National Repository of Grey Literature 9 records found  Search took 0.01 seconds. 
Analysis of user behavior due to the storing of digital footprints without knowledge of the user
Pappová, Michaela ; Souček, Martin (advisor) ; Ivánek, Jiří (referee)
Digital footprint designates data left behind a user movement in the digital environment or with the interaction with it. We distinguish active and passive digital footprint, together creating the digital identity of a user. The biggest benefit of the digital footprint for a user is the personalization of internet content. It also creates the reputation of a user on the internet. Other parties can utilize a digital footprint for purposes of marketing, science, HR research, and criminology. Digitial footprint can be actively affected and limited by users and different strategies for managing it exists. The aim of this thesis is to analyze user behavior of students in digital environment and their knowledge of digital footprint. It's focused on the relation between users knowledge about digital footprint existence and his real behavior. To fulfill the main purpose of the thesis researched questions are stated and the strategies of user behavior and managing their data are investigated afterwards. The knowledge of students and their real behavior with an accent on their motivation and reasons are determined in semi structured interviews. The relation between knowledge and real behavior has been found, as well as a strong influence of this relation on a user behavior strategy online.
The right to be forgotten on the internet
Jůzová, Jana ; Papík, Richard (advisor) ; Šlerka, Josef (referee)
Diploma thesis The Right to be Forgotten on the Internet applies to the functions of Internet search engines, search algorithms and the impact of the digital footprint that on the Internet user essentially leaves. With this issue is, on the one hand, inseparably linked the protection of personal data in the online environment, on the other hand the constitutionally enshrined right to information and other fundamental rights. Not ignored should be also the risk of censorship of the Internet. An application of the right to be forgotten adds a whole new dimension to this problems. The right to be forgotten is inferred from the judgment of the European Court of Justice on 13 May 2014 in the case Costeja versus Google Spain, where an Internet user named Mario Costeja Gonzáles first succeeded with a request of removal of unflattering information about himself from results of the search engine Google. Thus a reform precedent will have a big impact on seeking information on the Internet in the future, since the pronouncement of the judgment about the removal of his personal data may ask any European Internet user. The thesis aims to analyze the issue of right to be forgotten in the context of searching for information on the Internet in the European Internet environment - it means not to be searched on the...
Statistika & My (č. 11-12/2015): měsíčník Českého statistického úřadu
Český statistický úřad
Měsíčník informující o aktuálním dění v Českém statistickém úřadě. Přináší analýzy, komentáře, výsledky statistických šetření realizovaných a organizovaných ČSÚ, statistické údaje o ČR, jejich obyvatelích včetně mezinárodního srovnání. Uveřejňuje informace o ediční činnosti úřadu, odborných úspěších pracovníků, již uskutečněných a plánovaných tiskových konferencích, seminářích, akcích a dalších aktivitách.
Fulltext: Download fulltextPDF
Digital footprint on own computer and the Internet
Charvát, Daniel ; Halbich, Čestmír (advisor) ; Očenášek, Vladimír (referee)
The aim of the bachelor thesis is to define types of digital footprints and introduce the methods of the protection of personal data. The partial aim of this thesis is to compare the tools to protect the data and determine if we can eliminate our digital trace. If not, propose appropriate protection of the data and solution for the common user. At the beginning it is said, what is the concept of digital footprint and what kinds are divided. Subsequently there is a description of the risks of misuse of digital footprints. In other chapters there is analysed checking and the options how to minimize it. In the practical part, there is a comparison of the software.
Digital footprint on own computer and the Internet
Větrovský, Jiří ; Halbich, Čestmír (advisor) ; Očenášek, Vladimír (referee)
Bachelor thesis is dedicated to the problematics of digital footprints, to what extend the user is able to control it and protect his privacy by the use of freely available tools. In the first part the term digital footprint is analysed from several different points of view and the risks linked to their creation are explained. It is clarified how one can find the extent of his digital footprint and how to manage it. Next tools for providing protection from tracking, software for ensuring anonymity in the internet environment and techniques for potential removal of an existing footprint are analysed. The practical part is dedicated to choosing the right tools from the previous chapter and their mutual comparison for the purpose of finding out to what extend the user is able to protect his privacy and avoid possible risks. Conclusions are made from the results of the comparisons.
Digital footprint on own computer and the Internet
Růžička, Jan ; Halbich, Čestmír (advisor) ; Pavlík, Jan (referee)
The objective of this bachelor's degree paper is to evidence the negative impact and potential losses associated with unmanaged personal information sharing on the internet and then to provide solutions as to how to mitigate potential threats. This paper first addresses the definition of the digital footprint and its impact before describing in the Second Chapter the potential risks that are connected with leaving an unmanaged digital footprint. In order to investigate the levels of willingness of internet users to share their personal and private information I utilized a Questionnaire to interpret their understanding of privacy, risks associated with loss of privacy, identity theft and the levels of protection they adopt whilst being online. The final part of this Paper describes various means of personal data protection and how to mitigate, manage and minimize one's own digital track.
Digital footprint on own computer and the Internet
Skalický, Pavel ; Halbich, Čestmír (advisor) ; Gojda, Ondřej (referee)
The aim of my work is finding ways of how the user is able to control their digital footprint. Finding a negative impact on the user and his identity. All tests performed on the freely available tools. At the beginning of the introduction to the concept of digital track, different views on these tracks. There is described the emergence of digital tracks and then formulated a precaution against leaving digital traces. Said there are risks for when leaving digital traces. In the practical part, a test tool for hiding digital tracks, and detecting tracking tools. Getting to what extent can protect against attacks. The subsequent recommendation to certain instruments.
Digital footprint on own computer and the Internet
Kleinander, Michal ; Halbich, Čestmír (advisor) ; Pavlík, Jan (referee)
This work is focused on digital footprint and security. The basic terms and distribution of digital footprints are briefly described in the chapters. There are also described potential risks and threats that may occur due to misuse of digital footprints. The theoretical part is ended by the ways to control digital footprints and their management including the overview of tools. The practical part is focused on testing and comparison of selected tools for privacy protection. On the basis of comparison tools is provided a suitable solution in protection of digital footprint.
Digital footprint on own computer and the Internet
Tomovič, Štefan ; Halbich, Čestmír (advisor) ; Pavlík, Jan (referee)
The main aim of this thesis is to characterize various types of digital footprint and describe the methods of data protection. This conservation uses freeware tools. The theoretical part describes the types of digital footprint, the possibility of misuse of digital footprint and attacks on the computer or data. The next chapter describes the used freeware tools. Their basic characteristics and their use. In the practical part, these instruments are divided into three groups, depending on the region the problems that it solves. According regions are also chosen criteria. In the last part, these instruments are tested each other, using multi criteria analysis.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.