National Repository of Grey Literature 149 records found  beginprevious140 - 149  jump to record: Search took 0.02 seconds. 
Right to privacy versus right to information
Škopec, Antonín ; Sigmund, Tomáš (advisor) ; Toman, Prokop (referee)
This paper concerns with collisions between two fundamental human rights -- between right to privacy and right to information. In some cases, one of these rights must be limited, in order to fulfill the other right. It is very difficult to decide, which of these rights should take precedence in these conflicts. This paper tries to deal with question whether there can be found a general principle, how to handle these collisions of rights.
Nursing care women during wirt abortion
KOUTNÍKOVÁ, Radka
A birth assistant should manage several roles when taking care of women {--} she should communicate well, be a good nurse, should show empathy to women, introduce new trends and knowledge into her work, discuss them with her colleagues, be able to defend her actions and contribute to the improvement of nursing care. My work uses a quantitative survey based on the collection of data through questionnaires combined with a qualitative survey using interviews to clarify survey questions. The survey was carried out from October to December 2008. Research subjects included birth assistants and women patients at Gynaecological and Obstetric Departments. Questionnaires for birth assistants were distributed in 5 hospitals in the Czech Republic (Ústí nad Labem, Jindřichův Hradec, České Budějovice, Třebíč and Brno). I distributed 150 questionnaires for birth assistants; 105 (70%) questionnaires were collected. 15 questionnaires were discarded for being incorrectly completed; the research uses the total of 90 (100%) questionnaires. Interviews with women patients were carried out in the hospital in Ústí nad Labem. I interviewed 8 patients, who had been informed about the structure of the interview. They agreed that the interviews were recorded by dictaphone; the interviews were subsequently transcribed and assessed in charts and tables. My bachelor thesis formulates four targets and four hypotheses. The survey confirmed the targets and the hypotheses. The bachelor thesis deals with women after abortion; it focuses on nursing care, information provided to women patients, the securing of their intimacy and the care rendered to them according to standards. During the collection of data, I did not encounter unwillingness or displeasure on the part of birth assistants or women patients. The approach of both these groups was positive; 70% of birth assistants and 100% of women patients cooperated on the research. Both groups were interested in the results of the research. The results and theoretical part of the bachelor thesis will be used as a source of information for birth assistants and women after abortion. Birth assistants promised to use the results of the work as inspiration for the improving of their care of women after abortion. The bachelor thesis may also be used as an information brochure for women after abortion and the general public. It may provide information for the production of leaflets available at Gynaecological and Obstetric Departments or lectures.
Privacy and internet services
Samec, Marek ; Gála, Libor (advisor) ; Hlaváč, Jindřich (referee)
This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies for user tracking purposes and its possible impact on user privacy. Practical part consists of survey which is used to determine true level of user awareness of how is their privacy approached while using internet services, and of suggestion of measures to improve protection of privacy.
Privacy, individuality and reality: their losses in social networks
Ondroušek, Radek ; Rosický, Antonín (advisor) ; Pavlíček, Antonín (referee)
This thesis is focused on the current phenomenon, the social networks and their huge increase in the last years followed by the associated changes in their perception by the society and the development of the perception of privacy itself. The most important part of the work is dedicated to the pitfalls that the social networks and all communications bring through information technology. The thesis describes the currently most known networks that are used in the Czech Republic. A detailed investigation and analysis of the terms of use is focused on the probably nowadays most widespread and most used social network called Facebook. The following chapter shows a huge displacement in the basic settings and in the user's perception of privacy. This part also brings the recommended ways to setup. The last section presents the causes connected with the theme of this thesis and they are commented by author's point of view. The thesis ends by the summarizing of recommended measures and the overall conclusion of the theme.
Facebook Privacy
Klos, Roman ; Jandoš, Jaroslav (advisor) ; Kafka, Daniel (referee)
This paper deals with privacy on the social network Facebook. At the beginning has been defined terms such as privacy, personal data and social networks. Furthermore, it describes the history and gradual development of Facebook. Another chapter deals with the listing rules to ensure privacy on Facebook and how that information may be used in breach of these rules. Next, a description of social graph and its acquisition of Facebook API, which is then used in the next chapter, it shows a practical example of retrieving data from open-access user accounts. Then followed a survey that determines how well other users have setup privacy settings on Facebook. Finally, this paper is recommending most kinds of settings for your privacy, based on the fundamental principles of safe on the Internet and rules to ensure privacy on social networks.
History of development process of relation and attitude of the POLICE of the CZECH REPUBLIC to the protection of the data containing personal data in police information systems covering time period from the year 1990 to the year 2007.
SUFČÁK, Pavel
The subject of this bachelor?s work is a history of development process of relation and attitude of the POLICE of the CZECH REPUBLIC to the protection of the data containing personal data in police information systems covering time period from the year 1990 to the year 2007. The goal of this bachelor?s work is performance of analysis of the development of personal data protection in the time period from the year 1990 until the year 2007 with special emphasis on everyday work and practise of police organisms and police bodies within Management of the South Bohemia Region, POLICE of the CZECH REPUBLIC. Next successive goal of this bachelor?s work is the performance of analysis of the development of computer technology applied and used in police practice (safeguarding, protection, operation, back-up and archiving, anti-virus protection, case reporting). Theoretical part of this bachelor?s work deals with and analyses the concept of privacy, the development of the right of privacy, the development of the right to protection of personal data in terms of global, European, the Czech Republic, public-law, criminal-law and police. This bachelor?s points out the possibility of various types of imminent danger in the area of data funds being exposed to danger while using the most important relevant methods of cybernetics and cybernality. The integral part of this bachelor?s work is performance of quantitative analysis of the development of occurrence and incidence of criminal acts according to § 178 Unlawful/wrongful treatment of personal data, §§ 239, 240 Breach of secrecy of delivered messages, § 257a Damage and misuse/ill-use of a record on information carrier, arising out of the ESSK (Monitoring, Evidence Statistical System of Criminality) information system, which is run by the Centre (Headquarter Centre) of Informatics and Analytical Processes of the Service of Criminal Investigation Police Headquarters of the Czech Republic in the time period from the year 1990 until the year 2007. The second analysis assesses and evaluates the level of activities of appointed/ authorized policemen, who on the basis of the Act On Police of the Czech Republic perform direct supervision and inspection regarding observance of legislative standards of both having their basis in laws and falling and being obligatory within the Ministry of Interior under the conditions of Police Force in the Czech Republic, including pointing out the most frequent slight mistakes.
Providing the patient´s privacy after total hip replacement operation
RŮŽIČKOVÁ, Michaela
Abstract In our company the emphasis in the field of nursing care has increasingly been focused on preservation of a patient`s dignity and intimacy. In daily activities in a pacient the privacy and intimacy the patient may be affected which causes different reactions of such a patient. One might say that even after the routine procedure such as total hip replacement it is very important that the patient has enough privacy. The aims of this study were to assess how the intimacy in the postoperative care is ensured in patients undergoing total hip replacement at the intensive care units and to find out the level of knowledge of the nurses as for adherence to intimacy after total hip replacement. The research group consisted of patients who were hospitalized at the intensive care and standard units in the Hospital České Budějovice, a.s. (PLC), Faculty Hospital Olomouc and Military Hospital Olomouc. The second research group consisted of the nurses who worked at the intensive care and standard units in the Hospital České Budějovice, a.s. (PLC), the Hospital Šumperk, a.s., Faculty Hospital Olomouc and Military Hospital Olomouc. The research investigation was performed by the method using two ananymous questionnaires. The first defined hypothesis was confirmed. The patients at the intensive care units are more satisfield as for their intimacy compared to the patients at the standard units. The second hypothesis was also confirmed. The nurses have not enough time to ensure intimacy of the patient after total hip replacement. The third hypothesis was confirmed. The nurses have enough information of how to take care of the intimacy in the postoperative period. The fourth hypothesis was not confirmed. The nurses at the intensive care unit do not care about the intimacy with a higher interest compared to the nurses at the standard unit. The findings of this investigation show that the patients after total hip replacement at the intensive care unit are more satisfield with the provision of intimacy in the postoperative care compared to patients at the standard unit. Although the nurses do not have enough equipment to ensure the intimacy of a patient in the postoperative care, they know how to take care of intimacy in the postoperative care.
Providing the patient´s privacy on regular wards and intensive care units
ŠVAGROVÁ, Soňa
Providing the patient´s privacy on regular wards and intensive care units Abstract At present, dignity and intimacy of a patient has been increasingly put in the shade. The issue of security of intimacy differs at each ward. The objective of the bachelor thesis on the topic ``Security of intimacy of a patient at a standard ward, an anaesthesiology-resuscitation ward and an intensity care ward{\crqq} is to map out the knowledge of nurses in the field of intimacy and its observance at various sorts of wards. Conducting a number of activities, a nurse enters the intimate zone of a patient and disturbs their intimacy. Therefore we intended to ascertain whether nurses have sufficient knowledge in this field. In a number of cases, patients are not able to defend themselves so their protection is to be secured by the health workers who should behave in the manner respecting the patients in any situation and state. They must do anything not to disturb their intimacy at all or only to a minimal extent. For this reason we raised the questions: Do nurses observe intimacy of patients sufficiently? Do the nurses working at an anaesthesiology-resuscitation ward (ARO) and an intensity care ward (JIP) observe the intimacy principles more than the nurses at standard wards? The research group consisted of the nurses working at ARO, JIP and standard wards of surgical sections in Nemocnice České Budějovice a.s. and Nemocnice Český Krumlov a.s. The research method I used was a questionnaire. Hypothesis No. 1 that nurses have a sufficient knowledge in the field of intimacy was confirmed on the basis of the knowledge test results. Regrettably, hypothesis No. 2 that nurses observe patient intimacy insufficiently was confirmed. Hypothesis No. 3 that the nurses working at ARO and JIP wards observe the principles of intimacy security more than the nurses working at a standard ward was not confirmed. It follows from the results of the research that while nursing the patients, nurses observe the principles of intimacy security insufficiently at all the types of wards. On the basis of the undertaken research, the hospitals that have not internal regulations (guidelines) on this issue elaborated should do so e.g. in the form of ``Ten Rules of Patient Privacy{\crqq} and should pay attention to observance of principles of patient intimacy protection. It is necessary that the nurses serve as defenders of the patients{\crq} rights in this field.
Setting Up And Securing Enterprise Wireless Network
Balon, Lukáš ; Palovský, Radomír (advisor) ; Pavlíček, Luboš (referee)
The topic of this bachelor's thesis is to set compact view on the issues of the wireless networks, their settings and proper security in corporate environment. Wireless networks are supposed to simplify access to the internet and business data, but especially in this area, it is necessary to put forth above standard care to security policy, to protect network from external attacks. First part of this work is focused on theoretical background of the Wi-fi, basic functioning principles, history and step-by-step development of technology. Explains differences between particular standards, defines basic parameters of Wi-fi devices. Next part is focused on network security. It explains encryption methods and procedures and describes differences between ciphers. This section also deals with other possibilities, how to solve security questions. Third section deals with installation of wireless components, their proper configuration and other settings. From this text emerges, how simple to buy and how available are wireless components today. Last part id formed by series of experimental hacks into secured network, shows how simple it is to decrypt some ciphers. It proofs which ways of network security are best to use in enterprise environment.

National Repository of Grey Literature : 149 records found   beginprevious140 - 149  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.