Security implications of the personal information environment
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F18%3A63520784" target="_blank" >RIV/70883521:28140/18:63520784 - isvavai.cz</a>
Výsledek na webu
<a href="https://www.matec-conferences.org/articles/matecconf/pdf/2018/69/matecconf_cscc2018_04041.pdf" target="_blank" >https://www.matec-conferences.org/articles/matecconf/pdf/2018/69/matecconf_cscc2018_04041.pdf</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1051/matecconf/201821004041" target="_blank" >10.1051/matecconf/201821004041</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Security implications of the personal information environment
Popis výsledku v původním jazyce
This article discusses a security in a background of the personal information environment. A role and importance of personal information environment and its security is on the rise due to the increasing inclusion of information and communication technology. In many cases, the focus of conducted studies is on the technological part of the problem. In this article, results of the user-oriented study are presented. The main aim was to establish how users perceive security applications. As a preliminary study, a method of survey was utilized. Gathered data were evaluated using common statistical methods. Results of the study are presented in a suitable form with a consideration of a large variety of answers between users. Results show areas of technology and user disagreements. These established differences will be used as a basis of the future research.
Název v anglickém jazyce
Security implications of the personal information environment
Popis výsledku anglicky
This article discusses a security in a background of the personal information environment. A role and importance of personal information environment and its security is on the rise due to the increasing inclusion of information and communication technology. In many cases, the focus of conducted studies is on the technological part of the problem. In this article, results of the user-oriented study are presented. The main aim was to establish how users perceive security applications. As a preliminary study, a method of survey was utilized. Gathered data were evaluated using common statistical methods. Results of the study are presented in a suitable form with a consideration of a large variety of answers between users. Results show areas of technology and user disagreements. These established differences will be used as a basis of the future research.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2018
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
MATEC Web of Conferences
ISBN
—
ISSN
2261-236X
e-ISSN
neuvedeno
Počet stran výsledku
4
Strana od-do
"nestrankovano"
Název nakladatele
EDP Sciences
Místo vydání
Les Ulis
Místo konání akce
Majorca
Datum konání akce
14. 7. 2018
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—