National Repository of Grey Literature 26 records found  previous11 - 20next  jump to record: Search took 0.00 seconds. 
Personal data protection and cookies
Svetlík, Adam ; Stupka, Václav (referee) ; Míšek, Jakub (advisor)
This thesis deals with an analysis of cookies, a specific field of personal data protection. In particular, the thesis examines the legal aspects of the technology, as well as their insufficiencies. Besides that, it provides an analysis of several examples of privacy violations caused by cookies.
Digital footprint on own computer and the Internet
Charvát, Daniel ; Halbich, Čestmír (advisor) ; Očenášek, Vladimír (referee)
The aim of the bachelor thesis is to define types of digital footprints and introduce the methods of the protection of personal data. The partial aim of this thesis is to compare the tools to protect the data and determine if we can eliminate our digital trace. If not, propose appropriate protection of the data and solution for the common user. At the beginning it is said, what is the concept of digital footprint and what kinds are divided. Subsequently there is a description of the risks of misuse of digital footprints. In other chapters there is analysed checking and the options how to minimize it. In the practical part, there is a comparison of the software.
Digital footprint on own computer and the Internet
Větrovský, Jiří ; Halbich, Čestmír (advisor) ; Očenášek, Vladimír (referee)
Bachelor thesis is dedicated to the problematics of digital footprints, to what extend the user is able to control it and protect his privacy by the use of freely available tools. In the first part the term digital footprint is analysed from several different points of view and the risks linked to their creation are explained. It is clarified how one can find the extent of his digital footprint and how to manage it. Next tools for providing protection from tracking, software for ensuring anonymity in the internet environment and techniques for potential removal of an existing footprint are analysed. The practical part is dedicated to choosing the right tools from the previous chapter and their mutual comparison for the purpose of finding out to what extend the user is able to protect his privacy and avoid possible risks. Conclusions are made from the results of the comparisons.
Web Analytics - Development of web applications for managing accounts in Google Analytics
Aldorf, Marek ; Halbich, Čestmír (advisor) ; Tyrychtr, Jan (referee)
The first part deals with particular knowledge about web analytics and issues connected with web analytics such as segmentation, cookies, metrics, dimensions, KPIs, and lastly, gives an analytical tool Google Analytics. This bachelor thesis describes implementation of the tracking code to setting a basic structure of the instrument in terms of the account and the application interface. The practical part is focused on creating a web application to manage accounts in Google Analytics. Creation is described from graphic and wireframe design to launching the application in a browser. The contribution of this work is especially for new users of Google Analytics, saving time by several days. This is the automation of setting up filters by created application that can handle a few seconds to upload filters to the selected Google Analytics account, preformed filters, which resolves duplicates, SPAM bots and transparency of data.
Digital footprint on own computer and the Internet
Skalický, Pavel ; Halbich, Čestmír (advisor) ; Gojda, Ondřej (referee)
The aim of my work is finding ways of how the user is able to control their digital footprint. Finding a negative impact on the user and his identity. All tests performed on the freely available tools. At the beginning of the introduction to the concept of digital track, different views on these tracks. There is described the emergence of digital tracks and then formulated a precaution against leaving digital traces. Said there are risks for when leaving digital traces. In the practical part, a test tool for hiding digital tracks, and detecting tracking tools. Getting to what extent can protect against attacks. The subsequent recommendation to certain instruments.
Digital footprint on own computer and the Internet
Kleinander, Michal ; Halbich, Čestmír (advisor) ; Pavlík, Jan (referee)
This work is focused on digital footprint and security. The basic terms and distribution of digital footprints are briefly described in the chapters. There are also described potential risks and threats that may occur due to misuse of digital footprints. The theoretical part is ended by the ways to control digital footprints and their management including the overview of tools. The practical part is focused on testing and comparison of selected tools for privacy protection. On the basis of comparison tools is provided a suitable solution in protection of digital footprint.
Digital footprint on own computer and the Internet
Tomovič, Štefan ; Halbich, Čestmír (advisor) ; Pavlík, Jan (referee)
The main aim of this thesis is to characterize various types of digital footprint and describe the methods of data protection. This conservation uses freeware tools. The theoretical part describes the types of digital footprint, the possibility of misuse of digital footprint and attacks on the computer or data. The next chapter describes the used freeware tools. Their basic characteristics and their use. In the practical part, these instruments are divided into three groups, depending on the region the problems that it solves. According regions are also chosen criteria. In the last part, these instruments are tested each other, using multi criteria analysis.
Database system for optometrician shops
Dlouhý, Lukáš ; Borská, Eva (referee) ; Kříž, Jiří (advisor)
This thesis deals with creating a suitable database system for an specific existing company that manufactures and sells glasses. The thesis focuses on describing the development of the database system in SQL, HTML, PHP and also on the structuring of the database. It aims to create a database system, which will comply with the company's requirements.
IS for School Registration in Africa
Mikulka, David ; Ráb, Jaroslav (referee) ; Kašpárek, Tomáš (advisor)
This document contains description of a design and implementation of an information system for school registration for project Adopce na dálku®. The information system audits the information about children whom school fees are paid form the project mentioned above. The information personal, about child's family, higienic condition, about sponsor and mainly the information about school, which are ranged especially to audit the information about school fees payment, are stored. Access to this application is hierarchic in compliance with rights of an individual users autentificated by password. The system allows to create new child's records and its editing, it can generate lists for printing in accordance with various criteria, too. The system is created for effective and synoptical management of information presented above.
Web applications for user authentication
Vybíral, Petr ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The thesis deals with the problems of user authentication. The first chapter analyzes the problem of authentication, its methods and its utilization. The second chapter presents the different security options for communication. The chapter describes security, communication and authentication protocols. There is the 2D barcode QR Code described at the end of the chapter. The third chapter is devoted to ASP.NET technology, its development and possibilities of utilization. Attention is focused on web form and server controls. There is an analysis of elements of cookies and possibilities of their use. The last chapter consists of a practical part, which describes the development of a web application. There is a description of the parts of application, such as the database, the Web navigation, master pages and etc. in the following chapter. The cardinal part of the chapter consists of an analysis and implementation of forms authentication, the attribute authentication and authentication with QR code. Finally, there is a description of way how to secure the communication by using a certificate.

National Repository of Grey Literature : 26 records found   previous11 - 20next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.