85,787 research outputs found

    Current Problems of Using Electronic Signature in Practice

    Get PDF
    Import 11/07/2012Abstrakt Název práce: Aktuální problémy využití elektronického podpisu v praxi Jméno studenta: Bc. Petra Šmídová Tématem mé diplomové práce jsou aktuální problémy využití elektronického podpisu v praxi. Součástí práce je také analýza praktických problémů elektronického podpisu, při které jsem se zaměřila na respondenty poskytující právnické služby v Moravskoslezském kraji. V prvních kapitolách práce byla upřesněna problematika elektronického podpisu, jeho druhy, bezpečnost, výhody či nevýhody, které s ním souvisí a také právní úprava elektronického podpisu jak z pohledu českého práva, tak i práva Evropské unie. Následně jsem se zabývala analýzou praktických problémů elektronického podpisu u vybrané skupiny respondentů a to pomocí elektronického dotazníkového šetření. Cílem výše popsané analýzy bylo odhalit praktické problémy elektronického podpisu, jak při jeho zřizování, tak i v prvních letech či dlouhodobějším používání. Následně z výsledků provedené analýzy byly vytvořeny návrhy a doporučení, které by měly sloužit ke zkvalitnění služeb elektronického podpisu.Abstract Title of thesis: The current problems using electronic signatures in practice Name of student: Bc. Petra Šmídová The topic of my thesis is: the current problems of using an electronic signature in practice. My work also includes an analysis of practical problems of electronic signature in which I focused on respondents who provide legal services in the Moravian-Silesian Region. In the first chapters of the work I specified the term “electronic signature”, defined its types, safety, advantages and disadvantages associated with its usage, and also its legislation from the perspective of the Czech and the European Union law. Then I focused on the analysis of practical problems of electronic signatures with a selected group of respondents using an electronic questionnaire. The target of the analysis described above was to reveal practical problems of an electronic signature while establishing it, during the first years of its usage and also during a long-term use. From the results of the analysis were then created proposals and recommendations which should improve the quality of using an electronic signature.119 - Katedra právavýborn

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    Editorial Special Issue on Enhancement Algorithms, Methodologies and Technology for Spectral Sensing

    Get PDF
    The paper is an editorial issue on enhancement algorithms, methodologies and technology for spectral sensing and serves as a valuable and useful reference for researchers and technologists interested in the evolving state-of-the-art and/or the emerging science and technology base associated with spectral-based sensing and monitoring problem. This issue is particularly relevant to those seeking new and improved solutions for detecting chemical, biological, radiological and explosive threats on the land, sea, and in the air

    Electronic governance technologies in the system of providing administrative services

    Get PDF
    The practice of using the term “electronic governance” does not differentiate the concepts of the subject of management, that is, the three branches of government, with forms, processes and technologies of governance, which is not correct, since the use of information technology in state activities is not a top priority. On the other hand, electronic governance technologies cannot be considered separately from the automated governance processes as well as electronic governance technologies are not a supplement or an analogue of the traditional state, as intended to communicate by means of electronic governance technologies to increase the efficiency of the entire system of public administration, in particular in the system of administrative services

    Secure web application development and global regulation

    Get PDF
    The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today’s global information rich civilizations. Many societies have basic operational economical components that depend on Web enabled systems in order to support daily commercial activities. The acceptance of E-commerce as a valid channel for conducting business coupled with societal integration and dependence on Web enabled technology has instigated the development of local, national, and global efforts to regulate criminal activities on the World Wide Web. This paper makes two contributions. The first contribution is the high-level review of the United States and United Kingdom legislation that has developed from the escalation and integration of the World Wide Web into society. The second contribution is the support for the idea that legislative compatibility, in concert with an organization’s policy compatibility, needs to be acknowledged in secure Web application development methodologies
    corecore