National Repository of Grey Literature 34,417 records found  beginprevious34408 - 34417  jump to record: Search took 2.03 seconds. 

The development of Somalia since 1990 and the issue of piracy
Šimon, Ondřej ; Kváča, Vladimír (advisor) ; Kochan, Jan (referee)
This paper deals with the development of Somalia since the decay of the dictatorship in the early 1990s and further analyses the attempts to reestablish the somali national state and why any of them did not succeed. Focus on the various sides of the contlict, which is among the goals, sheds light on their performance in the somali failed state, lacking any effective central government. The theoretical part of the paper is dedicated to the phenomenon of failed state, which is being discussed a lot in the post-bipolar period, pursuing the need to solve problems related to failed and failing states. Somalia has become one of them.

Corporate social responsibility
Cvejnová, Ivana ; Zamazalová, Marcela (advisor) ; Černá, Jitka (referee)
The diploma thesis is focused on important issues in corporate social responsibility (CSR). The first part of the work introduces CSR conception, its history, development and today's role in international, national and business context. Next chapter takes to parts the process of implementation of CSR principles into the business strategy. Last chapter of theoretical part deals with communication in CSR field. Practical part performs confrontation of CSR strategy of GE Money Bank and its corporation (General Electric). There is the list of positives, negatives a recommandation for improvement shown at the end. The second part of practical work introduces and evaluates CSR communication in GE Money Bank. Main purpose of this thesis is to create the list of all important benefits, risks and deficiencies in the CSR concept. The goal is achieved in all parts of the work. summary of benefits and possible risks stays in theoretical basis and also in evaluation. The second effort is to confirm hypothesis that communication is the key tool of success in implementation and aplication CSR principles into business strategy. Theoretical finding and also evaluation of communication CSR strategy in GE Money Bank, a.s helps to validate this statement.

Security in wireless networks
Mlčochová, Ivana ; Peterka, Jiří (referee) ; Janeček, Jan (advisor)
The more the popularity of wireless networks grows the more threatsb appear of being attacked or misused, either intentionally or by accident. This bachelor work describes security protocols in use, such as WEP, WPA and WPA2, analyses their vulnerabilities and discusses the danger of possible attacks against them. As the security protocol itself cannot entirely protect any wireless network there are additional security measures suggested that minimize the risk of an successful attack. One of the goals was to prove experimentaly that WEP is really as bad a protocol as it is said and should not be used for securing any networks not even the home ones. In connection with that a survey has been made examining how wireless networks in Prague are secured, what protocols are used. This survey showed an alarming fact that most wireless networks are still using deprecated protocol WEP or no security protocol at all.

Changes in organizational structure in relation with the implementation of BPM
Šveřepa, Jaromír ; Kunstová, Renáta (advisor) ; Müller, Miroslav (referee)
This bachelor thesis aims to describe changes in the organizational structure that are necessary for the implementation of Business Process Management in the enterprise. These changes are simultaneously a reflection of the implementation. In the first part of the thesis the author defines the principles of Business Process Management considering the history of BPM. The author is analyzing reasons of past BPM concepts' failures and evaluates the current state of process management. The second part of the thesis pays attention to organizational structures and methods of organizational management. The author compares the traditional functional management with new process management approach exploring differences between them. The author appreciates applicability of different organizational structures types for Business Process Management and highlights problems between a specific type of organizational structure and BPM. In the last part of the thesis the author suggests organization changes for BPM implementation and defines prerequisites for successful transformation into process-managed organization. The author emphasizes the common risks and problems and suggests their solutions.

Social aspects of agile software development methodologies
Čížek, Pavel ; Buchalcevová, Alena (advisor) ; Balada, Jakub (referee)
Traditional methodologies of software development are burdened with number of problems, especially its complexity, bureaucracy and sticking on detailed processes defined in advance. This all often mean overtiming and overpricing the project as well as other negative effects. Agile methodologies of software development pursue solving such problems. They are built on principles of team-work, communication and developers' relations and sharing their knowledge. These values are one of the most important in agile development concept. This thesis's target is to identify and describe those principles of agile software development which impact development team functioning, working motivation of developers and focus on the project goals. Reader is first shortly familiarized with general theory of working motivation, team-working and leading to achieve the target. Then particular agile development principles are analyzed and the impact on developers' motivation, whole team functioning and focusing on the project goals is described. Another target of the thesis is to identify requirements on agile software developers, to explain what the need of them lies in and how the absence of these personal characteristics would impact whole team's productivity and the development progress. The last target of this thesis is to examine agile development as a whole. A SWOT analysis is used to achieve this. It states the strengths, weaknesses, opportunities (advantages) and risks of agile development. There is a list of 11 serious mistakes that can take place in the agile development process and heighten the risk of the project fail stated at the end of the thesis.

Internet Marketing
Weida, Petr ; Rydzi, Daniel (advisor) ; Stříteský, Václav (referee)
The main aim of this work is to describe web development from marketing point of view. Less space for technological part has given the author the opportunity to focus more on the business point of view. The goal of the work is to describe how to create user-friendly web that would be appreciated by people and where they would come back to. Successful web is not based on secret technological tricks but on continuous and creative work. This thesis is based on many years of experience with webs of clients whom author has helped with the internet marketing. For example: company Internet Mall, one of the biggest internet merchants in the Czech Republic, could be named. The thesis is structured into three main parts. Firstly, preparatory work and building of the web is described. Secondly, promotion of the web, gaining users and motivating them to return is discussed. Lastly, search engine Morfeo is analyzed and it is used as an example of how search engines generally work and how do they sort pages.

Credit risk management and business cycle
Kubesa, Lukáš ; Jílek, Josef (advisor) ; Munzi, Tomáš (referee)
This diploma thesis -- Credit risk management and business cycle -- is divided in four chapters. The first explains the purpose of bank as the financial intermediate and the main financial risk, which may results from its activities. The second part describes the theory of business cycle from the view of the main economic schools and clears up the problems of price bubbles on assets markets. The third part analyses the models and methods of credit risk management in the financial institution and the roles of regulatory authorities including the influence of Basel II. The last part concerns about credit risk development in bank sector in the Czech Republic including the ČNB macroeconomic credit risk model. The main focus is how the changes in business cycle development influence the credit risk.

Bosnian crisis 1908-1909
Kodet, Roman ; Kovář, Martin (referee) ; Skřivan, Aleš (advisor)
The Bosnian crisis is one of the most important milestones on the way to the First World War. It is because this act of Austria-Hungary totaly destroyed a chance to create a Austro-Russian rapprochement on the Balkans. From this crisis the rivalry between these two empires fully started and it was this rivalry, which caused the collapse ofEuropean diplomatic system in July 1914. The aim ofthis work is to analyze all the circumstances and conditions, which influenced the decision of Vienna to take this action and how and why this action ruined the long termed policy of Austro-Russian entente.

Security of Enterprise VoIP Telephony Networks
Šolc, Jiří ; Pavlíček, Luboš (advisor)
This thesis focuses on enterprise VoIP telephony network security. Introduces brief comparison of old analog and digital voice networks and IP telephone networks with special focus on VoIP system security. The goal of the thesis is to identify the risks of implementation and operation of VoIP technologies in enterprise environment and so thesis brings some conclusion how to minimalize or avoid these risks. First two chapters briefly introduce the development of telephony technologies with differentiation of enterprise telephone network from public telephone networks. Further it describes individual technologies, digitalization of voice, processing the signal and VoIP protocols and components. Third chapter focuses on infrastructure of telephony networks with special interest for architecture of IP telephony and ways of establishing call processing. It describes data flows for further security risk analysis, which this technology came with. Fifth chapter is about enterprise security standards in common and is trying to describe information security management system (ISMS) adopting VoIP technology. Individual security threats and risks are described in sixth chapter, along with known methods how to avoid them. Final parts of thesis concludes of two real situation studies of threats and risks of VoIP technologies implemented in environment of small commercial enterprise and medium size enterprise, in this example represented by University of economics. These chapters conclude theoretical problems shown on practical examples.

Methods for finding best answer with different user preferences
Eckhardt, Alan ; Vojtáš, Peter (advisor) ; Pokorný, Jaroslav (referee)
User preferences are one of new aspects in informatics, e.g. in domain of semantic web. This work tries to cover the whole problematic of user preferences, their modeling, various aspects of generating user preferences and their evaluation. It also studies the area of group decision and finding answer that suits all members of group. Next part follows the paper of Ronald Fagin, Amnon Lotem, Moni Naor about the top-k algorithm. The new independent system for the top-k algorithm is presented, some implementations of this algorithm are tested and the influence of modules of algorithm on the speed and the number of rows are studied.