Spelling suggestions: "subject:"[een] CYBERSPACE"" "subject:"[enn] CYBERSPACE""
411 |
Nový MHP rámec pro kybernetickou válku / New IHL Framework for Cyber WarfareKnopová, Eva January 2016 (has links)
NEW IHL FRAMEWORK FOR CYBER WARFARE - ABSTRACT Regarding the increasing number of revealed cyber-attacks aimed at public facilities including the governmental ones by who seems to be other state actors, this thesis aims to reveal the major importance of cyber warfare, point out the fatal vacuum regarding the IHL framework currently in force and suggests its completion by a new IHL convention, which would regulate cyberwarfare in International Armed Conflicts. In order to provide a well-structured and pertinent arguments to support its main points, the thesis uses methods of qualitative analysis of the current IHL sources including international treaties, customary law and work of the main institutions of international justice along with work of judicial scholars and cyber experts. The work contains five main chapters. The first chapter presents the underlining principles of Laws of Wars, including its theory, history and development; and focuses on one of its three main regimes - the International Humanitarian Law. The second part is dedicated to the topic of cyber warfare, defines its scope as computer network attacks, explains their classification system, analyses their effects and provides examples of such attacks. The third chapter focuses on the issue of the current legal vacuum in relation to cyber...
|
412 |
A privacidade do consumidor e a responsabilidade da empresa no espaço virtual: uma análise sob a ótica da eficácia direitos fundamentais nas relações privadas e da funcionalização do direito na responsabilidade da empresaGaspar, Gisele de Lourdes Friso Santos 08 August 2014 (has links)
Submitted by Nadir Basilio (nadirsb@uninove.br) on 2016-05-11T17:57:44Z
No. of bitstreams: 1
Gisele De Lourdes Friso Santos Gaspar.pdf: 19992252 bytes, checksum: 46db54402fe5d442bd7a0c7d243bf138 (MD5) / Made available in DSpace on 2016-05-11T17:57:44Z (GMT). No. of bitstreams: 1
Gisele De Lourdes Friso Santos Gaspar.pdf: 19992252 bytes, checksum: 46db54402fe5d442bd7a0c7d243bf138 (MD5)
Previous issue date: 2014-08-08 / This research aims to study the fundamental right to privacy in cyberspace, especially in
consumer relations. It analyzes the effectiveness of fundamental rights in relations between
individuals and the social function of company liability that is related of off-balance sheet
consumer detriment. This analysis is made from punitive damages perspective. The traditional
point of view states that fundamental rights are effective only in opposition to the State.
However, from the 1950s this view has changed, going to check the effectiveness of these
rights in relations between individuals. From another hand, the phenomenon of functionalism
of the law has been growth, since the institutes of law are seen today not only by their
structure but by their external relationship. By merging of these two current law visions it is
possible to notice that the liability has a social function - especially when facing injuries to the
right to privacy of the consumer, which is the vulnerable part of the legal relationship. The
Internet revolution promoted in society is well known as well as the way people exchange
information and data, facilitating communication. However, in the same way it has facilitated
the relationships between people, it caused problems not previously encountered such as high
privacy exposure of the consumers. The high growth electronic commerce, in larger
proportions than the old means of trade, also caused the multiple problems, especially in how
consumer data is protected (or exposed) in cyberspace. Due to these issues, the challenges of
this research is to reconcile the right to privacy in cyberspace consumer relations as well as to
determine, in accordance with current legislation, the corporate responsibility regarding the
safety of consumer data. In case of injury to the consumer, this work analyses how the social function of civil liability – as a negative sanction - is able to generate positive behavioral changes, especially focused to prevent further injury. / Esta pesquisa tem por finalidade o estudo do direito fundamental à privacidade no espaço
virtual, especialmente nas relações de consumo. Analisa-se a eficácia dos direitos
fundamentais nas relações entre particulares e a função social da responsabilidade civil da
empresa em relação a danos extrapatrimoniais causados ao consumidor, sob a ótica dos danos
punitivos. A visão tradicional é de que os direitos fundamentais têm eficácia apenas em
oposição ao Estado. Entretanto, a partir da década de 1950, essa visão modificou-se,
passando-se a verificar a eficácia desses direitos nas relações entre particulares. Por outro
ladp, o fenômeno da funcionalização do direito vem ocorrendo de forma crescente, posto que
os institutos de direito são hoje vistos também por sua função – relação externa – e não apenas
por sua estrutura. Conciliando essas duas visões atuais do direito, pode-se verificar que a
responsabilidade civil possui uma função social, especialmente quando se está diante de
lesões ao direito à privacidade do consumidor, que é a parte vulnerável na relação jurídica. É
de conhecimento notório a revolução que a Internet promoveu na sociedade e na forma como
as pessoas trocam informações e dados, facilitando a comunicação. Entretanto, da mesma
forma que facilitou as relações entre pessoas, trouxe problemas antes não enfrentados, como a
extrema exposição da privacidade das dos consumidores. Também o aumento vertiginoso do
comércio eletrônico, em proporções maiores do que os antigos meios de comércio, fez com
que os problemas se multiplicassem, sobretudo na forma como os dados dos consumidores
são protegidos (ou expostos) no espaço virtual. Em razão dessas questões verificadas, o
desafio proposto nesta pesquisa é conciliar o direito à privacidade nas relações de consumo
ocorridas no espaço virtual e apurar, de acordo com a legislação vigente, a responsabilidade
da empresa em relação à segurança dos dados dos consumidores. Havendo lesões ao
consumidor, analisa-se a forma como a função social da responsabilidade civil, sendo uma
sanção negativa, é capaz de gerar mudanças positivas de comportamento, especialmente para
prevenir novas lesões.
|
413 |
Možnosti zlepšení strategií pro kybernetickou bezpečnost / The potential improvement of the cyber security strategiesJandura, Lukáš January 2016 (has links)
The thesis focusses on central nodes' dynamics in cyberspace, representing its key elements. Such approach derives from the theory of networks developed by Albert-László Barabási and it is conceptualised along with cyberspace in security studies and the role of a state in cyberspace. Main question, which is how to improve cybersecurity strategies, is answered by well-structured package of possible positions of a state towards central nodes. It asses the level of involvement in cyberspace, boundaries of intrusion into central nodes and acceptable tools usable against those which are not directly accessible. Powered by TCPDF (www.tcpdf.org)
|
414 |
Specifika internetového podnikání / Internet business specificationsRýdel, Tomáš January 2013 (has links)
(in English): The main goal of diploma thesis is to describe the internet business specifics with focus of identifying the causes of success or failure of companies on the Internet. At the theoretical level in context of thesis is to characterize the influence of the Internet on business principles and give to the reader a complete picture of its impact on current business. Following the main aim of the theses will need a virtually explore the possibilities which offer 21st century in the integration of modern business tools that allows smoother access to corporate infomation and knowledge and If their effective optimatization is the key to a uccessful business on the internet. The contribution of this thesis is to evaluate the practical challenges for companies which brings continual development of information and communication technologies that can be used for support of decision making in selecting an appropriate combination of business tools.
|
415 |
E-GOVERNMENT A E-DEMOCRACY NEBOLI OPEN SOURCE VLÁDNUTÍ / XXXFejfar, Jindřich January 2013 (has links)
The diploma thesis Public sphere in networked society concerns about the relation of public sphere and cyberspace. Cyberspace is defined as new social institution, which is not embodied Habermasian normative ideal of critical public sphere, but in contrary it constitute new forms of inequalities and new forms of fragmentarization and commercialization. Explored are therefore also theories which critically deal with concept of public sphere and better describe the reality of cyberspace. The expansion of Cyberspace and horizontal communication network also relate with transformation of contentious politics. The thesis provides an overview of historical development of new action repertoire of contention - virtual sit-in. As an embodiment of all these societal shifts, which are seen as an elements of change in power balance, is presented Operation Payback orchestrated by hacktivist group Anonymous. Keywords Cyberspace, public sphere, hacktivism, action repertoires, repertoires of contention, virtual sit-in, electronic civil disobedience, Anonymous, Operation Payback
|
416 |
Podoby autorské funkce v kyberprostoru / The forms of author function in cyberspaceJonáš, Jakub January 2014 (has links)
Task of this thesis is to analyse forms of autors functions in cyberspace. The term autor function commes from Michel Foucaults thesis based on historical and cultural determination of wiew on autorship. The theory is based on point of wiew that society see autor through his function in discours, in case this regularity function is in a discours present. It provides specific way of existence, circulation and effect of discours within society. The issue of cyberspace is that it established originaly new possibillities of spreading of data. This possibilities broke down a former fear felt by mass medias, which finaly decided to move to cyberpace, which was allowed by their digitalization. There are two ways how to use the cyberspace. First is mass medial way, second way is cybercultural. Those ways are contradictory. Each of those ways has its own cultural practises, on which is based form of author funcion. Biggiest difference between those forms is that the mass media takes this form as some kind of private property, on which is based their working. On the opposite is form of author funcion typical for cyberculture, which is property free. The difference of those forms of autor function is the main reason, why are these two ways of using cyberspace in constant conflict.
|
417 |
Kolektivní inteligence a role jedince: na příkladu sociálního aktivismu online / Collective Intelligence and the Functions of Individual: Using an Example of Social Activism OnlineBatrlová, Marie January 2014 (has links)
Final thesis titled Collective Intelligence and the Functions of Individual: Using an Example of Social Activism Online uses definition of collective intelligence by Pierre Lévy, and tries to verify it throught practice of social activism on the internet using a smartphone as a tool for accessing cyberspace. The theses is based on media theory works focusing in particular on a new kind of intelligence of community and the impact of new communication technologies on humans. Next part is about the topics of social activism, when considering together or independently with collective intelligence, provides the potential for direct democracy. Lastly there are few examples of social activism online or forerunners of direct democracy. As an important issue of collective intelligence in practice emerge the rules of behavior of individuals and Lévy's vision of collective intelligence as a peak of humanity.
|
418 |
Možnosti zlepšení strategií pro kybernetickou bezpečnost / The potential improvement of the cyber security strategiesJandura, Lukáš January 2016 (has links)
The thesis is focused on central nodes' dynamics in cyberspace, representing its key elements. This approach is derived from the theory of networks developed by Albert-László Barabási and applied on different aspects of cyberspace, which brings different views at known events and issues and discovers relationship between central and common nodes. Cyberspace is perceived in its broadest shape as a fluid result of social constructivism influenced by behaviour of its users. Final outcomes are summarised to recommendations for a new approach to a cybersecurity strategy. Powered by TCPDF (www.tcpdf.org)
|
419 |
A framework for higher academic institutions in the republic of South Africa to mitigate network security threats and attacks.Mohapi, Matrinta Josephine 06 1900 (has links)
M. Tech. (Department of Information and Communication Technology, Faculty of Applied and Computer Sciences), Vaal University of Technology. / The computer networks of higher academic institutions play a significant role in the academic lives of students and staff in terms of offering them an environment for teaching and learning. These institutions have introduced several educational benefits such as the use of digital libraries, cluster computing, and support for distance learning. As a result, the use of networking technologies has improved the ability of students to acquire knowledge, thereby providing a supportive environment for teaching and learning. However, academic networks are constantly being attacked by viruses, worms, and the intent of malicious users to compromise perceived secured systems. Network security threats and cyber-attacks are significant challenges faced by higher academic institutions that may cause a negative impact on systems and Information and Communications Technology (ICT) resources. For example, the infiltration of viruses and worms into academic networks can destroy or corrupt data and by causing excessive network traffic, massive delays may be experienced. This weakens the ability of the institution to function properly, and results in prolonged downtime and the unavailability of Information Technology (IT) services.
This research determines challenges faced by higher academic institutions, identifies the type of security measures used at higher academic institutions, and how network security could be addressed and improved to protect against network security threats and attacks. Two research approaches were adopted, namely a survey and an experiment. Survey questionnaires were distributed to IT technical staff at higher academic institutions in Gauteng province to determine the challenges they face in terms of securing their networks. It is crucial that network security takes on a prominent role when managing higher academic institutions‘ networks.
The results of the study reveal several challenges such as budget constraints, inadequate security measures, lack of enforcing network security policies, and lack of penetration testing on systems and the network. The results also reveal that the implementation of security measures can and does address network security threats and attacks. It is therefore extremely important for higher academic institutions to implement proper security measures to help mitigate network security threats and attacks. The framework proposed is based on the results from the research study to help mitigate network security threats and attacks at higher academic institutions.
|
420 |
Community, Conversation, and Conflict: a Study of Deliberation and Moderation in a Collaborative Political WeblogSoma, Samantha Isabella 01 January 2009 (has links)
Concerns about the feasibility of the Internet as an appropriate venue for deliberation have emerged based on the adverse effects of depersonalization, anonymity, and lack of accountability on the part of online discussants. As in face-to-face communication, participants in online conversations are best situated to determine for themselves what type of communication is appropriate. Earlier research on Usenet groups was not optimistic, but community-administered moderation may provide a valuable tool for online political discussion groups who wish to support and enforce deliberative communication among a diverse or disagreeing membership.
This research examines individual comments and their rating and moderation within a week-long "Pie Fight" discussion about community ownership and values in the Daily Kos political blog. Specific components of deliberation were identified and a content analysis was conducted for each. Salient issues included community reputation, agreement and disagreement, meta-communication, and appropriate expression of emotion, humor, and profanity. Data subsets were analyzed in conjunction with the comment ratings given by community members to determine what types of interaction received the most attention, and how the community used the comment ratings system to promote or demote specific comment types. The use of middle versus high or low ratings, the value of varied ratings format, and the use of moderation as a low-impact means of expressing dissent were also explored.
The Daily Kos community members effectively used both comments and ratings to mediate conflict, assert their desired kind of community, demonstrate a deliberative self-concept, and support specific conditions of deliberation. The moderation system was used to sanction uncivil or unproductive communication, as intended, and was also shown to facilitate deliberation of disagreement rather than creating an echo chamber of opinion.
|
Page generated in 0.0452 seconds