National Repository of Grey Literature 39 records found  beginprevious30 - 39  jump to record: Search took 0.01 seconds. 
Darknet networks as a way of protecting internet users' privacy
Plevný, Marek ; Sigmund, Tomáš (advisor) ; Čermák, Radim (referee)
In this age when information technologies became inseparable parts of our lives we can hardly imagine for example living without internet. There is a phenomenon connected with internet and that is large scale collection of data about internet users and their activities. Because of this fact, it is important to protect our internet privacy as a very important aspect of our lives. This work examines large scale collection of data about users internet activities. During this work, different methods and reasons for this largescale data collection are examined. Later, different ways how internet users are protected by law or how they can protect themselves are examined. One of the ways how internet users can protect their internet privacy is by using so-called anonymizing networks connected with a phenomenon called Darknet. This work examines if it is possible by ordinary internet users to adapt this method of internet privacy protection.
Protection of personal data
Nutilová, Helena ; Prášková, Helena (advisor) ; Mikule, Leoš (referee) ; Mates, Pavel (referee)
The primary aim of this dissertation thesis is to present a comprehensive analysis of the issue of personal data protection in the Czech Republic with regard to the regulation in the EU. The secondary goal of this work is to explore the historical genesis and material sources of the issue in question. The core information sources from which the thesis draws represent laws, judicial decisions, official documents and Czech/foreign expert literature. In order to achieve the objectives of the work, the methods that are generally applicable in the field of legal science were used. Therefore the method of description (including classification), analysis and synthesis is mostly applied. The dissertation consists of seven chapters. After a short introduction, it begins with a sociological treatise on the importance of the protection of personal data in the 21st century. Privacy is currently an important topic in the light of the rapid development of information and communication technologies which have been developing since the second half of the 20th century and burgeoned since the turn of the century. Technological innovations allow for the collection of personal data on a large scale. These privacy infringements can prove to be irreversible, hence the importance of this area of law. The personal data...
Legal relations in photography : copyright and privacy protection in relation to the photography
Valoušek, Martin ; Křesťanová, Veronika (referee) ; Holcová, Irena (referee)
The main aim of the submitted rigorous thesis is to present, identify, describe, interpret and evaluate the main legal relations that are relevant to the field of photography and the process of photography. Under the term main legal relations in photography the author understands some sections of copyright and the protection of personality in the field of civil law. The described legal issues, in particular copyright law and privacy protection are discussed in Czech literature extensively, but separately and surprisingly, the coherent description in relation to the photography is missing. The objective of this work was to produce (to the extent the thesis) the Czech variation of the German "Fotorecht", the unified analysis of the issue of Czech "fotoprávo" ("Photolaw") and to assess the identified legal aspects especially in comparison with the German legal regulation.
Protection of Crime Victims and the Media: Publishing of Mistreatrd Chidren Information before and after Passing the Law of Criminal Procedure Amendment in 2009
Hosenseidlová, Petra ; Moravec, Václav (advisor) ; Benda, Josef (referee)
The thesis Protection of Crime Victims and the Media: Publishing of Mistreated Children Information before and after Passing the Law of Criminal Procedure Amendment in 2009 deals with the problem of secondary victimization caused by the media. More specifically, it focuses on the mistreated children and publishing that kind of information about them which enable their identification. It is concerned with the nationwide daily press and compares the situation before and after passing the Law of Criminal Procedure Amendment in 2009. This amendment introduced measures towards better privacy protection of crime victims with a special respect to underage victims and victims of some exceptionally serious crimes. The thesis compares the occurrence of information which enable identification of mistreated children in 2008 and 2011 in the three most popular nationwide dailies - Mlada fronta Dnes, Pravo and Blesk. It is interested in the following information: names and surnames of the victims and their family members, residence location, photos of the victims, their family members and their residence location. Apart from that it also examines where journalists get those information and photos from. The main aim is to find out what was the impact of the amendment, it means whether there are less information...
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
Person de-identification upon primary biometric traits
Šidó, Balázs ; Burget, Radim (referee) ; Přinosil, Jiří (advisor)
This bachelor’s thesis deals with various methods protecting privacy by de-identification based on the primary biometric traits. The first chapter describes face de-identification with ad-hoc, naive and advanced methods. It also describes the Active Appearance Models and the Active Shape Models. The second chapter consists of a general overview of voice signal processing and of voice de-identification methods by changing the levels of energy in each frequency band and by pitch shift. The following chapters are describing the realized face de-identification program and an algorithm design for reversible face de-identification using the appearance parameters of the Active Appearance Model. This is followed by algorithm designs for voice de-identification. The results of the experiments done with the de-identified pictures are introduced in the last chapter. The realized program were written in Matlab.
Tunneling and Cryptographic protocols as a privacy protection on regulated internet
Čížek, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis is about internet regulations and usage of tunneling protocols as a privacy protection on regulated internet. The thesis includes detailed description of most widely used tunneling protocols focused on their usage in regulated networks. The produce the teoretical part of the thesis is synoptical comparative table including benefits and disadvantages of each protocol and examples of suitable usage. The practical part presents the tunneling protocols in three different scenarios which are very frequent in practice. Each scenario has been realized, the communication has been captured using Wireshark network protocol analyzer and also the analysis of potential risks has been done for the event that the communication would be captured by a third party - the regulator.
Analysis of Privacy on Social Networks
Tomandl, Luboš ; Sigmund, Tomáš (advisor) ; Čermák, Radim (referee)
This thesis deals with a question of privacy in a context of social networks. The main substance of these services is the users' option to share an information about their lives. This alone can be a problem for privacy. In the first part of this thesis concentrates on the meaning of privacy as well as its value for both individuals and the society. In the next part the privacy threats on social networks, namely Facebook, are discussed. These threats are disclosed on four levels according to four recognized actors active on Facebook. Those actors are users, Facebook company, other corporations and government organizations. From all of these groups threats for user's privacy can come. This thesis not only tries to find these threats, but is wants to offer some solutions of this situation as well.
Privacy Protection and the Right to Be Forgotten
Matejka, Ján
Definition of the term “privacy” and the view of privacy from historical perspective; problems with the determination of the right to privacy. A new European system of privacy protection and a draft regulation on the protection of individuals introduced by the EU in January 2012.

National Repository of Grey Literature : 39 records found   beginprevious30 - 39  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.