National Repository of Grey Literature 66 records found  beginprevious32 - 41nextend  jump to record: Search took 0.01 seconds. 
Prostředí komerčních call center na trhu v České republice
Karásek, Jan
The diploma thesis deals with the analysis of the macroenvironment of companies operating in the market of commercial call centers in the Czech Republic. The analysis is performed from the perspective of a new entity in the existing market, an analysis of the competitive environment and an analysis of the attractiveness of the industry was also performed. Based on analytical work, the author compiles a set of recommendations for a new company entering the industry.
Directive on multimedia data long-term preservation
Klodner, Michal ; Antoš, David ; Berka, Roman ; Získal, Bohuš
The directive regulates processes and responsibilities during multimedia data preparation for long-term preservation, secure and effective transfer of the data to institutions responsible for long-term preservation and eventual process, how these institutions make the data accessible. The directive focuses on the coordination of processes necessary for potential risk mitigation.
Fulltext: Download fulltextPDF
Log Analysis and Hardware Utilization
Kuchyňka, Jiří ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
The goal of this thesis is to design and implement a system for long-term monitoring of the state of Linux systems located in a production environment. The thesis focuses mainly on situation in which the system does not have the ability to send the collected data for analysis over the network, so data collection must be completely automatic and data must be transferred from monitored systems to a central system for collection, analysis and visualization. A substantial part of the work is devoted to the design and implementation of a web application used to export data from monitored systems to the transmission medium and import them from it to the system for data collection. The resulting solution aims to simplify the collection of data from systems, previously performed directly by system administrators, so that it can be performed by anyone who can physically approach the monitored system and thus reduce the costs associated with monitoring these remote systems.
Small Company Mobile Security
Válka, Radek ; Novotný, Vít (referee) ; Ondrák, Viktor (advisor)
In the course of the work, an analysis of security issues with the use of mobile devices in a small company is created. Based on this analysis, are identified risks that could have an impact on the security of the company's information due to malicious code on the mobile device or unauthorized access to the mobile device. To eliminate or reduce these risks, are proposed safety measures inspired by the measures in the ČSN ISO/IEC 27002 standard, on which the bachelor's thesis is focused.
IT Security in Biomedicine.
Schlenker, Anna ; Šárek, Milan (advisor) ; Nakládalová, Marie (referee) ; Brechlerová, Dagmar (referee)
Title: IT Security in Biomedicine Author: Ing. Anna Schlenker Supervisor: Ing. Milan Šárek, CSc. Abstract: The aim of this work is to propose a solution to the biomedical data security strategy. The work provides an overview of the most commonly used biometric methods designed to identify or authenticate users. From these methods, the keystroke dynamics was chosen and used in the application solution. The reliability of this method has been tested by classical and modern classification methods. The greatest benefit of the work is the use of the created application in combination with the measurement using integrated electromyography to objectify the evaluation of the work related to keyboard typing in terms of local muscle load. Keywords: Biometrics, Data Security, Keystroke Dynamics, Local Muscle Load
Cloud computing
Bräuer, Jonáš ; Dzurenda, Petr (referee) ; Ricci, Sara (advisor)
Bezpečnost a zachování důvěrnosti dat uložených s využitím veřejných cloudových služeb je dnes velmi aktuální téma. V této práci se, na rozdíl od tradičního šifrování, zabýváme možností využití dělení dat k zabezpečení citlivých dat. Cílem práce je implementovat a porovnat dva již publikované protokoly pro násobení matic využívající dva rozdílné přístupy dělení dat. Na základě jejich vlastností byla navržena originální varianta, která na rozdíl od původních protokolů zohledňuje i případ, kdy poskytovatelé cloudových slu- žeb tajně spolupracují. Všechny tyto protokoly byly naimplementovány za použití plat- formy Java a veřejných cloudových služeb. Na závěr byla změřena výkonnostní náročnost a zhodnoceny požadavky na úložiště.
Design and Implementation of a Family Photo Management Web Application
Macháč, Jan ; Kindlová, Dita (referee) ; Dydowicz, Petr (advisor)
This thesis focuses on the design and development of a web application that offers help in managing family photographic material, with the emphasis on data integrity and security, and maximum transparency when handling personal information. The application will be usable on any device with a screen, web browser and internet connection. One of its key features will be face detection on uploaded photographs.
Design of an Information System Part
Kaššák, Marián ; Markus, Jakub (referee) ; Neuwirth, Bernard (advisor)
The diploma thesis deals with the analysis of the company and the focus on data security. Based on the company analysis and requirements is designed a new system of employee authorization in CMS systems of the company. The design of the employee authorization API solution is based on the OAuth 2.0 protocol.
Intelligent systems of mass data acquisition in power grids
Kretek, František ; Mlýnek, Petr (referee) ; Mišurec, Jiří (advisor)
his semestral thesis deals with problems of multiple data collection over power lines. It is included separation of the power lines. Principles and functions of transport technology PLC, GSM and GPRS. Requirements on security of transported data.
New media gathering users data and the attitude of users towards internet security: qualitative study
Laube, David ; Švelch, Jaroslav (advisor) ; Karaščáková, Zuzana (referee)
The theoretical part of the thesis analyzes the topic of new media and how it works with the privacy of its users. On the examples of applications such as Facebook, or Google services, I refer to the intensive and extensive kind of private information, that are stored on the provider's servers. All these data are not just gathered, but also analyzed and evaluated. Private companies use data of its users in such extension like never before. New media and their activities raises new questions about possible misuse of such data. In this thesis I mention a few examples that are somehow related to the topic of privacy and personal data protection. In the practical part I use the tools of qualitative research to explore how the issue of online privacy and data security is perceived by different user groups and how they explain their behavior. I examined whether the privacy issue is an important one and if their online activity in this context is somehow particularly regulated or restricted. For research I chose two groups of respondents - younger users up to 37 years of age and older aged 55 +. I get information from the respondents in the form of semi-structured interview. These were analyzed and I created new conclusions from it.

National Repository of Grey Literature : 66 records found   beginprevious32 - 41nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.