National Repository of Grey Literature 39 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Pricing of IT Goods
Kacina, Michal ; Janoušek, Vladimír (referee) ; Květoňová, Šárka (advisor)
The thesis contains the theoretical basis for study of possibilities of pricing information goods. The source areas are microeconomics, marketing, competitive advantage and economics of information goods. The model of market is created with constraints defined on the ground of theoretical basis. The thesis analyzes requirements that define the system that supports the choice of pricing strategy. It includes detailed design of the prototype of such system. The prototype is designed with robustness because of the future improvements. The design describes the prototype's input parameters and their transformation into useful outputs that cover basic characteristics of information goods. The designed prototype is implemented. The thesis includes demonstration of the prototype and possible directions for improvements that lead to validity of proposed model of market.
Maritime Piracy, its Suppression and Punishment
Štemberg, Milan ; Bílková, Veronika (advisor) ; Šturma, Pavel (referee)
The text Maritime Piracy, Its Suppression and Punishment, analyses piracy as a classical threat to international maritime traffic, which has reappeared after being considered obsolete in a majority of the world for several decades. The text first discusses general questions connected with piracy - a definition of piracy according to public international law is presented. Consequently, the factual side of piracy is presented, since piracy still is a topic not very well-known in the Western world. In the following part of the text, the tools provided by public international law for suppression of piracy are analyzed, as well as possible ways of prosecution of persons accused of piracy. The final part of the text discusses the case study of Somalia. In Somalia, piracy has become a threat to international peace as well as a severe hindrance to international maritime trade. Despite the effort of the international community, the public international law has yet to find adequate solutions for the problem of piracy in Somalia.
Private military and security companies in the fight against pirates from the South China Sea to the Horn of Africa
Perglerová, Soňa ; Karásek, Tomáš (advisor) ; Bureš, Oldřich (referee)
The international system has been confronting with constant changes since the end of the Cold War. Especially in the last twenty years on the international chessboard has emerged a new player that provides a wide range of military and security services - private military and security companies (PMSCs). While operations PMSCs are mainly associated and confined with conflict and war zones in Africa and the Middle East, this thesis entitled "Private military and security companies in the fight against the pirates from the South China sea to the horn of Africa" is about private military and security companies which provide special security services - naval. The growing demand for these services leads to the increase of private providers not only along the Somali coast, but also in Southeast Asia. The aim of the thesis is to explain why PMSCs engage in the fight against piracy, respectively what are the conditions for the initiation and development of private naval security activities.
Internet and computer criminality
Hefka, Rostislav ; Gřivna, Tomáš (advisor) ; Bohuslav, Lukáš (referee)
Internet and computer criminality Summary This thesis, as its name indicates, deals with the problems of our times associated with computers and the Internet, which make it possible to commit all sorts of crimes. Computers are part of our daily life and the sphere of information and communication technologies are constantly and rapidly developing, which gives space to potential perpetrators to find new approaches. The thesis is composed of eight chapters. The opening chapter of this thesis describes the basic concepts related to computer and Internet criminality. It includes the definitions of computer criminality, cybercrime, cyberspace, as well as basic technical concepts such as computer, hardware or software. Approximation of this terminology is essential to understanding the issue. Next chapter is devoted to some illegal activities in cyberspace, which are then legally assessed. The third chapter forms the most important part of the whole thesis because it describes in details the issue of copyright violations in connection with computers. At first it generally talks about intangible goods, and after that it acquaints to readers with piracy of audio and audiovisual works and later with software piracy. It shows the most important judgments that are connected to the discussed topic and were judged at...
Internet law
Meissnerová, Anna ; Žikovská, Petra (advisor) ; Wünschová Pujmanová, Alexandra (referee)
! 69! Internet Law - Master Thesis Abstract This study explores and describes the discipline of Internet Law as well as the problems arising from applying its jurisdiction. Furthermore, it deals with liability limitation in the on-line world and presents various tendencies in the development of the Internet Copyright Law in the Czech Republic, USA and France. This study is divided into two main chapters. The first one deals with the theoretical and philosophical foundations of the Internet phenomenon and the second focuses on practical aspects of the on-line legal regulation. The tendencies in interpretation and application of the legislature are presented through important case studies. The research strategy for this thesis was data gathering followed by its analysis. Providing examples of local legislature (Czech, USA, French) together with presentation of corresponding case studies I was searching for the keys for interpretation and application strategies of this relatively young and dynamically developing field of law. The study's objective was to find answers to the following two questions: a) Is there a general need for the Internet legal regulation? And if so b) What should the legislative tendency within the Internet Copyright Law be? During the writing process I had to confront two opposite...
Spanish-Dutch relations in the New World during the existence of the West-Indische Compagnie
Kubátová, Eva ; Křížová, Markéta (advisor) ; Skřivan, Aleš (referee) ; Marek, Pavel (referee)
Spanish-Dutch Relations in the New World during the Existence of the West Indische Compagnie Eva Kubátová Abstract This dissertation is dedicated to the Spanish-Dutch relations in the New World during the existence of the first Dutch West India Company (1621-1674). On base of an imagological analysis, this thesis presents elements of mutual relations, reflected in hetero-images, together with self-representation of both analyzed parties (thus self-image) within the ongoing conflict of the Eighty Years' War. The imagological analysis is applied on archival material, chiefly the Dutch pamphlets and Spanish Relaciones de sucesos (which can be translated as "Treatises of Successes"). The result of this thesis is then an analysis of development and changes of mutual images, upon the historical events of the Spanish-Dutch war conflict: thus since the beginnings of the Dutch Revolt, passing through the Twelve Years' Truce, until the signature of the Peace of Westphalia in 1648. A special emphasis is put to the final phase of the Eighty Years' War, in this thesis delimited by the years 1621-1648, which was marked by the official entrance of the West India Company into the Spanish waters of Greater Caribbean. An important watershed in mutual relations is afterwards represented by the Peace of Westphalia, which...
Software piracy
Cholasta, Roman ; Dobřichovský, Tomáš (advisor) ; Císařová, Zuzana (referee)
The main target of this thesis is to outline the issues connected with software piracy to the reader. To clarify this issue some legal background connected with software needs to be explained. First it is necessary to define what software is and clarify its connection with a computer program. Next step is to define a computer program, which parts of it are protected and which parts are not. In order to define what is software piracy the thesis defines a rightful use of a computer program. After that it is possible to define software piracy and take a closer look at it. Also in the conclusion there are some current issues in this area that have a significant impact on the perception of software piracy by the public. This thesis is divided into ten chapters. The introduction outlines the issues of software law and software piracy and attempts to clarify the origin of this issue considering a new borderless area - the internet. The second chapter deals with the terms software and computer program, their relation and the differences and also with other terms which are used in this thesis including the legal source of a computer program with an overview of the current case law of the European Union Court of Justice. The third chapter is focused on a computer program as an object of law together with...
Christian Captives in 17th Century Morocco
Kolek, Ladislav ; Veselý, Rudolf (advisor) ; Ženka, Josef (referee)
This thesis presents an inquiry into the issue of Christian captives in 17 th century Morocco, while the main concern is given to all main aspects of the moroccan captivity. The thesis begins with the introduction to the historical background of the period, which is followed by chronological delineation of the act of being taken captive where the corsaires of Salé took their part, then the living conditions which the Christians had to face during their captivity in Morocco, to the possibilities of redemption which the situation offered. keywords: Morocco, piracy, captives, Christians, 17 th century, Moulay Ismail, Salé, Republic of Bouregreg
Violation of Authors' Rights Using Cyberspace
Křížovská, Kristina ; Gřivna, Tomáš (advisor) ; Šelleng, Dalibor (referee)
Violation of Authors' Rights Using Cyberspace Abstract This diploma thesis describes violation of authors' rights in cyberspace, especially the most common ways of committing this crime. The thesis is divided into five parts. The first chapter contains a general introduction to the topic, it defines the basic concepts (such as computer and related terms of hardware and software, internet, cyberspace and cybercrime), which serve as a basis for other parts of the work. The second chapter deals with copyright as such. It explains the concept of copyright work and describes the individual rights of the author. Given the nature of this criminal activity, it is not possible to limit the interpretation to the criminal law regulation. The second chapter thus indicates what rights of the author are affected, which works are subject to copyright infringement, which works are excluded from copyright protection and, finally, what are the limitations and exceptions to copyright. The third part is followed by a brief overview of the legislation that can be applied to the area of copyright (or generally to cybercrime). This includes national (Czech), European and international legislation, as it is an issue that in many cases crosses national borders. The fourth part of the thesis is a crucial part, because it deals with...
Internet and computer criminality
Hefka, Rostislav ; Říha, Jiří (referee) ; Hořák, Jaromír (referee)
Internet and computer criminality Summary This thesis, as its name indicates, deals with the problems of our times associated with computers and the Internet, which make it possible to commit all sorts of crimes. Computers are part of our daily life and the sphere of information and communication technologies are constantly and rapidly developing, which gives space to potential perpetrators to find new approaches. The thesis is composed of eight chapters. The opening chapter of this thesis describes the basic concepts related to computer and Internet criminality. It includes the definitions of computer criminality, cybercrime, cyberspace, as well as basic technical concepts such as computer, hardware or software. Approximation of this terminology is essential to understanding the issue. Next chapter is devoted to some illegal activities in cyberspace, which are then legally assessed. The third chapter forms the most important part of the whole thesis because it describes in details the issue of copyright violations in connection with computers. At first it generally talks about intangible goods, and after that it acquaints to readers with piracy of audio and audiovisual works and later with software piracy. It shows the most important judgments that are connected to the discussed topic and were judged at...

National Repository of Grey Literature : 39 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.