Дисертації з теми "Secret des sources"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-28 дисертацій для дослідження на тему "Secret des sources".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Zemmouri, Catherine. "La protection du secret des sources du journaliste." Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2023. http://www.theses.fr/2023ASSA0082.
Повний текст джерелаFreedom of expression and communication is a fundamental right, and one of the key elements of a democracy. For this reason, it has been protected for a long time. However, one of its pillars, the protection of the confidentiality of a journalist's sources, has for a long time been ignored, and even today is not completely recognized in France. This state of affairs is mainly due to political factors. This refusal to acknowledge, and this partial and tardy recognition, can be largely explained by the fact that investigative reporting, in the public interest, can potentially target politicians. Furthermore, even a partial recognition of this right can be neutralised by increasingly sophisticated modern methods of surveillance, such as the Pegasus computer program. Journalists find themselves on an uneven playing field when they seek to take on public authorities, big business or indeed organised criminal groups who want to uncover the sources behind an investigative report. This is why the French system falls short, despite a ruling by the European Court of Human Rights (ECHR) in favour of protecting journalists' sources. However, a proper protection of these sources is well within the bounds of possibility. One has only to look as far as Belgium, where an effective and exemplary system is in place. An overhaul of the French system is well overdue, because, as the ECHR puts it, journalists are the vanguards of a democracy
De, Witte Parra Mona. "La protection du renseignement britannique, américain et allemand pendant la Seconde Guerre mondiale." Thesis, Reims, 2016. http://www.theses.fr/2016REIML004.
Повний текст джерелаThis thesis investigates the protection of British intelligence sources during World War Two, and includes a comparison with American and German practices. In these three countries, intelligence officers adopted very different approaches to preserve these sources and to ensure that the latter could be used in the long term. Each country had a different perception of the balance between the immediate use of intelligence and the protection of its sources, between the short-term benefits and long-term preservation of these assets in the context of the war. Drawing on a vast amount of archival material, both civilian and military, this research presents these three countries’ various approaches and uses this analysis to reflect on their concrete achievements. This study interrogates the preconceived ideas about these countries’ intelligence practices, in particular the reputation of secrecy of the British agencies, as opposed to the lack of discretion of their American counterparts. Moreover, this thesis emphasises the particular situation of German secret services in a very divided country.The ambiguous cooperation between Britain and the United States during the Second World War helped pave the way for their « special relationship ». During the war, the balance of power between the two nations shifted dramatically, in the intelligence field as in many others. Moreover, the analysis of the exchanges between the British intelligence officers and their French and Soviet colleagues opens new research avenues in the study of their international relations and on these complex and fluctuating alliances
Lévêque, Cyrielle. "Artification de l’archive : une dialectique entre figures et absences." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0334.
Повний текст джерелаThe development of this thesis work falls within an academic approach, andis also simultaneously thought in connection with the artistic creation. It deals with personal and private questioning, but is also « hunted » in a different way regarding yet genealogy, family and documentary pictures and the shadow zones that are part of all personal history. Mechanisms of resistance to arti- fication are deployed as an attempt at an artistic and theoretical response, facing a mute story, a lack of words. The family history is the origin of plural filiations, transmissions–with or without words–but also secrets. Sometimes some empty spaces appear on portraits. The missing element, thus, becomes an obsession due to its lack in the logic of the story. The artists working on those corpuses specifically aim to collect, reclaim and exhibit those blurred pictures in order to re-use them into an artistic, voluble and efficient circuit. These new pictures–private stories and testimony art at once–turn into a collective memory : by a clever telescope of meaning, the work, born out of the vernacular image, breaks through thanks to its plasticity, and offers a new meaning to the erased or absent figure. This theoretical and artistic reflection, based on the polysemous relations between documentary pictures and « erasing poietic », analyses the way that art acts into old archive pictures. How can art give the power to « read » a picture that is invisible ? Which ways, implemented devices, social and histo- ric beliefs allow it ? Conversely, what levers are developed by the artists, to update images that do not belong to them and that change our vision of the initial information ? Here is the challenge of this theoretical and plastic research that let us understand a mechanism of the artifying archival image, midway between private story and artistic mythology ; or how can images or vacilla- ting figures between presence and absence appear from invisible elements, as archives of a reformulated future
Brenes, Vargas Rodolfo. "Contribution à l'étude des abus de la liberté d'expression dans le domaine judiciaire : étude de politique criminelle : l'exemple de la France et du Costa Rica." Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01D018.
Повний текст джерелаFreedom of speech is now considered one of the essential elements of a democratic society. Driven by the European and Inter-American Court of Human Rights, it has acquired a new dimension and has an extensive protection. However, despite its importance, this freedom is not absolute, it must be balanced with other rights of equal value and legal imperatives which also deserve protection. Traditionally the way of regulating and sanctioning abuses of freedom of speech was criminal law. However, the strengthening of the freedom has produced, inversely, a phenomenon of " gradual withdrawal " of criminal law, which is considered less and less as "strictly necessary" and is often viewed as a disproportionate mode of sanction in regards to the goal pursued. This thesis analyzes the relevance of the use of criminal law in the judiciary field, where freedom of expression is often confronted with the right to presumption of innocence, right to reputation, and the need to protect the authority and impartiality of the judiciary. The issue is studied from a criminal policy approach, which allows us to go beyond the field of criminal law to make proposals for new regulation and punishment by other means than criminal
Sun, Xiaole, Ivan B. Djordjevic, and Mark A. Neifeld. "Secret Key Rates and Optimization of BB84 and Decoy State Protocols Over Time-Varying Free-Space Optical Channels." IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2016. http://hdl.handle.net/10150/621687.
Повний текст джерелаDarmon, Julien. "La loi du secret : la kabbale comme source de halakha chez r. Joseph Caro et les décisionnaires séfarades ultérieurs." Paris, EHESS, 2007. http://www.theses.fr/2007EHES0110.
Повний текст джерелаContrary to a well-spread notion, legal and ritual issues are an important focus of kabbalistic discourse and the halakhic literature, in turn, is far from having negleted what the kabbalists had to say. Since the historic beginnings of kabbalah, and even in the Talmud, legal and symbolic discourses interpenetrate. Their organic unity and the messianic telos of their dialectics are best articulated in the introduction to the main text of Lurianic kabbalah, 'Ets Hayyim. In the light of the notions presented therein, and following the concept of hierohistory borrowed from Henry Corbin, this study proposes a phenomenological re-reading of three precise aspects of the Jewish ritual, which have crystallized the essential discussions about the relationship between halakhah and kabbalah. The result is a new outlook on the metahistorical and eschatological motives behind the history of Jewish religious practices
Lazoul, Mohamed. "Etude de la génération paramétrique optique dans les cristaux photoniques non linéaires : application aux sources multilongueurs d'onde." Paris 13, 2013. http://scbd-sto.univ-paris13.fr/secure/edgalilee_th_2013_lazoul.pdf.
Повний текст джерелаThe aim behind this work is to propose new solutions based on nonlinear optics to design flexible and highly efficient multiwavelength coherent sources. We are particularly interested on multiple wavelength generation by means of optical parametric conversion in second order nonlinear photonic crystals. For this purpose, we have designed and fabricated second order nonlinear photonic crystals. Firstly, we have considered the case of non collinear quasi-phase matching in 1D-PPLT crystals. We have studied multiple non collinear interactions versus the photonic crystal’s parameters. The generated wavelengths are spatially distributed at symmetrical positions around the non collinear direction. Secondly, we have studied the case of multiple quasi-phase matching in 2D nonlinear photonic crystals. We have demonstrated multiwavelength non collinear generation in 2D-PPLT crystals. In order to design an efficient multiwavelength optical source we have designed and achieved a singly resonant optical parametric oscillator based on 2D-PPLT crystals
Friedman, Yaron. "Les Nusayri-ʿAlawis : entre sunna et shiʿa, refus et acceptation selon les sources arabes médiévales et modernes". Paris 4, 2006. http://www.theses.fr/2006PA040012.
Повний текст джерелаThe study of the NuîayrÌ-AlawÌ sect is of particular importance, due to the fact that it is the only sect that rules a country in the Middle East. This research explores the NuîayrÌ-AlawÌ sect from a distinct perspective by dealing with their image as reflected in Muslim sources. This thesis identifies three major attitudes in the Muslim world toward the NuîayrÌ-AlawÌ sect :A strong hostility among the Sunni majority. A combination of indulgence and hostility that coexist in žÌ‘Ìsm. An apologetic response among the NuîayrÌ-AlawÌs themselves. A survey of medieval and modern Arabic texts suggests a continuity in the three attitudes towards the Nusayri-‘AlawÌs outlined above. This monographic study treats a number of issues that have not been adequately addressed in previous research, such as : The biography of the founders of the sect, especialy the main figure, al-usayn ibn amdªn al-ŽaîÌbÌ; the manuscript of the DÌwan (poetic corpus) of al al-ŽaîÌbÌ and the fatwa (decree) of Ibn Taymiyya against the NuîayrÌs
Delbe, Jean. "L'idf45 (inhibitory diffusible factor 45 kda) : un inhibiteur de croissance secrete par les fibroblastes de souris." Paris 6, 1991. http://www.theses.fr/1991PA066459.
Повний текст джерелаWang, Shiping. "Peptides as amino acid sources for the synthesis of secreted proteins by mammary tissue explants and cultured mammary epithelial cells." Diss., Virginia Tech, 1994. http://hdl.handle.net/10919/39137.
Повний текст джерелаChassagnon, Serge Nehlig Astrid. "Imagerie de perfusion des crises épileptiques temporo-limbiques zones épileptogènes et non épileptogènes /." Strasbourg : Université Louis Pasteur, 2007. http://eprints-scd-ulp.u-strasbg.fr:8080/secure/00000658/02/Chassagnon2006.pdf.
Повний текст джерелаSavage, Ashley Christian. "Crown servants and unauthorised disclosures : whistleblowing, executive accountability and the public interest." Thesis, Durham University, 2012. http://etheses.dur.ac.uk/3640/.
Повний текст джерелаTavangaran, Nima [Verfasser], Holger [Akademischer Betreuer] Boche, Holger [Gutachter] Boche, H. Vincent [Gutachter] Poor, Antonia [Gutachter] Wachter-Zeh, and Rafael F. [Gutachter] Schaefer. "Robust Secret-Key Generation under Source Uncertainty and Communication Rate Constraint / Nima Tavangaran ; Gutachter: Holger Boche, H. Vincent Poor, Antonia Wachter-Zeh, Rafael F. Schaefer ; Betreuer: Holger Boche." München : Universitätsbibliothek der TU München, 2018. http://d-nb.info/1161528474/34.
Повний текст джерелаSanchez, Torres José Libardo. "Vulnérabilité, interdépendance et analyse des risques des postes sources et des modes d’exploitation décentralisés des réseaux électriques." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENT104/document.
Повний текст джерелаIn view of the increasing use of Information and Communication Technol-ogies in power systems, it is essential to study the interdependencies between these coupled heterogeneous systems. This thesis focuses on the modeling of multi- infrastructure systems. This includes interdependencies and the three major failures families: common mode, escalat-ing and cascading. It is indeed necessary to identify the weaknesses that can trigger one or multiple failure(s) and cascade through these interdependent infrastructures, causing unex-pected and increasingly more serious failures to other infrastructures. In this context, different approaches, based on the theory of Complex Networks, are developed to identify the most critical components in the coupled heterogeneous system. One of the major scientific barriers addressed in this thesis is the development of a unified mathematical model to represent the behavior
Solana, Javier. "All that glitters is not gold : the re-use of securities collateral as a source of systemic risk." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:4f5df3ab-ca74-425f-9e35-9a25cd8336b6.
Повний текст джерелаBen, Jaballah Wafa. "Securing wireless sensor and vehicular networks." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0013/document.
Повний текст джерелаWireless sensor and vehicular networks play an important role in critical military and civil applications, and pervade our daily life. However, security concerns constitute a potential stumbling block to the impeding wide deployment of sensor networks and vehicular communications. This dissertation studies communication security for Wireless Sensor Networks (WSNs), and vehicular communication. To this aim, we address four important aspects. The first study addresses broadcast authentication in WSNs. We focus on key disclosure based schemes. We demonstrate that key disclosure delay induces an authentication delay, which could lead to a memory DoS attack. We then propose two broadcastauthentication protocols for WSNs, which overcome the security vulnerability of existingsolutions. The proposed schemes guarantee the efficient management of receiver’s buffer, by employing a staggered authentication mechanism, and a Bloom filter data structure to reduce the communication overhead. We also validate our protocols under the AVISPA model checking tool, and we evaluate them with experiments under TinyOS. Our findings are that these protocols provide source authentication service while respecting the WSN constraints.The second study addresses the storage issue in WSNs, in particular the Delayed AuthenticationCompromise attack (DAC). We first demonstrate that recently proposed schemes, which also address the DAC issue are vulnerable to two kinds of attacks: switch command attack (where an adversary pretends to “switch” two messages over time), and drop command attack (where an adversary just pretends to “hide” a message sent from the broadcaster). As a countermeasure against these attacks, we propose a new solution for broadcast authentication. Our analysis shows that our solution is effective in detecting both switch command and drop command attack, and—at the same time—is more efficient (in terms of both communication and computation) than the state of the art solutions.In the third study, we address key management security in WSNs. We present novel symmetric-key-based authentication schemes which exhibit low computation and communication authentication overhead. Our schemes are built upon the integration of a reputation mechanism, a Bloom filter, and a key binary tree for the distribution and updating of the auxviii thentication keys. Our schemes are lightweight and efficient with respect to communication and energy overhead. The fourth study addresses security in vehicular communications. We focus on fast multi hop broadcast applications. We analyze the security threats of state of the art vehicular based safety applications. We demonstrate that these schemes are vulnerable to the position cheating attack, the replay broadcast message attack, and the interrupting forwarding attack. Then, we propose countermeasures for these threats. We hence propose a complete solution which is both fast and secure in broadcasting safety related messages: Fast and Secure Multi-hop Broadcast Algorithm (FS-MBA). Finally, we confirm the efficiency and feasibility of our proposals using an extensive set of simulations under NS-2 Simulator
Lefrançois-Martinez, Anne-Marie. "Caracterisation et regulation par les androgenes d'une proteine de 24 kda secretee par l'epididyme de souris. Etude chez l'adulte et au cours du developpement post-natal." Clermont-Ferrand 2, 1991. http://www.theses.fr/1991CLF21383.
Повний текст джерелаKrasnowski, Piotr. "Codage conjoint source-chiffrement-canal pour les canaux de communication vocaux sécurisés en temps réel." Thesis, Université Côte d'Azur, 2021. http://www.theses.fr/2021COAZ4029.
Повний текст джерелаThe growing risk of privacy violation and espionage associated with the rapid spread of mobile communications renewed interest in the original concept of sending encrypted voice as audio signal over arbitrary voice channels. The usual methods used for encrypted data transmission over analog telephony turned out to be inadequate for modern vocal links (cellular networks, VoIP) equipped with voice compression, voice activity detection, and adaptive noise suppression algorithms. The limited available bandwidth, nonlinear channel distortion, and signal fadings motivate the investigation of a dedicated, joint approach for speech encodingand encryption adapted to modern noisy voice channels.This thesis aims to develop, analyze, and validate secure and efficient schemes for real-time speech encryption and transmission via modern voice channels. In addition to speech encryption, this study covers the security and operational aspects of the whole voice communication system, as this is relevant from an industrial perspective.The thesis introduces a joint speech encryption scheme with lossy encoding, which randomly scrambles the vocal parameters of some speech representation (loudness, pitch, timbre) and outputs an encrypted pseudo-voice signal robust against channel noise. The enciphering technique is based on random translations and random rotations using lattices and spherical codes on flat tori. Against transmission errors, the scheme decrypts the vocal parameters approximately and reconstructs a perceptually analogous speech signal with the help of a trained neural-based voice synthesizer. The experimental setup was validated by sending encrypted pseudo-voice over a real voice channel, and the decrypted speech was tested using subjective quality assessment by a group of about 40 participants.Furthermore, the thesis describes a new technique for sending data over voice channels that relies on short harmonic waveforms representing quaternary codewords. This technique achieves a variable bitrate up to 6.4 kbps and has been successfully tested over various real voice channels. Finally, the work considers a dedicated cryptographic key exchange protocol over voice channels authenticated by signatures and a vocal verification. The protocol security has been verified in a symbolic model using Tamarin Prover.The study concludes that secure voice communication over real digital voice channels is technically viable when the voice channels used for communication are stable and introduce distortion in a predictable manner.stabintroduce distortion in a predictable manner
Dacheux, Mélanie. "Etude in vivo du rôle potentiel de la phospholipase A2 de groupe IIA humaine dans le paludisme : Caractérisation de la physiopathologie de l'infection à Plasmodium chabaudi chez la souris C57BL/6 transgénique pour l'enzyme." Thesis, Paris, Muséum national d'histoire naturelle, 2018. http://www.theses.fr/2018MNHN0007.
Повний текст джерелаMalaria is a tropical disease caused by a parasite of the Plasmodium genus. High levels of circulating human group IIA secreted phospholipase A2 (hGIIA) have been reported in malaria patients. The enzyme is well known for its bactericidal and pro-inflammatory actions. However, so far its role in malaria is unknown. In order to address the in vivo role of hGIIA in malaria, we performed a hematological, histopathological and immunohistochemical characterization of C57BL/6 hGIIA transgenic mice (Tg+ mice) infected with P. chabaudi chabaudi (864VD strain), a murine Plasmodium species and strain which causes non-lethal chronic malaria. Infected Tg+ mice present a 27% reduction of parasitaemia at the peak of infection (D14 post-inoculation, p.i.) compared to infected non-transgenic littermates (Tg- mice). Intraperitoneal injection of recombinant hGIIA at D12, D13 and D14 p.i. (0.125 mg/kg twice a day) into P. chabaudi 864VD-infected WT C57BL/6 mice leads to a 19% reduction of the parasitaemia at D14 p.i., demonstrating the direct and acute role of hGIIA in lowering parasite population and presumably ruling out a potential effect linked to chronic overexpression of hGIIA in Tg+ mice. Hematological data show a durable anemia in Tg+ mice compared to Tg- mice during the infection and an important increase of leucocytes, especially of polynuclear neutrophils. The parasitized Tg+ mouse also presents a higher activation of lymphocytes and a specific activation of monocyte cells at the pic of crisis. In the infected Tg- mouse, histological data show a better histopathological recovery in the liver and B cells hyperplasia in the spleen, whereas the infected Tg+ mouse presents late hepatic injuries and splenic extra-medullar hematopoiesis. RT-qPCR analyses suggest that hGIIA mRNA increases at the pic of infection in the liver of infected Tg+ mice, but decreases in spleen and blood. Intraperitoneal injection of recombinant hGIIA at the patent phase is without effect on parasitaemia, which suggests that later infection events are needed for the enzyme antiparasitic activity. Involvement of oxidized-lipoproteins as potential hGIIA substrates, based on in vitro studies, is discussed. In conclusion, our studies allowed us to elaborate a larger picture of the infection of Plasmodium in the mice expressing hGIIA and open new perspectives in the analysis of the role of the enzyme in malaria pathophysiology
Bliacheriene, Ana Carla. "Emprego dos subsídios e medidas compensatórias na defesa comercial: análise do regime jurídico brasileiro e aplicação dos acordos da OMC." Pontifícia Universidade Católica de São Paulo, 2006. https://tede2.pucsp.br/handle/handle/7169.
Повний текст джерелаThis thesis defines classifies and explores the applicable laws to subsidies and countervailing measures which are regulated by international rules of commercial defense issued by the World Trade Organization It introduces the historical evolution of the laws related to the multilateral trade by the international community and emphasizes the importance to maintain the mechanisms of commercial defense separated from those derived from the competition law Furthermore it presents out new themes related to subsidies raised in the Doha Agenda in addition to pointing out the Brazilian line of thought concerning other WTO-members propositions By classifying subsidies it discriminates financial subsidies between credit and tributary showing how the State acts as a regulator of the economical order It emphasizes the existence of a specific law system applicable to countervailing and antidumping measures in opposition to the one applicable to safeguards and it is compared with the Brazilian federal law It points out the vital importance of the maintenance of the judicial safety of the national court decisions about the application and interpretation of the WTO-derived Agreements specifically the Subsidies and Countervailing Measures Agreement Finally it shows the mechanisms available for application of the commercial defense measure by the States and international trade subjects
Aborda a definição classificação e o regime jurídico aplicável aos subsídios e às contramedidas segundo as regras do Acordo sobre Subsídios e Medidas Compensatórias da Mundial do Comércio e a Legislação brasileira Trata do histórico da regulamentação jurídica do comércio multilateral pela comunidade internacional e ressalta a importância da autonomia dos mecanismos de defesa comercial em relação àqueles derivados do direito da concorrência Destaca os novos temas em matéria de subsídios levantados na Agenda Doha de Negociação bem como a posição brasileira quanto às propostas presentadas por outros membros da Organização Diferencia subsídios financeiros tributários de ditícios e aborda a atuação do Estado como regulador da ordem econômica Destaca a existência de um regime jurídico especial e próprio aplicável às medidas antidumping e compensatórias diferente daquele aplicável às salvaguardas fazendo uma análise das visões jurisprudencial legislativa e doutrinária brasileiras Demonstra a necessidade de manutenção da segurança jurídica nas decisões do Poder Judiciário nacional no que se refere à aplicação e à interpretação dos acordos derivados da OMC mais precisamente do Acordo de Subsídio e Medidas Compensatórias Por fim aponta os mecanismos disponíveis para a aplicação dos instrumentos de defesa comercial pelos Estados e as pelas partes interessadas
Denardi, Eveline Gonçalves. "O direito constitucional ao sigilo na relação entre jornalistas e fontes de informação: contradições, conflitos e propostas." Pontifícia Universidade Católica de São Paulo, 2007. https://tede2.pucsp.br/handle/handle/7714.
Повний текст джерелаThis work starts from the practical experience of the journalist, from the communication theory considering the message (the news), the transmitter (reporter) and the receptor (society) and from the use secrecy of the source in different sides of Journalism in order to analyze the central conflict of this dissertation. What is the interpretation do Journalism and Law do of the secrecy of the source? The understanding of the journalist takes into account, essentially the rigid ethics of his profession and considers it vital in all fields of Journalism. When he does not act like that, he understands that his work has been distorted. Whereas Law understands it as a constitutional (art.5º, inc.XIV) protection, but also evaluates it from the points of view of the civil law (obligation) and criminal law. The difference of perception between the journalist and the Judiciary Power regarding the secrecy of the source is that it gives origin to the conflicts in the Courts. Between journalists and their sources it is established a relationship based on trust. The commitment to the silence regarding the origin of the information is established. If the journalist breaks the confidentiality pact, he commits an act of treason which extends to consequences both in the practice of Journalism and in his professional credibility that, in turn, will harm the constitutional right to information in its three aspects: the right to inform, the right of getting informed and the right of being informed. In Brazil, even if it is possible to notice a tendency of the Judiciary Power to interpret the matter, taking into consideration the importance of the professional ethics, we verify some initiatives of those who consider themselves as victims of such constitutional protection and plead for reporters to reveal their informants in Court. One of the objectives of this work is to contribute for the best understanding of magistrates, of the journalist and society about the way news is formed. To the Judiciary Power it proposes a reading that, besides considering the juridical aspects of the theme, comprises the importance of the ethical value of that prerogative in Journalism when it ponders the judgment of demands that involve the secrecy of the source. In this way, we dedicate the first part to the study of the freedom speech in the Federal Constitution, to the right to information and the consequent conflicts between Journalism and personality rights. Next we analyze the international scenario, from similar experiences in Portugal and in the USA. Finally, we have brought in the main questions about the subject matter for the Brazilian reality
Neste trabalho, partimos da experiência prática do jornalista, da teoria da comunicação considerando a mensagem (notícia), o emissor (repórter) e o receptor (sociedade) e do uso imprescindível do sigilo da fonte em diferentes vertentes do Jornalismo para analisar o conflito central dessa dissertação. Qual a leitura que o Jornalismo e o Direito fazem do sigilo da fonte? O entendimento do jornalista leva em conta essencialmente a ética rígida da sua profissão e a considera imprescindível em todas as áreas do Jornalismo. Quando não age assim, entende que seu trabalho foi deturpado. Já o Direito a compreende como uma proteção constitucional (art.5º, inc.XIV), mas também a avalia dos pontos de vista do direito civil (obrigação) e penal. A diferença de percepção entre o jornalista e o Poder Judiciário a respeito do sigilo da fonte é que dá origem aos conflitos nos Tribunais. Entre jornalistas e fontes se estabelece uma relação de confiança. É firmado o comprometimento do silêncio quanto à origem da informação. Se o jornalista rompe o pacto de confidencialidade comete ato de traição com extensão de conseqüências na prática do Jornalismo e na sua credibilidade profissional que, por sua vez, irá ferir o direito constitucional à informação em suas três vertentes: o direito de informar, de se informar e de ser informado. No Brasil, ainda que seja possível perceber uma tendência do Poder Judiciário em ler a questão, considerando a importância da ética profissional, verificamos algumas iniciativas daqueles que se consideram vítimas dessa proteção constitucional, pleiteando para que os repórteres revelem seus informantes nos tribunais. Um dos objetivos deste trabalho é contribuir para o melhor entendimento dos magistrados, do jornalista e da sociedade sobre a formação da notícia. Ao Poder Judiciário propõe uma leitura que, além de considerar os aspectos jurídicos do tema, compreenda a importância do valor ético dessa prerrogativa no Jornalismo ao ponderar o julgamento das demandas que envolvem o sigilo da fonte. Nesse caminho, dedicamos a primeira parte ao estudo da liberdade de expressão na Constituição Federal, o direito à informação e os conflitos decorrentes do Jornalismo com os direitos da personalidade. Em seguida, analisamos o cenário internacional, partindo de experiências similares em Portugal e nos EUA. Por fim, trouxemos as principais questões a respeito do assunto para a realidade brasileira
Štangler, Jan. "Architektura a správa zabezpečených sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413065.
Повний текст джерелаKozla, Dávid. "Stavebně technologický projekt pro Mezinárodní centrum klinického výzkumu Fakultní nemocnice u sv. Anny v Brně." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2020. http://www.nusl.cz/ntk/nusl-409970.
Повний текст джерелаMukherjee, Manuj. "Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects." Thesis, 2017. http://etd.iisc.ac.in/handle/2005/3783.
Повний текст джерелаMukherjee, Manuj. "Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects." Thesis, 2017. http://etd.iisc.ernet.in/2005/3783.
Повний текст джерелаVatedka, Shashank. "Lattice Codes for Secure Communication and Secret Key Generation." Thesis, 2017. http://etd.iisc.ac.in/handle/2005/3584.
Повний текст джерелаVatedka, Shashank. "Lattice Codes for Secure Communication and Secret Key Generation." Thesis, 2017. http://etd.iisc.ernet.in/2005/3584.
Повний текст джерелаPolónia, Daniela Marisa Brioso. "A necessária implicação das fontes na produção da verdade jornalística e na concreta realização da Justiça." Master's thesis, 2015. http://hdl.handle.net/10362/16154.
Повний текст джерела