Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyberspace" wg kryterium: Temat


Tytuł:
Siły Zbrojne Rzeczypospolitej Polskiej a cyberbezpieczeństwo. Zagadnienia organizacyjno-prawne
Autorzy:
Kuś, Bartosz
Powiązania:
https://bibliotekanauki.pl/articles/20311671.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
Armed Forces
defence of cyberspace
Opis:
Today, ICT systems play an important role in both the state and society. state security in the military and non-military dimensions, external and internal, has gained an additional dimension in the form of cyberspace. One of the primary goals of the Republic of Poland is to ensure the security of citizens. Protecting the independence of the state and the indivisibility of its territory and ensuring the security and inviolability of its borders are constitutional tasks of public authorities. The basic element of the defense system of the Republic of Poland participating in the implementation of security and defense policies is the Polish Armed Forces. The statutory task of this formation is, among other things, the protection and defense of cyberspace. A specialized component of the Polish Armed Forces is the Cyber Defense Forces. The process of creating this category of troops has not yet been completed.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 32-50
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Four Areas of Cybersecurity – Discussion of the Subject Area
Autorzy:
STALMACH, SŁAWOMIR
Powiązania:
https://bibliotekanauki.pl/articles/1798598.pdf
Data publikacji:
2021-07-15
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
cybersecurity
cyberspace
cyberspace law
Internet
media
artificial intelligence
Opis:
The article briefl y discusses four areas that should be considered when analysing the concept of cybersecurity: the legal aspect of cyberspace, the state security system, the specifi city of the media in the Internet environment, and last but not least – new virtual reality emerging in cyberspace. In the context of cybersecurity, all of these research areas have to be considered together.
Źródło:
Przegląd Policyjny; 2021, 141(1); 108-120
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The legal status of the cyberarmy in Hungary and Poland. An overview
Autorzy:
Bencsik, András
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/20311673.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberarmy
cyberspace
cybersecurity
Opis:
Cybersecurity tasks concern not only civilians but also the military. Similar to other spheres, cyberspace, as an operational domain, is exposed to threats. This includes destructive threats, ones that destabilise the state or its institutions. Given the need to ensure cybersecurity in the military dimension, individual states establish cyber armies to safeguard the stability of cyberspace, which is exposed to constant attacks. Cyberspace defence in a digital state, where ICT systems are also used to complete military tasks, must be considered a priority not only in national but also in international defence policies.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 19-31
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberthreats in Ukraine, Poland and Slovakia
Autorzy:
Evsyukova, Oksana
Karpiuk, Mirosław
Kelemen, Miroslav
Powiązania:
https://bibliotekanauki.pl/articles/31341976.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
cyberthreats
Opis:
This article focuses on cyberthreats in Ukraine, Poland and Slovakia. As the ICT system in a digital state plays an important role, states are obliged to ensure their adequate protection. Interference with the proper functioning of such systems can have farreaching consequences, potentially leading to the paralysis of specific economic sectors. The continually emerging cyberthreats, their intensity and types trigger the need to constantly monitor the phenomena occurring in cyberspace. With such monitoring cyberattacks can be countered and their destructive outcomes avoided. The article indicates, inter alia, the types of cybersecurity incidents and their frequency.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 58-78
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Social area of the internet in the context of values and personal safety threats in cyberspace
Autorzy:
Joanna, Grubicka,
Powiązania:
https://bibliotekanauki.pl/articles/890447.pdf
Data publikacji:
2020-10-12
Wydawca:
Akademia Pedagogiki Specjalnej im. Marii Grzegorzewskiej. Wydawnictwo APS
Tematy:
virtual reality
cyberspace
virtual communities
digital freedom
personal security in cyberspace
Opis:
The subject of the article directly fits into the process of broadly understood security. The author indicates the opportunities and threats in the social space of the Internet of human functioning. The aim of the article is to analyze the basic human threats while experiencing freedom and trust in the virtual space. The author poses the question: Should the Internet be a space of unlimited freedom? Freedom seems to be not only an immanent but also a constitutive feature of the virtual space in which the Internet functions. It should be emphasized that the issues are discussed from very different perspectives and in processes as well as social relations. The article consists of three parts. In the first one the author presented the issues of cyberspace development, whose specific features favor the development of the virtual community. Next, she defined the most important areas concerning the culture of freedom and the consent of human education as a way of promoting its independence in the social space of the Internet. The last part of the publication contains the most important theses regarding threats related to human personal safety in cyberspace.
Źródło:
International Journal of Pedagogy, Innovation and New Technologies; 2020, 7(1); 16-30
2392-0092
Pojawia się w:
International Journal of Pedagogy, Innovation and New Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberbezpieczeństwo dzieci i młodzieży w prawie polskim
Cyber security of children and youth in Polish law
Autorzy:
Maciejczuk, Mateusz
Wnorowski, Konrad
Olchanowski, Mateusz
Powiązania:
https://bibliotekanauki.pl/articles/1401383.pdf
Data publikacji:
2019-03-25
Wydawca:
Państwowa Uczelnia Zawodowa we Włocławku
Tematy:
cyberbezpieczeństwo
cyberprzestrzeń
cybersecurity
cyberspace
Opis:
Niniejsza praca stanowi kontynuację dwóch wcześniejszych artykułów dotyczących cyberbezpieczeństwa najmłodszych w prawie międzynarodowym oraz europejskim. W artykule poruszone zostało zagadnienie cyberbezpieczeństwa dzieci i młodzieży na gruncie prawa polskiego. Autorzy rozpoczynają analizę od przedstawienia przepisów ustawy zasadniczej. Następnie przybliżone zostały zapisy prawa karnego materialnego i procedury karnej. Dalej autorzy przedstawiają ustawy ratyfikujące umowy międzynarodowe dotyczące zagadnienia bezpieczeństwa najmłodszych w cyberprzestrzeni. W podsumowaniu zawarte są wnioski płynące z analizy całościowej treści przepisów zarówno prawa międzynarodowego i europejskiego, jak i rozwiązań krajowych w tym zakresie.
This work follows on from two previous articles on the cyber security of the youngest children in international and European law. The article discusses the issue of cyber security of children and youth on the basis of Polish law. The authors start their analysis with the presentation of the provisions of the constitution. Next, the provisions of substantive criminal law and criminal procedure are introduced. The authors then present the laws ratifying the international agreements on the issue of the safety of the youngest children in cyberspace. The summary contains conclusions drawn from the analysis of the overall content of the regulations of both inter¬national and European law, as well as national solutions in the scope of the title.
Źródło:
Zeszyty Naukowe Zbliżenia Cywilizacyjne; 2019, 15, 1; 10-28
1896-4087
Pojawia się w:
Zeszyty Naukowe Zbliżenia Cywilizacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Agresja elektroniczna wśród dzieci w młodszym wieku szkolnym
Electronic aggression among children at a younger school age
Autorzy:
Łukawska, Maria
Powiązania:
https://bibliotekanauki.pl/articles/2081667.pdf
Data publikacji:
2021-09-22
Wydawca:
Państwowa Wyższa Szkoła Zawodowa w Raciborzu
Tematy:
electronic aggression
children
cyberspace
Opis:
Aggression is a phenomenon accompanying man from the dawn of time. Contemporary reality has revealed a new face of this peculiarity. This article shows the importance of electronic aggression manifested by students from younger classes. Based on the literature on the subject, the basic concepts related to cyberspace were presented. Attention was drawn to the need to prevent manifestations of aggressive behaviors that are visible in the sphere of physical education of children. The types of aggression are indicated and the importance of electronic aggression is explained. Conclusions were put forward resulting from my own observations and research on this issue.
Źródło:
Eunomia – Rozwój Zrównoważony – Sustainable Development; 2021, 1(100); 117-124
1897-2349
2657-5760
Pojawia się w:
Eunomia – Rozwój Zrównoważony – Sustainable Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberspace in a risk society
Autorzy:
Drabik, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/2143062.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybersecurity
threat
infosphere
Opis:
The dynamic processes of modernization have affected the quantitative and qualitative dimensions of an unprecedented social transformation. It can be said that man has entered into hitherto unknown realms of abstraction. One of its dimensions is cyberspace with attributes that elude previous identifiers of physical three-dimensional space. The highly dynamized processes of technological progress have situated societies in new dimensions of risk. The likelihood of positive or negative events has been etiologically linked to the effects of „producing”, processing, storing, and transmitting the information. This article aims to analyze the factors justifying the crystallization of a risk society, a key identifier of which is cyberspace, the associated risks, and security measures in the context of shaping cybersecurity
Źródło:
Cybersecurity and Law; 2022, 7, 1; 17-26
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Money laundering and cybercrime
Autorzy:
Krupa, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/2158445.pdf
Data publikacji:
2022-12-06
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybercrime
money laundering
Opis:
In order to be used legally, proceeds from criminal activity must be laundered first. One type of crime that can be linked to money laundering is cybercrime, which has to be fought with special tools allowing for operation in cyberspace. Money laundering, and the related financing of terrorism and organised crime, pose a major threat to state security and financial stability.
Źródło:
Cybersecurity and Law; 2022, 8, 2; 160-165
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Cybersecurity Strategy of the Republic of Poland as a Source of Internal Law
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/31342044.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
internal law
Opis:
Cybersecurity as a subject of regulation can be found in a number of legal acts, both generally applicable and internal. This type of regulation is also found in the Cybersecurity Strategy of the Republic of Poland. The Strategy, however, as an act of internal law, has limited power. It does not influence external entities and, therefore, cannot form grounds for individual decisions relating to citizens, entrepreneurs, and other entities. Its primary objective of increasing the level of resilience to cyberthreats should be a priority for the state policy.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 234-245
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nowe oblicze komunikacji. Wybrane aspekty prawne i etyczne rozpowszechniania treści w cyberprzestrzeni
Autorzy:
Różycka, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/667317.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Jagielloński. Wydawnictwo Uniwersytetu Jagiellońskiego
Tematy:
cyberspace
convergence
law
media
Opis:
It can be regarded as we have a problem with the application of its provisions to the content present in the network in terms of law because regulations on media infiltrate boundaries – so, and the media themselves. Polish law is not adapted to the changing technology reality. And it is not only the universal use of social media. Traditional media also taking into account the convergence process are present in the network. The purpose of this publication is to analyze certain aspects of legal regulations concerning the distribution of content in cyberspace – on the basis of the law in Poland the media. To demonstrate that self-regulation in the area of electronic media has the great advantage that it can go in a relatively short distance for the development of “new” media. In contrast, new, precise regulations in the matter of electronic media are difficult to be implemented in a short time.
Źródło:
Zarządzanie Mediami; 2015, 3, 2; 107-120
2353-5938
Pojawia się w:
Zarządzanie Mediami
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The executive agency as a legal organisational form of implementing cybersecurity tasks
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/2211991.pdf
Data publikacji:
2023-06-01
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
executive agency
Opis:
The national cybersecurity system is formed of a number of public entities, including executive agencies with legal personality as entities of the public finance sector. The executive agency could implement cybersecurity tasks important to the functioning of the state and its institutions. Through this legal organisational form, it would be possible to shape the development of new technologies that could then serve a digital society or digital state, including the protection of ICT systems for communication, as well as the provision of digital services and key services. Due to the widespread activity in cyberspace, it is necessary to have entities in place to protect its users. Such an entity could have the form of a cyber agency, working with other institutions (public and private), that is competent for cybersecurity
Źródło:
Cybersecurity and Law; 2023, 9, 1; 48-60
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The executive agency as a legal organisational form of implementing cybersecurity tasks
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/17900903.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
executive agency
Opis:
The national cybersecurity system is formed of a number of public entities, including executive agencies with legal personality as entities of the public finance sector. The executive agency could implement cybersecurity tasks important to the functioning of the state and its institutions. Through this legal organisational form, it would be possible to shape the development of new technologies that could then serve a digital society or digital state, including the protection of ICT systems for communication, as well as the provision of digital services and key services. Due to the widespread activity in cyberspace, it is necessary to have entities in place to protect its users. Such an entity could have the form of a cyber agency, working with other institutions (public and private), that is competent for cybersecurity
Źródło:
Cybersecurity and Law; 2023, 9, 1; 48-60
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Computer fraud
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/20311658.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
computer fraud
cybercrime
cyberspace
Opis:
Computer fraud is one of the offences against property defined by the legislator. It is committed with the purpose of financial gain or with the intent of causing damage to another person. It may also be classified as cybercrime if information systems and networks are used, including where an information and communication (ICT) system is applied in connection with committing the offence. Computer fraud is also described in this paper from a statistical perspective based on data from annual reports concerning cybersecurity incidents recorded by CERT Poland.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 183-194
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zapewnienie bezpieczeństwa przez semantyczne monitorowanie cyberprzestrzeni
Providing security by using Web monitoring systems
Autorzy:
Abramowicz, Witold
Bukowska, Elżbieta
Filipowska, Agata
Powiązania:
https://bibliotekanauki.pl/articles/426440.pdf
Data publikacji:
2013
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
security
web monitoring
cyberspace
cyber-threats
malware
phishing
Semantic Monitoring of Cyberspace
Opis:
Security is one of the basic human needs. Due to the increasing citizens’ activity in the cyberspace, a need for security in this area is increasing. The cyber-threats may appear in many forms: from malware and phishing, to fraud or scams attempts. Rapid technological development makes the traditional methods of obtaining information insufficient for an automatic Web monitoring with the aim of detecting potential threats. The paper discusses the problem of monitoring of Web sources and indicates the existing gap between the volume of available information and the decision-making ability. Finally, it presents an example from the field of cyberspace security: Semantic Monitoring of Cyberspace project and achieved results.
Źródło:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie; 2013, 3 (50); 11-17
1731-6758
1731-7428
Pojawia się w:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies