3 resultados para Proactive Secret Sharing
em AMS Tesi di Dottorato - Alm@DL - Università di Bologna
Resumo:
The latter part of the 20th century was a period characterized by a fundamental demographic transition of western society. This substantial and structural demographic change proposes several challenges to contemporary society and fosters the emergence of new issues and challenges. Among these, none is more crucial than the comprehension of the mechanisms and the processes that lead people to positive aging. Rowe and Kahn’s model of successful aging highlights the interplay between social engagement with life, health, and functioning for a positive aging experience. Other systemic models of successful aging (Kahana et al., 1996; 2003; Stevernik et al., 2006) emphasize the role of internal and external resources for attaining positive aging. Among these, the proactive coping strategies are indicated as important active strategies for avoiding the depletion of resources, counterbalancing the declines and maintaining social and civic involvement. The study has analyzed the role of proactive coping strategies for two facets of positive aging, the experience of a high social well-being and the presence of personal projects in fundamental life domains. As expected, the proactive coping strategies, referred to as the active management of the environment, the accumulation of resources and the actualization of human potentials are confirmed as positive predictors of high level of social well-being and of many personal projects focused on family, culture, leisure time, civic and social participation. Perceived health status give a significant contribution only to the possession of many personal projects. Gender and level of school education give also a significant contribution to these two dimensions of positive aging, highlighting how positive aging is rooted not only in the possession of personal resources, but also in historical models of education and in positive longitudinal chains related to early development.
Resumo:
La prova informatica richiede l’adozione di precauzioni come in un qualsiasi altro accertamento scientifico. Si fornisce una panoramica sugli aspetti metodologici e applicativi dell’informatica forense alla luce del recente standard ISO/IEC 27037:2012 in tema di trattamento del reperto informatico nelle fasi di identificazione, raccolta, acquisizione e conservazione del dato digitale. Tali metodologie si attengono scrupolosamente alle esigenze di integrità e autenticità richieste dalle norme in materia di informatica forense, in particolare della Legge 48/2008 di ratifica della Convenzione di Budapest sul Cybercrime. In merito al reato di pedopornografia si offre una rassegna della normativa comunitaria e nazionale, ponendo l’enfasi sugli aspetti rilevanti ai fini dell’analisi forense. Rilevato che il file sharing su reti peer-to-peer è il canale sul quale maggiormente si concentra lo scambio di materiale illecito, si fornisce una panoramica dei protocolli e dei sistemi maggiormente diffusi, ponendo enfasi sulla rete eDonkey e il software eMule che trovano ampia diffusione tra gli utenti italiani. Si accenna alle problematiche che si incontrano nelle attività di indagine e di repressione del fenomeno, di competenza delle forze di polizia, per poi concentrarsi e fornire il contributo rilevante in tema di analisi forensi di sistemi informatici sequestrati a soggetti indagati (o imputati) di reato di pedopornografia: la progettazione e l’implementazione di eMuleForensic consente di svolgere in maniera estremamente precisa e rapida le operazioni di analisi degli eventi che si verificano utilizzando il software di file sharing eMule; il software è disponibile sia in rete all’url http://www.emuleforensic.com, sia come tool all’interno della distribuzione forense DEFT. Infine si fornisce una proposta di protocollo operativo per l’analisi forense di sistemi informatici coinvolti in indagini forensi di pedopornografia.
Resumo:
This thesis is primarily based on three core chapters, focused on the fundamental issues of trade secrets law. The goal of this thesis is to come up with policy recommendations to improve legal structure governing trade secrets. The focal points of this research are the following. What is the optimal scope of trade secrets law? How does it depend on the market characteristics such as degree of product differentiation between competing products? What factors need to be considered to balance the contradicting objectives of promoting innovation and knowledge diffusion? The second strand of this research focuses on the desirability of lost profits or unjust enrichment damage regimes in case of misappropriation of a trade secret. A comparison between these regimes is made and simple policy implications are extracted from the analysis. The last part of this research is an empirical analysis of a possible relationship between trade secrets sharing and misappropriation instances faced by firms.