| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990007140010403321 |
|
|
Titolo |
Giudizio a quo e promovimento del processo costituzionale : atti del Seminario svoltosi in Roma, Palazzo della Consulta, nei giorni 13 e 14 novembre 1989 |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
|
|
Collocazione |
|
DP XIX - 254 |
VIII E 9a |
VIII E 9b |
CONGRESSI G 14 |
DP XIX- 105 |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996495570903316 |
|
|
Titolo |
Trust, privacy and security in digital business : 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, proceedings / / edited by Sokratis Katsikas, Steven Furnell |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (106 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science ; ; v.13582 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Business - Computer programs |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Preface -- Organization -- Contents -- PriPoCoG: Guiding Policy Authors to Define GDPR-Compliant Privacy Policies -- 1 Introduction -- 2 Background -- 2.1 General Data Protection Regulation -- 2.2 Layered Privacy Language -- 2.3 Prolog -- 3 Related Work -- 4 Framework -- 4.1 Overview -- 4.2 Procedure -- 4.3 GDPR Coverage -- 4.4 Privacy Policy Editor -- 5 Formalization: P-LPL -- 6 Case Study: Amazon.de -- 6.1 Methodology -- 6.2 Results -- 6.3 Performance -- 7 Discussion and Future Work -- References -- Closing the Gap Between Privacy Policies and Privacy Preferences with Privacy Interfaces -- 1 Introduction -- 2 Related Work -- 3 Running Example -- 4 Privacy Interfaces -- 4.1 Workflow -- 4.2 Syntactic and Semantic DPV Extension -- 4.3 Privacy Language Mapping -- 5 Evaluation -- 5.1 Mapping Evaluation -- 5.2 Processing Performance -- 6 Discussion -- 7 Conclusion -- References -- A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games -- 1 Introduction -- 2 Information Privacy Awareness and Competences -- 2.1 Information Privacy Awareness -- 2.2 Information Privacy Competences -- 2.3 Existing Works in Developing Information Privacy Knowledge and Skills -- 2.4 Existing Works in Developing Information Privacy Social Role, Traits, Self-image and Motives -- 3 Constructivism in the Design of Educational Interventions and Information Privacy Learning -- 4 Development of the Proposed Framework for Raising |
|
|
|
|
|
|
|
|
|
|
Information Privacy Competences -- 4.1 Games in the Role of Educational Tools -- 4.2 The Effectiveness of Playful Environments for Learning -- 4.3 A New Type of Serious Game: The Escape Room -- 4.4 Escape Rooms for Learning -- 5 An Educational Escape Room for Information Privacy -- 6 Conclusions -- References. |
Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply Privacy- and Authenticity-Enhancing Technologies -- 1 Introduction -- 2 Research Methods -- 2.1 Methodologic Triangulation -- 2.2 Investigator Triangulation -- 3 Technology Classification -- 4 Challenges and Technology Mapping -- 4.1 SDE Challenges (RQ1) -- 4.2 Technology Mapping (RQ2) -- 5 Discussion -- 6 Related Work -- 7 Conclusion -- References -- Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Threat Sharing Platform -- 3.2 Host Intrusion Detection System -- 3.3 STDM Central Coordinator -- 3.4 Watchdog -- 3.5 Honeypot -- 4 Implementation -- 4.1 Threat Sharing Platform -- 4.2 STDM -- 4.3 Host Intrusion Detection System -- 4.4 Isolated Environments -- 4.5 Watchdog -- 5 Evaluation -- 5.1 Environment Description -- 5.2 Methodology -- 5.3 Results -- 6 Conclusion -- 7 Future Work -- References -- Homomorphic Encryption in Manufacturing Compliance Checks -- 1 Introduction -- 2 Background -- 2.1 Homomorphic Encryption Schemes -- 2.2 Related Work -- 2.3 HE Challenges and Limitations -- 3 Point Cloud Mesh Distance in Manufacturing -- 3.1 COLLABS Use Case -- 3.2 Point Cloud to Mesh Distance Computation and Implementation -- 4 HE Based Module Design -- 5 Packing Strategies Evaluation -- 6 Conclusion and Future Work -- References -- Author Index. |
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910969828503321 |
|
|
Titolo |
The United Nations : past, present and future : proceedings of the 2007 Francis Marion University UN symposium / / Scott Kaufman and Alissa Warters, editors |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, : Nova Science Publishers, c2009 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (271 p.) |
|
|
|
|
|
|
Collana |
|
Global political studies series |
|
|
|
|
|
|
Altri autori (Persone) |
|
KaufmanScott <1969-> |
WartersAlissa |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- The United Nations. Past, Present and Future: Proceedings of the 2007 Francis Marion University UN Symposium -- Contents -- Editor's Foreword -- List of Participants -- Transcript of the First Ambassadorial Session -- Transcript of the Second Ambassadorial Session -- Peacekeeping and Security -- Introduction -- Managing Risk, Protecting Populations, Blurring Spaces of Governance: Kofi Annan's Vision for a UN-Led Collective Security System in the New Millenium -- Abstract -- Introduction -- Managing Risk, Protecting People, Re-envisioning Sovereignty -- Disputes -- Conclusion -- Note -- References -- From Policy to Practice: Security Sector Reform in Liberia -- Abstract -- From Policy to Practice: Security Sector Reform in Liberia -- Historical Roots of the Conflict -- End of Americo-Liberian Rule -- 1980-1989: The Reign of Samuel Doe -- 1989-2003: The Reign of Charles Taylor -- 2005: Elections -- Transforming the Security Situation -- Program Timeline -- Lesson One: Policy to Practice Begins with the Peace Agreement -- Lesson Two: Justice verses Security -- Lesson Three: Human Security Matters -- Conclusion -- Glossary -- References -- The Suez Crisis and the Emergence of the First International UN Peacekeeping Emergency Force, 1956-1967 -- Abstract -- Introduction -- Historical Background of the 1956 Suez Crisis -- Background of the Suez Crisis -- The Regional Aspect of the Suez War -- The International Aspect of the Suez War -- UN |
|
|
|
|
|
|
|
|
|
|
|
Intervention -- Conclusion -- Appendix: UNEF 1: Facts and Figures -- References -- Introductory Essay: The United Nations and Human Rights -- The United Nations and Human Rights: Implementing Humanitarian Intervention, International Criminal Justice and Humanitarianism -- A Short History of the Responsibility to Protect -- The Developing International Justice Regime: The Responsibility to Prosecute. |
Neo-Humanitarianism: The Responsibility to Feed -- Dynamics of Responsibilities -- The UN and Darfur -- Conclusion -- References -- The Genocide Convention in Historical Perspective: International Courts Then and Now -- The Role of the International Court of Justice -- An International Criminal Court -- Conclusion -- References -- Turbulent Transition: From the UN Human Rights Commission to the Council -- I. Membership, Election Mandate -- II. Standard Setting -- III. Protection of Human Rights in Specific States -- IV. Special Procedures -- V. Miscellaneous -- VI. Conclusion -- References -- The United Nations and Regional Organizations -- The Challenges of Maintaining Peace and Security in the 21st Century: The United Nations and Regional Organizations -- Abstract -- The UN Charter and Regional IGO-UN Relations -- Trends in Regionalism and Regional Security Architecture -- Post-Cold War Trends in UN and Regional Peace Operations -- Developing the Relationship between the UN and Regional Organizations -- Conclusion -- References -- Decentralized, Often Disjointed: The UN and Regional Organizations in Economic Development -- Region as a Way to Organize the United Nations -- Regional and Caucusing Groups in the United Nations -- Region as a Way to Implement UN Economic Activities -- The UN and Regional Organization as Cooperating Partners -- The UN and Regional Organizations as Competitors -- Regional Organizations as Independent Organizations -- Explaining the Relationship between the UN and Regional Organizations on Economic Issues -- References -- Achieving International Peace and Security: The Need for a Closer Cooperation between the United Nations and Regional International Organizations -- Regionalism in World Politics -- The Legal Basis of Regionalism -- Regional Peacekeeping in Perspective -- The Contribution of RAs to PKOs. |
Advantages of Regional Peacekeeping Operations -- Disadvantages of Regional Peacekeeping Operations -- Advantages versus Disadvantages -- Conclusion -- References -- Index. |
|
|
|
|
|
|
Sommario/riassunto |
|
The United Nations (UN) is an international organisation whose stated aims are to facilitate co-operation in international law, international security, economic development, social progress, human rights and achieving world peace. This new book presents the proceedings of a conference dedicated to the past, present and future of the UN. |
|
|
|
|
|
|
|
| |