National Repository of Grey Literature 71 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Analysis of the security situation in the European Union for the past 15 years
The aim of this thesis is to analyze the changes in security for the EU over the p?ast 15 years from the perspective of de facto deeds, various strata of the population, and experts. The thesis also considers the influence of other states on EU citizens and evaluation of changes in political argumentation. The method of text analysis was used to achieve this goal; looking at the literature of renowned experts, the analysis of European legislation, and the annual reports of EUROPOL. This thesis contributes to the body of knowledge that examines how the attacks of September 11, 2001, have changed the current state of security measures in the EU. The work provides a chronological view of the period under review. The work also views the time since 2001 as a struggle with the external enemy. Through this evaluation, it is revealed that the enemy is not just external but also internal, as seen in the British attack on London in 2005. After 2010, criminals have increased threats to information and technology. At this time the EU is beginning to face its democratic principles and despite simpler ways to repress crime, these are unacceptable because of the EU's strict human rights principles. The principles (human rights) are emphasized in every document; however, criminals do not respect these principles. The evaluation suggests that the terrorist attacks happening today are occuring more frequently on local citizens. The lone wolf, an Islamic state-motivated individual who uses a simple but effective means, such as car bombings, are happening more often. There is a migration crisis that is exploited by populist groups for their own benefit. The misinformation is used to influence EU public opinion. The EU is facing the simultaneous challenges of combating hybrid threats, threat of misinformation, and terrorism. The EU must convince its own citizens that it is not enemy #1; however, that is very difficult as every mistake is exaggerated and emphasized by the enemy.
Připravenost škol z pohledu objektové bezpečnosti
This bachelor's thesis, titled "Preparedness of schools from the perspective of object security", deals with a current security situation of primary and secondary schools in the Czech Republic, focusing on the preparedness of schools, and the approaches they have taken, from the perspective of object security. Moreover, this analysis reflects past experiences with attacks and refers to historical precedents. Finally, it discusses the current security status of primary and secondary schools. The aim of this thesis is to analyze and evaluate the current state of security at primary and secondary schools, considering past incidents described in the thesis. The theoretical part contains characteristic examples of appropriate security measures in schools - methods of securing schools, definitions of basic security terms, specific threats to schools and possibilities for dealing with them. Furthermore, the analysis of historical examples and specific school attacks by armed attackers are discussed. The practical part focuses on the actual security preparedness of schools and their pedagogical and non-pedagogical staff in terms of protection of pupils from potentials dangers. All information used in the thesis comes directly from primary and secondary school teachers by means of semi-structured interviews.
The threat of terrorism with focus on soft targets
Vrba, Vojtěch ; Fiala, Miloš (advisor) ; Vilášek, Josef (referee)
Title: The threat of terrorism with focus on soft targets Objectives: The main aim of this work is to describe the security issues of terrorism in the Czech Republic with a focus on soft targets. Another aim is to verify whether, according to valid legislation and documents relating to the fight against terrorism in the Czech Republic, the IRS components are prepared to actively face a terrorist attack on their basis and procedure. Methods: The chosen method is the literary search of Czech and foreign literature, legislation on the fight against terrorism at the level of the Czech Republic and the European Union, and internet sources. Determination of the activities of the IRS components during a terrorist attack, protection of soft targets and explanation of the term terrorism, its forms, methods and what types are most commonly used. In particular, it focuses on the legislative framework which, in the event of a terrorist attack, will be instrumental for IRS components and other components subject to this legislation. Results: It has been found that both terrorism and the fight against it are constantly evolving. In the case of terrorist attacks on soft targets, the currently drafted legislation at the level of both the Czech Republic and the European Union and the components of the Integrated...
Terrorism greatest threat of the 21st Century
Jančík, David ; Fiala, Miloš (advisor) ; Vilášek, Josef (referee)
Bachelor thesis title: Terrorism the greatest threat of the 21st century Goal: description of the principle, history and typology of terrorism as a potential threat to critical infrastructure in the Czech Republic Methods: study of literature, analysis and research of literature Results: Terrorism is one of the biggest potential threats to critical infrastructure, because it cannot be easily predicted and it can strike at sensitive and strategic places. Following the terrorist attack on September 11, 2001, many countries have begun to scrutinize the topic and started securing elements of critical infrastructure against undesirable attacks. Keywords: terrorism, threat, safety, society, aggression, religion
Kybergrooming at the elementary schools
Heber, Roman ; Marádová, Eva (advisor) ; Kovaříková, Miroslava (referee)
In my master thesis I deal with the issue of pupils' movement in the online space, I observe number of different online features that may be potentially confusing or dangerous to children, as well as phenomena that can directly threaten the children. I also monitor the activities of the children themselves, how they deal with their personal data and how they care for their own safety. I pay special attention to social networks and pathologies on them, addiction, cyberstalking, sexting, online bullying and the utmost attention to cyberspace issues. In my survey, it turns out that the profile of some of the social networks has the vast majority of pupils in the elementary school, some of them younger than the official minimum age limit on these networks. Own personal data share about nine children out of ten. 6 % of the questioned children commit significant risk behaviour, 48 % have already encountered cyberbullying and 42 % of children committing some risky behaviour do not think they should behave more cautiously in the virtual world.
Risk Management inside Construction Company
Pelikánová, Kateřina ; Zvolánek, Tomáš (referee) ; Nováková, Jana (advisor)
The bachelor's thesis aids to describe risk management in the construction company focusing primarily on project risks. The theoretical part deals with various types of risks, and explanation of the terms associated with the project. And further deal with analysis of risks and characteristics of the RIPRAN method. The practical part is focused on the risk situations in a particular building company. Subsequently, the building project show the actual procedures and solutions to risk management together with preventive measures.
The Approach of the Bush and Obama Administration to Fighting Terrorism in Afghanistan
Mikšovská, Kristýna ; Hornát, Jan (advisor) ; Raška, Francis (referee)
The Bachelor's thesis deals with the changes of the U.S. counterterrorism strategy during the presidency of George W. Bush and Barack Obama. The main purpose is to compare the pre-emption strategy with the diplomatic one, regarding the fight against terrorism. After the 11/9/2001 attacks, the threat of terrorism became the number one priority to all U.S. federal institutions responsible for ensuring security. The terrorist organization responsible for the events of 9/11 was Al-Qaeda, therefore it's activity is main subject for this analysis. Since then, the American counterterrorism strategy went through major changes and during the analysed period it went through further development. The text records mainly the period of 2001 - 2015. The main sources are doctrinal documents published frequently by each administration, and legislation released as a response to 9/11. The conclusion tries to evaluate, which part or parts of counter-terrorism strategy of each president were different from their rhetoric and whose approach was more convenient. Keywords counterterrorism, president, Bush, Obama, Afghanistan, security, threat, Al- Qaeda
The Formation of coalitions against the Islamic State
Pinkas, Šimon ; Kofroň, Jan (advisor) ; Střítecký, Vít (referee)
In this bachelor thesis, I will be exploring the process of formation of coalitions in the context of war against Islamic State in the region of Near and Middle East. Through this analysis, I will try to test the Balance of Threat theory, conceived by Stephen Walt, whose main assumption is a severe influence of the aspect of threat on the state's coalition policy. Coalitions are important phenomena on the international scene, often being crucial for the next political development, researching them is both instructive and beneficial. In this thesis, I will firstly summarize the assumptions of the theory concerning the formation of coalitions and follow up with the analysis of all state-actors participating in my research, according to the qualities needed for successful test of the theory. Then I will explore the coalition making process that led to formation of the main coalitions against ISIS. Finally, according to the data from this analysis, I will decide whether the Balance of Threat theory is or is not valid.
Security of mobile devices running Android in a corporate environment
Pecl, David ; Dvořák, Jan (referee) ; Frolka, Jakub (advisor)
The thesis deals with the security of the Android operating system. Firstly, it describes the basic architecture of the system and the security mechanisms we can find in this system, namely Linux kernel, application sandboxing, and application permissions. In the second part, it describes threats and attacks on the Android devices. Describes the risks to which the users are exposed and the impact on the device, user, and data security. For each threat and attack, the way the device can be compromised is mentioned. Threats and attacks are rated using CVSS. It also deals with Android updates. The last section describes applications that can be used to manage and secure Android mobile devices primarily in the corporate environment. There are described features of these applications and against what threats or attacks provide protection. Furthermore, there are examples of such applications. The thesis also provides a laboratory task that is created to demonstrate the mobile device management systems that are used in the corporate environment. Also, study material is created in the form of presentation for both lecture and self-study.
Risk analysis in the municipality with extended competence Horšovský Týn and subsequent methodological assistance to the mayors of municipalities in the administrative district of this territory
GERMANOVÁ, Anastázie
The thesis deals with the risk analysis in the administrative district of municipality with extended competence Horšovský Týn. Its aim is to analyse anthropogenic and biogenic hazards on the territory of the municipality with extended competence Horšovský Týn and to create a practical aid for mayors of municipalities for dealing with an emergency. The theoretical part defines the basic powers and duties of the municipal authorities in the field of security and crisis management. Furthermore, it defines the theoretical bases for the analysis of risks, especially the definitions of the concepts and the characteristics of the various available methods. In the practical part, a specific risk analysis for the area of the administrative district of the municipality with extended competence Horšovský Týn is carried out by expert assessment method. It includes a detailed characterization of the territory in terms of administrative distribution, demography, climatological and hydrological conditions, infrastructure, etc. Furthermore, the risk rates for individual events are then calculated and compared to each other. Based on the results of the analysis, the mayors of the municipalities are suggested of security measures. The risk analysis for the territory of the municipality with extended competence Horšovský Týn serves as a basic entry into the processes of emergency and crisis planning in this area. The methodical aid, which will be handed over to the mayors of individual municipalities, will contribute to the preparedness for dealing with extraordinary events and crisis situations in the territory of the municipality with extended jurisdiction Horšovský Týn. The thesis can serve as a teaching material in the field of public security.

National Repository of Grey Literature : 71 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.