Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyberspace law" wg kryterium: Temat


Wyświetlanie 1-11 z 11
Tytuł:
Four Areas of Cybersecurity – Discussion of the Subject Area
Autorzy:
STALMACH, SŁAWOMIR
Powiązania:
https://bibliotekanauki.pl/articles/1798598.pdf
Data publikacji:
2021-07-15
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
cybersecurity
cyberspace
cyberspace law
Internet
media
artificial intelligence
Opis:
The article briefl y discusses four areas that should be considered when analysing the concept of cybersecurity: the legal aspect of cyberspace, the state security system, the specifi city of the media in the Internet environment, and last but not least – new virtual reality emerging in cyberspace. In the context of cybersecurity, all of these research areas have to be considered together.
Źródło:
Przegląd Policyjny; 2021, 141(1); 108-120
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Cybersecurity Strategy of the Republic of Poland as a Source of Internal Law
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/31342044.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
internal law
Opis:
Cybersecurity as a subject of regulation can be found in a number of legal acts, both generally applicable and internal. This type of regulation is also found in the Cybersecurity Strategy of the Republic of Poland. The Strategy, however, as an act of internal law, has limited power. It does not influence external entities and, therefore, cannot form grounds for individual decisions relating to citizens, entrepreneurs, and other entities. Its primary objective of increasing the level of resilience to cyberthreats should be a priority for the state policy.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 234-245
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Can mouse clicking be seen as involvement in armed conflict? Some notes on the direct participation in hostilities in cyberspace
Can mouse clicking be seen as involvement in armed conflict? Some notes on the direct participation in hostilities in cyberspace
Autorzy:
Lewandowski, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/684880.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
Humanitarian law
armed conflicts
cyberspace
Opis:
Contemporary armed conflicts are increasingly based on new technologies. These technologies enable to conduct hostilities from a distance, often eliminate the human factor from the battlefield. Nowadays, cyberspace created by the Internet allows to frame the idea of armed conflict outside the traditional recognition of the fight between belligerent armed forces. This article addresses issues of the direct participation of hostilities in cyberspace. In the first part it discusses technological development and its impact on the activation of the civil factor during armed conflicts. In the second part by analysing the current practice of cyber conflicts it refers to the concept of direct participation in hostilities and its constituent elements as a threshold of harm, direct causation, belligerent nexus at the cybernetic level. The third and final part examines the possibility of the loss of protection, in particular, it addresses the issues related to its temporal nature and the question of means and methods of attacking civilians involved in cyber warfare.
Źródło:
Adam Mickiewicz University Law Review; 2013, 2; 195-204
2450-0976
Pojawia się w:
Adam Mickiewicz University Law Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wokół definicji cyberbezpieczeństwa
Autorzy:
Żywucka-Kozłowska, Elżbieta
Dziembowski, Robert
Powiązania:
https://bibliotekanauki.pl/articles/20311663.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
security
law
digitization
directive
European Union
Opis:
The concept of cyber security has become part of the reality of the late 20th and 21st centuries. This term is understood as a system that blocks threats consisting in destroying, changing and unauthorized interception of data. The importance of the cybersecurity problem was emphasized by making legal regulations in the legislation of many countries around the world, including Poland, the United States, Russia and China, and on the basis of the provisions of state associations or international organizations, which is reflected in the relevant regulations of the European Union. The concept of cyber security is multi-faceted, becoming an object of interest not only to countries or organizations, but also to individual individuals living in given communities. The progressive digitization of many areas of life, regardless of the geographical location of the country, means that the need to ensure the proper and safe functioning of this sphere of reality determines the universality of cyber security.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 123-132
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected security threats in cyberspace
Autorzy:
Chronowska, Emilia
Powiązania:
https://bibliotekanauki.pl/articles/2143013.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
threats
cyberspace
cyber threats
international law
Opis:
This article presents selected cybersecurity threats, identifies them, and points out their evolving nature. Cyberspace is a realm without defined geographic or political boundaries and is highly interactive. This article indicates the important role of cybersecurity in the context of building the information society and presents the most important legal regulations, both international and national, along with the indication of the proposed directions of changes at the national level, which would help to increase cybersecurity. The article emphasizes the importance of legislative and organizational regulations in the field of the addressed issues.
Źródło:
Cybersecurity and Law; 2022, 7, 1; 7-16
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Międzynarodowe regulacje prawne dotyczące cyberprzestrzeni
Autorzy:
Wąsik, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/20311661.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cyber security
international law
international organizations
Opis:
This article aims to present the different approaches of countries around the world regarding the legal regulations of cyberspace. The creation of a unified legal system for cyberspace will be a difficult process due to major conflicts of interest. International organizations such as the EU and NATO, which bring together countries that have a similar vision of the world and how it should function, contribute to the unification of legal norms governing cyberspace in specific countries. On the other hand, vague initiatives of the world’s largest organization – the UN as well as the lack of implementation of newly adopted regulations by all member countries, unfortunately slow down the fight against cyberterrorism and cybercrimes that are transnational in nature. All countries around the world are increasing financial investment in improving information networks, creating new institutions to combat threats in the digital space and adapting laws to a dynamically changing world.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 133-155
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Disinformation in Cyberspace. Introduction to Discussion on Criminalisation Possibilities
Autorzy:
Ciesielski, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/31341996.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
disinformation
cyberspace
criminalisation
law
security systems
security studies
Opis:
Disinformation is a phenomenon that has always accompanied humankind. The objective of disinformation is not only to mislead specified addressees – social groups, interest groups, public opinion, or whole societies – but also to yield the expected results in the form of social response. Cyberspace, where all the weaknesses of the infosphere are converged, generating significant vulnerabilities to disinformation, has a growing influence on creating social circumstances. All the more so that, in cyberspace, we are dealing not only with the transfer of information decoded from computer data but also with reflecting, complementing and creating entirely new social interactions, social relationships and individual contacts. This paper aims to introduce readers to the analysis of social and legal conditions concerning the possibility of criminalising disinformation in cyberspace effectively. It outlines the general conceptual framework and places it in the social and legal dimensions. The research problem being addressed in this paper is as follows: How can instances of disinformation in cyberspace be identified in the context of criteria of a prohibited act?
Źródło:
Cybersecurity and Law; 2024, 11, 1; 185-199
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Contemporary threats related to content processing in the cyberspace
Autorzy:
Martyniak, Kamil
Szydłowski, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/2033080.pdf
Data publikacji:
2019-04-30
Wydawca:
Wyższa Szkoła Finansów i Prawa w Bielsku-Białej
Tematy:
cyberspace
the law
the Internet
computer crimes
information
cybersecurity
Opis:
The Internet, as a social medium has a wide spectrum of applications. In general, the cyberspace serves as a provider of services, a commercial platform and the arena of social networking. On one hand, the Internet offers unlimited possibilities with respect to the access to all sources of information but, on the other hand, it can generate a series of threats to the established social and legal order. The threats may pertain to systems, data security, computer programs, users' privacy and intellectual property. Although the problem is important socially as well as politically, until recently the Polish literature on the subject did not address the issue of counteracting and punishing offences related to electronic data processing widely enough. The motivation behind this paper was recent social discourse on the free flow of information on the Internet and the multiplicity of controversies accompanying this topic.
Źródło:
Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej; 2019, 1; 20-24
2084-1809
Pojawia się w:
Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Filling the opinio iuris vacuum on sovereignty in cyberspace: A call for the South-Eastern European States to act
Autorzy:
Hadji-Janev, Metodi
Powiązania:
https://bibliotekanauki.pl/articles/1987426.pdf
Data publikacji:
2022-02-07
Wydawca:
Akademia Sztuki Wojennej
Tematy:
International law
sovereignty
Cyberspace
NATO
South-East European States
Strategy
Opis:
There is more than one reason why South-East European States should clarify their public positions on the applicability of sovereignty as a principle or as the rule of international law while addressing the growing ambiguity in cyberspace. The article argues that strategically and legally it is in the SEE States’ interest to step up and fill the vacuum in ever needed opinio iuris on the applicability of sovereignty in cyberspace, particularly after some leading NATO States took an opposing course on the issue. Explaining the evolution in cyberspace and how this affects the Westphalian concept of sovereignty under international law the article introduces the importance of the main thesis. It then provides the rationale for the argument and explains why it is in the SEE States interest to act and express their position on the applicability of sovereignty in cyberspace under international law.
Źródło:
Cybersecurity and Law; 2021, 6, 2; 151-166
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberspace and public access to the legislative process
Autorzy:
Tkaczyk, Edyta
Powiązania:
https://bibliotekanauki.pl/articles/2159296.pdf
Data publikacji:
2021-03-05
Wydawca:
Akademia Sztuki Wojennej
Tematy:
legislative process
public-access principle
Parliamentary law
cyberspace
legislative information
Opis:
Public access to the legislative process is one of the principles governing Parliamentary law. This process primarily entails public debates, the public nature of motions and submissions, public voting, the public adoption of resolutions, and the public availability of documents constituting the basis for the work of the Sejm – the Lower House of Parliament. Thanks to modern means of communication and live broadcasts, the public has unrestricted access to Parliamentary debates and the legislative process. While searching for, or generating, information by automated means, recipients can follow the legislative process in the form of video broadcasts. Therefore, all types of Internet attack constitute a clear threat for the validity of the legislative process, and can lead to the disruption of information disclosure as part of the public debate.
Źródło:
Cybersecurity and Law; 2020, 4, 2; 73-84
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Law of 11 march 2022 on homeland defense implications for the cybersecurity of Poland
Autorzy:
Kobielski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/2201549.pdf
Data publikacji:
2022
Wydawca:
Towarzystwo Wiedzy Obronnej
Tematy:
cyberspace
cybersecurity
Cyber Defense Forces
data
law
Polska
Law on Homeland Defense
cyberprzestrzeń
bezpieczeństwo cybernetyczne
dane
prawo
Polska
Ustawa o Obronie Ojczyzny
Opis:
On March 11, 2022, Polish parliament, the Sejm passed the Law on Homeland Defense. The Law replaces 14 other legal acts in the field of military law. The main goal of the Law was to prepare the Polish Armed Forces for the processes of rapid increase in the manpower and technical modernization, also due to the current geopolitical context related to the war in Ukraine. The Law is extensive. Although the improvement of Poland’s cybersecurity was not its primary goal, the Law introduces a number of solutions that undoubtedly pursue such a goal. This paper discusses selected issues in the field of cybersecurity included in the Law, and regarding the method of defining the cyberspace, organization and tasks of the Cyberspace Defense Forces, including the socalled proactive protection and active defense, as well as the competence of military authorities to access and manage data.
Źródło:
Wiedza Obronna; 2022, 3; 25--38
0209-0031
2658-0829
Pojawia się w:
Wiedza Obronna
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-11 z 11

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies