National Repository of Grey Literature 20 records found  previous11 - 20  jump to record: Search took 0.01 seconds. 
Hierarchy and human behavior. BDSM as an alternative sexual behaviour.
Jozífková, Eva ; Weiss, Petr (advisor) ; Bob, Petr (referee) ; Zvěřina, Jaroslav (referee)
Preferences for sexual arousal by overstated dominance and submission in sex is categorized as F65.5, sadomasochism, according to ICD, but this behaviour is called BDSM among the general public. The ground of these preferences could be ultimately biological. These preferences reflect behavioural strategy which enables to gain higher reproductive success. Men and women who were sexually aroused by a submissive partner had more male relatives than men and women with other preferences. Contrary to the women, the dominant men reported themselves as more attractive. Women who were aroused by a higher-ranking partner considered themselves more attractive. Sons of couples in which was hierarchical disparity had more siblings than sons of "equal" couples or couples with no hierarchical disparity. Daughters of hierarchically disparate couples had more brothers than daughters of "both dominant" partners. Concurrently, number and gender of offspring as well as self- reported attractiveness are likely to be criteria of the reproductive success in humans. It is also interesting that hierarchically disparate couples, without regard to gender of higher-ranking partner, reached higher reproductive success than "equal" couples. Individuals who preferred higher- or lower-ranking partner were also aroused by...
Abuse of dominant position - individual forms of abusing practices under Community and Czech law
Nováková, Petra ; Horáček, Vít (advisor) ; Liška, Petr (referee)
Abuse of Dominant Position - Individual Forms of Abusing Practices under Community and Czech law Abstract Competition is a basic mechanism of the market economy. It encourages companies to provide consumers products they want, encourages innovation, and pushes the prices down. In order to be effective, competition needs independent undertakings which are subject to the competitive pressure. That was the reason why Competition law has developed. It should pre- eminently ensure to preserve the competition on the market. Competition law comprising three pillars, namely cartel agreements prohibition, merger control and the law against abuse of dominant position. This thesis focuses on the last mentioned branch of the competition law. Attention is aimed to the individual possible forms of abusive conduct of dominant undertakings. The text explicates this problem from the Czech and European law perspective and attempts to explain individual forms of abusing practices in the light of case law. It only contains substantial law, procedural law is not covered. The main aim of the thesis is to bring out the comparison between the legislation relating to the individual forms of abusing practices in the European law and Czech law and to find out if the approach of the competition authorities on the European and Czech...
Dominant position and its abuse in the Czech and European Community Law
Vavříček, Vladimír ; Svoboda, Pavel (referee) ; Šmejkal, Václav (referee)
This thesis addresses dominant position and its abuse in the Czech and in the European Community law, by the means of comparative method. Analyzes and comments on new, relevant courts practice and takes a closer look at reform of the competition law in the field of Art. 102 TFEU. For the sake of the global description of topic in question, the thesis briefly mentions concepts of economic position, economic dependency (significant market power) and their abuse and also presents concept of monopoly position and its abuse in antitrust law of the United States of America.
Statistical anomaly detection methods of data communication
Woidig, Eduard ; Mangová, Marie (referee) ; Slavíček, Karel (advisor)
This thesis serves as a theoretical basis for a practical solution to the issue of the use of statistical methods for detecting anomalies in data traffic. The basic focus of anomaly detection data traffic is on the data attacks. Therefore, the main focus is the analysis of data attacks. Within the solving are data attacks sorted by protocols that attackers exploit for their own activities. Each section describes the protocol itself, its usage and behavior. For each protocol is gradually solved description of the attacks, including the methodology leading to the attack and penalties on an already compromised system or station. For the most serious attacks are outlined procedures for the detection and the potential defenses against them. These findings are summarized in the theoretical analysis, which should serve as a starting point for the practical part, which will be the analysis of real data traffic. The practical part is divided into several sections. The first of these describes the procedures for obtaining and preparing the samples to allow them to carry out further analysis. Further described herein are created scripts that are used for obtaining needed data from the recorded samples. These data are were analyzed in detail, using statistical methods such as time series and descriptive statistics. Subsequently acquired properties and monitored behavior is verified using artificial and real attacks, which is the original clean operation modified. Using a new analysis of the modified traffics compared with the original samples and an evaluation of whether it has been some kind of anomaly detected. The results and tracking are collectively summarized and evaluated in a separate chapter with a description of possible further attacks, which were not directly part of the test analysis.
Potential for Misuse of Products of Civil Pyrotechnics
Matoušek, Pavel ; Bartošková, Monika (referee) ; Němčák,, Ondřej (advisor)
This thesis analyses misuse potential of category 1, 2 and 3 firework´s products. An algorithm for selection of pyrotechnic products with the biggest potential of misuse was created and experimetally tested on common firework products. An experiment replicating the Boston incident was also conducted. And in this experiment was found out, that pyrotechnical compositions used in common firework products could have been used.
Executive decree authority in parliamentary systems: case study Italy
Tošnerová, Monika ; Němec, Jan (advisor) ; Vymětal, Petr (referee)
This thesis analyzes use of extraordinary legislative instruments with a special focus on executive decrees. Executive decrees are analyzed in terms of their theoretical definition and their practical use in connection with other executive and legislative powers. The main part of the study is dedicated to the case study which analyzes the frequent use of executive decrees in Italy. The aim of the thesis is to determine causes of this phenomenon, examine how the use of executive decrees affects the democratic functioning of parliamentary democracy, and to find general tendencies of use of executive decree power across different political systems. The study therefore contains also a comparative analysis of the Italian case with other chosen countries - Argentina, Brazil and Spain, whose constitutions also allow executive power to promulgate decrees.
Current legal issues of copyright infringement of musical works
Kubešová, Eliška ; Boháček, Martin (advisor) ; Votava, Tomáš (referee)
This diploma thesis identifies the most important changes in legislation and submitted proposals in the area of copyright between years 2012 and 2013 and in the beginning of 2014 in the Czech Republic, the EU and the USA. These changes are evaluated from a legislative point of view and also from the point of view of a music consumer. For thorough understanding, the thesis contains also an overview of the current Czech legislation of copyright. Furthermore, it evaluates the current situation in a broader context of law, history, technology, culture and consumer behaviour and defines it as opposed to previous periods. It describes the history of music piracy and its current situation and features some of the most important cases of copyright enforcement of the period 2012 to 2014. The thesis contains also a research performed in the Czech Republic and Sweden, which describes past and present habits of music listeners. Following the identification of previous development and current trends, the thesis discovers future development and suggests future solutions to the problem of copyright in music.
Payment cards security
VALENTA, Roman
This bachelor thesis deals with payment cards security. Different kinds of payment cards and technologies which make their usage secure are described in the work. There is an analysis of risks and vulnerabilities performed in the thesis explaining attacks on payment cards. Analysis-based measures that guarantee protection against of payment cards fraud are proposed.
Euthanasy from the sight of medical staff in picked-up South-Bohemian hospitals
OPOVÁ, Lenka
The main topic of this thesis was to find out how people view today the issue of euthanasia and what arguments they see for and against its legalization. The theoretical part is focused on the history of suicide and abuse of euthanasia in Nazi Germany, the legislation and attitude of individual states that permit or tolerate the merciful death or assisted suicide and the opinions of some Czech personalities. The empirical part expresses the views of nurses and with the help of a quantitative research, we are trying to find out if they are adequately informed in this field. By using an anonymous questionnaire we learn whether they agree or disagree with the legalization of euthanasia in the Czech Republic and whether their age, department they work in and the frequency of meetings with the dying patient has an effect on their opinion.
E-mail a jeho zneužívání
Měsíček, Libor ; Kubešová, Vlasta (advisor) ; Pejsar, Zdeněk (referee) ; Nováček, Jan (referee)
Cílem práce je pokusit se zmapovat historii, popsat současný stav a možný vývoj (trendy) v oblasti zneužívání e-mailu. Shrnout postupy prevence a obrany proti nevyžádané poště. Zároveň vytvořit přehled právních úprav v oblasti zneužívání elektronické komunikace. Hlavní cíl práce spočívá ve formulování doporučení pro uživatele e-mailu, jak snížit nebezpečí spojené s jeho používáním.

National Repository of Grey Literature : 20 records found   previous11 - 20  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.