National Repository of Grey Literature 51 records found  beginprevious32 - 41next  jump to record: Search took 0.01 seconds. 
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
Competence of lower secondary school pupils while using social network sites
HAVLÍČEK, Radek
This bachelor thesis deals with the risk of connecting and using social network from the point of view of sharing private data by primary school students. The author focuses on data protection againts misuse, accumulation of information and sharing personal information of youthful. In this bachelor thesis he desribes requirements of using social networks, risks of using and comparing social networks with respect to data accumulation. The main aim is to figure out, with using a research, how youthful approach to social networks, find out what kinds of data they share, why they share them and whether data are not misused. The author uses a questionnaire survey and analyses chosen issues with using statistical method chi-square statistic. He also compares processed data to the variety of factors verify and analyses differences between separate groups.
Darknet networks as a way of protecting internet users' privacy
Plevný, Marek ; Sigmund, Tomáš (advisor) ; Čermák, Radim (referee)
In this age when information technologies became inseparable parts of our lives we can hardly imagine for example living without internet. There is a phenomenon connected with internet and that is large scale collection of data about internet users and their activities. Because of this fact, it is important to protect our internet privacy as a very important aspect of our lives. This work examines large scale collection of data about users internet activities. During this work, different methods and reasons for this largescale data collection are examined. Later, different ways how internet users are protected by law or how they can protect themselves are examined. One of the ways how internet users can protect their internet privacy is by using so-called anonymizing networks connected with a phenomenon called Darknet. This work examines if it is possible by ordinary internet users to adapt this method of internet privacy protection.
Protection of personal data
Nutilová, Helena ; Prášková, Helena (advisor) ; Mikule, Leoš (referee) ; Mates, Pavel (referee)
The primary aim of this dissertation thesis is to present a comprehensive analysis of the issue of personal data protection in the Czech Republic with regard to the regulation in the EU. The secondary goal of this work is to explore the historical genesis and material sources of the issue in question. The core information sources from which the thesis draws represent laws, judicial decisions, official documents and Czech/foreign expert literature. In order to achieve the objectives of the work, the methods that are generally applicable in the field of legal science were used. Therefore the method of description (including classification), analysis and synthesis is mostly applied. The dissertation consists of seven chapters. After a short introduction, it begins with a sociological treatise on the importance of the protection of personal data in the 21st century. Privacy is currently an important topic in the light of the rapid development of information and communication technologies which have been developing since the second half of the 20th century and burgeoned since the turn of the century. Technological innovations allow for the collection of personal data on a large scale. These privacy infringements can prove to be irreversible, hence the importance of this area of law. The personal data...
Camera systems and video records in legal protection of privacy
Chládek, Milan ; Švestka, Jiří (advisor) ; Dvořák, Jan (referee) ; Vychopeň, Martin (referee)
DISSERTATION ABSTRACT JUDr. Milan Chládek Camera systems and video records in legal protection of privacy The main goal of this dissertation named Camera systems and video records in legal protection of privacy is the basic analysis and familiarization with the highest actual and in the recent time wide-discussed problems. The field of the video surveillance is highly interesting and for the time being by the law science not solved topic. The legal science and practice solve problem belongs to this problematic area often as you go along, often by the aplication of the more generic rules and therefore the deciding authorities often make the law complete by theirselves because the legislator was not able to cover all the possible situations - just because of high actuality and novelty of this topic. This work tries to cover the topis by the relative wide way, from the generic introduction and tematic survey of the right to privacy offers first the concrete work with generic topic of right to privacy in relation to the video records, further focusing on camera systems and the last third of the work focuses on highly modern technologies of using video surveillance and on other methods using video records and snapshots in the area of informatic technologies and further areas of the use. The dissertation is...
Protection of Crime Victims and the Media: Publishing of Mistreatrd Chidren Information before and after Passing the Law of Criminal Procedure Amendment in 2009
Hosenseidlová, Petra ; Moravec, Václav (advisor) ; Benda, Josef (referee)
The thesis Protection of Crime Victims and the Media: Publishing of Mistreated Children Information before and after Passing the Law of Criminal Procedure Amendment in 2009 deals with the problem of secondary victimization caused by the media. More specifically, it focuses on the mistreated children and publishing that kind of information about them which enable their identification. It is concerned with the nationwide daily press and compares the situation before and after passing the Law of Criminal Procedure Amendment in 2009. This amendment introduced measures towards better privacy protection of crime victims with a special respect to underage victims and victims of some exceptionally serious crimes. The thesis compares the occurrence of information which enable identification of mistreated children in 2008 and 2011 in the three most popular nationwide dailies - Mlada fronta Dnes, Pravo and Blesk. It is interested in the following information: names and surnames of the victims and their family members, residence location, photos of the victims, their family members and their residence location. Apart from that it also examines where journalists get those information and photos from. The main aim is to find out what was the impact of the amendment, it means whether there are less information...
77 millions user accounts have been stolen, should we worry? Analysis of Internet discussions relevant to the topic
Gregor, Filip ; Švelch, Jaroslav (advisor) ; Nečas, Vlastimil (referee)
Diploma thesis 77 million PlayStation Network accounts stolen, does it affect us?: An analysis of Internet discussions revolving around this topic deals with the case of what so far seems to be the biggest case of user information leak on the Internet. The introduction outlines the history and development of PlayStation consoles and maps major attempts to jailbreak the last generation of the console by hackers. The following section presents PlayStation Network itself, whose users were at risk of the loss of their online identity because of the attack and chronologically describes the course of breach-related events including the subsequent theft of user data. It also focuses in detail on the case of GeoHot - a hacker whose dispute with Sony alienated fellow hacker community and initiated retaliatory activities which as a result led to loss of data. Another part of the thesis examines the issue of digital identity and its protection, gives an insight into the history of the formation of the hacker community and further explains the phenomenon of existence and perception of the term hacker in the context of the Internet. The final section is devoted to analysis of selected discussion posts under thematically relevant articles, analyzes them in terms of content relevance, information sentiment and...
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
Facebook
Jůnová, Jana ; Švelch, Jaroslav (advisor) ; Vochocová, Lenka (referee)
The theme of this thesis is to assess the behavior while using the public communication network Facebook. The number of users of social networks increases, as well as number of photographs, videos and other input that is stored on the Internet. Particularly, young people try to maintain or further develop their contacts by this way. Perhaps it is a new type of social convergence, which is more or less based on voyeurism, or just an expression of self- realization. In any case this behavior impacts shaping the social relationships of networking users and their free time in a real life. Through a research of Facebook users, this work is looking for uncovering the thinking process of people when publishing private matters via the Internet. Its main goal is to explore the usage of Facebook, depending on the knowledge of its surround. First of all, it is interested in users' network settings experience. Because the adjustment of Privacy Policy may prevent risk of misuse of the social networking, which may lead to disruption of the privacy of all users involved. The main question of the thesis is to what extent the users are aware of the interaction of the environment that is "watching" them. Basicly, when talking about this topic, the most important question is notifying the process of blurring the...

National Repository of Grey Literature : 51 records found   beginprevious32 - 41next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.