National Repository of Grey Literature 155 records found  beginprevious151 - 155  jump to record: Search took 0.00 seconds. 
History of development process of relation and attitude of the POLICE of the CZECH REPUBLIC to the protection of the data containing personal data in police information systems covering time period from the year 1990 to the year 2007.
SUFČÁK, Pavel
The subject of this bachelor?s work is a history of development process of relation and attitude of the POLICE of the CZECH REPUBLIC to the protection of the data containing personal data in police information systems covering time period from the year 1990 to the year 2007. The goal of this bachelor?s work is performance of analysis of the development of personal data protection in the time period from the year 1990 until the year 2007 with special emphasis on everyday work and practise of police organisms and police bodies within Management of the South Bohemia Region, POLICE of the CZECH REPUBLIC. Next successive goal of this bachelor?s work is the performance of analysis of the development of computer technology applied and used in police practice (safeguarding, protection, operation, back-up and archiving, anti-virus protection, case reporting). Theoretical part of this bachelor?s work deals with and analyses the concept of privacy, the development of the right of privacy, the development of the right to protection of personal data in terms of global, European, the Czech Republic, public-law, criminal-law and police. This bachelor?s points out the possibility of various types of imminent danger in the area of data funds being exposed to danger while using the most important relevant methods of cybernetics and cybernality. The integral part of this bachelor?s work is performance of quantitative analysis of the development of occurrence and incidence of criminal acts according to § 178 Unlawful/wrongful treatment of personal data, §§ 239, 240 Breach of secrecy of delivered messages, § 257a Damage and misuse/ill-use of a record on information carrier, arising out of the ESSK (Monitoring, Evidence Statistical System of Criminality) information system, which is run by the Centre (Headquarter Centre) of Informatics and Analytical Processes of the Service of Criminal Investigation Police Headquarters of the Czech Republic in the time period from the year 1990 until the year 2007. The second analysis assesses and evaluates the level of activities of appointed/ authorized policemen, who on the basis of the Act On Police of the Czech Republic perform direct supervision and inspection regarding observance of legislative standards of both having their basis in laws and falling and being obligatory within the Ministry of Interior under the conditions of Police Force in the Czech Republic, including pointing out the most frequent slight mistakes.
Providing the patient´s privacy after total hip replacement operation
RŮŽIČKOVÁ, Michaela
Abstract In our company the emphasis in the field of nursing care has increasingly been focused on preservation of a patient`s dignity and intimacy. In daily activities in a pacient the privacy and intimacy the patient may be affected which causes different reactions of such a patient. One might say that even after the routine procedure such as total hip replacement it is very important that the patient has enough privacy. The aims of this study were to assess how the intimacy in the postoperative care is ensured in patients undergoing total hip replacement at the intensive care units and to find out the level of knowledge of the nurses as for adherence to intimacy after total hip replacement. The research group consisted of patients who were hospitalized at the intensive care and standard units in the Hospital České Budějovice, a.s. (PLC), Faculty Hospital Olomouc and Military Hospital Olomouc. The second research group consisted of the nurses who worked at the intensive care and standard units in the Hospital České Budějovice, a.s. (PLC), the Hospital Šumperk, a.s., Faculty Hospital Olomouc and Military Hospital Olomouc. The research investigation was performed by the method using two ananymous questionnaires. The first defined hypothesis was confirmed. The patients at the intensive care units are more satisfield as for their intimacy compared to the patients at the standard units. The second hypothesis was also confirmed. The nurses have not enough time to ensure intimacy of the patient after total hip replacement. The third hypothesis was confirmed. The nurses have enough information of how to take care of the intimacy in the postoperative period. The fourth hypothesis was not confirmed. The nurses at the intensive care unit do not care about the intimacy with a higher interest compared to the nurses at the standard unit. The findings of this investigation show that the patients after total hip replacement at the intensive care unit are more satisfield with the provision of intimacy in the postoperative care compared to patients at the standard unit. Although the nurses do not have enough equipment to ensure the intimacy of a patient in the postoperative care, they know how to take care of intimacy in the postoperative care.
Providing the patient´s privacy on regular wards and intensive care units
ŠVAGROVÁ, Soňa
Providing the patient´s privacy on regular wards and intensive care units Abstract At present, dignity and intimacy of a patient has been increasingly put in the shade. The issue of security of intimacy differs at each ward. The objective of the bachelor thesis on the topic ``Security of intimacy of a patient at a standard ward, an anaesthesiology-resuscitation ward and an intensity care ward{\crqq} is to map out the knowledge of nurses in the field of intimacy and its observance at various sorts of wards. Conducting a number of activities, a nurse enters the intimate zone of a patient and disturbs their intimacy. Therefore we intended to ascertain whether nurses have sufficient knowledge in this field. In a number of cases, patients are not able to defend themselves so their protection is to be secured by the health workers who should behave in the manner respecting the patients in any situation and state. They must do anything not to disturb their intimacy at all or only to a minimal extent. For this reason we raised the questions: Do nurses observe intimacy of patients sufficiently? Do the nurses working at an anaesthesiology-resuscitation ward (ARO) and an intensity care ward (JIP) observe the intimacy principles more than the nurses at standard wards? The research group consisted of the nurses working at ARO, JIP and standard wards of surgical sections in Nemocnice České Budějovice a.s. and Nemocnice Český Krumlov a.s. The research method I used was a questionnaire. Hypothesis No. 1 that nurses have a sufficient knowledge in the field of intimacy was confirmed on the basis of the knowledge test results. Regrettably, hypothesis No. 2 that nurses observe patient intimacy insufficiently was confirmed. Hypothesis No. 3 that the nurses working at ARO and JIP wards observe the principles of intimacy security more than the nurses working at a standard ward was not confirmed. It follows from the results of the research that while nursing the patients, nurses observe the principles of intimacy security insufficiently at all the types of wards. On the basis of the undertaken research, the hospitals that have not internal regulations (guidelines) on this issue elaborated should do so e.g. in the form of ``Ten Rules of Patient Privacy{\crqq} and should pay attention to observance of principles of patient intimacy protection. It is necessary that the nurses serve as defenders of the patients{\crq} rights in this field.
Setting Up And Securing Enterprise Wireless Network
Balon, Lukáš ; Palovský, Radomír (advisor) ; Pavlíček, Luboš (referee)
The topic of this bachelor's thesis is to set compact view on the issues of the wireless networks, their settings and proper security in corporate environment. Wireless networks are supposed to simplify access to the internet and business data, but especially in this area, it is necessary to put forth above standard care to security policy, to protect network from external attacks. First part of this work is focused on theoretical background of the Wi-fi, basic functioning principles, history and step-by-step development of technology. Explains differences between particular standards, defines basic parameters of Wi-fi devices. Next part is focused on network security. It explains encryption methods and procedures and describes differences between ciphers. This section also deals with other possibilities, how to solve security questions. Third section deals with installation of wireless components, their proper configuration and other settings. From this text emerges, how simple to buy and how available are wireless components today. Last part id formed by series of experimental hacks into secured network, shows how simple it is to decrypt some ciphers. It proofs which ways of network security are best to use in enterprise environment.

National Repository of Grey Literature : 155 records found   beginprevious151 - 155  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.