Search results for "secrecy"

showing 10 items of 22 documents

Michelin : du culte du secret à la transparence?

2015

Transparency the ultimate virtue of society, the guarantee of truth (?), between right and duty, is often expressed in opposition to secret or even lie. Organizations are faced with and often trapped between these extremes. The Michelin Corporation that will serve as the basis for our analysis is often presented as the Corporation of secrecy. As a real myth in our collective consciousness, it illustrates the dual relationship between transparency and secrecy, which appeared to have been successful given its longevity and ranking among the largest French leading companies in terms of CSR. From the materiality of objects and spaces to intangible rhetoric, the Group comprehensive communication…

transparency[SHS.INFO]Humanities and Social Sciences/Library and information sciencessecrettransparenceethics[SHS.INFO] Humanities and Social Sciences/Library and information sciencessecrecyaestheticstechnologyéthiqueCSResthétiquetechnologieRSE
researchProduct

Zasięg korporacyjnego upoważnienia aplikanta do zastępstwa

2023

Upoważnienie aplikanta do zastępstwa funkcjonuje od dawna. Jako że ma charakter tylko albo aż upoważnienia korporacyjnego, stąd też na tym tle jest ono różnie postrzegane. Do tego dochodzą dylematy w zakresie pełnienia przez profesjonalnego pełnomocnika funkcji kuratora, a także kwestia udzielenia upoważnienia do zastępstwa dla aplikanta czy nawet substytucji procesowej dla innego profesjonalnego pełnomocnika w osobie adwokata lub radcy prawnego. Wielość wątków z uwagi na szerokie spektrum aktywności aplikanta, co wiązać należy z odbywaną przez niego aplikacją adwokacką albo radcowską, pociąga za sobą konieczność umiejscowienia go w szeroko rozumianym wymiarze sprawiedliwości jako osoby qua…

authorisation to defendtrainee advocatekorporacje prawniczeprofesjonalny pełnomocnik procesowyurgent legal actionsubstitution power of attorneyprofessional litigation representativekuratorpełnomocnictwo substytucyjnedefence attorneypower of attorney to represent in court proceedingsguardian ad litemupoważnienie do obronynagła czynność procesowatrainee attorneyat lawadvocateattorney-at-lawadwokatpełnomocnictwo procesoweradca prawnydefence secrecytajemnica obrończalaw corporationsobrońcaupoważnienie korporacyjne do zastępstwaaplikant radcowskicorporate mandate for representationaplikant adwokackiPalestra
researchProduct

Not Worth the Net Worth? The Democratic Dilemmas of Privileged Access to Information

2017

In this article, we discuss the democratic conditions for parliamentary oversight in EU foreign affairs. Our point of departure is two Interinstitutional Agreements (IIAs) between the Council and the European Parliament (EP), which provide the latter with access to sensitive documents. To shed light on this issue, we ask to what extent these contribute to the democratic accountability in EU foreign policy? It is argued that the IIAs have strengthened the EP’s role in EU foreign affairs by giving it access to information to which it was previously denied. This does not mean, however, that this increase in power equals a strengthening of the EP as a democratic accountability forum. First of a…

European ParliamentparliamentPublic AdministrationSociology and Political ScienceEuropean PoliticsParliamentmedia_common.quotation_subjectPolitikwissenschaft0211 other engineering and technologies02 engineering and technologyEuropapolitikPublic administrationInformation policyPower (social and political)secrecylcsh:Political science (General)Political science050602 political science & public administrationmedia_common.cataloged_instancePrivileged accessEuropean UnionAußenpolitikEuropean unionlcsh:JA1-92Political scienceEuropaparlamentmedia_commoninformation policytransparency021110 strategic defence & security studies05 social sciencesParlamentKontrolledemocratic accountabilitydemocratic accountability; secrecyTransparency (behavior)Democracy0506 political scienceTransparenzforeign policyForeign policyddc:320EUInformationspolitikcontrolIndraStra Global
researchProduct

Managing skunkworks to achieve ambidexterity: The Robinson Crusoe effect

2021

Abstract Literature on ambidexterity emphasizes the need for both exploration and exploitation. Large firms usually choose to implement structural ambidexterity to separate both activities. We here focus on an extreme case of such structural partitioning implemented as a secret skunkworks project in a large French automotive company. A qualitative survey using both primary and secondary data shows that the major basic and initial characteristics of a skunkworks (i.e. secrecy, urgency, and autonomy) created favorable conditions for the technological exploration. However, exploitation failed due to precisely those same characteristics coupled with the fact that the project did not respond to …

business.industryStrategy and Managementmedia_common.quotation_subject05 social sciencesAutomotive industrySkunkworks projectQualitative surveySupply and demand0502 economics and businessSecrecy050211 marketingBusiness050203 business & managementAutonomyIndustrial organizationmedia_commonAmbidexterityEuropean Management Journal
researchProduct

Don't Tell Us: The Demand for Secretive Behaviour

2009

The matter studied here is how, and with what implications, people may decide that they do not want to be let into secrets that concern them. They could get the information at no cost but they refuse to know. The reasoning is framed in terms of principals and agents, with the principals assumed not to want to know the agents' secrets. For convenience, the context chosen for the exposition is mainly that of voters as principals and the government or the office-holders as agents. After some exploration of the motivations underlying the attitude of the principals, the paper focuses on the case when neither total secrecy nor total disclosure prevails. The demand for partial secrecy is analysed …

GovernmentSalience (language)business.industrymedia_common.quotation_subjectContext (language use)Public relationsInformation asymmetryVotingPolitical scienceTransparency (graphic)Secrecybusinessmedia_commonExposition (narrative)SSRN Electronic Journal
researchProduct

Secure and efficient data storage in unattended wireless sensor networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…

Scheme (programming language)business.industryComputer scienceMobile computingHomomorphic encryptionCryptographyComputer data storageSecrecyVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile telephonybusinesscomputerWireless sensor networkcomputer.programming_languageComputer network
researchProduct

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs

2010

Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accident…

Computer sciencebusiness.industryForward secrecyReliability (computer networking)Node (networking)SecrecyDistributed data storeProbabilistic logicData securitybusinessWireless sensor networkComputer network2010 IEEE Global Telecommunications Conference GLOBECOM 2010
researchProduct

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

2020

Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…

PROTOCOLSCRYPTOGRAPHYComputer Networks and CommunicationsComputer scienceGROUP COMMUNICATIONKey distributionCore networkRESEAU INFORMATIQUEAccess control02 engineering and technologySCALABILITYTECHNOLOGIE SANS FIL[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]TELECOMMUNICATIONForward secrecy0202 electrical engineering electronic engineering information engineeringRekeyingINTERNET OF THINGSElectrical and Electronic EngineeringINTERNETSECURITEDYNAMIC ENVIRONMENTSECURITYIOTTRAITEMENT DES DONNEESbusiness.industryKey distribution center020206 networking & telecommunicationsWIRELESS SENSOR NETWORKSRESEAU DE TELECOMMUNICATIONSGROUP KEY MANAGEMENTINFORMATIQUECommunication in small groupsScalabilityARCHITECTURE CLIENT-SERVEURbusinessCOMPUTER ARCHITECTUREACCESS CONTROLComputer network
researchProduct

Practicing Ballot Secrecy: Postal Voting and the Witness Requirement at the 2019 Finnish Elections

2021

Electoral rights belong to the core of citizenship in democratic nation-states. Voting, then, represents an actualization of the relationship between the citizen and the political community. For citizens living outside the country in which they are eligible to vote, voting signifies a rare institutional connection to the country of origin. The aim of this article is to explore the introduction of the postal vote, a new form of voting for external voters at Finnish elections, from the grassroots perspective. The study focuses on how a central policy concern, safeguarding ballot secrecy, was resolved in the policy implementation by the witness requirement, and how the individual voters subseq…

votingnon-resident citizenselectoral practicesballot secrecypostal votingPolitical scienceFinlandJFrontiers in Political Science
researchProduct

Practicing Ballot Secrecy : Postal Voting and the Witness Requirement at the 2019 Finnish Elections

2021

Electoral rights belong to the core of citizenship in democratic nation-states. Voting, then, represents an actualization of the relationship between the citizen and the political community. For citizens living outside the country in which they are eligible to vote, voting signifies a rare institutional connection to the country of origin. The aim of this article is to explore the introduction of the postal vote, a new form of voting for external voters at Finnish elections, from the grassroots perspective. The study focuses on how a central policy concern, safeguarding ballot secrecy, was resolved in the policy implementation by the witness requirement, and how the individual voters subseq…

asuminen ulkomaillaexternal votersPublic AdministrationSociology and Political Sciencenon-resident citizenspostal votingennakkoäänestysvaalilakivotingPolitical Science and International Relations5171 Political Scienceäänestäminenelectoral practicesSafety Researchballot secrecyvaalitFinland
researchProduct