Kamil Kopecký | Palacky University, Olomouc (original) (raw)
Uploads
Papers by Kamil Kopecký
This paper focuses on cyberbullying as a specific form of risky behaviour in the Internet environ... more This paper focuses on cyberbullying as a specific form of risky behaviour in the Internet environment, which occurs both at pubescents and adolescents, as well as in the adult population. The paper analyses various manifestations and forms of cyberbullying, it focuses both on extortion, threats, humiliation, and various forms of harm to victims through photographs, video or audio materials. It also describes cyberbullying with sexual subtext, within which sexually explicit materials are used to harm the victims. The paper compares the differences between cyberbullying of children and adults, follows different motives for its implementation. The paper uses data from the national research Risks of Internet Communication IV, which was carried out in 2013 throughout the Czech Republic by our team. The research was performed on target group of Czech teens (n=21 000, 11-17 years old). One of the goal of the research was to determine respondents' experience with cyberbullying from the point of view of victims and aggressors and their will to involve other people in a process of dealing with their problems. The research REC 3 is in its nature mainly descriptive, determined data are mainly quantitative. On-line questionnaire survey was chosen as the basic research method. The questionnaire contained 71 questions of various kinds.
Currently the need to pay attention to computer security, especially topics related to the safe u... more Currently the need to pay attention to computer security, especially topics related to the safe use of Internet services, has been constantly growing. Many users, unfortunately, still does not respect the basic safety principles used to enter their accounts and often use universal and simple passwords. This paper focuses on the formal and semantic analysis of more than 4 000 computer passwords used by Czech Internet users aged 18-25 to access their electronic accounts. Monitoring was focused especially on passwords used to access e-mail, e-learning environment (LMS) and account for social networks (Facebook, Google+). The paper presents results of formal analysis passwords with a focus on the structure of alphanumeric passwords, password length and structure of the case-sensitive structure of passwords. It also describes the semantic characteristics of passwords (use of dictionary entries, numeric passwords and password combination), it also focuses on the universal password used to access multiple electronic accounts.
This paper focuses on cyberbullying as a specific form of risky behaviour in the Internet environ... more This paper focuses on cyberbullying as a specific form of risky behaviour in the Internet environment, which occurs both at pubescents and adolescents, as well as in the adult population. The paper analyses various manifestations and forms of cyberbullying, it focuses both on extortion, threats, humiliation, and various forms of harm to victims through photographs, video or audio materials. It also describes cyberbullying with sexual subtext, within which sexually explicit materials are used to harm the victims. The paper compares the differences between cyberbullying of children and adults, follows different motives for its implementation. The paper uses data from the national research Risks of Internet Communication IV, which was carried out in 2013 throughout the Czech Republic by our team. The research was performed on target group of Czech teens (n=21 000, 11-17 years old). One of the goal of the research was to determine respondents' experience with cyberbullying from the point of view of victims and aggressors and their will to involve other people in a process of dealing with their problems. The research REC 3 is in its nature mainly descriptive, determined data are mainly quantitative. On-line questionnaire survey was chosen as the basic research method. The questionnaire contained 71 questions of various kinds.
Currently the need to pay attention to computer security, especially topics related to the safe u... more Currently the need to pay attention to computer security, especially topics related to the safe use of Internet services, has been constantly growing. Many users, unfortunately, still does not respect the basic safety principles used to enter their accounts and often use universal and simple passwords. This paper focuses on the formal and semantic analysis of more than 4 000 computer passwords used by Czech Internet users aged 18-25 to access their electronic accounts. Monitoring was focused especially on passwords used to access e-mail, e-learning environment (LMS) and account for social networks (Facebook, Google+). The paper presents results of formal analysis passwords with a focus on the structure of alphanumeric passwords, password length and structure of the case-sensitive structure of passwords. It also describes the semantic characteristics of passwords (use of dictionary entries, numeric passwords and password combination), it also focuses on the universal password used to access multiple electronic accounts.