National Repository of Grey Literature 70 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
The transfer and protection of information in mobile telecommunications
Pacák, Pavel ; Ivánek, Jiří (advisor) ; Pavlásková, Eliška (referee)
Charles University in Prague Faculty of Arts Institute of Information Studies and Librarianship Study program: Information Studies and Librarianship Field of study: Information Studies and Librarianship Pavel Pacák The transfer and protection of information in mobile telecommunications Bachelor thesis abstract The work focuses on the transfer and protection of information in mobile telecommunications. First, historical development of each technology used is introduced. Also different forms of thread which user can face in every day use of his cell phone are listed. In the end few possible solutions of security policy are presented. Possible ways of communication with higher level of security which can be used with your cell phone are the conclussion.
The Role of Rating Agencies in the Worldwide Crise
Kratochvíl, Jan ; Očko, Petr (advisor) ; Ivánek, Jiří (referee)
The thesis focuses on the role of rating agencies in the financial crisis. The aim of the thesis is to judge a rate how much rating agencies contributed to give rise to last financial crisis, began by fall of Lehman Brothers in 2008. A main question is whether rating agencies acted inadvertently or on purpose and which all factors contributed most to result in financial crisis and as well how the rating agencies could influence and cope with these factors. The thesis deals with regulation of rating agencies and their appropriateness too. Rating and its aspects in theoretical way are described in the first part of the work. The real situation of rating industry prior to and in financial crisis is described in the second practical part of the thesis.
Expert systems in military
Stahl, Ladislav ; Ivánek, Jiří (advisor) ; Papík, Richard (referee)
This master thesis deals with the topic of expert systems in the military. In the first part, expert systems are described in general focusing on the theoretical aspects. The creation, types, structure, architecture, advantages, disadvantages and history of expert systems and knowledge acquisition are described. The next part of the thesis deals with the specific military and security (defence) applications of expert systems. There are descriptions of applications from Ground forces (ADRIES, ESROC, KBGIS, PRIDE, TED systems), Air forces (AIRID, LES, TATR), NAVY (systems BATTLE, SIAMES systems), Joint forces (AI-EOD, CMES, GTEX, MBEES, MCTA, SEAT SEC systems) and security areas (EPS-APES, DOC - EXPLOIT, FRIEND - FOE / FIRE DECISION systems). A more detailed description of ADRIES, BATTLE, KBGIS a FRIEND - FOE DETECTION / FIRE DECISION expert systems is included in the final part of the thesis.
Information Systems Quality Measurement and Evaluation
Kostiha, František ; Vlasák, Rudolf (advisor) ; Ivánek, Jiří (referee) ; Fiala, Alois (referee)
CHARLES UNIVERSITY IN PRAGUE Faculty of Arts Institute of Information Studies and Librarianship February 2012 DISERTATION THESIS ABSTRACT Information Systems Quality Measurement and Evaluation This dissertation thesis includes a concept of an information system evaluation based on the criteria provided with respect to the philosophical, historical and cultural context and using contemporary methodologies well proven in industrial quality assurance systems. The reasoning and proper foundations are made with the sampling methodology through the selected sources interpretation. A comprehensive and an integral approach apply paradigms inspired with for example Aristotle, Giordano Bruno, Confucius and also with the contemporary authorities in philosophy and arts (Belohradsky), information science (Wiener, Shannon, Nielsen), management (Ducker), economy (Stieglitz), psychology and sociology (Kohoutek, Koukolik), quality assurance systems and software and information technology quality assurance systems based on the CSN, EN, ISO and IEC standards. The essence and the nature of information are put to the relation with a value in its social, economic and ethic sense. Based on the information systems quality model designed on such basis, using the statistic methodologies and the seven year data retention pool, the...
Historical development of cryptography during the World Wars era
Vaverka, Ondřej ; Ivánek, Jiří (advisor) ; Souček, Martin (referee)
This bachelor thesis deals with the description of cryptographic and cryptanalytic methods during the First and Second World Wars and related historical circumstances. The introduction briefly describes the development of cryptology prior to WWI. The first major chapter examines the application of cryptology during WWI. The next chapter concisely bridges the interwar period, and then focuses on WWII cryptology. The Ultra programme and the problem of Enigma machine is analyzed here in detail. The final chapter is a dedicated to the aftermath of WWII cryptographic efforts in the form of papers by Claude E. Shannon.
Development and utilization of hash functions for information processing
Zimmermannová, Jana ; Ivánek, Jiří (advisor) ; Souček, Martin (referee)
At the end of 70th of last century the concept began to emerge, now is referred as a cryptographic hash function. Currently, these functions are associated especially with a digital signature. In 2005, the worldwide most used function SHA-1 was broken. This fact led in 2007 NIST announced a public competition to create a new secure hash algorithm. This Thesis deals with issues of cryptographic hash functions from the beginning of their theoretical formulation to current events in this area. Key words: Cryptographic hash functions, SHA-1, MD5, NIST competition
The Information Control in the Information Channel on an Example of Gatekeeping Mechanism
Bydžovská, Barbora ; Sluková, Petra Zia (advisor) ; Ivánek, Jiří (referee)
This master thesis is devoted to the theoretical framework and the background for the information control in an information channel with a chapter on the specific form of control information, that is the gatekeeping mechanism. The practical part focuses on the research in the Christian community and to identify methods of gatekeeping mechanisms in this group. The second chapter introduces the key concepts of the thesis such as information theory. The third chapter summarizes the operation and types of censorship and information control process, and points out the signal noise in the transmission of an information. The fourth chapter describes the historical development and transformation in the understanding of gatekeeping, including the new concept of gatekeeping on the network level. The fifth chapter focuses on the dynamics of information control, especially for using in decision-making, knowledge sharing and gatekeeper's acting according to his type of behavior. The sixth and seventh chapter deals with the research itself, including the accompanying document, the determination of a methodology, a representative sample, etc.
Study of Knowledge and Information Management use in practise
Hodrová, Jitka ; Basl, Josef (advisor) ; Ivánek, Jiří (referee)
The main goal of this master thesis is to investigate and evaluate the use of Knowledge and Information Management in practise. The thesis summarizes the actual tools and principals of Knowledge and Information Management and does research in specific eight institutions with subsequent evaulation of the results and recommendations. A questionary accompanied by an introduction letter and a dictionary of terms were created for the purpose of the research. -- The thesis starts with theoretical description of information and knowledge management. It continues with practical part describing three corporate environments. The main part of the thesis is a research performed by a questionary. -- The questionary comprises of three parts. The first part characterises the questioned subjects and their work environment. The second part focuses on the use of tools and practises for working with data, information and knowledge. The third part documents individual wishes and recommendations of the questioned subjects in respect to more effective use of these tools. -- The results of this research are analyzed and summarized in the conclusion of the thesis, describing which tools and practises are being used. -- Authors of future works in the same area are given possible topics that can be further extended based on this...
History of cryptography from antiquity to middle ages
Prokopič, David ; Skopec, Antonín (referee) ; Ivánek, Jiří (advisor)
Práce nejdříve definuje obor kryptografie a další termíny, které s ní bezprostředně souvisí. Poté popisuje stručný přehled vývoje kryptografie v období starověku a středověku a naváže popisem jednotlivých metod, v závěru shrne a vyhodnotí vývoj za dané období.

National Repository of Grey Literature : 70 records found   beginprevious21 - 30nextend  jump to record:
See also: similar author names
2 Ivánek, Jindřich
Interested in being notified about new results for this query?
Subscribe to the RSS feed.