Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "CYBERSPACE" wg kryterium: Temat


Tytuł:
Siły Zbrojne Rzeczypospolitej Polskiej a cyberbezpieczeństwo. Zagadnienia organizacyjno-prawne
Autorzy:
Kuś, Bartosz
Powiązania:
https://bibliotekanauki.pl/articles/20311671.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
Armed Forces
defence of cyberspace
Opis:
Today, ICT systems play an important role in both the state and society. state security in the military and non-military dimensions, external and internal, has gained an additional dimension in the form of cyberspace. One of the primary goals of the Republic of Poland is to ensure the security of citizens. Protecting the independence of the state and the indivisibility of its territory and ensuring the security and inviolability of its borders are constitutional tasks of public authorities. The basic element of the defense system of the Republic of Poland participating in the implementation of security and defense policies is the Polish Armed Forces. The statutory task of this formation is, among other things, the protection and defense of cyberspace. A specialized component of the Polish Armed Forces is the Cyber Defense Forces. The process of creating this category of troops has not yet been completed.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 32-50
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Four Areas of Cybersecurity – Discussion of the Subject Area
Autorzy:
STALMACH, SŁAWOMIR
Powiązania:
https://bibliotekanauki.pl/articles/1798598.pdf
Data publikacji:
2021-07-15
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
cybersecurity
cyberspace
cyberspace law
Internet
media
artificial intelligence
Opis:
The article briefl y discusses four areas that should be considered when analysing the concept of cybersecurity: the legal aspect of cyberspace, the state security system, the specifi city of the media in the Internet environment, and last but not least – new virtual reality emerging in cyberspace. In the context of cybersecurity, all of these research areas have to be considered together.
Źródło:
Przegląd Policyjny; 2021, 141(1); 108-120
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The legal status of the cyberarmy in Hungary and Poland. An overview
Autorzy:
Bencsik, András
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/20311673.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberarmy
cyberspace
cybersecurity
Opis:
Cybersecurity tasks concern not only civilians but also the military. Similar to other spheres, cyberspace, as an operational domain, is exposed to threats. This includes destructive threats, ones that destabilise the state or its institutions. Given the need to ensure cybersecurity in the military dimension, individual states establish cyber armies to safeguard the stability of cyberspace, which is exposed to constant attacks. Cyberspace defence in a digital state, where ICT systems are also used to complete military tasks, must be considered a priority not only in national but also in international defence policies.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 19-31
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberthreats in Ukraine, Poland and Slovakia
Autorzy:
Evsyukova, Oksana
Karpiuk, Mirosław
Kelemen, Miroslav
Powiązania:
https://bibliotekanauki.pl/articles/31341976.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
cyberthreats
Opis:
This article focuses on cyberthreats in Ukraine, Poland and Slovakia. As the ICT system in a digital state plays an important role, states are obliged to ensure their adequate protection. Interference with the proper functioning of such systems can have farreaching consequences, potentially leading to the paralysis of specific economic sectors. The continually emerging cyberthreats, their intensity and types trigger the need to constantly monitor the phenomena occurring in cyberspace. With such monitoring cyberattacks can be countered and their destructive outcomes avoided. The article indicates, inter alia, the types of cybersecurity incidents and their frequency.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 58-78
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberbezpieczeństwo dzieci i młodzieży w prawie polskim
Cyber security of children and youth in Polish law
Autorzy:
Maciejczuk, Mateusz
Wnorowski, Konrad
Olchanowski, Mateusz
Powiązania:
https://bibliotekanauki.pl/articles/1401383.pdf
Data publikacji:
2019-03-25
Wydawca:
Państwowa Uczelnia Zawodowa we Włocławku
Tematy:
cyberbezpieczeństwo
cyberprzestrzeń
cybersecurity
cyberspace
Opis:
Niniejsza praca stanowi kontynuację dwóch wcześniejszych artykułów dotyczących cyberbezpieczeństwa najmłodszych w prawie międzynarodowym oraz europejskim. W artykule poruszone zostało zagadnienie cyberbezpieczeństwa dzieci i młodzieży na gruncie prawa polskiego. Autorzy rozpoczynają analizę od przedstawienia przepisów ustawy zasadniczej. Następnie przybliżone zostały zapisy prawa karnego materialnego i procedury karnej. Dalej autorzy przedstawiają ustawy ratyfikujące umowy międzynarodowe dotyczące zagadnienia bezpieczeństwa najmłodszych w cyberprzestrzeni. W podsumowaniu zawarte są wnioski płynące z analizy całościowej treści przepisów zarówno prawa międzynarodowego i europejskiego, jak i rozwiązań krajowych w tym zakresie.
This work follows on from two previous articles on the cyber security of the youngest children in international and European law. The article discusses the issue of cyber security of children and youth on the basis of Polish law. The authors start their analysis with the presentation of the provisions of the constitution. Next, the provisions of substantive criminal law and criminal procedure are introduced. The authors then present the laws ratifying the international agreements on the issue of the safety of the youngest children in cyberspace. The summary contains conclusions drawn from the analysis of the overall content of the regulations of both inter¬national and European law, as well as national solutions in the scope of the title.
Źródło:
Zeszyty Naukowe Zbliżenia Cywilizacyjne; 2019, 15, 1; 10-28
1896-4087
Pojawia się w:
Zeszyty Naukowe Zbliżenia Cywilizacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberspace in a risk society
Autorzy:
Drabik, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/2143062.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybersecurity
threat
infosphere
Opis:
The dynamic processes of modernization have affected the quantitative and qualitative dimensions of an unprecedented social transformation. It can be said that man has entered into hitherto unknown realms of abstraction. One of its dimensions is cyberspace with attributes that elude previous identifiers of physical three-dimensional space. The highly dynamized processes of technological progress have situated societies in new dimensions of risk. The likelihood of positive or negative events has been etiologically linked to the effects of „producing”, processing, storing, and transmitting the information. This article aims to analyze the factors justifying the crystallization of a risk society, a key identifier of which is cyberspace, the associated risks, and security measures in the context of shaping cybersecurity
Źródło:
Cybersecurity and Law; 2022, 7, 1; 17-26
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Cybersecurity Strategy of the Republic of Poland as a Source of Internal Law
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/31342044.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
internal law
Opis:
Cybersecurity as a subject of regulation can be found in a number of legal acts, both generally applicable and internal. This type of regulation is also found in the Cybersecurity Strategy of the Republic of Poland. The Strategy, however, as an act of internal law, has limited power. It does not influence external entities and, therefore, cannot form grounds for individual decisions relating to citizens, entrepreneurs, and other entities. Its primary objective of increasing the level of resilience to cyberthreats should be a priority for the state policy.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 234-245
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The executive agency as a legal organisational form of implementing cybersecurity tasks
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/2211991.pdf
Data publikacji:
2023-06-01
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
executive agency
Opis:
The national cybersecurity system is formed of a number of public entities, including executive agencies with legal personality as entities of the public finance sector. The executive agency could implement cybersecurity tasks important to the functioning of the state and its institutions. Through this legal organisational form, it would be possible to shape the development of new technologies that could then serve a digital society or digital state, including the protection of ICT systems for communication, as well as the provision of digital services and key services. Due to the widespread activity in cyberspace, it is necessary to have entities in place to protect its users. Such an entity could have the form of a cyber agency, working with other institutions (public and private), that is competent for cybersecurity
Źródło:
Cybersecurity and Law; 2023, 9, 1; 48-60
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The executive agency as a legal organisational form of implementing cybersecurity tasks
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/17900903.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
executive agency
Opis:
The national cybersecurity system is formed of a number of public entities, including executive agencies with legal personality as entities of the public finance sector. The executive agency could implement cybersecurity tasks important to the functioning of the state and its institutions. Through this legal organisational form, it would be possible to shape the development of new technologies that could then serve a digital society or digital state, including the protection of ICT systems for communication, as well as the provision of digital services and key services. Due to the widespread activity in cyberspace, it is necessary to have entities in place to protect its users. Such an entity could have the form of a cyber agency, working with other institutions (public and private), that is competent for cybersecurity
Źródło:
Cybersecurity and Law; 2023, 9, 1; 48-60
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity as the Basis for State and Society Security in the 21st Century
Autorzy:
Bujek, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/466214.pdf
Data publikacji:
2017
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
cyberspace
cybersecurity
threats
cybersecurity system
Opis:
Cybersecurity is one of the most common security topics at present times. Society has enormous capabilities and possibilities in the cyberspace, which create opportunities and threats as well. A cyberwar, cyberterrorism and cybercrime have permanently entered the catalog of threats for security. This kind of situation in a cyberspace determines the need for coordinated activities at international and national level which will provide an acceptable level of security in this area. This article presents and briefly outlines threats for the state cybersecurity. There are also presented activities aimed to provide protection in this area. In addition, the author analyzed the current structure of the cybersecurity system in the Republic of Poland.
Źródło:
Safety & Defense; 2017, 3; 8-13
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberprzestrzeń w systemie militarnym bezpieczeństwa państwa
Autorzy:
Wochnowicz, Arkadiusz
Powiązania:
https://bibliotekanauki.pl/articles/20311670.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
national security
cyberspace
cybersecurity
Opis:
The article „Cyberspace in the military system of state security” presents the basic concepts related to security, which is nowadays considered to be a state of certainty, peace, security and lack of threat and protection against danger, and cyberspace, which is understood as a virtual environment of information and interaction between people. This article also shows the definitions of terms relating to the values most valued and protected by man, i.e. state security, which is an integral part of the state policy related to the creation and use of national defense potential to prevent and counteract various types of threats. The importance of important units of the Polish Armed Forces as the basic organ of shaping cyberspace in the military area has been shown. The role and place of bodies in the Polish Armed Forces ready to respond to threats to ICT systems and networks connected by cyberspace has been defined.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 51-69
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Quantitatively examining the interaction between cybercrime and physical crime
Autorzy:
Doss, Daniel Adrian
Scherr, Daniel
Powiązania:
https://bibliotekanauki.pl/articles/28408753.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
crime and criminology
cybercrime
cybersecurity
cyberspace
sociology
Opis:
This study examined the differences and relationships between reported incidents of cybercrime and physical crime within U.S. society nationally. The examined period encompassed the years between 2001 and 2020. The study outcomes showed that a relationship existed between reported incidents of cybercrime and reported incidents of physical crime (p = 0.00; α = 0.05). More specifically, it appeared that relationships existed between the reported incidents of cybercrime and the reported incidents of physical crimes representing robbery rate (p = 0.01; α = 0.05), burglary rate (p = 0.00; α = 0.05), and larceny theft rate (p = 0.00; α = 0.05). It also appeared that a difference (p = 0.00; α = 0.05) existed between reported incidents of cybercrime and physical crime, wherein greater quantities of physical crime were exhibited societally during the examined period.
Źródło:
Society Register; 2023, 7, 3; 7-20
2544-5502
Pojawia się w:
Society Register
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberterroryzm – ewolucja czy rewolucja w sposobie działania współczesnych organizacji terrorystycznych
Cyberterrorism – the evolution or the revolution in modus operandi of the contemporary terrorist organizations
Autorzy:
Rychlica, Jacek
Powiązania:
https://bibliotekanauki.pl/articles/137038.pdf
Data publikacji:
2019
Wydawca:
Szkoła Główna Służby Pożarniczej
Tematy:
cyberprzestrzeń
cyberterroryzm
terroryzm
cyberspace
cybersecurity
cyberterrorism
terrorism
Opis:
Ostatnie trzy dekady zostały bez wątpienia zdominowane przez niezwykle szybki rozwój technik informacyjnych, które są obecne praktycznie wszędzie i wykorzystuje się je w niemal każdej sferze aktywności człowieka. Co więcej, przetwarzanie olbrzymich ilości informacji (ang. Big Data) jest obecnie niezbędne zarówno w polityce, jak i w szeroko rozumianym biznesie. Bez właściwego przetwarzania i przepływu tych informacji nie mogą poprawnie funkcjonować ani rożnego rodzaju media, ani wszelkiego typu instytucje, ani też inne − często krytyczne z punktu widzenia życia i zdrowia ludzi − systemy. Niestety, szybki postęp technologiczny wprowadza również wiele nowych zagrożeń, gdyż nowoczesne systemy mogą zostać wykorzystane zarówno do poprawy jakości życia obywateli, jak i przez rożnego rodzaju grupy przestępcze, organizacje terrorystyczne, a nawet nieformalne i/lub jawnie działające struktury o charakterze militarnym. W artykule dokonano próby oceny wpływu opisanych zmian na sposób i zakres działania współczesnych organizacji terrorystycznych.
The last three decades have undoubtedly been dominated by the unusually rapid development of information technologies, which today are present practically everywhere and are used in almost every sphere of human activity. What’s more, the processing of huge amounts of information (so-called Big Data) is now indispensable both in politics and in broadly understood business activities. It is not an exceptional knowledge that without the proper processing and the flow of such information, today there can not properly function both different types of media or all types of institutions, and no other systems, often critical from the point of view of human life and health. The rapid technological progress also introduces a number of new threats, as modern systems can be used to improve the quality of the human life as well as by the various types of criminal groups, terrorist organizations and even informal and/or legally operating military structures. This article attempts to assess the impact of the described changes on the manner and the scope of operation of the contemporary terrorist organizations.
Źródło:
Zeszyty Naukowe SGSP / Szkoła Główna Służby Pożarniczej; 2019, 1, 69; 197-220
0239-5223
Pojawia się w:
Zeszyty Naukowe SGSP / Szkoła Główna Służby Pożarniczej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberspace as a source of dehumanization of the human being
Autorzy:
Pieczywok, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/13946801.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybersecurity
institutional threats
personal threats
risk
Opis:
The paper points to an important sphere of human safety, as it refers to cyberspace as an environment where information is exchanged via the net and computer systems. In addition to positive accents, cyberspace also creates various threats that lead to the dehumanization of life. The negative effects of being in cyberspace cause threats to mental, social and healthy lives. Very often they pose a danger not only to human health but also to human life. In addition to the introduction, the article includes characteristics of the loss of a sense of reality among people who use cyberspace excessively and the risks of medical hazards.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 40-47
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybercrime on the Example of Selected Botnets
Autorzy:
Mazurczak, Przemysław
Powiązania:
https://bibliotekanauki.pl/articles/2020073.pdf
Data publikacji:
2021-09-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
cyber threats
botnet
computer network
cyberspace
cybersecurity
Opis:
The article presents threat analysis resulting from botnet activity on the Internet. Botnet networks are a very common tool among cybercriminals. They enable the acquisition of large amounts of data from computers infected with the virus that creates the given network entirely subordinated to its creator. Currently, many unidentified botnets are a threat to Internet users. Those identified and diagnosed answer the problem of how dangerous a botnet is in the hands of cybercriminals. The article presents statistics and analysis of selected botnets. Currently, there is a decline in the interest in botnets in cybercrime, although many new threats appear, suggesting that botnets will continue to be popular and are still a dangerous weapon in the hands of criminals.
Źródło:
Polish Political Science Yearbook; 2021, 3 (50); 53-65
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies