1,330 research outputs found

    Les conflits d'usage des espaces périurbains et le contentieux administratif. Le cas de la région Ile-de-France..

    Get PDF
    L’article porte sur une analyse des conflits d’usages d’espace, traduits par les requêtes devant la justice administrative française de 1981 à 2005. Le terrain d’étude est le périurbain francilien, territoire qui connaît une forte urbanisation et où la diversité des modes d’occupation du sol nécessite une meilleure compréhension de la dynamique spatiale et temporelle de la conflictualité. L’étude empirique montre une corrélation entre l’augmentation des conflits d’usage en Île-de-France et la dynamique de périurbanisation. Elle met en évidence un couplage entre certains types de conflits et certaines caractéristiques du territoire : les problèmes d’urbanisme font souvent l’objet conflictuel dominant dans les communes plutôt aisées, tandis que l’opposition aux infrastructures publiques se situe fréquemment dans les communes à forte urbanisation. Les nuisances des installations classées sont souvent localisées dans des communes plutôt peu aisées.The article provides an analysis of land-use conflicts extract from the rulings of French Administrative Courts from 1981 to 2005. It focuses on Paris’s suburb, where the urbanisation process and the diversity of land-use require a deeper comprehension of the problem. Our results show that the land-use conflict’s evolution is correlated with the urbanisation process. They also detect a coupling phenomenon between conflict’s type and territory’s parameters : urbanism disputes often arise in wealthy municipalities, whereas oppositions to public infrastructure have particularly risen in strongly urbanising towns. Classified industrial facility’s nuisances have been found in unfortunate municipalities.Île-de-France; contentieux; périurbanisation; conflit d’usage; Paris region; periurbanisation; land-use conflict; litigation;

    景気循環と金融政策に関する諸研究

    Get PDF
    京都大学新制・課程博士博士(経済学)甲第24164号経博第658号京都大学大学院経済学研究科経済学専攻(主査)教授 西山 慎一, 准教授 高橋 修平, 准教授 安井 大真学位規則第4条第1項該当Doctor of EconomicsKyoto UniversityDFA

    Cybersecurity Strategies for Universities With Bring Your Own Device Programs

    Get PDF
    The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study\u27s conceptual framework. The data collection process included interviews with 10 IT security professionals and the gathering of publicly-accessible documents retrieved from the Internet (n = 59). Data collected from the interviews and member checking were triangulated with the publicly-accessible documents to identify major themes. Thematic analysis with the aid of NVivo 12 Plus was used to identify 4 themes: the ubiquity of BYOD in higher education, accessibility strategies for mobile devices, the effectiveness of BYOD strategies that minimize risk, and IT security professionals\u27 tasks include identifying and implementing network security strategies. The study\u27s implications for positive social change include increasing the number of users informed about cybersecurity and comfortable with defending their networks against foreign and domestic threats to information security and privacy. These changes may mitigate and reduce the spread of malware and viruses and improve overall cybersecurity in BYOD-enabled organizations

    Cybersecurity Strategies for Universities With Bring Your Own Device Programs

    Get PDF
    The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study\u27s conceptual framework. The data collection process included interviews with 10 IT security professionals and the gathering of publicly-accessible documents retrieved from the Internet (n = 59). Data collected from the interviews and member checking were triangulated with the publicly-accessible documents to identify major themes. Thematic analysis with the aid of NVivo 12 Plus was used to identify 4 themes: the ubiquity of BYOD in higher education, accessibility strategies for mobile devices, the effectiveness of BYOD strategies that minimize risk, and IT security professionals\u27 tasks include identifying and implementing network security strategies. The study\u27s implications for positive social change include increasing the number of users informed about cybersecurity and comfortable with defending their networks against foreign and domestic threats to information security and privacy. These changes may mitigate and reduce the spread of malware and viruses and improve overall cybersecurity in BYOD-enabled organizations

    Fisheries Planning and Management in Vietnam:an explanation of ineffectiveness

    Get PDF
    corecore