - Slutet Mag 3 C-upps.Hylla: Upps. ChP 99-01
Carter, Sabrena Michelle. "The day we all became Hokies an exploratory uses and gratifications study of Facebook use after the Virgina Tech shootings /." Lynchburg, Va. : Liberty University, 2008. http://digitalcommons.liberty.edu.
Повний текст джерелаGrove, Alan J. "Drawing a Line in the Snow: the Geopolitical Place-making of Canadian Security Policy." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1243349150.
Повний текст джерелаHeni, Amira. "Internet et la fidélisation de la clientèle bancaire : étude du passage de la relation B2C de personne à personne à la relation B2C virtuelle." Thesis, Université Laval, 2007. http://www.theses.ulaval.ca/2007/25020/25020.pdf.
Повний текст джерелаRyan, Jo-Anne. "Exploring the investor relations website : the impact of internet reporting on institutions." Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/1530/.
Повний текст джерелаBeauvais, Geneviève. "Imaginaires migratoires et médias virtuels : le cas des Argentins au Canada et au Québec." Master's thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/26200.
Повний текст джерелаUbayasiri, Kasun. "Media, Tamil Tigers, terrorism and the internet: The cyber interface between the Liberation Tigers of Tamil Eelam (LTTE) and mainstream media." Thesis, Queensland University of Technology, 2008.
Знайти повний текст джерелаLe, Cam Florence. "L'identité du groupe des journalistes du Québec au défi d'Internet." Phd thesis, Université Rennes 1, 2005. http://tel.archives-ouvertes.fr/tel-00011013.
Повний текст джерелаCormier, Eric. "L'industrie de l'omniscience : le profilage comportemental et le droit à la vie privée au Canada." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/20680.
Повний текст джерелаTorok, Robyn. "Discourses of terrorism: The role of Internet technologies (social media and online propaganda) on Islamic radicalisation, extremism and recruitment post 9/11." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2016. https://ro.ecu.edu.au/theses/1938.
Повний текст джерелаOliver, Hazel Dawn. "Why information privacy and the employment relationship don't mix, workplace e-mail and Internet monitoring in the United Kingdom and Canada." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ63088.pdf.
Повний текст джерелаHerail, Leslie. "Le traitement juridique des propos haineux sur les plateformes numériques de partage de contenus." Master's thesis, Université Laval, 2019. http://hdl.handle.net/20.500.11794/38196.
Повний текст джерелаVidanage, Harinda Ranura. "Exploring the impact of online politics on political agents and political strategies in the Sri Lankan Tamil diaspora." Thesis, University of Edinburgh, 2009. http://hdl.handle.net/1842/5949.
Повний текст джерелаVanderWallen, Lisa. "Deconstructing Representations of "The Other" in the Online Media of Canadian Based Non-Governmental Organizations." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23109.
Повний текст джерелаChatur, Noorin. "Political outcomes of digital conversations : case study of the Facebook group "Canadians against proroguing parliament"." Thesis, Lethbridge, Alta. : University of Lethbridge, Dept. of Political Science, 2011, 2011. http://hdl.handle.net/10133/3100.
Повний текст джерела171 leaves ; 29 cm
Dupré, Florence. "La fabrique des parentés : enjeux électifs, pratiques relationnelles et productions symboliques chez les Inuit des îles Belcher (Nunavut, Arctique canadien)." Thesis, Lyon 2, 2014. http://www.theses.fr/2014LYO20020.
Повний текст джерелаThis doctoral dissertation is a contribution to the study of Inuit kinship. It presents an ethnography and analysis of contemporary kinship practices in the Arctic village of Sanikiluaq (Nunavut). The specific aim is to understand how kinship ties are produced, practised, and severed in a community that historically and socially has much in common with other Canadian Inuit societies of the early 21st century. The text thus covers the history of the Belcher Islands, the strategies currently used to establish kinship ties, and the kin identities of the people involved. The aim, here, is to understand the meaning of Inuit kinship without having to fall back on the flexibility of social organization to provide a satisfactory answer.After describing the historical backdrop to the recent formation of the village of Sanikiluaq, the first part (chapters 2 and 3) retraces the development of kinship practices during the 20th century and identifies the main strategies behind present-day kinship choices, e.g., choosing a mate, a godmother, a godfather, or a namesake for a newborn child. The second part (chapters 4 and 5) provides an ethnography and analysis of kinship choices in nine groups of siblings who are contemporary Qikirtamiut (i.e., Inuit of the Belcher Islands). It addresses how kinship strategies, production of kinship ties, and the actual kinship experience interrelate in terms of three factors that structure the practices and cultural theories under discussion: genealogy, identity, and daily life. The third and last part (chapters 6 and 7) pursues this analysis in places and settings where images of oneself and one’s kin group are used as means to produce, convey, and practise kinship. Topics include kinship practices on social networking websites, use of family photos, and several categories of tagging, which range from tattooing to drawing, that help people to identify themselves to others via the ontological identity that underlies their kinship ties. In sum, this dissertation describes Inuit kinship by showing how strategy processes, day-to-day practices, and forms of symbolic production relate to each other in the Arctic of the early 21st century
Daniels, Minji. "Online Islamic organizations and measuring Web effectiveness." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FDaniels.pdf.
Повний текст джерелаThesis Advisor(s): James Ehlert, Raymond Buettner. Includes bibliographical references (p. 55-58). Also available online.
Dauverchain, Mathieu. "Le consentement dans le contexte du traitement de données personnelles sur les sites de réseautage social." Master's thesis, Université Laval, 2018. http://hdl.handle.net/20.500.11794/29484.
Повний текст джерелаGramaccia, Julie. "La propagande terroriste : étude du récit propagandiste numérique de l'organisation Daech." Thesis, Bordeaux 3, 2020. http://www.theses.fr/2020BOR30036.
Повний текст джерелаTaking advantage of the opportunity offered by the Internet to address its audiences directly without going through the "bottleneck" of the traditional gatekeeping system, the terrorist organization Daech (ISIS) has been able to construct a polarizing discourse, capable of addressing the individual as well as the collective, its followers as well as its enemies. This particular context constitutes the general problem of this research: before digital media, terrorist organizations depended on traditional media to make themselves known to the public and had limited room for manoeuvre to speak for themselves. By bypassing the traditional gatekeeping system, Daech was able to construct a particularly effective jihadist propaganda narrative. Not only has this propaganda transcended state and cultural boundaries, but it has also contributed to the radicalization of thousands of individuals who, since 2014, have joined Daech's ranks. This work aims to contribute to the understanding of the emergence of the terrorist propaganda of the jihadist organization Daech through digital media in a narrative and enunciative perspective. In this perspective, we have formulated the following research questions: How is Daech's propaganda narrative constructed in the digital media? What are its enunciative and narrative characteristics? In order to answer these questions, we have mobilized a methodology of discourse analysis based on a semiotic approach, the study of narrativity according to the proposals of Greimas and Courtés. This research has allowed us to highlight the narrative foundations of this digital propaganda. Daech's discourse constitutes a unique digital experience to this day: these propagandists have mobilized all possible means to construct a discourse that is as legitimate as possible, borrowing for this purpose both from an extremist liturgy of Islam and from Western media and cultural genres
Duaso, Calés Rosario. "Principe de finalité, protection des renseignements personnels et secteur public : étude sur la gouvernance des structures en réseau." Thèse, Paris 2, 2011. http://hdl.handle.net/1866/12714.
Повний текст джерелаLa question de la protection des renseignements personnels présente des enjeux majeurs dans le contexte des réseaux. Les premières lois en la matière au Canada et en Europe avaient pour base une série de principes qui sont encore aujourd’hui d’actualité. Toutefois, l’arrivée d’Internet et des structures en réseau permettant l’échange d’un nombre infini d’informations entre organismes et personnes ont changé la donne et induisent de nouveaux risques informationnels. Le principe de finalité, pierre angulaire des systèmes de protection des renseignements personnels, postule le caractère adéquat, pertinent et non excessif des informations collectées par rapport à l’objet du traitement et exige qu’elles soient uniquement utilisées à des fins compatibles avec la finalité initiale. Nous retracerons l’historique de ce principe et analyserons la manière dont la doctrine, la jurisprudence et les décisions du CPVPC comme de la CNIL ont contribué à délimiter ses contours. Nous étudierons comment ce principe se manifeste dans la structure en réseau de l’administration électronique ou du gouvernement électronique et nous relèverons les nouveautés majeures que présente l’État en réseau par rapport au modèle d’État en silo, ainsi que la nécessité d’une gouvernance adaptée à cette structure. Nous examinerons également la présence de standards juridiques et de notions à contenus variable dans le domaine de la protection des renseignements personnels et nous tenterons de montrer comment la finalité, en tant que principe ou standard, a les capacités de s’adapter aux exigences de proportionnalité, d’ajustement et de mutation continuelle qui sont aujourd’hui au cœur des défis de la gouvernance des réseaux. Finalement, il sera question de présenter quelques pistes pour l’adoption de mécanismes d’adaptation « réseautique » pour la protection des renseignements personnels et de montrer dans quelle mesure ce droit, capable de créer un cadre de protection adéquat, est également un « droit en réseau » qui possède tous les attributs du « droit post-moderne », attributs qui vont rendre possible une adaptation propre à protéger effectivement les renseignements personnels dans les structures, toujours changeantes, où circulent aujourd’hui les informations.
Personal data protection poses significant challenges in the context of networks. The first laws on this matter both in Canada and in Europe were based on a series of principles that remain valid today. Nevertheless, Internet and the development of network-based structures that enable infinite exchange of information between institutions and individuals are changing the priorities and, at the same time, present new risks related to data protection. The purpose principle, which is the personal data protection systems cornerstone, stresses the relevance and adequate yet not excessive nature of the collected information vis à vis the objective of data collection. The purpose principle also requires that the information shall not further be processed in a way incompatible with the initial purpose. We will describe the origins and evolution of this principle, as well as its present relevance and scope analysing the doctrine, jurisprudence and decisions of the Office of the Privacy Commissioner in Canada and of the Commission nationale de l’informatique et des libertés (CNIL) in France. We will also examine how this principle is reflected in the network structure of the digital administration and of the electronic government. We will also underline the differences between a network-based State and a « silo-based » State, each needing its structure of governance. Within the context of personal data protection, we will explore the presence of legal standards and of concepts with a changing nature. An effort will be made to highlight how purpose, be it as a principle or as a standard, has the capacity to adapt to the requirements of the core principles of the current network governance, such as proportionality, adjustment and continuous mutation. Finally, the objective is to reflect on some personal data protection network adaptation mechanisms, and to demonstrate how personal data protection can work in a network that includes all « post-modern law » elements that allow for true adaptation for effective personal data protection within the ever changing structures where data is being exchanged.
Hogan, Bernard Michael, and n/a. "The Internet as a Research and/or Communication Tool to Support Classroom-Based Instruction: Usage, Value, and Utility for Post-Secondary Students." Griffith University. School of Film, Media and Cultural Studies, 2004. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20040719.124141.
Повний текст джерелаUdrescu, Florin. "Le concept contemporain du djihad à l’épreuve des pratiques discursives des acteurs radicaux sur l’Internet." Thesis, Lyon 3, 2013. http://www.theses.fr/2013LYO30017.
Повний текст джерелаConcerning the topic of djihad, radical Islamist discourse that spreads in the cyberspace following the attacks of September 11, feeds on an interaction between the reconfiguration of a religious heritage and the digital technology. Thus, the rhetoric deployed by the central actors of Al Qaeda generates a new space of performance and action of a violence advocated in the name of djihad. This concept, which initially is the result of a legal construction which makes it an “ethical doctrine”, becomes emptied of its normative and symbolic substance to stiffen in a reflexive closure used to assert the theories and the terrorist practices. Henceforth, it is necessary to grasp the dynamics at work in the seizures of the significations operated by the actors of contemporary radical discourse. Fundamental is the issue of the collective memory and the way that the radical discourse captures it, selectively, to divert it for the benefit of a conceptual bricolage. Associated with the technical modalities of the Internet medium, the virtualization is a powerful vector of performative action. In this regard, an analysis of the interactions linking in a consubstantial way the physical and discursive action, activism and discourse, will take the measure of the discursive pragmatics in its both semantic and contextual thickness
Becuywe, Isabelle. "Patrimoine immatériel et technologies numériques : représentations et usages." Thesis, Paris, EHESS, 2020. http://www.theses.fr/2020EHES0003.
Повний текст джерелаWith the Convention for the Safeguarding of the Intangible Cultural Heritage of UNESCO (2003), the concept of heritage was expanded to new objects, but above all a new distribution of roles was made among the actors, putting the practitioners individual and collective at the heart of the device. States that have ratified the convention have given themselves the obligation to carry out inventories by involving the communities in the designation of what, for them, constitutes intangible heritage, thus offering an opportunity for experimentation of forms and methods to achieve this goal. These inventories were largely based on digital technologies for their constitution and on the web for their dissemination. The social dynamics in which the notion of inventory is inscribed is based on an imaginary of digital techniques as a means of warding off cultural loss, and an ambiguous relationship is formed at the time of the natively digital inventory between immaterial and virtual. The study of the narative of the history of the web makes it possible to highlight a set of founding myths of the Internet which contribute to this ambiguity. Based on an observant participation in the Inventory of the Intangible Religious Heritage of Quebec (IPIR), which is based on the definitions of the UNESCO Convention, digital technologies, including the Internet, should be considered as tools that the communities (state, local communities, actors of the inventory) mobilize to be staged by intangible heritage. The example of the IPIR, with three missions (keep the memory, list the living practices, communicate them), compared to other existing online inventories illustrates the plasticity of the intangible cultural heritage inventory. The trajectories of inventorization emerge by questioning the social demand for an inventory of intangible cultural heritage in the context of de-Christianization of Quebec from the 1960s. Finally, the web-based dissemination of inventory data makes it possible to question the uses of techniques and forms of representation of the web as a means of cultural transmission. While the social dynamics in which an online inventory is based on an imaginary digital techniques as a means to avert cultural loss, the proliferation of tracks on the Internet comes to challenge the promise of universal accessibility that the web was wearing. origins
Kinuthia, Wanyee. "“Accumulation by Dispossession” by the Global Extractive Industry: The Case of Canada." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/30170.
Повний текст джерела