Narrow your search
Listing 1 - 8 of 8
Sort by

Book
Autonomie und Struktur in Selbstlernarchitekturen : Empirische Untersuchung zur Dynamik von Selbstlernprozessen
Authors: ---
Year: 2008 Publisher: Leverkusen-Opladen : Verlag Barbara Budrich,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Die AutorInnen nehmen die Form und die Dynamik von Selbstlernprozessen im Rahmen institutioneller Kontexte der Professionalisierung in der Lehrerbildung in den Blick.


Book
Publizistische freiheit und persönlichkeitsschutz : zu den Grenzen der Verwertbarkeit realer biografien
Author:
Year: 2008 Publisher: Universitätsverlag Göttingen

Loading...
Export citation

Choose an application

Bookmark

Abstract

Publishing of diaries and biographies is a lucrative business, fictional texts are always looking close to real people and events that a market for the "sale" of life stories has become established. The development of law against this practice is fallen behind. The present study focuses on two questions circles. The first focus is on the systematization of the decision parameters and the derivation of concrete responses from the basics of intellectual property law. Die Veröffentlichung von Tagebüchern und Biografien ist ein einträgliches Geschäft, fiktionale Texte suchen immer wieder die Nähe zu realen Personen und Geschehnissen, ein Markt für den Verkauf von Lebensgeschichten hat sich etabliert. Die Rechtsentwicklung droht gegenüber dieser Praxis zurückzubleiben. Die Grenzen der erlaubnisfreien Darstellung fremder Lebensläufe werden von Bundesgerichtshof und Bundesverfassungsgericht unterschiedlich gezogen, der Rechtscharakter und die Wirkungen einer Erlaubniserteilung zur publizistischen Verwertung sind nicht abschließend geklärt. Die vorliegende Untersuchung widmet sich beiden Fragekreisen. Im Vordergrund stehen dabei die Systematisierung der Entscheidungsparameter und die Ableitung konkreter Antworten aus den Grundlagen des Immaterialgüterrechts.

Keywords

Privacy --- Freedom of the press --- Law


Book
Privacy in de arbeidsrelatie : gids voor het voeren van een privacybeleid.
Authors: --- --- ---
ISBN: 9789087640057 9087640056 Year: 2008 Volume: *7 Publisher: Gent Story publishers

Loading...
Export citation

Choose an application

Bookmark

Abstract

Het boek geeft heldere en overzichtelijke antwoorden bij actuele thema's: e-mail en internet, telefonie, camerabewaking, uitgangscontrole, gps en privacy bij werving en selectie. Wanneer is controle van het e-mailverkeer en internetgebruik van de werknemer toegelaten? Wanneer is controle van telefonische communicatie door de werkgever toegelaten? Wanneer is het gebruik van camera's in de onderneming toegelaten? Hoe moet camerabewaking worden ingevoerd? Wanneer zijn uitgangscontroles toegelaten? Wanneer is gebruik van een gps-lokalisatiesysteem in de onderneming toegelaten? Wanneer wordt de privacy van de sollicitant geschonden? Alle hoofdstukken zijn op gelijke wijze ingedeeld. Eerst krijgt u een duiding met de relevante juridische bepalingen. Vervolgens wordt uitgelegd onder welke voorwaarden en op welke wijze het recht op privacy kan worden beperkt. U krijgt ook een overzicht van mogelijke sancties en ieder hoofdstuk eindigt met een stappenplan voor het invoeren van controlemaatregelen.


Book
Le droit de la vie privée
Author:
ISBN: 9782804424770 2804424774 Year: 2008 Volume: *28 Publisher: Bruxelles : Larcier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Privacy - Privacy Nationaal - Privacy Internationaal - privacy persoonlijke levenssfeer & de grondslagen van het recht op privacy & de algemene regelen van het recht op privacy - de begunstigden van de bescherming - de omvang van het recht op privacy - het respect van de beschermde rechten - het gebruik van iemands gegevens met een persoonlijk karakter - het gebruik van iemands afbeelding & de reglementering van de persoonsgegevens in de nationale context - toepassingsgebied van de wet - de verantwoordelijke personen in de ogen van de wet - verplichte informatie voorafgaand aan de behandeling van persoonsgegevens - de individuele informatie bij het verkrijgen van de gegevens - de veiligheid en de vertrouwelijkheid van de gegevens - de behandeling van gevoelige medische en juridische gegevens - de rechten van de betrokken persoon & de reglementering van de persoonsgegevens in een internationale context - welke wet is van toepassing? - de overdracht van gegevens binnen de EU - de overdracht van gegevens naar derde landen & privacy en elektronische handel (e-commerce) - de profilering van de internauten - direct marketing & privacy en bewaking - de bewaking door de openbare diensten - de bewaking door private personen - de toelaatbaarheid van bewijzen & verhaal en sancties - de overdracht naar derde landen

Keywords

Human rights --- privacy --- Belgium --- Electronic surveillance --- Electronic commerce --- Privacy, Right of --- Surveillance électronique --- Commerce électronique --- Droit à la vie privée --- Law and legislation --- Droit --- Personality (Law) --- AA / International- internationaal --- 343.45 --- Respect de la vie privée Bescherming van het privé-leven --- Droit public Publiekrecht --- V60 - Protection de la vie privée - Bescherming persoonlijke levenssfeer --- Protection de la vie privée --- BPB0901 --- 342.7 <493> --- Droits de l'homme --- 342.7 <493> Grondwettelijke rechten en vrijheden. Fundamentele rechten--België --- Grondwettelijke rechten en vrijheden. Fundamentele rechten--België --- Onschendbaarheid van geheimen. Geheim persoonlijke levenssfeer, beroepsgeheim, bankgeheim. --- Eerbiediging van het privé-leven --- Rechten van de mens --- Surveillance électronique --- Commerce électronique --- Droit à la vie privée --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Onschendbaarheid van geheimen. Geheim persoonlijke levenssfeer, beroepsgeheim, bankgeheim --- Privacy [Right of ] --- privatumo apsauga --- beskyttelse af privatlivet --- varstvo zasebnosti --- eraelu puutumatuse kaitse --- Schutz der Privatsphäre --- заштита на приватноста --- protezione della vita privata --- заштита приватности --- ochrana soukromí --- proteção da vida privada --- protection of privacy --- privatlivets helgd --- privātās dzīves aizsardzība --- protección de la vida privada --- προστασία της ιδιωτικής ζωής --- a magánélet védelme --- ochrana súkromia --- prawo do prywatności --- неприкосновеност на частен живот --- yksityisyyden suoja --- mbrojtja e jetës private --- zaštita privatnosti --- eerbiediging van het privé-leven --- protezzjoni tal-privatezza --- protecția vieții private --- Recht auf Respektierung der Privatsphäre --- тајност на писмата --- teisė į privatumą --- diritto della vita privata --- derecho a la intimidad --- tutela della vita privata --- a magán- és családi élet tiszteletben tartásához való jog --- právo na súkromie --- ochrana soukromého a rodinného života --- recht op privacy --- δικαίωμα σεβασμού της ιδιωτικής ζωής --- dreptul la respectatrea viații private --- õigus eraelu puutumatusele --- ret til privatliv --- right to privacy --- rätt till privatliv --- direito ao respeito da vida privada --- tiesības uz privāto dzīvi --- pravo na privatnost --- oikeus yksityisyyteen --- e drejtë për jetë private --- интегритет на личноста --- право на приватност --- právo na soukromí --- protecção da vida privada --- recht op privé-leven --- droit au respect de la vie privée --- derecho al honor --- rispetto della vita privata --- človekove pravice --- derechos humanos --- ľudské práva --- prawa człowieka --- ljudska prava --- δικαιώματα του ανθρώπου --- човешки права --- human rights --- inimõigused --- cilvēktiesības --- rechten van de mens --- lidská práva --- cearta an duine --- ihmisoikeudet --- direitos humanos --- људска права --- emberi jogok --- menneskerettigheder --- човекови права --- drittijiet tal-bniedem --- mänskliga rättigheter --- žmogaus teisės --- të drejtat e njeriut --- diritti umani --- drepturile omului --- Menschenrechte --- kršenje ljudskih prava --- Verletzung der Menschenrechte --- diritti fondamentali dell'uomo --- Verteidigung der Menschenrechte --- nezadatelná práva --- ανθρώπινα δικαιώματα --- nepromlčitelná práva --- pasikėsinimas į žmogaus teises --- фундаментални слободи и права на човекот и граѓанинот --- zaštita ljudskih prava --- porušování lidských práv --- atentado a los derechos humanos --- Schutz der Menschenrechte --- mbrojtje e të drejtave të njeriut --- krænkelse af menneskerettighederne --- cilvēktiesību apdraudējums --- παραβίαση των δικαιωμάτων του ανθρώπου --- violarea drepturilor omului --- aantasting van de rechten van de mens --- porušenie ľudských práv --- Beeinträchtigung der Menschenrechte --- mensenrechten --- emberi jogok védelme --- emberi jogok megsértése --- kränkning av mänskliga rättigheter --- atteinte aux droits de l'homme --- útok na ľudské práva --- ihmisoikeusloukkaus --- προσβολή των δικαιωμάτων του ανθρώπου --- attack on human rights --- protección de los derechos humanos --- cilvēktiesību aizsardzība --- bescherming van de rechten van de mens --- salvaguardia dei diritti dell'uomo --- proteção dos direitos humanos --- tilsidesættelse af menneskerettighederne --- ihmisoikeuksien suojelu --- protezione dei diritti umani --- Конвенција за заштита на човековите права и основните слободи --- skydd av mänskliga rättigheter --- violación de los derechos humanos --- cilvēktiesību pārkāpums --- ochrana ľudských práv --- žmogaus teisių apsauga --- ihmisoikeuksien uhkaaminen --- prava čovjeka --- derechos del hombre --- rispetto dei diritti dell'uomo --- schending van de rechten van de mens --- inimõiguste kaitse --- protecția drepturilor omului --- shkelje e të drejtave të njeriut --- violação dos direitos humanos --- brott mot mänskliga rättigheter --- beskyttelse af menneskerettigheder --- ochrana lidských práv --- inimõiguste ohustamine --- violation des droits de l'homme --- повреда на граѓанските права --- cenim i të drejtave të njeriut --- žmogaus teisių pažeidimas --- cilvēka pamattiesības --- граѓански слободи и права --- προστασία των δικαιωμάτων του ανθρώπου --- ofensa aos direitos humanos --- заштита на правата и слободите на граѓаните --- кршење на човековите права --- human rights violation --- violazione dei diritti umani --- protection of human rights --- inimõiguste rikkumine --- reato contro i diritti dell'uomo --- protection des droits de l'homme --- cosaint príobháideachais --- Protection de la vie privée --- Privacy, Right of - Belgium --- Personality (Law) - Belgium --- Electronic surveillance - Law and legislation - Belgium --- Electronic commerce - Law and legislation - Belgium --- Droit public --- Droit à la vie privée et familiale --- Surveillance --- Inviolabilité du domicile --- Secret des communications --- Données à caractère personnel --- Cour européenne des droits de l'homme --- Protection des droits de l'homme --- Détective privé


Book
Forensische auditing : wettelijke en reglementaire context voor het financiële rechercheren.
Author:
ISBN: 9782804400316 280440031X Year: 2008 Volume: *20 Publisher: Brussel Larcier


Periodical
Security and communication networks.
ISSN: 19390122 19390114 Year: 2008 Publisher: [Chichester, West Sussex, England] : [London] : John Wiley & Sons, Wiley Hindawi Partnership


Book
Intrusion detection systems
Authors: ---
ISBN: 9780387772653 0387772650 9780387772660 1441945857 9786611491758 1281491756 0387772669 Year: 2008 Publisher: Gaithersburg, MD Springer US

Loading...
Export citation

Choose an application

Bookmark

Abstract

In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems (IDSs). Intrusion Detection Systems is an edited volume by world class leaders in this field. This edited volume sheds new light on defense alert systems against computer and network intrusions. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more. This volume is presented in an easy-to-follow style while including a rigorous treatment of the issues, solutions, and technologies tied to the field. Intrusion Detection Systems is designed for a professional audience composed of researchers and practitioners within the computer network and information security industry. It is also suitable as a reference or secondary textbook for advanced-level students in computer science. .

Keywords

Computer networks --- Réseaux d'ordinateurs --- Security measures. --- Sécurité --- Mesures --- Computer networks -- Security measures. --- Computer Science -- IT. --- Computer security. --- Intrusion detection systems (Computer security). --- Engineering & Applied Sciences --- Computer Science --- Electrical & Computer Engineering --- Telecommunications --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer organization. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer Systems Organization and Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Organization, Computer --- Informatics --- Science --- Distributed processing --- Computer network architectures. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Putting crime in its place : units of analysis in geographic criminology
Authors: --- ---
ISBN: 0387096876 1441909737 9786611810856 1281810851 0387096884 3540096884 3540096884 3540111069 0387111069 3540132260 0387132260 3540150005 0387150005 3540155481 0387155481 3540552553 0387552553 3540096892 0387096892 3540111077 0387111077 0387138196 3540138196 3540096906 0387096906 3540111085 0387111085 0387130195 3540130195 3540155554 0387155554 9780387096872 9781441909732 1441935177 9786612924200 1282924206 3662149850 3540469958 3662150719 354039463X 3662152339 3540388192 3662152355 354038829X 3662152614 3540390480 3662152630 3540392092 3662153343 354047028X 3662159783 3540385193 3662159988 3540385223 3662153246 3540385975 3662161311 3540394680 Year: 2008 Publisher: New York ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing and Mining Uncertain Data contains surveys by well known researchers in the field of uncertain databases. The book presents the most recent models, algorithms, and applications in the uncertain data field in a structured and concise way. This book is organized so as to cover the most important management and mining topics in the field. The idea is to make it accessible not only to researchers, but also to application-driven practitioners for solving real problems. Given the lack of structurally organized information on the new and emerging area of uncertain data, this book provides insights which are not easily accessible elsewhere. Managing and Mining Uncertain Data is designed for a varied audience composed of professors, researchers and practitioners in industry. This book is also suitable as a reference book for advanced-level database students in computer science and engineering. Editor Biography Charu C. Aggarwal obtained his B.Tech in Computer Science from IIT Kanpur in 1993 and Ph.D. from MIT in 1996. He has been a Research Staff Member at IBM since then, and has published over 120 papers in major conferences and journals in the database and data mining field. He has applied for or been granted over 65 US and International patents, and has thrice been designated Master Inventor at IBM for the commercial value of his patents. He has been granted 17 invention achievement awards by IBM for his patents. His work on real time bio-terrorist threat detection in data streams won the IBM Corporate award for Environmental Excellence in 2003. He is a recipient of the IBM Outstanding Innovation Award in 2008 for his scientific contributions to privacy technology, and a recipient of the IBM Research Division award for his contributions to stream mining for the System S project. He has served on the program committee of most major database conferences, and was program chair for the Data Mining and Knowledge Discovery Workshop, 2003, and program vice-chairs for the SIAM Conference on Data Mining 2007, ICDM Conference 2007, and the WWW Conference, 2009. He served as an associate editor of the IEEE Transactions on Data Engineering from 2004 to 2008. He is an associate editor of the ACM SIGKDD Explorations and an action editor of the Data Mining and Knowledge Discovery Journal. He is a senior member of the IEEE and a life-member of the ACM.

Keywords

Applied human geography. --- Crime analysis. --- Crime prevention. --- Crime --- Applied human geography --- Crime analysis --- Criminology, Penology & Juvenile Delinquency --- Social Welfare & Social Work --- Social Sciences --- Applied anthropogeography --- Applied cultural geography --- Applied social geography --- Analysis --- Geochemistry, Biogeochemistry --- Geochemistry, Biogeochemistry. --- Brottsbekämpning. --- Crime prevention measures. --- Geographic distribution of crime. --- Measure of uncertainty (Information theory) --- Shannon's measure of uncertainty --- System uncertainty --- Crime. --- City crime --- Crime and criminals --- Crimes --- Delinquency --- Felonies --- Misdemeanors --- Urban crime --- Social aspects --- Computer science. --- Computer security. --- Database management. --- Data mining. --- Information storage and retrieval. --- Artificial intelligence. --- Computer Science. --- Data Mining and Knowledge Discovery. --- Database Management. --- Artificial Intelligence (incl. Robotics). --- Information Storage and Retrieval. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Sociology. --- Demography. --- Criminology and Criminal Justice. --- Criminology and Criminal Justice, general. --- Sociology, general. --- Police administration --- Social problems --- Criminal justice, Administration of --- Criminal law --- Criminals --- Criminology --- Transgression (Ethics) --- Human geography --- 504 --- 550.47 --- 550.47 Biogeochemistry --- Biogeochemistry --- 504 Environment. Environmental science --- Environment. Environmental science --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Uncertainty (Information theory) --- Information measurement --- Probabilities --- Questions and answers --- Biogeochemical cycles. --- Environmental chemistry. --- Environmental Sciences and Forestry. Geology --- Environmental Sciences and Forestry. Environmental Management --- Environmental Pollution. --- Biogeochemical cycles --- Environmental chemistry --- Chemistry, Environmental --- Chemistry --- Ecology --- Cycles --- Chimie de l'environnement --- Pollution --- Environmental aspects --- Pollutants --- Toxicology --- Criminology. --- Information storage and retrieva. --- Artificial Intelligence. --- Historical demography --- Social sciences --- Population --- Vital statistics --- Study and teaching --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Social theory --- Ecology. --- Metals. --- Adsorption --- Chemical industry. --- Chemical industry --- Microbiology. --- Microbiology --- Oxidation. --- Oxidation --- Air --- Biological transport --- Photochemistry --- Plant metabolism --- Reaction (chemistry) --- Sedimentation --- Soils --- Solubility --- Chelation --- Metabolism (animal) --- Reaction kinetics --- Microbial degradation --- Asbestos --- Carbon black --- Cellulose --- Molybdenum --- Phosphorus --- ENVIRONMENTAL CHEMISTRY --- ENVIRONMENTAL TOXICOLOGY --- POLLUTION --- HYDROCARBONS, FLUORO --- MERCURY --- CADMIUM --- ALKANES --- DYES --- PIGMENTS --- ENVIRONMENTAL ASPECTS --- Amines --- Aromatic compounds --- Esters --- Phosphates --- Thallium

Listing 1 - 8 of 8
Sort by