85,787 research outputs found
Current Problems of Using Electronic Signature in Practice
Import 11/07/2012Abstrakt
Název práce: Aktuální problémy využití elektronického podpisu v praxi
Jméno studenta: Bc. Petra Šmídová
Tématem mé diplomové práce jsou aktuální problémy využití elektronického podpisu v praxi. Součástí práce je také analýza praktických problémů elektronického podpisu, při které jsem se zaměřila na respondenty poskytující právnické služby v Moravskoslezském kraji. V prvních kapitolách práce byla upřesněna problematika elektronického podpisu, jeho druhy, bezpečnost, výhody či nevýhody, které s ním souvisí a také právní úprava elektronického podpisu jak z pohledu českého práva, tak i práva Evropské unie. Následně jsem se zabývala analýzou praktických problémů elektronického podpisu u vybrané skupiny respondentů a to pomocí elektronického dotazníkového šetření.
Cílem výše popsané analýzy bylo odhalit praktické problémy elektronického podpisu, jak při jeho zřizování, tak i v prvních letech či dlouhodobějším používání. Následně z výsledků provedené analýzy byly vytvořeny návrhy a doporučení, které by měly sloužit ke zkvalitnění služeb elektronického podpisu.Abstract
Title of thesis: The current problems using electronic signatures in practice
Name of student: Bc. Petra Šmídová
The topic of my thesis is: the current problems of using an electronic signature in practice. My work also includes an analysis of practical problems of electronic signature in which I focused on respondents who provide legal services in the Moravian-Silesian Region. In the first chapters of the work I specified the term “electronic signature”, defined its types, safety, advantages and disadvantages associated with its usage, and also its legislation from the perspective of the Czech and the European Union law. Then I focused on the analysis of practical problems of electronic signatures with a selected group of respondents using an electronic questionnaire.
The target of the analysis described above was to reveal practical problems of an electronic signature while establishing it, during the first years of its usage and also during a long-term use. From the results of the analysis were then created proposals and recommendations which should improve the quality of using an electronic signature.119 - Katedra právavýborn
The Value of User-Visible Internet Cryptography
Cryptographic mechanisms are used in a wide range of applications, including
email clients, web browsers, document and asset management systems, where
typical users are not cryptography experts. A number of empirical studies have
demonstrated that explicit, user-visible cryptographic mechanisms are not
widely used by non-expert users, and as a result arguments have been made that
cryptographic mechanisms need to be better hidden or embedded in end-user
processes and tools. Other mechanisms, such as HTTPS, have cryptography
built-in and only become visible to the user when a dialogue appears due to a
(potential) problem. This paper surveys deployed and potential technologies in
use, examines the social and legal context of broad classes of users, and from
there, assesses the value and issues for those users
Editorial Special Issue on Enhancement Algorithms, Methodologies and Technology for Spectral Sensing
The paper is an editorial issue on enhancement algorithms, methodologies and technology for spectral sensing and serves as a valuable and useful reference for researchers and technologists interested in the evolving state-of-the-art and/or the emerging science and technology base associated with spectral-based sensing and monitoring problem. This issue is particularly relevant to those seeking new and improved solutions for detecting chemical, biological, radiological and explosive threats on the land, sea, and in the air
Electronic governance technologies in the system of providing administrative services
The practice of using the term “electronic governance” does not differentiate the concepts of the subject of management, that is, the three branches of government, with forms, processes and technologies of governance, which is not correct, since the use of information technology in state activities is not a top priority. On the other hand, electronic governance technologies cannot be considered separately from the automated governance processes as well as electronic governance technologies are not a supplement or an analogue of the traditional state, as intended to communicate by means of electronic governance technologies to increase the efficiency of the entire system of public administration, in particular in the
system of administrative services
Secure web application development and global regulation
The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today’s global information rich civilizations. Many societies have basic operational economical components that depend on Web enabled systems in order to support daily commercial activities. The acceptance of E-commerce as a valid channel for conducting business coupled with societal integration and dependence on Web enabled technology has instigated the development of local, national, and global efforts to regulate criminal activities on the World Wide Web. This paper makes two contributions. The first contribution is the high-level review of the United States and United Kingdom legislation that has developed from the escalation and integration of the World Wide Web into society. The second contribution is the support for the idea that legislative compatibility, in concert with an organization’s policy compatibility, needs to be acknowledged in secure Web application development methodologies
- …