National Repository of Grey Literature 39 records found  beginprevious21 - 30next  jump to record: Search took 0.01 seconds. 
Free speech on the Internet and censorship as a way to protectusers' privacy
Brišová, Jana ; Moravec, Václav (advisor) ; Osvaldová, Barbora (referee)
The aim of this bachelor thesis is to provide a complex analysis of free speech on the internet, violation of this right and ways how to protect own privacy in cyberspace. It is based on a theoretical exploration of protection of free speech, right to privacy and collision of these rights. Based on this theoretical analysis this thesis seeks to provide a comprehensive analysis of the cyberspace as a space enabling free speech as well as violating the right to privacy. This thesis also explores the responsiveness of the Internet to the users' demands on privacy, violations of the right to freedom of expression, and censorship of the Internet, as demonstrated by the case studies of countries taking these steps. This is followed by a research of ways to circumvent Internet censorship, including the possibility of anonymity on the Internet. Anonymity is also discussed as a tool to protect privacy as well as source of dangers.
Privacy Protection on Mobile Devives
Aron, Lukáš ; Hudec,, Ladislav (referee) ; Drahanský, Martin (referee) ; Hanáček, Petr (advisor)
Tato práce analyzuje ochranu citlivých dat na mobilních zařízeních a představuje metodu pro ochranu těchto dat před možností úniku informaci ze zařízení. Ochrana se zaměřuje na využívání zařízení, jak pro osobní účely, tak i v pracovním prostředí. Koncept navrženého řešení je implementován ve formě prototypu. Model implementace je verifikován s modelem požadovaného chování. Součástí práce jsou experimenty s prototypem a experimenty zaměřené na verifikaci mezi danými modely.
Personal data protection and cookies
Svetlík, Adam ; Stupka, Václav (referee) ; Míšek, Jakub (advisor)
This thesis deals with an analysis of cookies, a specific field of personal data protection. In particular, the thesis examines the legal aspects of the technology, as well as their insufficiencies. Besides that, it provides an analysis of several examples of privacy violations caused by cookies.
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
Legal aspects of the current personal data protection developments
Tumpachová, Kateřina ; Pítrová, Lenka (advisor) ; Svoboda, Petr (referee)
This doctoral thesis is divided into ten chapters in which, together with the introduction and conclusion, it aims to describe and analyse the current development of legal regulation of personal data protection, especially from a substantive law perspective. The thesis analyses the existing legal regulations of the European Union, implemented in the legal frame of the Czech Republic compared to the new General Data Protection Regulation, which unifies the legal framework for the personal data protection in the whole European Union. The first chapter of the thesis describes in brief the development of the personal data protection legal framework, from the establishment of the right to personal data protection in human rights declarations to the gaining its independence from the right to privacy. Furthermore, the relevant OECD Guidelines and Convention 108, which plays a crucial role in the field of personal data protection, are described. The development of the legal regulation of personal data protection in the European Union, together with the development of legislation in the Czech Republic, which also meant the necessary implementation of EU regulations into the Czech legal order with the accession of the Czech Republic to the European Union, are described. The second chapter describes in detail...
The Impact of Online Marketing Practices on Perception of Privacy
Šimáková, Zuzana ; Rosenfeldová, Jana (advisor) ; Báča, Ladislav (referee)
This bachelor thesis deals with the impact of online marketing practices on perception of privacy. For this purpose, the theoretical part of this thesis first presents different conceptions of privacy, that are most repeated in the discourse. This chapter focuses on the position of privacy in the context of marketing communication. After that The Czech Privacy Policy as well as the European Union Privacy Policy are described. The last chapter of theoretical part presents different online marketing practises that use customer data. The emphasis is on online behavioral targeting and related remarketing. In the practical part, semi-structured individual interviews are conducted to find out whether users are familiar with these online marketing practices, what they think about them and mainly how do these practices affect their perception of privacy.
Anonymization of users when collecting network traffic
Hamár, Lukáš ; Blažek, Petr (referee) ; Sikora, Marek (advisor)
This thesis deals with anonymization of data, which could lead to disclosure of the identity of end users in network traffic. Work describes algorithms by which individual data parts are anonymized and also tools which use these techniques for network traffic anonymization. The next part of the thesis describes construction of a laboratory network, in which is the network traffic captured, containing pcap and NetFlow data. With using of the captured data, the anonymization tools are tested and the results are compared. In the last part of the thesis is created graphical interface for one of the tested anonymization softwares.
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
Competence of lower secondary school pupils while using social network sites
HAVLÍČEK, Radek
This bachelor thesis deals with the risk of connecting and using social network from the point of view of sharing private data by primary school students. The author focuses on data protection againts misuse, accumulation of information and sharing personal information of youthful. In this bachelor thesis he desribes requirements of using social networks, risks of using and comparing social networks with respect to data accumulation. The main aim is to figure out, with using a research, how youthful approach to social networks, find out what kinds of data they share, why they share them and whether data are not misused. The author uses a questionnaire survey and analyses chosen issues with using statistical method chi-square statistic. He also compares processed data to the variety of factors verify and analyses differences between separate groups.
Darknet networks as a way of protecting internet users' privacy
Plevný, Marek ; Sigmund, Tomáš (advisor) ; Čermák, Radim (referee)
In this age when information technologies became inseparable parts of our lives we can hardly imagine for example living without internet. There is a phenomenon connected with internet and that is large scale collection of data about internet users and their activities. Because of this fact, it is important to protect our internet privacy as a very important aspect of our lives. This work examines large scale collection of data about users internet activities. During this work, different methods and reasons for this largescale data collection are examined. Later, different ways how internet users are protected by law or how they can protect themselves are examined. One of the ways how internet users can protect their internet privacy is by using so-called anonymizing networks connected with a phenomenon called Darknet. This work examines if it is possible by ordinary internet users to adapt this method of internet privacy protection.

National Repository of Grey Literature : 39 records found   beginprevious21 - 30next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.