• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 98
  • 15
  • 14
  • 10
  • 6
  • 4
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 180
  • 69
  • 63
  • 57
  • 53
  • 46
  • 46
  • 37
  • 35
  • 33
  • 29
  • 27
  • 26
  • 23
  • 23
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Mediální diskurz regulace médií: komparativní analýza českého a britského denního tisku / Media discourse of the regulation of media with an attention to cases of publicising information from phone hacking-comparative analysis of Czech and British daily newspapers

Pospíchal, Tomáš January 2015 (has links)
This thesis is concerned with the media image of Czech and British press regulation, with a focus on daily newspapers. The theoretical part deals with selected normative requirements for media, the concept of public interest, the legislative framework of the press operation in the Czech Republic and the United Kingdom, self-regulation mechanisms of the British press, and, last but not least, ethical norms and professional practice that comes with the occupation of a journalist. The thesis also presents the main representatives and the basis of critical discourse analysis, the selected procedures of which are then used in the follow-up study of media content. The analytical part focuses on the discourse of selected Czech and British daily newspapers and examines it in the context of two events associated with state intervention into media regulation. Inthe case of the Czech Republic it is the approval of Law no. 52/2009, titled by the media as "muzzle law", in the case of the United Kingdom we are concerned with the exposal of illegal methods for obtaining information by News of the World, a British weekly. Both of these events led to significant media response, among other reasons because they were closely tied with the issue of media regulation, respectively press regulation. Using the tools of...
122

Ukradeno 77 milionů účtů služby PlayStation Network, týká se nás to?: analýza internetových diskuzí pod články týkajícími se tématu / 77 millions user accounts have been stolen, should we worry? Analysis of Internet discussions relevant to the topic

Gregor, Filip January 2013 (has links)
Diploma thesis 77 million PlayStation Network accounts stolen, does it affect us?: An analysis of Internet discussions revolving around this topic deals with the case of what so far seems to be the biggest case of user information leak on the Internet. The introduction outlines the history and development of PlayStation consoles and maps major attempts to jailbreak the last generation of the console by hackers. The following section presents PlayStation Network itself, whose users were at risk of the loss of their online identity because of the attack and chronologically describes the course of breach-related events including the subsequent theft of user data. It also focuses in detail on the case of GeoHot - a hacker whose dispute with Sony alienated fellow hacker community and initiated retaliatory activities which as a result led to loss of data. Another part of the thesis examines the issue of digital identity and its protection, gives an insight into the history of the formation of the hacker community and further explains the phenomenon of existence and perception of the term hacker in the context of the Internet. The final section is devoted to analysis of selected discussion posts under thematically relevant articles, analyzes them in terms of content relevance, information sentiment and...
123

Levesonova komise a její význam pro diskusi o etických hranicích bulvárních médií / The Leveson Inquiry and Its Value for the Discussion about Ethical Limits of Tabloid Media

Roubková, Janetta January 2016 (has links)
This thesis deals with the use of dishonest manners of obtaining information, particularly in connection with the tabloid media. The aim is to evaluate the practices of the tabloid media in gathering information and contribute to the discussion about their ethical borders. It also analyzes investigation of Leveson Inquiry, which was established in 2011 by the British government in response to the phone-hacking scandal connected with tabloid newspaper News of the World. The judicial commission leded by Brian Leveson was tasked to examine the ethical aspects of media and to find out if the system of media self-regulation is still effective. The thesis also includes an analysis of the tabloid environment in the Czech republic. It is based on interviews with representatives of major tabloids in this country.
124

Bluetoothsäkerhet, neglegerad eller (o)kunskap

Axelsson, Andreas January 2019 (has links)
Under 2017 hittades sårbarheten Blueborne som gjorde att en person kunde ta sig in i mobiltelefoner eller datorer helt obemärkt genom att enheten endast ha igång bluetooth. Bluetoothsäkerheten behövs tas på minst lika stort allvar som alla andra enheter som tillexempel wifi eller annan trådlös utrustning som kan äventyra att information hamnar i orätta händer, för skulle felaktig information nå en person med ont uppsåt så skulle konsekvenserna vara förödande för privatpersoner eller för företag. Denna uppsats behandlar frågor genom att intervjua personer på företag och genom enkätundersökning, det har påvisats att majoriteten av företag har bristande kunskap eller saknar någonting som kan varna en användare eller administratör vid en attack. Diskussion kring attackers potentiella förödelse mot företag när det kommer kring information och drift och hur det går att skydda sig.
125

Science, practice, and justification : the a priori revisited

Basoukos, Antonios January 2014 (has links)
History is descriptive. Epistemology is conceived as normative. It appears, then, that a historical approach to epistemology, like historical epistemology, might not be epistemically normative. In our context here, epistemology is not a systematic theory of knowledge, truth, or justification. In this thesis I approach epistemic justification through the vantage point of practice of science. Practice is about reasoning. Reasoning, conceived as the human propensity to order perceptions, beliefs, memories, etc., in ways that permit us to have understanding, is not only about thinking. Reasoning has to do with our actions, too: In the ordering of reasoning we take into account the desires of ourselves and others. Reasoning has to do with tinkering with stuff, physical or abstract. Practice is primarily about skills. Practices are not mere groping. They have a form. Performing according to a practice is an activity with a lot of plasticity. The skilled performer retains the form of the practice in many different situations. Finally, practices are not static in time. Practices develop. People try new things, some of which may work out, others not. The technology involved in how to go about doing things in a particular practice changes, and the concepts concerning understanding what one is doing also may change. This is the point where history enters the picture. In this thesis I explore the interactions between history, reasoning, and skills from the viewpoint of a particular type of epistemic justification: a priori justification. An a priori justified proposition is a proposition which is evident independent of experience. Such propositions are self-evident. We will make sense of a priori justification in a context of regarding science as practice, so that we will be able to demonstrate that the latter accommodates the normative character of science.
126

La performance dans les arts plastiques aujourd'hui : tatouages et piercings

Souladie, Catherine 26 June 2012 (has links) (PDF)
Cette recherche propose une réflexion sur la pertinence d'un " art -action " actuel, à partir d'une analyse d'actes pour l'art, caractérisés comme " hors limites ", à travers une utilisation de la présence physique comme essence et support de l'art plastique, entreprise dès les années 1920 par Marcel Duchamp, et déclinée durant tout le vingtième siècle avec des mouvements artistiques tels Dada, le Happening, l'Actionnisme Viennois, ou l'Art Corporel.Nous étudions ici, aidés d'artistes performers choisis autour de quelques pratiques singulières de Albrecht Becker, Ron Athey et Lukas Zpira, les possibles limites d'actes artistiques, mettant en scène de façon extrême, à travers des performances jugées choquantes, agressives, incluant piercings, tatouages, osant parfois un art du malaise, se jouant des conventions, des tabous et des codes sociaux et culturels en place. Ainsi nous voyons s'il y a lieu, aujourd'hui, de parler encore d'actes artistiques politiques, militants, après l'âge d'or des années soixante-dix, parmi des nouvelles esthétiques du corps humain, celui-ci successivement " héros, sujet, matériau, objet, victime, écran " de cet art-action transgressif. Notre volonté est de saisir l'ambiguïté contenue dans la représentation, et toute la symbolique donnée à voir, par rapport à une première intention qui est une certaine déstructuration à la fois thématique et formelle dans les arts plastiques. La discussion est donc engagée sur l'authenticité et la pérennité de ces pratiques artistiques extrémistes, transgressives, manipulant le concept d'identité ou même la génétique, discussion aussi sur leur statut avant-gardiste dans l'histoire de " l'art pour l'art ", concept porté par la modernité.Ce " hacking " du corps nous amène-t-il-alors vers un devenir post-humain virtuel, une seule existence dans les univers numériques ? Le corps est-il en perdition ou, paradoxalement l'ultime recours, sauvé par ces modifications douloureuses et radicales ?
127

Hacktivism and Habermas: Online Protest as Neo-Habermasian Counterpublicity

Houghton, Tessa J. January 2010 (has links)
This thesis both draws from and contributes to the ongoing project of critiquing and reconstructing the theory of the public sphere; an undertaking that has been characterised as both valuable and necessary by Fraser (2005: 2) and many others. The subsection of theory variously described as ‘postmodern’, ‘radical’, or ‘agonistic’ informs an intensive practical and theoretical critique of the pre- and post-‘linguistic turn’ iterations of the Habermasian ideal, before culminating in the articulation of a concise and operationalisable ‘neo-Habermasian’ public sphere ideal. This revised model retains the Habermasian public sphere as its core, but expands and sensitizes it, moving away from normative preoccupations with decision-making in order to effectively comprehend issues of power and difference, and to allow publicness “to navigate through wider and wilder territory” (Ryan, 1992: 286). This theoretical framework is then mobilised through a critical discourse analytical approach, exploring three cases of hacktivist counterpublicity, and revealing the emergence of a multivalent, multimodal discourse genre capable of threatening and fracturing hegemony. The case studies are selected using Samuel’s (2004) taxonomy of hacktivism, and explore the ‘political coding’ group, Hacktivismo; the Creative Freedom Foundation and the ‘performative hacktivism’ of their New Zealand Internet Blackout; and the ‘political cracking’ operations carried out by Anonymous in protest against the Australian government’s proposed Internet filter. The analysis focuses on how the discursive form and content of hacktivism combines to function counterhegemonically; that is, how hacktivists work to provoke widespread political preference reflection and fracture the hegemony of the publics they are oriented against. This approach generates a fruitful feedback loop between theory and empirical data, in that it enriches and extends our understanding of new modes of counterpublicity, as well as providing a detailed account of the under-researched yet increasingly widespread phenomenon of hacktivism.
128

Právní aspekty boje proti počítačové trestné činnosti / Legal Aspects of Fighting Cybercrime

Dostál, Otto January 2020 (has links)
The thesis deals with the topic of computer crime. Foremost, it demonstrates on an example of the operation of a medical image information processing system some selected aspects of this issue. It shows that it is always necessary to monitor the current state of the technical knowledge at the time, but also the need of addressing the issue within the corresponding legal limits. The thesis presents criminal law reality as a complex system. The links between different parts of the system are examined, and possible shortcomings are considered. The legal instruments and legal limits of the procedures that can be used against cybercrime are evaluated. The thesis focuses especially on the issue of obtaining evidence under the Czech Criminal Procedure Code. It presents a proposal on how to understand individual procedural legal institutes and for what purposes and how to use them. Consequently it suggests legal procedures for specific selected practical situations.
129

Kommunal IT-säkerhet under en pandemi : Distansarbetets påverkan på informationssäkerhet / Municipal IT security during a pandemic : The impact of telework on information security

Axelsson, Louise, Rosvall, Erik January 2021 (has links)
Efter pandemins intåg i världen år 2020 har de flesta människor tvingats ändra sina levnadsvanor, både vad gäller privatliv som arbetsliv. I Sverige har anställda, där tjänsten tillåter, tvingats utföra sina arbetsuppgifter på distans och detta har oftast skett i det egna hemmet. Detta öppnar upp för en hel del frågor. Hur skall man kunna bibehålla en god informationssäkerhet när tjänster som hanterar känsliga och sekretessbelagda uppgifter flyttas till den anställdes hem? Denna studie kommer att undersöka en specifik forskningsfråga: Vilka konsekvenser har det ökade digitala distansarbetet resulterat i, vad gäller kommunal IT-säkerhet? En kvalitativ datainsamlingsmetod har använts. Vi har tagit del av tidigare studier och rapporter i ämnet och utfört intervjuer med respondenter som innehar en kommunal tjänst inom IT. Undersökningen fokuserar framför allt på de digitala verktyg som används, vilka strategier som finns, rådande hot gentemot data- och informationssäkerheten samt hantering av tidigare och framtida attacker.   Resultatet visar på att de flesta kommunerna vi intervjuade, använder sig av liknande verktyg för att kommunicera vid distansarbete och även för att säkerställa en säker uppkoppling. Trots givna strategier och riktlinjer från diverse myndigheter, använder kommunerna dessa främst som inspiration till egna policydokument. Under intervjuerna framkom det att de kommuner som utsatts för dataintrång har tagit lärdom och därefter vidtagit diverse åtgärder för att det inte skall upprepas. En slutsats som kan dras av studien är att risken för dataintrång gentemot kommunerna inte har ökat under pandemin.  Däremot har man kunnat konstatera att det är den anställdes brist på utbildning i IT-säkerhet som kan ses som det största hotet vad gäller distansarbete. För att minimera riskerna att känsliga och sekretessbelagda uppgifter läcker ut och hamnar i orätta händer, krävs ökad kunskap och tydliga direktiv vad som skall följas vid distansarbete. / After the pandemic entered the world in 2020, most people have been forced to change their lifestyles, both in terms of private life and work life. In Sweden, employees, where the service allows, have been forced to perform their tasks remotely and this has usually taken place in their own home. This opens up a lot of questions. How can good information security be maintained when services that handle sensitive and classified information are moved to the employee's home? This study will examine a specific research question: What consequences has the increased digital teleworking resulted in, in terms of municipal IT security? A qualitative data collection method has been used. We have taken part in previous studies and reports on the subject and conducted interviews with respondents who hold a municipal position in IT. The survey focuses primarily on the digital tools used, what strategies are available, current threats to data and information security and the management of past and future attacks. The results show that most of the municipalities we interviewed use similar tools to communicate during telework and also to ensure a secure connection. Despite given strategies and guidelines from various authorities, the municipalities use these primarily as inspiration for their own policy documents. During the interviews, it emerged that the municipalities that have been subjected to data breaches have learned lessons and subsequently taken various measures to ensure that it is not repeated. One conclusion that can be drawn from the study is that the risk of data breaches against the municipalities has not increased during the pandemic. On the other hand, it has been established that it is the employee's lack of training in IT security that can be seen as the biggest threat in terms of teleworking. In order to minimize the risks of sensitive and classified information being leaked and falling into the wrong hands, increased knowledge and clear directives are required as to what must be followed in teleworking.
130

Analýza zabezpečení a autentizace bezdrátových sítí / Analysis of security and authentication of wireless networks

Kulíř, Tomáš January 2011 (has links)
This master's thesis deals with wireless networks, mainly about the WiFi. It deals with summary of individual security mechanism both theoretically and using them in real hardware. Mainly it is interested in the security of the individual mechanisms and their weaknesses, which cause rupture of security. At each chapter the ideas and methods, that the attackers are trying for infiltration of wireless networks and decrypt encryption WEP, WPA or WPA2, are outlined. The principle of the authentication of the WiFi by the authentication server and its options, which is connected with directory service LDAP, is also explained in this thesis. The penultimate chapter deals with the summary of security mechanisms and references that should be adhered by design of the WiFi for the provision of the high security. The ending of the master's thesis is devoted to social engineering and its most famous representatives.

Page generated in 0.0622 seconds