Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "CYBERSPACE" wg kryterium: Temat


Tytuł:
Siły Zbrojne Rzeczypospolitej Polskiej a cyberbezpieczeństwo. Zagadnienia organizacyjno-prawne
Autorzy:
Kuś, Bartosz
Powiązania:
https://bibliotekanauki.pl/articles/20311671.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
Armed Forces
defence of cyberspace
Opis:
Today, ICT systems play an important role in both the state and society. state security in the military and non-military dimensions, external and internal, has gained an additional dimension in the form of cyberspace. One of the primary goals of the Republic of Poland is to ensure the security of citizens. Protecting the independence of the state and the indivisibility of its territory and ensuring the security and inviolability of its borders are constitutional tasks of public authorities. The basic element of the defense system of the Republic of Poland participating in the implementation of security and defense policies is the Polish Armed Forces. The statutory task of this formation is, among other things, the protection and defense of cyberspace. A specialized component of the Polish Armed Forces is the Cyber Defense Forces. The process of creating this category of troops has not yet been completed.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 32-50
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Four Areas of Cybersecurity – Discussion of the Subject Area
Autorzy:
STALMACH, SŁAWOMIR
Powiązania:
https://bibliotekanauki.pl/articles/1798598.pdf
Data publikacji:
2021-07-15
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
cybersecurity
cyberspace
cyberspace law
Internet
media
artificial intelligence
Opis:
The article briefl y discusses four areas that should be considered when analysing the concept of cybersecurity: the legal aspect of cyberspace, the state security system, the specifi city of the media in the Internet environment, and last but not least – new virtual reality emerging in cyberspace. In the context of cybersecurity, all of these research areas have to be considered together.
Źródło:
Przegląd Policyjny; 2021, 141(1); 108-120
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The legal status of the cyberarmy in Hungary and Poland. An overview
Autorzy:
Bencsik, András
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/20311673.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberarmy
cyberspace
cybersecurity
Opis:
Cybersecurity tasks concern not only civilians but also the military. Similar to other spheres, cyberspace, as an operational domain, is exposed to threats. This includes destructive threats, ones that destabilise the state or its institutions. Given the need to ensure cybersecurity in the military dimension, individual states establish cyber armies to safeguard the stability of cyberspace, which is exposed to constant attacks. Cyberspace defence in a digital state, where ICT systems are also used to complete military tasks, must be considered a priority not only in national but also in international defence policies.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 19-31
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberprzestrzeń - cyberobecność - cyberteatr
CYBERSPACE - CYBERPRESENCE - CYBERTHEATRE
Autorzy:
Kmieciak, Sandra
Powiązania:
https://bibliotekanauki.pl/articles/636977.pdf
Data publikacji:
2011
Wydawca:
Uniwersytet Jagielloński. Wydawnictwo Uniwersytetu Jagiellońskiego
Tematy:
CYBERPRESENCE
CYBERSPACE
CYBERTHEATRE
Opis:
In antiquity Zeus descending ex machina on the scene, caused the performance to became more spectacular and affecting. In the Middle Ages the same task was fulfilled by fire blazing gates of hell, in the Romanticism - dioramas and now LCD screens, video cameras, microports and devices which transform sound, projectors or the Internet. If theater does not want to become a fossilized and archaic art, it had to creatively respond to changes in the modern world, otherwise the theatres could be converted into museums. But each time when theater connects with new medium, the question returns: what is theatre or where are theatre's boundaries? How far can the creator go so his work is still associated with the theatre and not the TV/video/Internet? The topic of the article is the problem that arises for con- temporary theatre's specialists when moving play into the Internet. Although the projectors, computers, screens, television and cameras open up theatre to the new possibilities, they permit to break the current time-space constraints, they make cause a lot of theoretical problems too. First, when scientists have to call these phenomena. In the following examples I show, that new media reasonably incorporated into the performance don't cause damage, on the contrary - they make it more absorbing, enriching its senses and the presentation becomes more interesting visually.
Źródło:
Przegląd Kulturoznawczy; 2011, 1(9); 107-119
1895-975X
2084-3860
Pojawia się w:
Przegląd Kulturoznawczy
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberthreats in Ukraine, Poland and Slovakia
Autorzy:
Evsyukova, Oksana
Karpiuk, Mirosław
Kelemen, Miroslav
Powiązania:
https://bibliotekanauki.pl/articles/31341976.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
cyberthreats
Opis:
This article focuses on cyberthreats in Ukraine, Poland and Slovakia. As the ICT system in a digital state plays an important role, states are obliged to ensure their adequate protection. Interference with the proper functioning of such systems can have farreaching consequences, potentially leading to the paralysis of specific economic sectors. The continually emerging cyberthreats, their intensity and types trigger the need to constantly monitor the phenomena occurring in cyberspace. With such monitoring cyberattacks can be countered and their destructive outcomes avoided. The article indicates, inter alia, the types of cybersecurity incidents and their frequency.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 58-78
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Social area of the internet in the context of values and personal safety threats in cyberspace
Autorzy:
Joanna, Grubicka,
Powiązania:
https://bibliotekanauki.pl/articles/890447.pdf
Data publikacji:
2020-10-12
Wydawca:
Akademia Pedagogiki Specjalnej im. Marii Grzegorzewskiej. Wydawnictwo APS
Tematy:
virtual reality
cyberspace
virtual communities
digital freedom
personal security in cyberspace
Opis:
The subject of the article directly fits into the process of broadly understood security. The author indicates the opportunities and threats in the social space of the Internet of human functioning. The aim of the article is to analyze the basic human threats while experiencing freedom and trust in the virtual space. The author poses the question: Should the Internet be a space of unlimited freedom? Freedom seems to be not only an immanent but also a constitutive feature of the virtual space in which the Internet functions. It should be emphasized that the issues are discussed from very different perspectives and in processes as well as social relations. The article consists of three parts. In the first one the author presented the issues of cyberspace development, whose specific features favor the development of the virtual community. Next, she defined the most important areas concerning the culture of freedom and the consent of human education as a way of promoting its independence in the social space of the Internet. The last part of the publication contains the most important theses regarding threats related to human personal safety in cyberspace.
Źródło:
International Journal of Pedagogy, Innovation and New Technologies; 2020, 7(1); 16-30
2392-0092
Pojawia się w:
International Journal of Pedagogy, Innovation and New Technologies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberbezpieczeństwo dzieci i młodzieży w prawie polskim
Cyber security of children and youth in Polish law
Autorzy:
Maciejczuk, Mateusz
Wnorowski, Konrad
Olchanowski, Mateusz
Powiązania:
https://bibliotekanauki.pl/articles/1401383.pdf
Data publikacji:
2019-03-25
Wydawca:
Państwowa Uczelnia Zawodowa we Włocławku
Tematy:
cyberbezpieczeństwo
cyberprzestrzeń
cybersecurity
cyberspace
Opis:
Niniejsza praca stanowi kontynuację dwóch wcześniejszych artykułów dotyczących cyberbezpieczeństwa najmłodszych w prawie międzynarodowym oraz europejskim. W artykule poruszone zostało zagadnienie cyberbezpieczeństwa dzieci i młodzieży na gruncie prawa polskiego. Autorzy rozpoczynają analizę od przedstawienia przepisów ustawy zasadniczej. Następnie przybliżone zostały zapisy prawa karnego materialnego i procedury karnej. Dalej autorzy przedstawiają ustawy ratyfikujące umowy międzynarodowe dotyczące zagadnienia bezpieczeństwa najmłodszych w cyberprzestrzeni. W podsumowaniu zawarte są wnioski płynące z analizy całościowej treści przepisów zarówno prawa międzynarodowego i europejskiego, jak i rozwiązań krajowych w tym zakresie.
This work follows on from two previous articles on the cyber security of the youngest children in international and European law. The article discusses the issue of cyber security of children and youth on the basis of Polish law. The authors start their analysis with the presentation of the provisions of the constitution. Next, the provisions of substantive criminal law and criminal procedure are introduced. The authors then present the laws ratifying the international agreements on the issue of the safety of the youngest children in cyberspace. The summary contains conclusions drawn from the analysis of the overall content of the regulations of both inter¬national and European law, as well as national solutions in the scope of the title.
Źródło:
Zeszyty Naukowe Zbliżenia Cywilizacyjne; 2019, 15, 1; 10-28
1896-4087
Pojawia się w:
Zeszyty Naukowe Zbliżenia Cywilizacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Agresja elektroniczna wśród dzieci w młodszym wieku szkolnym
Electronic aggression among children at a younger school age
Autorzy:
Łukawska, Maria
Powiązania:
https://bibliotekanauki.pl/articles/2081667.pdf
Data publikacji:
2021-09-22
Wydawca:
Państwowa Wyższa Szkoła Zawodowa w Raciborzu
Tematy:
electronic aggression
children
cyberspace
Opis:
Aggression is a phenomenon accompanying man from the dawn of time. Contemporary reality has revealed a new face of this peculiarity. This article shows the importance of electronic aggression manifested by students from younger classes. Based on the literature on the subject, the basic concepts related to cyberspace were presented. Attention was drawn to the need to prevent manifestations of aggressive behaviors that are visible in the sphere of physical education of children. The types of aggression are indicated and the importance of electronic aggression is explained. Conclusions were put forward resulting from my own observations and research on this issue.
Źródło:
Eunomia – Rozwój Zrównoważony – Sustainable Development; 2021, 1(100); 117-124
1897-2349
2657-5760
Pojawia się w:
Eunomia – Rozwój Zrównoważony – Sustainable Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberspace in a risk society
Autorzy:
Drabik, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/2143062.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybersecurity
threat
infosphere
Opis:
The dynamic processes of modernization have affected the quantitative and qualitative dimensions of an unprecedented social transformation. It can be said that man has entered into hitherto unknown realms of abstraction. One of its dimensions is cyberspace with attributes that elude previous identifiers of physical three-dimensional space. The highly dynamized processes of technological progress have situated societies in new dimensions of risk. The likelihood of positive or negative events has been etiologically linked to the effects of „producing”, processing, storing, and transmitting the information. This article aims to analyze the factors justifying the crystallization of a risk society, a key identifier of which is cyberspace, the associated risks, and security measures in the context of shaping cybersecurity
Źródło:
Cybersecurity and Law; 2022, 7, 1; 17-26
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Money laundering and cybercrime
Autorzy:
Krupa, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/2158445.pdf
Data publikacji:
2022-12-06
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybercrime
money laundering
Opis:
In order to be used legally, proceeds from criminal activity must be laundered first. One type of crime that can be linked to money laundering is cybercrime, which has to be fought with special tools allowing for operation in cyberspace. Money laundering, and the related financing of terrorism and organised crime, pose a major threat to state security and financial stability.
Źródło:
Cybersecurity and Law; 2022, 8, 2; 160-165
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Cybersecurity Strategy of the Republic of Poland as a Source of Internal Law
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/31342044.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
internal law
Opis:
Cybersecurity as a subject of regulation can be found in a number of legal acts, both generally applicable and internal. This type of regulation is also found in the Cybersecurity Strategy of the Republic of Poland. The Strategy, however, as an act of internal law, has limited power. It does not influence external entities and, therefore, cannot form grounds for individual decisions relating to citizens, entrepreneurs, and other entities. Its primary objective of increasing the level of resilience to cyberthreats should be a priority for the state policy.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 234-245
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nowe oblicze komunikacji. Wybrane aspekty prawne i etyczne rozpowszechniania treści w cyberprzestrzeni
Autorzy:
Różycka, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/667317.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Jagielloński. Wydawnictwo Uniwersytetu Jagiellońskiego
Tematy:
cyberspace
convergence
law
media
Opis:
It can be regarded as we have a problem with the application of its provisions to the content present in the network in terms of law because regulations on media infiltrate boundaries – so, and the media themselves. Polish law is not adapted to the changing technology reality. And it is not only the universal use of social media. Traditional media also taking into account the convergence process are present in the network. The purpose of this publication is to analyze certain aspects of legal regulations concerning the distribution of content in cyberspace – on the basis of the law in Poland the media. To demonstrate that self-regulation in the area of electronic media has the great advantage that it can go in a relatively short distance for the development of “new” media. In contrast, new, precise regulations in the matter of electronic media are difficult to be implemented in a short time.
Źródło:
Zarządzanie Mediami; 2015, 3, 2; 107-120
2353-5938
Pojawia się w:
Zarządzanie Mediami
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The executive agency as a legal organisational form of implementing cybersecurity tasks
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/2211991.pdf
Data publikacji:
2023-06-01
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
executive agency
Opis:
The national cybersecurity system is formed of a number of public entities, including executive agencies with legal personality as entities of the public finance sector. The executive agency could implement cybersecurity tasks important to the functioning of the state and its institutions. Through this legal organisational form, it would be possible to shape the development of new technologies that could then serve a digital society or digital state, including the protection of ICT systems for communication, as well as the provision of digital services and key services. Due to the widespread activity in cyberspace, it is necessary to have entities in place to protect its users. Such an entity could have the form of a cyber agency, working with other institutions (public and private), that is competent for cybersecurity
Źródło:
Cybersecurity and Law; 2023, 9, 1; 48-60
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The executive agency as a legal organisational form of implementing cybersecurity tasks
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/17900903.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
executive agency
Opis:
The national cybersecurity system is formed of a number of public entities, including executive agencies with legal personality as entities of the public finance sector. The executive agency could implement cybersecurity tasks important to the functioning of the state and its institutions. Through this legal organisational form, it would be possible to shape the development of new technologies that could then serve a digital society or digital state, including the protection of ICT systems for communication, as well as the provision of digital services and key services. Due to the widespread activity in cyberspace, it is necessary to have entities in place to protect its users. Such an entity could have the form of a cyber agency, working with other institutions (public and private), that is competent for cybersecurity
Źródło:
Cybersecurity and Law; 2023, 9, 1; 48-60
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Computer fraud
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/20311658.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
computer fraud
cybercrime
cyberspace
Opis:
Computer fraud is one of the offences against property defined by the legislator. It is committed with the purpose of financial gain or with the intent of causing damage to another person. It may also be classified as cybercrime if information systems and networks are used, including where an information and communication (ICT) system is applied in connection with committing the offence. Computer fraud is also described in this paper from a statistical perspective based on data from annual reports concerning cybersecurity incidents recorded by CERT Poland.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 183-194
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zapewnienie bezpieczeństwa przez semantyczne monitorowanie cyberprzestrzeni
Providing security by using Web monitoring systems
Autorzy:
Abramowicz, Witold
Bukowska, Elżbieta
Filipowska, Agata
Powiązania:
https://bibliotekanauki.pl/articles/426440.pdf
Data publikacji:
2013
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
security
web monitoring
cyberspace
cyber-threats
malware
phishing
Semantic Monitoring of Cyberspace
Opis:
Security is one of the basic human needs. Due to the increasing citizens’ activity in the cyberspace, a need for security in this area is increasing. The cyber-threats may appear in many forms: from malware and phishing, to fraud or scams attempts. Rapid technological development makes the traditional methods of obtaining information insufficient for an automatic Web monitoring with the aim of detecting potential threats. The paper discusses the problem of monitoring of Web sources and indicates the existing gap between the volume of available information and the decision-making ability. Finally, it presents an example from the field of cyberspace security: Semantic Monitoring of Cyberspace project and achieved results.
Źródło:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie; 2013, 3 (50); 11-17
1731-6758
1731-7428
Pojawia się w:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberprzestrzeń jako zagrożenie dla człowieka XXI wieku
Cyberspace as a New Form of Threat in the 21st Century
Autorzy:
Kałdon, Barbara
Powiązania:
https://bibliotekanauki.pl/articles/496353.pdf
Data publikacji:
2016-06-30
Wydawca:
Towarzystwo Naukowe Franciszka Salezego
Tematy:
cyberprzestrzeń
Generacja Z
subkultury medialne
massmedia
Cyberspace
Generation Z
subcultures in cyberspace
Opis:
The media have a significant influence on everyday life of an individual as well as on the life of whole social groups (both primary, such as family, and secondary). Particularly noteworthy here is the so called “Generation Z”, i.e. young people born at the turn of the 21st century who cannot conceive of a world without Internet and other mass media. This phenomenon is imposed on youth subcultures that already exist in the social reality and it implies transferring a lot of their aspects to the cyberspace. This not only results in gaining a new quality by the existing subcultures, but also in the emergence of entirely new subcultures which can only exist in virtual reality. The most important among those are: cybergoths and cyberpunks, haters, hackers and pirates, computer games players, bloggers, machinimists, fanficers and sceners.
Media wpływają na całokształt obecnego życia jednostki i całych grup społecznych (zarówno naturalnych, jak rodzina jak też wtórnych). Na szczególną uwagę zasługuje „generacja Z”, czyli młodzież urodzona na przełomie XX i XXI wieku, która nie zna świata bez Internetu i innych massmediów. Zjawisko to nakłada się na istniejące już w rzeczywistości społecznej subkultury młodzieżowe, przenosząc wiele ich aspektów do cyberprzestrzeni. Powoduje to wyłonienie się zupełnie nowej jakości istniejących subkultur, jak również powstanie zupełnie nowych subkultur, które nie mogą istnieć poza rzeczywistością wirtualną. Na szczególną uwagę zasługują: cybergoci i cyberpunki, hejterzy, hakerzy i piraci, gracze komputerowi, bolgerzy, machinimiści, fanfikowcy i scenowcy.
Źródło:
Seminare. Poszukiwania naukowe; 2016, 37, 2; 87-101
1232-8766
Pojawia się w:
Seminare. Poszukiwania naukowe
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Can mouse clicking be seen as involvement in armed conflict? Some notes on the direct participation in hostilities in cyberspace
Can mouse clicking be seen as involvement in armed conflict? Some notes on the direct participation in hostilities in cyberspace
Autorzy:
Lewandowski, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/684880.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
Humanitarian law
armed conflicts
cyberspace
Opis:
Contemporary armed conflicts are increasingly based on new technologies. These technologies enable to conduct hostilities from a distance, often eliminate the human factor from the battlefield. Nowadays, cyberspace created by the Internet allows to frame the idea of armed conflict outside the traditional recognition of the fight between belligerent armed forces. This article addresses issues of the direct participation of hostilities in cyberspace. In the first part it discusses technological development and its impact on the activation of the civil factor during armed conflicts. In the second part by analysing the current practice of cyber conflicts it refers to the concept of direct participation in hostilities and its constituent elements as a threshold of harm, direct causation, belligerent nexus at the cybernetic level. The third and final part examines the possibility of the loss of protection, in particular, it addresses the issues related to its temporal nature and the question of means and methods of attacking civilians involved in cyber warfare.
Źródło:
Adam Mickiewicz University Law Review; 2013, 2; 195-204
2450-0976
Pojawia się w:
Adam Mickiewicz University Law Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Seniorzy w cyberprzestrzeni. Między stereotypem a rzeczywistością
Seniors in Cyberspace. Between Stereotype and Reality
Autorzy:
Błeszyńska, Krystyna M.
Orłowska, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/1070819.pdf
Data publikacji:
2020-03-15
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
seniors
cyberspace
digital competencies
lifestyles
Opis:
Błeszyńska Krystyna M., Orłowska Małgorzata, Seniorzy w cyberprzestrzeni. Między stereotypem a rzeczywistością [Seniors in Cyberspace. Between Stereotype and Reality]. Studia Edukacyjne nr 56, 2020, Poznań 2020, pp. 153-166. Adam Mickiewicz University Press. ISSN 1233-6688. DOI: 10.14746/se.2020.56.8 Today, stereotypically seniors are assigned many negative traits. One of them is their lack of digital competences, which in consequence leads to their exclusion from modern social life. Given that modern Western societies are rapidly aging, this problem is becoming a social issue that needs to be addressed. A significant part of society must not be allowed to live as outcasts. In this situation, a question arises whether contemporary seniors are definitively excluded, or is age not an apparent premise in their case, and the problem lies elsewhere? The analysis of the collected empirical material revealed that the variable determining the level and type of social participation in virtual society is not age, but the level of education. Therefore, contrary to the prevailing views, seniors are not at risk of information exclusion and it is difficult to consider them as digital immigrants. Contrary to stereotypes, seniors are more distant, selective and pragmatic; independence allows them not to imitate culture and lifestyles, but to create them in contrast to the generation of their grandchildren.
Źródło:
Studia Edukacyjne; 2020, 56; 153-166
1233-6688
Pojawia się w:
Studia Edukacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy protection in a digital economy
Autorzy:
Wróblewski, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/1178970.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
cyberspace
economy
market
privacy
protection
Opis:
The author wonders, what impact on the privacy of the human being is developing ahead of us digital economy, with the acquisition of new technology. Brings forth the most important legal standards in force and outlines future European plans for digital market development. It presents the role of cyberspace in the functioning of business and society, and addresses the risks associated with it, such as exclusion, poverty and social unrest. Looking for answers to the question of what decides about behavior or loss of privacy in virtual reality.
Źródło:
World Scientific News; 2017, 89; 322-328
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
New reality – old school. Informal aspects of school cyberspace
Autorzy:
Zbigniew, Łęski,
Powiązania:
https://bibliotekanauki.pl/articles/893895.pdf
Data publikacji:
2020-01-27
Wydawca:
Akademia Pedagogiki Specjalnej im. Marii Grzegorzewskiej. Wydawnictwo APS
Tematy:
school
cyberspace
didactics
transactional analysis
Opis:
Along with the development of technologies, surrounding reality has extended to include the world of cyberspace. The great majority of schools, however, still function according to the rules and patterns adopted in the past. It is particularly important in relation to the fact that along with cyberspace not only a new communication networkappeared in schools, but also new entities in the process of communication between the teacher and a pupil. It should be emphasized that cyberspace has both a formal and informal aspect. Looking at the functioning of many schools, it seems that one can forward the thesis that the latter aspect is often overlooked. Meanwhile, it has an extremely signifi cant infl uence on the quality of the education process and the relations that occur in this process at each of its stages.
Źródło:
Problemy Opiekuńczo-Wychowawcze; 2018, 574(9); 23-29
0552-2188
Pojawia się w:
Problemy Opiekuńczo-Wychowawcze
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zdrowotne i społeczne skutki pracy zdalnej wynikające z izolacji epidemicznej w odniesieniu do dzieci I młodzieży szkolnej
Health and social effects of remote work resulting from epidemic isolation in relation to school children and youth
Autorzy:
Łukawska, Maria
Basak, Alina Maria
Powiązania:
https://bibliotekanauki.pl/articles/2081694.pdf
Data publikacji:
2021-09-22
Wydawca:
Państwowa Wyższa Szkoła Zawodowa w Raciborzu
Tematy:
cyberspace
health safety
children
youth
Opis:
The article discusses the issue of health and social effects of remote work resulting from epidemic isolation for children and schoolchildren. Basic concepts related to cyberspace were discussed and health and social threats resulting from the use of the Internet by children and adolescents were presented. Based on the literature on the subject and the professional experience of the authors, conclusions were made that are important for pedagogical practice.
Źródło:
Eunomia – Rozwój Zrównoważony – Sustainable Development; 2021, 1(100); 93-101
1897-2349
2657-5760
Pojawia się w:
Eunomia – Rozwój Zrównoważony – Sustainable Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
TOŻSAMOŚĆ W CYBERPRZESTRZENI: IMPLIKACJE ZJAWISKA CYBERPRZEMOCY WŚRÓD ADOLESCENTÓW
IDENTITY IN CYBERPRESSES: IMPLICATIONS OF CYBERBULLING IN ADOLESCENT
Autorzy:
Grubicka, Joanna
Jopek, Anita
Powiązania:
https://bibliotekanauki.pl/articles/508710.pdf
Data publikacji:
2017
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
cyberspace
the phenomenon of cyberbullying
Opis:
Cyberspace is a place of many opportunities that allows young people to search and create their own identity. Unfortunately, interacting (being) in a virtual world is seemingly safe can promote the development of many negative phenomena such as cyberbullying and the occurrence of threats and dangers to adolescents
Źródło:
Security, Economy & Law; 2017, 4/2017 (XVII)
2353-0669
Pojawia się w:
Security, Economy & Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bezpieczeństwo dzieci i młodzieży w cyberprzestrzeni na podstawie Krajowych Ram Polityki Cyberbezpieczeństwa Rzeczypospolitej Polskiej na lata 2017–2022
Safety of children and youth in cyberspace under the National Framework of Cyber Security Policy of the Republic of Poland for years 2017–2022
Autorzy:
Olchanowski, Mateusz
Powiązania:
https://bibliotekanauki.pl/articles/442591.pdf
Data publikacji:
2017
Wydawca:
Państwowa Uczelnia Zawodowa we Włocławku
Tematy:
cyberbezpieczeństwo
cyberprzestrzeń
cyber security
cyberspace
Opis:
W pierwszej części artykułu przybliżony został problem odpowiedniego zabezpieczenia dzieci i młodzieży od zagrożeń występujących w cyberprzestrzeni. W dalszej kolejności autor pracy przybliżył regulacje „Krajowych Ram Polityki Cyberbezpieczeństwa Rzeczypospolitej Polskiej na lata 2017–2022” i zarazem dokonał ich analizy pod kątem zabezpieczenia w cyberprzestrzeni interesu najmłodszych. Intencją autora było m. in. zweryfikowanie czy zapewnienie bezpieczeństwa dzieci i młodzieży w cyberświecie jest dla rządu polskiego priorytetem, czy może jednak problem ten jest zupełnie ignorowany? Analiza poprzedzona jest przedstawieniem status quo polskich regulacji prawnych stojących na straży bezpieczeństwa dzieci i młodzieży w cyberprzestrzeni. W podsumowaniu zawarte są wnioski, jakie autor wyciągnął z przedmiotowej analizy.
The first part of the article depicts the problem of adequate protection of children and young people against the dangers occurring in cyberspace. Subsequently, the author of the paper described the 'National Framework of Cyber Security Policy of the Republic of Poland for years 2017–2022’ ańd at the same time ańalysed it iń terms of securing in cyberspace the interests of the youngest. The intention of the author was, among other things, to verify whether ensuring the safety of children and young people in cyberspace is a priority for the Polish Government or whether this problem is completely ignored. The analysis is preceded by the presentation of the status quo of Polish legal regulations that protect the safety of children and young people in cyberspace. The final part contains the conclusions the author drew from the analysis of the issue.
Źródło:
Zeszyty Naukowe Zbliżenia Cywilizacyjne; 2017, 13, 3; 56-69
1896-4087
Pojawia się w:
Zeszyty Naukowe Zbliżenia Cywilizacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Public administration in cyberspace
Autorzy:
Wyrębek, Henryk
Ciekanowski, Zbigniew
Powiązania:
https://bibliotekanauki.pl/articles/1929822.pdf
Data publikacji:
2020-04-17
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
administration
cyberspace
entities
society
technologies
Opis:
The turn of the twenty-fi rst century is the time of a global revolution consisting in an avalanche of modern technologies. The achievements of science and technology are used in every fi eld of human existence. The basis of functioning of modern society is the use of cyberspace. Access to mobile phones, computers and the global ICT network is a determinant of societal development. The idea of universal automation and computerisation is a fact. The possibility of using high-speed ICT connections is not only the domain of scientifi c institutions, military agents and large business entities. A global computer network connects individuals. The intensive development of modern technologies, the Internet and telecommunication networks has enabled the emergence of a new approach in communication between citizens and the state (with central and local government offi ces). It has also enabled the introduction of new solutions, models and services at this level, resulting directly from specifi c social needs and expectations. According to the assumptions of the idea of e-government, the basic premise for creating e-government is to improve contact with the authorities at all levels, and to speed up procedures for dealing with offi cial matters. Investing in modern administration may bring tangible benefi ts to citizens and entrepreneurs as well as to the administration itself.
Źródło:
Przegląd Policyjny; 2019, 136(4); 23-39
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberspace in the Perspective of Cognitive Pedagogy
Autorzy:
Siemieniecka, Dorota Anna
Siemieniecki, Bronisław Franciszek
Powiązania:
https://bibliotekanauki.pl/articles/1969045.pdf
Data publikacji:
2018-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
cognitive pedagogy
cyberspace
virtual reality
Opis:
The article discusses the problems of human functioning in cyberspace seen from the perspective of cognitive pedagogy. The focus was on the area of communication, information processing by people and problems related to the language of the media. The understanding of the concepts of cyberspace and virtual reality from the position of cognitive pedagogy has been defined. A number of phenomena have been presented, such as: multitasking, cognitive load, sequencing mechanism, compression and addiction.
Źródło:
The New Educational Review; 2018, 54; 157-167
1732-6729
Pojawia się w:
The New Educational Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity as the Basis for State and Society Security in the 21st Century
Autorzy:
Bujek, Małgorzata
Powiązania:
https://bibliotekanauki.pl/articles/466214.pdf
Data publikacji:
2017
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
cyberspace
cybersecurity
threats
cybersecurity system
Opis:
Cybersecurity is one of the most common security topics at present times. Society has enormous capabilities and possibilities in the cyberspace, which create opportunities and threats as well. A cyberwar, cyberterrorism and cybercrime have permanently entered the catalog of threats for security. This kind of situation in a cyberspace determines the need for coordinated activities at international and national level which will provide an acceptable level of security in this area. This article presents and briefly outlines threats for the state cybersecurity. There are also presented activities aimed to provide protection in this area. In addition, the author analyzed the current structure of the cybersecurity system in the Republic of Poland.
Źródło:
Safety & Defense; 2017, 3; 8-13
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Raising public and private user awareness of the threats and risks related to cyberspace security
Autorzy:
Makuch, Anna
Powiązania:
https://bibliotekanauki.pl/articles/2158436.pdf
Data publikacji:
2022-12-06
Wydawca:
Akademia Sztuki Wojennej
Tematy:
state security
cyberspace
data security
Opis:
Modern cybersecurity efforts require the identification ofthe risks and threats associated with the cyberenvironment by consistently increasing public awareness of the dual nature of cyberspace and its use for the purposes of cooperation, and for the purposes of warfare and crime. Raising awareness today means involving both public and private users in cooperationfor the sake of both the common good and common interests involving standards for the use of virtual space.
Źródło:
Cybersecurity and Law; 2022, 8, 2; 44-55
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberprzestrzeń w systemie militarnym bezpieczeństwa państwa
Autorzy:
Wochnowicz, Arkadiusz
Powiązania:
https://bibliotekanauki.pl/articles/20311670.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
national security
cyberspace
cybersecurity
Opis:
The article „Cyberspace in the military system of state security” presents the basic concepts related to security, which is nowadays considered to be a state of certainty, peace, security and lack of threat and protection against danger, and cyberspace, which is understood as a virtual environment of information and interaction between people. This article also shows the definitions of terms relating to the values most valued and protected by man, i.e. state security, which is an integral part of the state policy related to the creation and use of national defense potential to prevent and counteract various types of threats. The importance of important units of the Polish Armed Forces as the basic organ of shaping cyberspace in the military area has been shown. The role and place of bodies in the Polish Armed Forces ready to respond to threats to ICT systems and networks connected by cyberspace has been defined.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 51-69
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Koncepcja informowania i edukacji człowieka jako narzędzie przeciwdziałania zagrożeniom w cyberprzestrzeni
A concept of information and education of a human as tool of prevention of cyberspace threats
Autorzy:
Krassowski, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/451911.pdf
Data publikacji:
2018
Wydawca:
Wyższa Szkoła Gospodarki Euroregionalnej im. Alcide De Gasperi w Józefowie
Tematy:
cyberspace security
cybercrime
cyberspace threats
information
education
bezpieczeństwo cyberprzestrzeni
cyberprzestępstwo
zagrożenia
cyberprzestrzeni
informacja
edukacja
Opis:
Development of information society of XXI century brought, apart from many welcomed and positive consequences contributing to further development of civilization, also new and unknown threats that are now permanent element of our social reality. Said threats, that are also a subject of constant evolution coupled with advancements of technology, can be characterized by high dynamics of growth and serious negative consequences both regarding high scale material losses they cause as well as other unwanted consequences regarding functioning of whole societies. An efficient countermeasures and fight with the threats in question poses a real challenge to law enforcement and other state institutions responsible for provision and maintenance of public security. Taking into account an economical dimension of discussed phenomenon it seems to be also a field of possible cooperation between public institutions and private sector, vitally interested in minimization of financial loses. Effective neutralization of negative phenomena in cyberspace considered from the point of view of social sciences – taking an education of a human (cyberspace user) as the main point of interest – requires, considering methodology of social sciences, an application of descriptive method for an overview and organization of basic definitions and concepts, together with analysis of phenomenon in question, it’s evolution and assessment of strategic countermeasure programs. All this in order to apply a method of synthesis to make determination regarding established issue – development of both an optimal and practical concept of provision of information and education to a human as an effective means of prevention against cyber threats, in the framework of development of cyberspace culture.
Rozwój społeczeństwa informacyjnego XXI w. przyniósł, obok wielu pożądanych i pozytywnych skutków korzystnie wpływających na rozwój cywilizacyjny, także nowe, nieznane dotąd zagrożenia, które stały się trwałym elementem naszej rzeczywistości społecznej. Zagrożenia te, same podlegające ciągłej ewolucji wraz z postępującym rozwojem technologii, charakteryzują się dużą dynamiką wzrostu oraz poważnymi negatywnymi konsekwencjami w postaci strat o charakterze materialnym oraz innych niepożądanych skutków dotyczących funkcjonowania całych społeczeństw. Skuteczne przeciwdziałanie i zwalczanie powyższych zagrożeń jest rzeczywistym wyzwaniem dla organów ścigania oraz innych instytucji państwa odpowiedzialnych za zapewnianie bezpieczeństwa publicznego. Ze względu na ekonomiczny wymiar zjawiska jest to również pole ścisłej współpracy instytucji publicznych i sektora prywatnego, żywotnie zainteresowanego minimalizacją strat finansowych. Skuteczna neutralizacja negatywnych zjawisk w cyberprzestrzeni rozpatrywana na gruncie nauk społecznych – przy założeniu, iż edukację człowieka traktuje się jako główny przedmiot zainteresowania – wymaga, z punktu widzenia metodologii nauk społecznych, dla dokonania przeglądu przedmiotowej problematyki i uporządkowania sfery pojęciowej, zastosowania metody opisowej, w połączeniu z metodą analizy zjawiska oraz jego ewolucji i wskazania podejmowanych do tej pory programów zaradczych o charakterze strategicznym. Wszystko to w celu zastosowania metody syntezy dla rozstrzygnięcia w zakresie postawionego problemu – stworzenia praktycznej koncepcji zapewnienia człowiekowi informacji oraz edukacji jako skutecznych narzędzi przeciwdziałania zagrożeniom w cyberprzestrzeni.
Źródło:
Journal of Modern Science; 2018, 37, 2; 327-340
1734-2031
Pojawia się w:
Journal of Modern Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The contemporary multi-layered cybersecurity landscape and emerging nano-threats. An overview
Współczesny wielowarstwowy krajobraz cyberbezpieczeństwa i pojawiające się nano-zagrożenia. Przegląd
Autorzy:
Olszewski, Bogusław
Powiązania:
https://bibliotekanauki.pl/articles/16539466.pdf
Data publikacji:
2022-06-30
Wydawca:
Uniwersytet Opolski
Tematy:
cyberspace
persona
cyberpersona
layers
cyberwar
adversary
Opis:
Presented article attempts to identify the key node located in the three-tier model of cyberspace, the node which is characterized by the greatest potential impact on the other elements essential for the functioning of the whole network, especially in the security context. Based on the network analysis, it was proposed to place the ‘persona’ in the center of interest, in other words the human factor. In this way – regardless of the future direction of the further development of artificial intelligence – an individual adversary is able to dispose the historically unprecedented ability to put an impact on the critical and – potentially – military infrastructure of the state. Thus, individual digitally-skilled person is capable of destabilizing the post-industrial society not only in the context of network/computer security, but also physical security (through the cyber-physical systems).
Źródło:
Studia Krytyczne/ Critical Studies; 2021, 10; 63-72
2450-9078
Pojawia się w:
Studia Krytyczne/ Critical Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wybrane aspekty bezpieczeństwa w cyberprzestrzeni
Selected aspects of cyberspace security
Autorzy:
Pala, Mariusz
Powiązania:
https://bibliotekanauki.pl/articles/565084.pdf
Data publikacji:
2015-07-01
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
cyberprzestrzeń
cyberterroryzm
cyberprzestępczość
cyberspace
cyberterrorism
cybercrime
Opis:
Niniejszy artykuł, przedstawia współczesne zagrożenia w cyberprzestrzeni. W dobie powszechnej informatyzacji posiadamy dostęp do Internetu i możemy swobodnie komunikować się ze wszystkimi na świecie za pomocą komunikatorów czy poczty elektronicznej, co powoduje, że możemy mieć dostęp do najbardziej aktualnych informacji. Internet stał się obszarem, gdzie można dokonywać również różnego rodzaju nadużyć. Korzystają z niego nie tylko przestępcy czy służby specjalne wielu państw, ale również terroryści. Terroryzm, w klasycznym rozumieniu jest formą protestu lub walki, których celem jest zwrócenia na siebie uwagi opinii publicznej bądź władz państwowych. Terroryści stosują narzędzia należące do zbioru nielegalnych metod, zakazanych przez prawo międzynarodowe i napiętnowanych przez międzynarodowe organizacje. Najnowszą formą działań terrorystów jest aktywność w cyberprzestrzeni. Celem cyberterrorystów, jest opanowanie najważniejszych sektorów, a następnie monopolizacja dostępu do informacji.
This article provides information about contemporary threats to information security in cyberspace. In the age of universal computerization, worldwide Internet access we are freely to communicate with all the world via instant messengers or e-mail, what gives the access to the most current information. The Internet has become an area of various kinds of abuse. The Internet is used not only by criminals or secret services of many countries, but also terrorists. Terrorism in the traditional sense is a form of protest or struggle, aimed at the achievement of some objective and to attract attention of public opinion or the government. Terrorists use the tools belonging to the collection of illegal methods that are banned by international law and condemned by international organizations. The latest form of terrorist activity is cyberspace activity. Cyberterrorists aim to control the most important sectors and the monopolization of the information access.
Źródło:
De Securitate et Defensione. O Bezpieczeństwie i Obronności; 2015, 1(1); 113-130
2450-5005
Pojawia się w:
De Securitate et Defensione. O Bezpieczeństwie i Obronności
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybergenic Presidential Candidates of Third Parties in the United States: The Analysis of Selected Political Campaigns with the Key Role of New Media
Autorzy:
Popielec, Dominika
Powiązania:
https://bibliotekanauki.pl/articles/630439.pdf
Data publikacji:
2017
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
Cyberspace, Media, Election campaign, High-tech
Opis:
This article focuses on selected political campaigns of the Third Parties in the United States. The main purpose of this work is to present how these candidates promote themselves and communicate with voters. Traditional and new media are playing a crucial role in public life during presidential elections. Not only do they inform society but also are a tool of political communication. Voters can get to know a candidate and his/her election program via the media. Journalists are conducting interviews with main candidates, especially the Democrats and Republicans, which are leaders in the polls. But what should the candidates from other parties do? Those who do not appear very often in the mainstream media? How do they gain public support for their ideas? Do we insist on a telegenic president, as William F. Buckley indicated, or a cybergenic president in the contemporary world? Considering the increasing role of the Internet in modern society, these candidates use new new media to promote themselves. Therefore, in this article I will describe the importance of new media, their effectiveness in presidential campaigns and a cybergenic candidate as a standard of modern political communication
Źródło:
Kwartalnik Kolegium Ekonomiczno-Społecznego Studia i Prace; 2017, 4; 97-116
2082-0976
Pojawia się w:
Kwartalnik Kolegium Ekonomiczno-Społecznego Studia i Prace
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Przegląd zagrożeń w cyberprzestrzeni
Threats in cyberspace in the opinion of users
Autorzy:
Snopkiewicz, Konrad
Powiązania:
https://bibliotekanauki.pl/articles/1877221.pdf
Data publikacji:
2020
Wydawca:
Akademia im. Jakuba z Paradyża w Gorzowie Wielkopolskim
Tematy:
cyberprzestrzeń
zagrożenia
bezpieczeństwo
cyberspace
threats
security
Opis:
Przestrzeń cybernetyczna nabrała znaczenia powszechnego w niezwykle dynamicznym tempie. W obecnych czasach trudno wyobrazić sobie funkcjonowanie bez możliwości zalogowania się do sieci. Surfowanie po Internecie stało się codziennością, można stwierdzić, że jest to jedna z kluczowych potrzeb człowieka. Niegdyś nowe, a dziś już wszystkim obyte środowisko internetowe zrodziło nowe poważne zagrożenie, jakim jest cyberprzestępczość. Cyberataki są jednymi z największych zagrożeń XXI wieku. Zdecydowanie łatwiej dokonuje się przestępstw z wykorzystaniem maski anonimowości działania. Cyberprzestępczość wpływa na stabilność instytucji państwa, a także system polityczny i gospodarczy. W niniejszym opracowaniu przedstawiono przegląd zagrożeń występujących w cyberprzestrzeni od tych najbardziej powszechnych do najgroźniejszych oddziałujących na funkcjonowanie państwa i ludzi.
yberspace has gained universal importance at an extremely dynamic pace. Nowa-days it is difficult to imagine functioning without logging into the network. Surfing the Internet has become commonplace, it can be said that it is one of the key human needs. The once new and now familiar Internet environment has created a new serious threat, which is cybercrime. Cyber-attacks are one of the greatest threats of the 21st century. It is much easier to commit crimes using the mask of anonymity of action. Cybercrime affects the stability of state institutions as well as the political and economic system. This study presents an overview of threats in cyberspace, from the most common to the most dangerous, affecting the functioning of the state and people.
Źródło:
Studia Administracji i Bezpieczeństwa; 2020, 9; 29-41
2543-6961
Pojawia się w:
Studia Administracji i Bezpieczeństwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nationalism, Cyberspace and Convergence Culture
Autorzy:
Majewski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/508932.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Instytut Slawistyki PAN
Tematy:
nationalism
cyberspace
Internet
Greek culture
Macedonia
Opis:
Nationalism, Cyberspace and Convergence CultureThe article analyses the discourse of the Greek-Macedonian dispute as it unfolded in the Internet, including especially the social networking website YouTube. The discourse is based on a mythologized concept of history, in which the national community is perceived as an eternal chain of generations, while the national identity is a stable, static and “natural” foundation of narrations.Nacjonalizm, cyberprzestrzeń i konwergencja kulturowaW swoim artykule analizuję dyskurs odnoszący się do sporu grecko-macedońskiego toczącego się w przestrzeni Internetu, w tym zwłaszcza na portalu społecznościowym YouTube. Dyskurs ten opiera się na zmitologizowanej wizji historii, gdzie wspólnota narodowa postrzegana jest jako odwieczny łańcuch pokoleń, a tożsamość narodowa jest stałym – nie podlegającym zmianom – i „naturalnym” fundamentem nacji.
Źródło:
Colloquia Humanistica; 2012, 1
2081-6774
2392-2419
Pojawia się w:
Colloquia Humanistica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberbullying and Opportunities for its Prevention
Autorzy:
Gálik, Slavomír
Hladíková, Vladimíra
Pavlák, Lukáš
Powiązania:
https://bibliotekanauki.pl/articles/1396943.pdf
Data publikacji:
2018
Wydawca:
Univerzita sv. Cyrila a Metoda. Fakulta masmediálnej komunikácie
Tematy:
The Internet
Bullying
Cyberbullying
Cyberspace
Prevention
Opis:
This paper focuses on the phenomenon of bullying in the electronic environment - cyberbullying. It is divided in two parts - a theoretical part in which we define basic concepts such as bullying and cyberbullying, as they are important in our context. The contribution includes several definitions of cyberbullying from authors who first thought of this topic. Cyberbullying also includes various forms, which, together with their means, are elaborated at work. It is important to explain basic bullying that we compare with cyberbullying. Our goal is to design options and solutions for its prevention and elimination. The research part is in the form of a quantitative questionnaire which analyzes the issue of cyberbullying through the eyes of secondary school pupils, especially their real experience and knowledge of the assumed subject to achieve the idea of the current state. We discovered whether students were bullying someone over the internet, cyberbullying, and how they matched cyberbullying. The aim of our research questions was also to find out if students are familiar with some of the web sites that deal with cyberbullying prevention and whether their school provides enough information to address this issue.
Źródło:
Media Literacy and Academic Research; 2018, 1, 1; 6-17
2585-8726
Pojawia się w:
Media Literacy and Academic Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Training employees on risks in the area of cybersecurity
Autorzy:
Pieczywok, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/2143026.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
employee training
threats
cyberbullying
risk
cyberspace
Opis:
The title of the article points to an important area of human security as it relates to cyberspace as an environment for information exchange through networks and computer systems. In addition to the positive aspects, cyberspace also gives rise to various threats, such as cyber crises and cyber conflicts, cyber violence, cyber protests, or cyber demonstrations, including the threat of triggering a cyberwar. Risk is inherent in a given organization’s cybersecurity. Therefore, one of the forms of counteracting this unfavorable phenomenon is periodic training among employees. In addition to an introduction, the article includes characteristics of cyberspace risk and suggestions for employee training in this area.
Źródło:
Cybersecurity and Law; 2022, 7, 1; 261-271
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Directions of the Polish migration policy in cyberspace
Autorzy:
Chmielecka, Paulina A.
Powiązania:
https://bibliotekanauki.pl/articles/2143051.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
information security
cyberspace
migration
political communication
Opis:
A state cannot exist without a defined territory, a population living within it, and a government. It is not insignificant for the maintenance of security in the country to ensure the stability of borders, law and order, and the protection of the people residing in the country. The protection applies to nationals as well as to economic immigrants and refugees. It takes place in real-time and in the virtual information space, which is one of the research areas in the security sciences. This article aims to highlight the most important challenges for the Polish migration policy in cyberspace.
Źródło:
Cybersecurity and Law; 2022, 7, 1; 142-152
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Współczesne technologie informatyczne - szanse i zagrożenia
Modern information technologies - opportunities and threats
Autorzy:
Ciekanowski, Zbigniew
Wyrębek, Henryk
Powiązania:
https://bibliotekanauki.pl/articles/565228.pdf
Data publikacji:
2017-07-01
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
cyberterroryzm
cyberatak
cyberprzestrzeń
cyberterrorism
cyberattack
cyberspace
Opis:
Dynamiczny rozwój informatyki spowodował że człowiek jest coraz bardziej uza-leżniony od komputerów i pochodnych urządzeń. Jeszcze na początku lat 80. XX wieku kom-puter był jedynie narzędziem, którego głównym przeznaczeniem było wykonywanie skompli-kowanych obliczeń naukowych lub użycie w celach militarnych. Obecnie urządzania teleinfor-matyczne towarzyszą człowiekowi praktycznie w każdym aspekcie jego życia, począwszy od wykonywania zadań służbowych, na relaksie i utrzymywaniu kontaktów ze znajomymi koń-cząc. Technologie informatyczne zdominowały sposób zarządzania państwem wraz z jego klu-czowymi elementami, do których należy m.in. infrastruktura krytyczna. Wraz z rosnącym uza-leżnieniem funkcjonowania społeczeństwa od technologii informatycznych rosną również za-grożenia płynące z ataków w cyberprzestrzeni. Fakt ten wykorzystują organizacje terrorystyczne, co owocuje pojawieniem się nowego, groźnego dla świata zagrożenia – cyber-terroryzmu.
The dynamic development of information technology has caused that man is becom-ing more and more dependent on computers and related devices. At the beginning of the 1980s computer was only a tool which main purpose was to perform complex scientific calculations or use in military purposes. Currently, the telecommunication devices accompany man in almost every aspect of life, starting with performing the work tasks, relaxation and maintaining contacts with friends. Information technology dominated the state management with its key elements, one of which is, among others, critical infrastructure. With the growing addiction of society from in-formation technology, also threats from the attacks in cyberspace grow. This fact is used by ter-rorist organizations, which results in the emergence of a new, dangerous for the world, threat – cyber-terrorism.
Źródło:
De Securitate et Defensione. O Bezpieczeństwie i Obronności; 2017, 1(3); 8-21
2450-5005
Pojawia się w:
De Securitate et Defensione. O Bezpieczeństwie i Obronności
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Sanctifying Cyberspace
O uświęcaniu cyberprzestrzeni
Autorzy:
Drozdek, Adam
Powiązania:
https://bibliotekanauki.pl/articles/558711.pdf
Data publikacji:
2014
Wydawca:
Gdańskie Seminarium Duchowne
Tematy:
cyberspace
theology
sacredness
cyberprzestrzeń
teologia
uświęcenie
Opis:
Because of the ubiquity and usefulness of the internet it is sometimes deemed that not only the internet is a potent technological force, but that it is sacred. Views of some proponents of this view are critically analyzed. Paper concludes that for a believer, the source of all that exists is God and in this sense the internet is God’s gift or at least the result of human ingenuity which comes from God. The internet by itself is morally and religiously neutral and it is up to the moral dimension whether it is used for good or for ill.
Internet przeniknął niemal wszystkie aspekty życia społecznego i czasami nadaje mu się znamię świętości. Artykuł krytycznie analizuje poglądy niektórych autorów mówiących o uświęcaniu cyberprzestrzeni. Konkluzją artykułu jest stwierdzenie, że dla wierzącego źródłem wszystkiego, co istnieje, jest Bóg – i w tym sensie internet jest darem boskim, a przynajmniej rezultatem ludzkiej inteligencji, która również pochodzi od Boga. Internet sam w sobie jest religijnie i moralnie neutralny – to moralny wymiar człowieka dyktuje, czy będzie użyty do dobrych czy złych celów.
Źródło:
Studia Gdańskie; 2014, 34; 79-88
0137-4338
Pojawia się w:
Studia Gdańskie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected problems of security of information confidentiality in cyberspace
Autorzy:
Wolaniuk, L.
Powiązania:
https://bibliotekanauki.pl/articles/348489.pdf
Data publikacji:
2017
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
information confidentiality
cyberspace security
ICT security
Opis:
Information confidentiality is the one of the cornerstones of IT security, which is defined and described in ISO/IEC 27000 standard. Contemporary practices of disclosing information to unauthorized persons and systems are the reason for difficulties in this concept implementation. At every step we encounter situations where information is extracted or obtained illegally from different sources. The main purpose of this paper is to present the issue of information confidentiality protection in cyberspace, as a complex, full of contradictions problem of techno-social character. The role of information confidentiality in functioning of a society, organization and individual has been described. The most important information confidentiality threats have been characterized and the description of a number of incidents illustrating those threats has been quoted. Contemporary security threats have been presented as well as selected methods of information confidentiality protection transmitted in ICT networks. The characteristics of protection systems of information confidentiality have been analyzed, with special attention paid to their functionality and vulnerability to existing threats. The concept of protecting the confidentiality of information transmitted on the Internet based on the use of cryptography and steganography has been presented.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2017, 4; 194-207
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Thoughts on the evolution of national security in cyberspace
Autorzy:
Dobák, Imre
Powiązania:
https://bibliotekanauki.pl/articles/1194403.pdf
Data publikacji:
2021
Wydawca:
Akademia Sztuki Wojennej
Tematy:
information society
national security
intelligence
cyberspace
Opis:
Nowadays, the vast majority of the threats to our security come from cyberspace, resulting in a significant transformation of national security systems. Behind these changes, we can find some organisational and capability responses to technological developments, seeing that the function of national security is inseparable from the social environment and its processes. The study examines certain impacts of cyberspace on national security as a system, addressing some features of the changing external environment. The topic is related to the research on the relationship between the information society and security in the 21st century. Therefore, the study explores some processes visible at the international level and reviews some external environment trends in connection with national security. The changes affect the future of national security thinking and the development of principles and methods. It is the task of national security services operating under strict legislation to respond effectively to various threats in a changing environment. All this is only possible through the continuous monitoring of changes in the environment and long-term strategic thinking.
Źródło:
Security and Defence Quarterly; 2021, 33, 1; 75-85
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberterrorism as an Effect of the Evolution of New Information Technologies in the First and Second Decades of the 21st Century
Autorzy:
GERWATOWSKI, JACEK
Powiązania:
https://bibliotekanauki.pl/articles/1798635.pdf
Data publikacji:
2021-07-15
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
terrorism
cyberterrorism
cybercrime
threats in cyberspace
Opis:
The article is about the threats that result from the evolution of new technologies. Problems such as terrorism and cyberterrorism have been discussed in detail. The article presents examples of cybercrimes. Selected law regulations are also described in terms of cyberterrorism and cybersecurity. The author also presents cyberthreats which we may be exposed to in our everyday life, including phishing and pharming. Finally, Polish and global cybercrime statistics are presented in the article.
Źródło:
Przegląd Policyjny; 2021, 141(1); 297-323
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Legal Security Aspects of Online Search. Postulates de lege ferenda
Autorzy:
Kurek, Justyna
Powiązania:
https://bibliotekanauki.pl/articles/1374840.pdf
Data publikacji:
2019
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
Privacy
spyware
covert activity in cyberspace
Opis:
Classified online search of telecommunication systems with the use of spyware tools requires comprehensive regulation. On the one hand, it should ensure the balance between an effective legal framework for guaranteeing public security in the online environment and legal regulation, on the other hand — it should respect constitutional norms, in particular the right of the individual to protect privacy, the inviolability of the home and the protection of correspondence. Legal and political consent for such activities requires, however, the creation of institutional, material, legal and procedural guarantees.
Źródło:
Internal Security; 2019, 11(2); 129-140
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Phonoholism as a Personal Safety Threat
Autorzy:
Zbroszczyk, Dorota
Grubicka, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/1808011.pdf
Data publikacji:
2019-09-09
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
phonoholism
virtual reality
cyberspace
computer addiction
Opis:
Using modern devices and global access to information have become one of the most important areas of people’s lives, especially in case of young people who have been dealing with technology and new media since they were very young. It is hard to imagine life without new information communication technologies. Communicating, making friends, gaining information, entertainment, pursuing hobbies and interests – it all happens through these technologies. Is virtual reality becoming the space of creativity of the young or their escape from real tasks that they should face in everyday life? The paper presents research on the compulsive usage of mobile phones and gives a detailed characteristics of the phenomenon of phonoholism in Masovian voivodship. The underlying research objective is the analysis of the negative effects of the excessive immersion of the users in the Internet and the ubiquitous presence thereof in people’s lives, with a particular emphasis being put on the impact the Internet has on young people. Among others, the research results have displayed low perception of the harmfulness of addiction to a mobile phone among the investigated youth.
Źródło:
Security Dimensions; 2019, 29(29); 166-184
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Threats to people with disabilities in virtual and environmental spaces – a comparison of behaviors
Autorzy:
Pieczywok, Andrzej
Wasielewska, Paulina
Wasielewski, Sławomir
Powiązania:
https://bibliotekanauki.pl/articles/2143015.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
threats
security
environmental threats
cyberspace threats
Opis:
This paper will outline the major mental and physical health risks associated with the Internet and environmental risks affecting people with physical disabilities. Modern humans strongly emphasize their need for security. A clean environment is important for human health and well-being. Human security in cyberspace is also important. The importance of security for citizens using information and communication technology systems is increasing every day. The article compares key environmental and cyberspace threats.
Źródło:
Cybersecurity and Law; 2022, 7, 1; 309-319
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The need for protection of human rights in cyberspace
Autorzy:
Florek, Iwona
Eroglu, Susran Erkan
Powiązania:
https://bibliotekanauki.pl/articles/951098.pdf
Data publikacji:
2019
Wydawca:
Wyższa Szkoła Gospodarki Euroregionalnej im. Alcide De Gasperi w Józefowie
Tematy:
Human rights
cyberspace
individual rights
protection
Opis:
Technology is an integral part of social life. The widespread use of computers and the development of information and communication technologies have made people dependent on this technology in many ways. Computer products such as Internet, mobile phone, satellite are among the indispensables of daily life. The developments in information technologies attract the attention of the international community as much as the individuals and affect this society as well. In particular, the tools and methods that are created by using computers have created cyber area life in addition to the real world, and this area has begun to provide significant benefits and facilities in the daily lives of individuals and communities. In this article the relation between cyberspace and protection of human rights in this sphere will be examined socially and legally
Źródło:
Journal of Modern Science; 2019, 42, 3; 27-36
1734-2031
Pojawia się w:
Journal of Modern Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Park w dobie obrazów cyfrowych. Praktyki późnej nowoczesności: bywać – naturalizować – mieszkać
Park in the Age of Digital Images. Late Modernity Practices: to exist – to naturalize – to live
Autorzy:
Banaszkiewicz, Karina
Powiązania:
https://bibliotekanauki.pl/articles/534488.pdf
Data publikacji:
2018
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
park
naturalization
settlement
topographical experience
cyberspace
Opis:
Park as an intentionally formed phenomenon is an example of imposing on reality both anthropocentric patterns and those typical of a specific cultural context. Interpreted against the backdrop of space, nature, landscape, it unravels its power as a human gesture, sign and measure of human nature – expresses a man’s attitude to the world. Founded on the topographical experience, a park gains the status of a place and initiates the processes of taming and naturalization. Everyday being with a park leads to living, which then endows a park with an order of life and identity. To be, to naturalize, to live – these are the practices of existence in the world, deconstructed by the processes of globalisation, including digitalization. While analysing digital realizationsof a park and a park extended over the spaces emitted by the screens and monitors of digital devices in terms of the functions it performs in a modern and postmodern city, this paper asks about contemporary forms of settlement, embodied by virtual and real parks.
Źródło:
Śląskie Studia Polonistyczne; 2018, 11, 1; 21-38
2084-0772
2353-0928
Pojawia się w:
Śląskie Studia Polonistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Evolution of Cybersecurity Regulation in the European Union Law and Its Implementation in Poland
Autorzy:
Szpor, Grażyna Maria
Powiązania:
https://bibliotekanauki.pl/articles/1597404.pdf
Data publikacji:
2021-08-21
Wydawca:
Katolicki Uniwersytet Lubelski Jana Pawła II
Tematy:
cybersecurity, cyberspace, legislation, NIS Directive, ENISA
Opis:
The 2013 European Union Cybersecurity Strategy, the 2016 Directive, and the 2019 Regulation mark the next steps in strengthening the protection of cybersecurity by European Union bodies, linked to changes in member states’ laws. The rapid increase in threats, referred to as the “cyberpandemic”, requires prompt adaptation of legal instruments to new needs, but at the same time complicates ensuring consistency of multi-level regulation. The analysis of changes in the legal status in Poland shows that this concerns terminology, subject matter scope and the structure of cyber security systems. In order to reduce difficulties, it is worth considering introducing immediate amendments to those provisions in force which were negatively assessed during works on drafting new acts. Such a conclusion is prompted by the evolution of the definition of cybersecurity, which, according to the 2019 Regulation as well as the draft amendments to the Polish Act on National Cyber Security System and the draft of the new Directive, is to be understood as activities necessary to protect networks and information systems, users of such systems and other persons against cyber threats such as any potential circumstance, event or action that may cause damage, disruption or otherwise adversely affect networks and information systems. Another example is the maintenance of the distinction between key service operators and digital service providers in the 2019 EU Regulation and the 2021 draft amendment to the Polish law, although the 2020 NIS 2 directive draft recognizes that it has become irrelevant and replaces it with a distinction between essential and relevant entities. Also, other changes currently proposed are justified by the blurring of the boundaries between virtual and real space.
Źródło:
Review of European and Comparative Law; 2021, 46, 3; 219-235
2545-384X
Pojawia się w:
Review of European and Comparative Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wykonawstwo muzyczne w cyberprzestrzeni. Między wirtualnością a rzeczywistością
Autorzy:
Jagiełło, Bartosz
Powiązania:
https://bibliotekanauki.pl/articles/2095889.pdf
Data publikacji:
2020
Wydawca:
Poznańskie Towarzystwo Przyjaciół Nauk
Tematy:
cyberspace
music
musical performance
the Internet
Opis:
The history of musical performances is also the history of space in which they take place. This space is associated with the development of digital technologies. The article presents situations in which musicians perform or take other artistic actions relying on these technologies. This is an attempt at drawing attention to the fact that cyberspace does not replace traditional performance space (like concert halls, opera houses etc.) but rather, leads to cooperation of musicians in that space.
Źródło:
Our Europe. Ethnography – Ethnology – Anthropology of Culture; 2020, 9; 55-59
2299-4645
Pojawia się w:
Our Europe. Ethnography – Ethnology – Anthropology of Culture
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Lawfare – Hostile Actions Against the Legal System of the State Through Activities in Cyberspace
Autorzy:
Milik, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/31342001.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
lawfare
social engineering
information warfare
cyberspace
Opis:
The article analyses important and current issues concerning the use of modern information technologies in hostile actions against the state in the international environment. First, the concept of lawfare was defined as a method of conducting information warfare. Then, the focus was on the potential manifestations of lawfare in cyberspace, indicating possible gaps in the state’s information security system and sensitive areas susceptible to methods of hostile shaping of the state’s legal system.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 105-119
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Quantitatively examining the interaction between cybercrime and physical crime
Autorzy:
Doss, Daniel Adrian
Scherr, Daniel
Powiązania:
https://bibliotekanauki.pl/articles/28408753.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
crime and criminology
cybercrime
cybersecurity
cyberspace
sociology
Opis:
This study examined the differences and relationships between reported incidents of cybercrime and physical crime within U.S. society nationally. The examined period encompassed the years between 2001 and 2020. The study outcomes showed that a relationship existed between reported incidents of cybercrime and reported incidents of physical crime (p = 0.00; α = 0.05). More specifically, it appeared that relationships existed between the reported incidents of cybercrime and the reported incidents of physical crimes representing robbery rate (p = 0.01; α = 0.05), burglary rate (p = 0.00; α = 0.05), and larceny theft rate (p = 0.00; α = 0.05). It also appeared that a difference (p = 0.00; α = 0.05) existed between reported incidents of cybercrime and physical crime, wherein greater quantities of physical crime were exhibited societally during the examined period.
Źródło:
Society Register; 2023, 7, 3; 7-20
2544-5502
Pojawia się w:
Society Register
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wokół definicji cyberbezpieczeństwa
Autorzy:
Żywucka-Kozłowska, Elżbieta
Dziembowski, Robert
Powiązania:
https://bibliotekanauki.pl/articles/20311663.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
security
law
digitization
directive
European Union
Opis:
The concept of cyber security has become part of the reality of the late 20th and 21st centuries. This term is understood as a system that blocks threats consisting in destroying, changing and unauthorized interception of data. The importance of the cybersecurity problem was emphasized by making legal regulations in the legislation of many countries around the world, including Poland, the United States, Russia and China, and on the basis of the provisions of state associations or international organizations, which is reflected in the relevant regulations of the European Union. The concept of cyber security is multi-faceted, becoming an object of interest not only to countries or organizations, but also to individual individuals living in given communities. The progressive digitization of many areas of life, regardless of the geographical location of the country, means that the need to ensure the proper and safe functioning of this sphere of reality determines the universality of cyber security.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 123-132
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Explication and Classification of Social Deviations on the Internet: Cyberdeviation as a New Social Phenomenon
Autorzy:
Mincewicz, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/22858345.pdf
Data publikacji:
2023-06-28
Wydawca:
Polskie Towarzystwo Socjologiczne
Tematy:
cyberdeviation
cybercrime
cyberspace
virtual community
netiquette
anomy
Opis:
The aim of the presented study is to conceptualize and regulate the meaning of the term social cyberdeviation. The analysis carried out in the first part was based on the etymological and inductive methods, as well as contextual analysis with the definitions of cross-border cybercrime. To achieve the aim of the work and indicate the contents of the concept, it turned out to be necessary to determine whether it is possible to indicate the existence of standards among the online virtual community that are recognized by most of its members. The nominal definition of cyberdeviation as a violation of the norms prevailing in the virtual community is the starting point for the second part of the article, the purpose of which is to classify activities that violate the norms in cyberspace. The gradation of behavior indicates that the situations on the Internet are: low-intensity activities that focus primarily on social norms, not legal norms; medium intensity, where the criterion is a violation of a legal norm; high intensity acts that are legally penalized nor accepted in the entire community, which clearly violate social norms.
Źródło:
Polish Sociological Review; 2023, 222, 2; 231-248
1231-1413
2657-4276
Pojawia się w:
Polish Sociological Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Challenges for Ukraine’s cyber security: National dimensions
Autorzy:
Katerynchuk, Pavlo
Powiązania:
https://bibliotekanauki.pl/articles/1041594.pdf
Data publikacji:
2019-12-30
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
cyberspace
cyber security
hacker attacks
information security
Opis:
The usage of information as a weapon in the foreign and domestic policies of Russia is not a new phenomenon. Still, the sophistication and intensity of it grow with each passing year. Recently the EU and USA have realized the powerful latent influence of Russian media and propaganda, including on electoral processes and the activities of State administration. They have realized that Russian disinformation poses a serious threat to the United States and its European allies, first and foremost with regard to Poland, the Baltic States and Ukraine. Moreover, unlike Soviet propaganda, the modern methods of the Russian information war do not rudely promote the agenda of the Kremlin. Instead, they aim to confuse, daze and divert citizens from supporting the EU and Ukraine. Russia seeks to undermine the support for European values; producing disarray among European allies in order to increase its influence. Ethnic, linguistic, regional, social and historical contradictions and stereotypes are used for this purpose. As current experience shows, Russian advocacy efforts in Europe make up an important part of their hybrid approach to the projection of force. Despite the fact that the crisis in Ukraine for the first time drew the attention of the West to the importance and real meaning of the information campaign in Russia, the Kremlin’s use of disinformation was launched long before the crisis. Russia carefully and purposefully prepared an information war against Ukraine.
Źródło:
Eastern Review; 2019, 8; 137-147
1427-9657
2451-2567
Pojawia się w:
Eastern Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Threats from cyberspace for civil aviation
Autorzy:
Leśnikowski, Władysław
Powiązania:
https://bibliotekanauki.pl/articles/2056495.pdf
Data publikacji:
2021
Wydawca:
Towarzystwo Wiedzy Obronnej
Tematy:
cyberspace
cyberattack
air terrorism
aviation security
prevention
Opis:
Digital transformation and mobility, which is what drives the revolution in aviation, they are also a challenge to ensure safety. Increasing automation means a greater risk of cyberattack. The author in the article below touches on the issues related to Cyberspace, characterizes it and shows the issues related to violation of civil aviation security by performing cyberattacks, drone attacks, and thus violating civil aviation security. Civil aviation is a specific user of highly advanced information technology and therefore requires special protection against unauthorized access (cyberattacks). This protection covers the entire aviation ecosystem, and in it; Air Traffic Control, aircraft (aviation industry), airports. In the whole process of civil aviation security, and in particular the prevention of cyberattacks and air terrorism, legislation plays a very important role. In recent decades we have witnessed various events that were a serious threat to the safety of air navigation. These situations gave impetus to search and creating new preventive systems ensuring a high level of security in international civil aviation transport.
Źródło:
Wiedza Obronna; 2021, 3; 124--153
0209-0031
2658-0829
Pojawia się w:
Wiedza Obronna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Dangers and Attacks on Digital Information in the Public Safety Space
Autorzy:
Grubicka, Joanna
Rogowski, Krzysztof
Diemientiew, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1808051.pdf
Data publikacji:
2020-01-27
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
threats of Internet crime
cyberspace
ICT systems
Opis:
The need for security is one of the most fundamental human needs. The scale of the threats posed by cybercrime to IT systems is large. It is mostly the result of the high vulnerability of IT systems to threats, the high risk of data theft, a very high occurrence of Internet frauds, the low efficiency of the systems protecting computers and networks, and an inadequately low level, as related to the existing threats, of security measures utilized by the users of IT systems. In this article, the authors discuss the underestimated problem of crime on the Internet and its nature in today’s reality.
Źródło:
Security Dimensions; 2019, 30(30); 66-95
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Dzien z życia Ziemi, czyli YouTube jako cyberkultura
A DAY FROM LIFE ON EARTH, OR YOUTUBE AS CYBERCULTURE
Autorzy:
Zaglewski, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/636979.pdf
Data publikacji:
2011
Wydawca:
Uniwersytet Jagielloński. Wydawnictwo Uniwersytetu Jagiellońskiego
Tematy:
CYBERCULTURE
CYBERSPACE
LIFE IN A DAY
YOUTUBE
Opis:
The article attempt to define YouTube's cyberculture by describing a model of its user and by showing the ways of participation in this particular cyberspace. Author starts his research by mentioning the rick roll strategy as one of the major practices of 'using' the YouTube content. However the main part of the article is concentrating on the efforts to reveal YouTube as a cyberculture thanks to the analysis of Life in a Day production and its reception. And so, one of the crucial theories that constitute YouTube as an individual medium is the one explored by Richard Grusin. Grusin's thesis about the re-mediated and pre-mediated aspects of new media helps to understand the main idea of YouTube as a socio- technical proposition as well as Jan van Dijk's characteristic of the new media offers like fragmentarization of the cultural texts or its constant visualization. By referring to the Life in a Day project, author of the article is able to point out the basic determinants of YouTube's cyberculture by describing it as an example of digitalized bedroom culture and snack culture (both terms links with a specific tradition of thinking about the media consumers and consumption itself).
Źródło:
Przegląd Kulturoznawczy; 2011, 1(9); 90-108
1895-975X
2084-3860
Pojawia się w:
Przegląd Kulturoznawczy
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberterroryzm – ewolucja czy rewolucja w sposobie działania współczesnych organizacji terrorystycznych
Cyberterrorism – the evolution or the revolution in modus operandi of the contemporary terrorist organizations
Autorzy:
Rychlica, Jacek
Powiązania:
https://bibliotekanauki.pl/articles/137038.pdf
Data publikacji:
2019
Wydawca:
Szkoła Główna Służby Pożarniczej
Tematy:
cyberprzestrzeń
cyberterroryzm
terroryzm
cyberspace
cybersecurity
cyberterrorism
terrorism
Opis:
Ostatnie trzy dekady zostały bez wątpienia zdominowane przez niezwykle szybki rozwój technik informacyjnych, które są obecne praktycznie wszędzie i wykorzystuje się je w niemal każdej sferze aktywności człowieka. Co więcej, przetwarzanie olbrzymich ilości informacji (ang. Big Data) jest obecnie niezbędne zarówno w polityce, jak i w szeroko rozumianym biznesie. Bez właściwego przetwarzania i przepływu tych informacji nie mogą poprawnie funkcjonować ani rożnego rodzaju media, ani wszelkiego typu instytucje, ani też inne − często krytyczne z punktu widzenia życia i zdrowia ludzi − systemy. Niestety, szybki postęp technologiczny wprowadza również wiele nowych zagrożeń, gdyż nowoczesne systemy mogą zostać wykorzystane zarówno do poprawy jakości życia obywateli, jak i przez rożnego rodzaju grupy przestępcze, organizacje terrorystyczne, a nawet nieformalne i/lub jawnie działające struktury o charakterze militarnym. W artykule dokonano próby oceny wpływu opisanych zmian na sposób i zakres działania współczesnych organizacji terrorystycznych.
The last three decades have undoubtedly been dominated by the unusually rapid development of information technologies, which today are present practically everywhere and are used in almost every sphere of human activity. What’s more, the processing of huge amounts of information (so-called Big Data) is now indispensable both in politics and in broadly understood business activities. It is not an exceptional knowledge that without the proper processing and the flow of such information, today there can not properly function both different types of media or all types of institutions, and no other systems, often critical from the point of view of human life and health. The rapid technological progress also introduces a number of new threats, as modern systems can be used to improve the quality of the human life as well as by the various types of criminal groups, terrorist organizations and even informal and/or legally operating military structures. This article attempts to assess the impact of the described changes on the manner and the scope of operation of the contemporary terrorist organizations.
Źródło:
Zeszyty Naukowe SGSP / Szkoła Główna Służby Pożarniczej; 2019, 1, 69; 197-220
0239-5223
Pojawia się w:
Zeszyty Naukowe SGSP / Szkoła Główna Służby Pożarniczej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mobbing And Cybermobbing: Risk Aspects Of (Digital) Communication In The Workplace And Possibilities Of Legislative And Non- Legislative Protection Under The Conditions Of The Slovak Republic
Autorzy:
Hladíková, Vladimíra
Powiązania:
https://bibliotekanauki.pl/articles/2150850.pdf
Data publikacji:
2020
Wydawca:
Univerzita sv. Cyrila a Metoda. Fakulta masmediálnej komunikácie
Tematy:
Mobbing
Cybermobbing
Legislation
Protection
Prevention
Employee
Cyberspace
Opis:
The paper deals with the issue of negative phenomena related to the field of communication in the workplace and has the character of an interdisciplinary study using knowledge from the theory of law, personnel management, psychology, theory of communication and media studies. The main aim of the paper is to examine the issue of communication in the workplace with a specific emphasis on mobbing and cybermobbing as negative aspects and consequences of this communication, and the legislative and non-legislative options for protection against them. In the paper, we present a reflection of the basic theoretical background and defining frameworks from various author's perspectives. In this paper, we focus on the origin of mobbing, its forms, and manifestations, as well as a brief description of cyberspace as a determinant for the transformation of mobbing into the virtual environment. The dominant part is the second section of the paper, where the current possibilities of legislative protection in the context of victims of mobbing and cybermobbing are identified regarding various manifestations and selected types of aggressive communication and behaviour.
Źródło:
Media Literacy and Academic Research; 2020, 3, 2; 88-108
2585-8726
Pojawia się w:
Media Literacy and Academic Research
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberspace as a source of dehumanization of the human being
Autorzy:
Pieczywok, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/13946801.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybersecurity
institutional threats
personal threats
risk
Opis:
The paper points to an important sphere of human safety, as it refers to cyberspace as an environment where information is exchanged via the net and computer systems. In addition to positive accents, cyberspace also creates various threats that lead to the dehumanization of life. The negative effects of being in cyberspace cause threats to mental, social and healthy lives. Very often they pose a danger not only to human health but also to human life. In addition to the introduction, the article includes characteristics of the loss of a sense of reality among people who use cyberspace excessively and the risks of medical hazards.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 40-47
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Poland’s Path to Building Cyber Capabilities
Autorzy:
Zdzikot, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/31341978.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Cyber capabilities
Armed Forces
Cybersecurity
Cyberspace
Cyberwarfare
Opis:
In October 2023, Poland hosted the next edition of the Cyber Commanders Forum, the world’s largest conference of military cyber commanders. For the first time, the Forum was hosted by the Polish Cyberspace Defense Forces Component Command. This is a recognition of the international community for Polish achievements, resources and capabilities. The article is a transcript of a speech delivered during the Forum, describing the Polish path to building cyber capabilities, framed in five key success factors.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 92-97
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Borders of Digital Network Freedom in Public Security Space
Autorzy:
Szczurek, Tadeusz
Grubicka, Joanna
Zbroszczyk, Dorota
Powiązania:
https://bibliotekanauki.pl/articles/1375027.pdf
Data publikacji:
2020
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
virtual reality
cyberspace
digital revolution
digital freedom
Opis:
In the era of common access to freedom on the Internet, there are more and more controversies between advocates of complete freedom and followers of the idea of limiting the usage of the global network’s resources. Should the Internet become a space of unlimited freedom? Contrary to common belief, the answer to such a question is not that obvious, although intuitively one would like to say yes. The Internet is basically an egalitarian tool of communication, a space of easy creation and transfer of content, for which the only limit is technology and unlimited human imagination. Freedom seems to be not only an immanent, but even a constitutive feature of the virtual space in which the Internet functions.
Źródło:
Internal Security; 2020, 12(1); 211-223
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Freedom of Network Society in a Social Security Space
Autorzy:
Grubicka, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/1807714.pdf
Data publikacji:
2020-11-30
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
virtual reality
cyberspace
digital revolution
digital freedom
Opis:
The purpose of this article is to reflect on what freedom of speech in the web is. In the age of universal freedom of access to the Internet, controversy is growing between supporters of full freedom and supporters of legal restrictions on the use of global Internet resources. Should the Internet be the space of unlimited freedom? Surprisingly enough, the answer to this question is not obvious, although intuitively one would like to answer in the affirmative. By definition, the Internet is an egalitarian tool of communication, a space for free creation and flow of content, for which the only limit is technology and human imagination, whose boundaries cannot be determined. The global network is a field completely unregulated and not bound by any rules. This situation is slowly changing and legislators and courts are beginning to set the boundaries of online proceedings. People posting content on the Internet must do so with precaution so as not to violate the limits of freedom of speech, especially in the field of broadly understood public security, crime, morality, public order, other people’s personal rights, and confidential information.
Źródło:
Security Dimensions; 2020, 34(34); 234-255
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybercrime on the Example of Selected Botnets
Autorzy:
Mazurczak, Przemysław
Powiązania:
https://bibliotekanauki.pl/articles/2020073.pdf
Data publikacji:
2021-09-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
cyber threats
botnet
computer network
cyberspace
cybersecurity
Opis:
The article presents threat analysis resulting from botnet activity on the Internet. Botnet networks are a very common tool among cybercriminals. They enable the acquisition of large amounts of data from computers infected with the virus that creates the given network entirely subordinated to its creator. Currently, many unidentified botnets are a threat to Internet users. Those identified and diagnosed answer the problem of how dangerous a botnet is in the hands of cybercriminals. The article presents statistics and analysis of selected botnets. Currently, there is a decline in the interest in botnets in cybercrime, although many new threats appear, suggesting that botnets will continue to be popular and are still a dangerous weapon in the hands of criminals.
Źródło:
Polish Political Science Yearbook; 2021, 3 (50); 53-65
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Activities for protection of young cyberspace users
Autorzy:
Nowicka, Julia
Zaroślak, Marta
Powiązania:
https://bibliotekanauki.pl/articles/2053206.pdf
Data publikacji:
2021
Wydawca:
Akademia Marynarki Wojennej. Wydział Dowodzenia i Operacji Morskich
Tematy:
threats
Internet
security
cyberspace
zagrożenia
bezpieczeństwo
cyberprzestrzeń
Opis:
The study indicates actions taken to ensure the safety of minor network users. Prophylactic activity and methods of reacting in the case of identification of perpetrators of prohibited acts are described. It was assumed that in the area of cybersecurity, avoiding threats concerns the educational space, hence information, education and social campaigns play an important role in contemporary social functioning. The study presents the formal and legal framework for the protection of cyberspace users, the functioning of which is determined, among others, by the Convention on the Rights of the Child, the Penal Code, the International Convention on Cybercrime, the Act on Counteracting Drug Addiction, Internet Management Forum, Safer Internet Centers, Scientific and Academic Computer Network. (NASK), Empowering Children Foundation and others. Examples of assumptions of selected social programs building a safe environment for the exchange of information on the Internet are presented.
Źródło:
Rocznik Bezpieczeństwa Morskiego; 2021, R. XV; 1-16
1898-3189
Pojawia się w:
Rocznik Bezpieczeństwa Morskiego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected security threats in cyberspace
Autorzy:
Chronowska, Emilia
Powiązania:
https://bibliotekanauki.pl/articles/2143013.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
threats
cyberspace
cyber threats
international law
Opis:
This article presents selected cybersecurity threats, identifies them, and points out their evolving nature. Cyberspace is a realm without defined geographic or political boundaries and is highly interactive. This article indicates the important role of cybersecurity in the context of building the information society and presents the most important legal regulations, both international and national, along with the indication of the proposed directions of changes at the national level, which would help to increase cybersecurity. The article emphasizes the importance of legislative and organizational regulations in the field of the addressed issues.
Źródło:
Cybersecurity and Law; 2022, 7, 1; 7-16
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
L’attitude, puis les arguments
Attitude first, arguments thereafter
Autorzy:
Pirogowska, Ewa
Powiązania:
https://bibliotekanauki.pl/articles/1048545.pdf
Data publikacji:
2017-09-15
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
cyberspace
logical fallacy
argumentative subversiveness
false causation
Opis:
The paper investigates the challenges posed by argumentation relying on a logical fallacy. The data has been obtained from a genuine interaction found in cyberspace. The aim of the study is to demonstrate that once a line of reasoning is arbitrarily imposed, a conversational schema emerges, even in spite of the fact that the messages are not consistently interlinked.
Źródło:
Studia Romanica Posnaniensia; 2017, 44, 3; 137-149
0137-2475
2084-4158
Pojawia się w:
Studia Romanica Posnaniensia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Międzynarodowe regulacje prawne dotyczące cyberprzestrzeni
Autorzy:
Wąsik, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/20311661.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cyber security
international law
international organizations
Opis:
This article aims to present the different approaches of countries around the world regarding the legal regulations of cyberspace. The creation of a unified legal system for cyberspace will be a difficult process due to major conflicts of interest. International organizations such as the EU and NATO, which bring together countries that have a similar vision of the world and how it should function, contribute to the unification of legal norms governing cyberspace in specific countries. On the other hand, vague initiatives of the world’s largest organization – the UN as well as the lack of implementation of newly adopted regulations by all member countries, unfortunately slow down the fight against cyberterrorism and cybercrimes that are transnational in nature. All countries around the world are increasing financial investment in improving information networks, creating new institutions to combat threats in the digital space and adapting laws to a dynamically changing world.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 133-155
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Niebezpieczeństwa wirtualizacji życia i wartości w cyberprzestrzeni
Dangers of virtualization of life and values in cyberspace
Autorzy:
Kaszuba, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/30109670.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Papieski Jana Pawła II w Krakowie
Tematy:
cyberprzestrzeń
zagrożenia w cyberprzestrzeni
wirtualizacja wartości
osoba
etyka mediów
cyberspace
dangers in cyberspace
values virtualization
person
media ethics
Opis:
Niebezpieczeństwa wirtualizacji życia i wartości w cyberprzestrzeni. W niniejszych badaniach chcemy zwrócić uwagę na to, jak cyberprzestrzeń wraz ze swoimi aplikacjami stała się generatorem procesów wirtualizacji i cyfryzacji społeczeństwa, tworząc nową jakość tej przestrzeni. Zanurzenie w przestrzeni cyfrowej nie jest procesem jednorodnym, ale raczej platformą wyrażającą wiele procesów i przemian. Zmiany te dotyczą prawie każdej sfery życia człowieka, sfery prywatnej i publicznej, kulturalnej, religijnej, wychowawczej, ekonomicznej, politycznej. W ślad za rozwojem technologii cyfrowych powinna iść zarówno teoretyczna, jak i praktyczna refleksja nad jej wpływem na człowieka, a także liczne badania dotyczące powszechnego zastosowania nowych relacji człowieka do rzeczywistości wirtualnej i cyberprzestrzeni. Analizy zostały przeprowadzone na podstawie dostępnej literatury przedmiotu, uzupełnionej artykułami dostępnymi w sieci.
Dangers of virtualization of life and values in cyberspace. In this study we would like to highlight how the cyberspace with its applications became the generator of virtualization processes and society digitization creating new value of this space. Embedding in cyberspace is not a homogeneous process but a platform which expresses a lot of processes and changes. These changes concern almost every sphere of life, public and private sphere, cultural, religious, educational, economic, political. In the wake of development of digital technologies there ought to be theoretical and practical reflection about its influence on human as well as numerous research concerning common application of new human relations to the virtual reality and cyberspace. Analysis is based on available related literature supplemented with web accessible articles.
Źródło:
Studia Socialia Cracoviensia; 2020, 12, 1; 49-72
2080-6604
Pojawia się w:
Studia Socialia Cracoviensia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Tożsamość człowieka w erze zapośredniczenia. Awatary w teatrze życia cyberrealnego
Personal Identity in the Era of Remote Living. Avatars in the Theatre of Cyberreal Life
Autorzy:
Kuczyński, Bartosz
Powiązania:
https://bibliotekanauki.pl/articles/31231901.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Avatar
Cyberspace
persönliche Identität
soziale Medien
avatar
cyberspace
personal identity
social media
awatar
cyberprzestrzeń
tożsamość osobowa
media społecznościowe
Opis:
Artykuł traktuje o kwestiach związanych z partycypacją człowieka w cyberprzestrzeni w kontekście zagadnienia tożsamości osobowej oraz wyzwań związanych z technologicznym zapośredniczeniem komunikacji. Horyzont badawczy wyznacza przy tym zagadnienie teatralności życia; akcent położony zostaje na znaczenie autoekspresji i autokreacji oraz wpływu otoczenia społecznego na jednostkę. Technologie cyfrowe stworzyły nowe warunki autoprezentacji, umożliwiając jednostkom kształtowanie ich tożsamości w bardziej zdecentralizowany i fragmentaryczny sposób. Omówione zostają takie aspekty cyfrowego uobecnienia, jak: warunki awataryzacji, relacja awatar–użytkownik oraz zapośredniczone środki ekspresji. Artykuł sugeruje, że jednym z głównych wyzwań, przed którymi stoją ludzie w świecie zapośredniczonym cyfrowo, jest utrzymanie spójnego poczucia siebie. Wymaga to przyjęcia bardziej zniuansowanych i wieloaspektowych ujęć tożsamości osobowej, które uwzględniają uwikłanie jednostki w relacyjność (z samą sobą, z jej awatarami oraz z innymi ludźmi).
Der Artikel befasst sich mit Fragen der Teilnahme des Menschen im Cyberspace im Zusammenhang mit der Frage nach der persönlichen Identität und den Herausforderungen, die sich durch die technologische Vermittlung von Kommunikation ergeben. Der Forschungshorizont wird durch die Frage nach der Theatralität des Lebens bestimmt; der Schwerpunkt liegt auf der Bedeutung des Selbstdarstellung und der Selbstgestaltung sowie auf dem Einfluss des sozialen Umfelds auf das Individuum. Die digitalen Technologien haben neue Bedingungen für die Selbstdarstellung geschaffen, die es dem Einzelnen ermöglichen, seine Identität auf stärker dezentralisierte und fragmentierte Weise zu gestalten. Es werden solche Aspekte der digitalen Präsenz wie die Bedingungen der Avatarisierung, die Avatar-Nutzer-Beziehung und die vermittelten Ausdrucksmittel besprochen. Der Artikel legt nahe, dass eine der größten Herausforderungen für Menschen in einer digital vermittelten Welt darin besteht, ein kohärentes Selbstbewusstsein zu bewahren. Dies erfordert eine Annahme von differenzierteren und facettenreicheren Ansätzen zur persönlichen Identität, die die Verstrickung eines Individuums mit der Relationalität (mit sich selbst, mit ihren Avataren und mit anderen Menschen) mit einbezieht.
The article deals with issues related to human participation in cyberspace in the context of the problem of personal identity and the challenges associated with remote forms of communication. The research perspective is based on the notion of the theatricality of life, in matters such as self-expression and self-creation as well as with regard to social coexistence. Digital technologies gave rise to new opportunities for self-representation, enabling individuals to shape their identities in more decentralized and fragmented ways. The article focuses on aspects of digital presence such as conditions of avatarization, the avatar-user relationship, and digital forms of self-expression. The article suggests that one of the main challenges people face in a digitally mediated world is to maintain a coherent sense of self. It requires embracing a more nuanced and multifaceted understanding of personal identity, which takes into account the individual’s entanglement in relationality (with oneself, with one's avatars, and with other people).
Źródło:
Kultura i Wartości; 2023, 35; 219-236
2299-7806
Pojawia się w:
Kultura i Wartości
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberprzestrzeń wyzwaniem dla działalności opiekuńczo-wychowawczej
Cyberspace as a challenge for childhood care and education
Autorzy:
Bednarek, Józef
Andrzejewska, Anna
Powiązania:
https://bibliotekanauki.pl/articles/893795.pdf
Data publikacji:
2018-03-07
Wydawca:
Akademia Pedagogiki Specjalnej im. Marii Grzegorzewskiej. Wydawnictwo APS
Tematy:
cyberprzestrzeń
nastolatkowie
wyzwania i zagrożenia cyberprzestrzeni
działalność opiekuńczo-wychowawcza
cyberspace
teenagers
cyberspace challenges and threats
childhood care and education
Opis:
Cyberprzestrzeń, podobnie jak światy wirtualne są nowym środowiskiem, tworzonym przez najnowsze media cyfrowe i technologie informacyjno-komunikacyjne. One też po raz pierwszy w historii świata i ewolucji człowieka, na niezwykłą skalę i z wielką dynamiką wzbogacają realną przestrzeń publiczną, a jednocześnie w olbrzymim tempie diametralnie zmieniają funkcjonowanie każdego człowieka, zwłaszcza młodego pokolenia. Ta nowa przestrzeń stanowi też niewątpliwie wiele wyzwań. Przedmiotem analiz w publikacji uczyniono następujące zagadnienia: 1. Cyberprzestrzeń a działalność opiekuńczo-wychowawcza 2. Fale rozwoju społeczno-informacyjnego oraz przemiany w edukacji i komunikacji 3. Aktywności nastolatków w sieci 4. Koncepcje teoretyczne przedmiotu analiz 5. Nowe szanse i tendencje rozwojowe kształcenia 6. Próba klasyfikacji nowych zagrożeń cyberprzestrzeni
Cyberspace as well as virtual worlds are a new environment created by state-of-the-art digital media and information and communication technologies. Also, for the first time in world history and human evolution, they enrich the real-world public sphere on an extraordinary scale and at an amazing speed, and at the same time dramatically change the functioning of all people, especially the young generation. Without any doubt, this new space presents many challenges as well. The paper analyzes the following issues: 1. Cyberspace versus childhood care and education. 2. Waves of social and information development and transformations in education and communication. 3. Teenagers’ activities on the Web. 4. Theoretical concepts of the subject being analyzed. 5. New developmental opportunities and trends in education. 6. Attempt to classify new cyberspace threats.
Źródło:
Problemy Opiekuńczo-Wychowawcze; 2018, 566(1); 3-11
0552-2188
Pojawia się w:
Problemy Opiekuńczo-Wychowawcze
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Strategic thinking about security in cyberspace
Autorzy:
Kozub, Marian
Mitręga, Adrian
Powiązania:
https://bibliotekanauki.pl/articles/2053193.pdf
Data publikacji:
2021
Wydawca:
Akademia Marynarki Wojennej. Wydział Dowodzenia i Operacji Morskich
Tematy:
strategic thinking
cybersecurity
cyberspace
myślenie strategiczne
cyberbezpieczeństwo
cyberprzestrzeń
Opis:
Since its emergence, cyberspace has been developing dynamically. It has become an information and communication sphere for billions of people, and thus plays an increasingly important role in our lives, as many political, economic, social and cultural activities now take place in virtual space. Nevertheless, with the widespread use of the Internet and people’s growing dependence on information and communication technologies, threats from cyberspace have become a significant factor directly related to social stability and national security. Protection against threats that have appeared in cyberspace has become an important issue for countries and international organisations, as consequences to a cyber-attack may be equally as serious as a military attack. Therefore, the aim of this article is to present the relationship between strategic thinking and security in cyberspace.
Źródło:
Rocznik Bezpieczeństwa Morskiego; 2021, XV; 1-28
1898-3189
Pojawia się w:
Rocznik Bezpieczeństwa Morskiego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberprzestrzeń w polskim dyskursie parlamentarnym
Autorzy:
Przyklenk, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/1036252.pdf
Data publikacji:
2020-11-20
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
discourse analysis
parliamentary discourse
conceptualization
discursive worldview
cyberspace
Opis:
The subject matter of the article is the conceptualization of cyberspace in the Polish parliamentary discourse. It was recognised as important to identify how representatives of legislature perceived cyberspace in 2001–2018. The source of analyses were texts excerpted from the Polish Parliamentary Corpus. In the research ethnolinguistic and cognitive linguistics approach (linguistic and discursive worldview) and diachronic linguistics approach were applied to establish fixed and variable elements of cyberspace conceptualization. The following components were identified as fixed: the perception of cyberspace in threat terms (legal and military contexts) and its definitional elusiveness. In turn, the transition from treating the studied phenomenon as a novelty to its empowerment may be seen as the main change here.
Źródło:
Forum Lingwistyczne; 2020, 7; 17-32
2449-9587
2450-2758
Pojawia się w:
Forum Lingwistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Tackling cyberspace threats – the international approach
Autorzy:
Pilarski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/576463.pdf
Data publikacji:
2016-09-23
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cyber defence
cybercrime
information communication
technology (ICT)
Opis:
The fact that NATO has acknowledged cyberspace as the fifth dimension of combat operations indicates that this problem issue is really topical and is pointing at the direction from which the possible threat can be expected. However, the issues of information communication technology (ICT) security on the national level have been tackled in numerous countries for many years. Technological advancement has resulted in making communication, and at the same time services rendered in cyberspace, an international domain. Thus, the aspects of cyberspace threats should be considered through the international prism. The above-presented approach has become an incentive for the author to take up research on international activities in terms of cyberspace defence and reaction to the already identified as well as future threats.
Źródło:
Security and Defence Quarterly; 2016, 12, 3; 100-117
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Disinformation in Cyberspace. Introduction to Discussion on Criminalisation Possibilities
Autorzy:
Ciesielski, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/31341996.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
disinformation
cyberspace
criminalisation
law
security systems
security studies
Opis:
Disinformation is a phenomenon that has always accompanied humankind. The objective of disinformation is not only to mislead specified addressees – social groups, interest groups, public opinion, or whole societies – but also to yield the expected results in the form of social response. Cyberspace, where all the weaknesses of the infosphere are converged, generating significant vulnerabilities to disinformation, has a growing influence on creating social circumstances. All the more so that, in cyberspace, we are dealing not only with the transfer of information decoded from computer data but also with reflecting, complementing and creating entirely new social interactions, social relationships and individual contacts. This paper aims to introduce readers to the analysis of social and legal conditions concerning the possibility of criminalising disinformation in cyberspace effectively. It outlines the general conceptual framework and places it in the social and legal dimensions. The research problem being addressed in this paper is as follows: How can instances of disinformation in cyberspace be identified in the context of criteria of a prohibited act?
Źródło:
Cybersecurity and Law; 2024, 11, 1; 185-199
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Rozwój e-urzędu na przykładzie Zakładu Ubezpieczeń Społecznych
Autorzy:
Uścińska, Gertruda
Powiązania:
https://bibliotekanauki.pl/articles/48552325.pdf
Data publikacji:
2023-01-23
Wydawca:
Uniwersytet Warszawski. Wydawnictwa Uniwersytetu Warszawskiego
Tematy:
e-administration
ZUS
e-projects
public administration
cyberspace
Opis:
The Social Insurance Institution (ZUS) is a leading office developing digital services for citizens and an important element of e-government in Poland. Its digital reforms are part of the process of building the e-government. For several years, ZUS has been implementing strategies and projects aimed at increasing customer satisfaction. It is possible thanks to the innovative solutions in customer service, as well as a transparency and efficiency in managing public funds. The implemented modern reforms brought measurable financial benefits and positive qualitative changes, which resulted in the improvement in the public opinion of the institution. The strategic plans of ZUS, including the “Strategy of the Social Insurance Institution for the years 2021–2025” and the “IT development strategy in ZUS for 2021–2025”, envisage the continuation of the direction of reforms and projects, mainly related to the expansion of the scope of application of modern IT solutions.
Źródło:
Studia Iuridica; 2022, 92; 367-383
0137-4346
Pojawia się w:
Studia Iuridica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Competition for High Politics in Cyberspace: Technological Conflicts Between China and the USA
Autorzy:
Val Sánchez, Karina Verónica
Akyesilmen, Nezir
Powiązania:
https://bibliotekanauki.pl/articles/2019117.pdf
Data publikacji:
2021-03-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
USA
China
militarization of cyberspace
Artificial Intelligence
cyberespionage
Opis:
This paper highlighted the use of cyberspace as a conflict zone by the US and China, focusing on competition in various technological spheres, including cyberespionage, military technology, and Artificial Intelligence (AI). The main purpose of this study was to depict how great powers manipulate the cyber domain for their high political objectives through US-China rivalry. The research has been carried out mainly via literature review, discourse analysis, and relevant statistics. Consistent with previous literature and global public perception, the outcome has shown that both states are using cyberspace as a new domain for completion in trade, technology, and military purposes. Cyberespionage, the militarization of cyberspace, and AI have been the main conflict areas between these two global competitors in the last decade.
Źródło:
Polish Political Science Yearbook; 2021, 1 (50); 43-69
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberprzestępczość wśród nieletnich – charakterystyka zjawiska, jego skala i przeciwdziałanie
Cybercrime Among Minors – Characteristics of the Phenomenon, Its Scale and Counteraction
Autorzy:
Czerski, Wojciech Marcin
Powiązania:
https://bibliotekanauki.pl/articles/2197593.pdf
Data publikacji:
2022-09-20
Wydawca:
Uniwersytet Rzeszowski
Tematy:
cyberprzestępczość
nieletni
zagrożenie
cyberprzestrzeń
cybercrime
minors
threat
cyberspace
Opis:
Współcześnie wiele osób, a zwłaszcza młodzi ludzie, nie wyobraża sobie już świata bez nowoczesnych technologii. Dzięki nim mogą bez wychodzenia z domu robić praktycznie wszystko na co mają ochotę (nawet działać nie do końca zgodnie z prawem). Jednakże to przywiązanie do cyfrowego świata niesie szereg zagrożeń. Dzieci i młodzież ze względu na swoje przywiązanie do urządzeń, relacji w sieci i często lekkomyślności mogą stać się łatwym celem przestępców w cyberprzestrzeni. Mogą oni również stać się sprawcami, a to za sprawą złudnej anonimowości w sieci. Z tego też względu autor podjął próbę głębszego spojrzenia na zjawisko cyberprzestępczości wśród nieletnich prezentując między innymi jego skalę.
Nowadays, especially young people, cannot imagine the world without modern technologies. Thanks to them they can do practically everything they want without leaving home (even things that are not entirely legal). However, this attachment to the digital world carries a number of risks. Children and young people, because of their attachment to devices, online relationships and often recklessness, can become easy targets for criminals in cyberspace. They may also become perpe-trators due to the illusory anonymity in the network. For this reason, the author has attempted to take a deeper look at the phenomenon of cybercrime among minors by presenting, among other things, its scale.
Źródło:
Dydaktyka informatyki; 2022, 17, 17; 11-18
2083-3156
2543-9847
Pojawia się w:
Dydaktyka informatyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Online Claims-Making: The NRA and Gun Advocacy in Cyberspace
Autorzy:
Maratea, R.J.
Powiązania:
https://bibliotekanauki.pl/articles/2107041.pdf
Data publikacji:
2015-04-30
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
Claims-Making
Activism
Internet
Online
Cyberspace
Gun Control
Opis:
This article examines the Internet’s emergent role in the claims-making process. My central premise is while Internet technology provides lay citizens with a mass mediated platform to distribute claims publically, power dynamics in the public sphere have remained relatively stable: Insiders and lobbyists continue to be powerful cultural voices; the press still functions as a cultural gatekeeper of newsworthiness; most people continue to have relatively little social authority; and the least powerful risk being completely left out of a digital society. Using the National Rifle Association (NRA) web presence as a case study, I describe the Internet as a vast collection of interconnected public cyber-arenas where problem claims are continuously disseminated, global communication is facilitated via online advocacy networks, and claimants utilize novel cyber-strategies to mobilize supporters. In doing so, I examine how cyber-arenas fundamentally differ from more static traditional claims-making arenas like television, radio, and print publication. I conclude by considering the extent to which historically powerful insider claims-making groups like the NRA are actually best positioned to succeed in a supposedly democratized new media world.
Źródło:
Qualitative Sociology Review; 2015, 11, 2; 144-159
1733-8077
Pojawia się w:
Qualitative Sociology Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The role of the Cybersecurity Strategy of the Republic of Poland in ensuring cybersecurity
Autorzy:
Karpiuk, Mirosław
Makuch, Anna
Soler, Urszula
Powiązania:
https://bibliotekanauki.pl/articles/22180772.pdf
Data publikacji:
2023-09-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
social security
cyberspace
cybersecurity
public security
cybersecurity strategy
Opis:
Cybersecurity belongs to the area of activity of state and supra-state actors, giving direction to national and international systems of law as components of national and supranational systems of political, economic, military cooperation, etc. Still, the state has a monopoly on the causality of lawmaking, which forms the basis of cyberspace use security activities. The state responds to national security needs by actively participating in the formation of the collective security order of the supranational level. The aim of this paper is to demonstrate the significance of the national Cybersecurity Strategy of the Republic of Poland for ensuring the safe use of cyberspace. The Strategy, while referring to the national order, is at the same time an implementation of supranational arrangements within the scopes adopted by the state authorities, which means that the Strategy is subjected to logical evaluation depending on the impact of cyber conditions or binding arrangements of the international environment. The text is based on two research methods: the doctrinal legal research method to analyse the applicable legal regulations governing the issues related to the strategic aspects of cybersecurity and the law theory method aimed at evaluating the strategic solutions in respect of security in cyberspace.
Źródło:
Polish Political Science Yearbook; 2023, 3(53); 155-163
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyfrowi tubylcy i cyfrowi imigranci. O społecznych wyzwaniach i zagrożeniach w cyberprzestrzeni
Autorzy:
Huczek, Katarzyna
Powiązania:
https://bibliotekanauki.pl/articles/20311603.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
digital exclusion
Internet
digital immigrants
digital natives
Opis:
Contemporary people live in a world where the line between the virtual and the real is blurring. Finding their way in a reality where the primary resource is information and access to it is becoming a challenge not only for digital natives – people for whom technology is a natural habitat, but also digital immigrants who are permanently learning to exist in cyber reality. The article presents the relationship between technology and human life with a special focus on the risks and challenges of functioning in cyberspace. The concept of digital natives and digital immigrants is also presented, as well as the essence of digital competence and digital exclusion as an element of social exclusion.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 414-429
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Service-oriented cyberspace for improving cybersecurity
Autorzy:
Krawczyk, Henryk
Powiązania:
https://bibliotekanauki.pl/articles/1955262.pdf
Data publikacji:
2022-02-04
Wydawca:
Politechnika Gdańska
Tematy:
cyberspace
key technologies
smart services
cybersecurity
policy and strategies
Opis:
The paper presents a cyberspace model where different categories of IT services are offered and used largely. A general cybersecurity policy is considered and the corresponding cybersecurity strategies are shown. The role of such technologies as: Internet of Things, Cloud Computing and Big Data is analyzed in order to improve the cybersecurity of a cyberspace. A new kind of service oriented cyberspace is proposed and its main properties are emphasized. Two simple examples of such cyberspaces are given and briefly discussed.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2019, 23, 2; 141-157
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Edukacyjna cyberprzestrzeń dla każdego
Educational cyberspace for everyone
Autorzy:
Janczyk, Janusz
Powiązania:
https://bibliotekanauki.pl/articles/446083.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Rzeszowski
Tematy:
cyberprzestrzeń
edukacja
kształcenie ustawiczne
Internet
cyberspace
education
continuing training
Opis:
Cyberprzestrzeń od swych początków była zorientowana na swych użytkowników. Pozwala-ła zaspokajać potrzeby komunikacyjne i informacyjne. Ważnym obszarem oddziaływania cyber-przestrzeni są jej możliwości edukacyjne. Każdy, kto ma dostęp do Internetu może z tych możli-wości korzystać, bez względu na płeć, wiek, czy wyznawane poglądy. Istotą prezentacji są te współczesne technologie i usługi dostępne w cyberprzestrzeni, które najbardziej są przydatne dla procesów kształcenia przez całe życie.
The cyberspace from its inception was oriented to users. It allows meet communication and in-formation needs. The important area of cyberspace influence are the educational possibilities. Everyone, who has access to the Internet, can benefit from these possibilities, regardless of gender, age, or presented views. The essence of the presentation are those available in the cyberspace modern technologies and services, which are most useful for the processes of lifelong learning.
Źródło:
Dydaktyka informatyki; 2013, 8; 95-105
2083-3156
Pojawia się w:
Dydaktyka informatyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
“Tango down. Some comments on the security of cyberspace of Republic of Poland
„Tango down”. Kilka uwag o bezpieczeństwie cyberprzestrzeni RP
Autorzy:
Lisiak-Felicka, D.
Szmit, M.
Powiązania:
https://bibliotekanauki.pl/articles/112989.pdf
Data publikacji:
2012
Wydawca:
STE GROUP
Tematy:
bezpieczeństwo
cyberprzestrzeń
ACTA
administracja publiczna
security
cyberspace
public administration
Opis:
W artykule przedstawione zostały wybrane zagadnienia dotyczące: terminologii związanej z bezpieczeństwem, systemów zarządzania bezpieczeństwem informacji, działań administracji państwowej w zakresie bezpieczeństwa „cyberprzestrzeni” oraz prac nad Rządowym Programem Ochrony Cyberprzestrzeni Rzeczypospolitej Polskiej. Zaprezentowano również harmonogram ataków na serwisy rządowe po podpisaniu porozumienia ACTA (ang. Anti-Counterfeiting Trade Agreement) oraz zwrócono uwagę na przykłady nieprofesjonalnych zachowań urzędników administracji państwowej po wystąpieniu ataków hakerskich.
Źródło:
Systemy Wspomagania w Inżynierii Produkcji; 2012, 1 (1); 133-145
2391-9361
Pojawia się w:
Systemy Wspomagania w Inżynierii Produkcji
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Figurative and visual transformation of personality in the Internet space
Autorzy:
Bagayeva, Elissa
Powiązania:
https://bibliotekanauki.pl/articles/2121414.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Virtual identity
Self-presentation
social networks
Cyberspace
Manipulative media
Opis:
The relevance of the study is due to the fact that the influence of the Internet and media resources is growing and there is a tendency to develop virtual personalities that have little to do with reality and show the features of an antisocial person. In this regard, this article is aimed at identifying aspects and characteristics of a network personality that is influenced by modern media resources. The leading methods of studying this problem are methods of analysis, deduction and classification, which will help to recognize the most basic aspects of the figurative-visual transformation of a person on the Internet, show the results of the influence of social networks on a person and demonstrate the changes that a person is exposed to in the Internet space. The article reveals and substantiates the features and aspects that are distinctive for an individual in the Internet society, negative and positive characteristics of Internet users. The author substantiates the daily interactivity of social media. Also, the most relevant and influential forms of network interaction are shown and the frequency of their use is analysed. The materials of the article are of practical value for students, teenagers, youth, parents, future teachers who should know the aspect of the manifestation of personality transformation in the Internet space.
Źródło:
Polish Psychological Bulletin; 2022, 53, 1; 40-46
0079-2993
Pojawia się w:
Polish Psychological Bulletin
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Technological Expansion of Sociability: Virtual Communities as Imagined Communities
Autorzy:
Grădinaru, Camelia
Powiązania:
https://bibliotekanauki.pl/articles/1036730.pdf
Data publikacji:
2016
Wydawca:
Academicus. International Scientific Journal publishing house
Tematy:
virtual community
imagined community
online communication
cyberspace
online sociability
Opis:
The reception of Benedict Anderson’s ideas was very fruitful in many disciplines, and his work provided key concepts that can now throw a clarifying light in some blurry matters. The expression “imagined community” has known a remarkable proliferation, a situation that led to both the formation of a research direction and to the perpetuation of a cliché. In this respect, my article pointed out some suggestive characteristics of virtual communities, explaining why the imagined community is a valuable subject for the theorists of new media. The impossibility to know in person all the members of a big community is just one factor that determines its imagined face. Moreover, the set of values and inner presuppositions that guide the members are important bricks in the construction of community. In my opinion, the virtual community is imagined as a multi-layered experience (technological, conversational, relational etc.). The dynamic of a virtual community contains the tension amongst these layers and the degree of its imagined side depends on multiple factors. In order to illustrate these aspects, I gave a brief example by analysing a Romanian virtual community, using the triad common language – temporality – high centers. In spite of its limitations, the perspectives offered by this concept are still useful for understanding the nature of online communities. Thus, the imagined community is a valuable set of beliefs and practices that underlie and bolster the effective meaning and functioning of the virtual communities.
Źródło:
Academicus International Scientific Journal; 2016, 14; 181-190
2079-3715
2309-1088
Pojawia się w:
Academicus International Scientific Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected models of information warfare in cyberspace
Autorzy:
Bielawski, Radosław
Radomska, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/576343.pdf
Data publikacji:
2017-03-21
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
information models
national security
military system
critical
infrastructure
Opis:
One form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the action is subordinated to the antagonistic side of the other. It leads to the achievement of political objectives and is aimed at overthrowing the systems of the state responsible for the state of its security. It is important that this condition is at a high, or at least acceptable, level. To ensure this level, it is important to define cybersecurity fighting models that are adequate for the threats and to determine their impact on the level of national security risk in cyberspace. Literature on the subject contains many models of cyberwarfare information that have been shaped in recent years. However, there is no assessment of the adequacy of these models for the risks and risks associated with national security threats. It should be noted that information security itself, as part of national security, is variable. New threats are emerging and, at a very high rate and with high activity in cyberspace, they are capable of destabilising the security of key state administration bodies, military facilities and other important state– run infrastructures. It should be emphasised that existing cyberspace fighting information models are not universal and cannot be used for any type of threat to national security. They need to find, organise and evaluate those that would be the most appropriate not only for national security threats but also for geopolitical determinants. Assumptions for the research and its results are a noticeable increase in the number of cyberattacks, some of which are important from the point of view of national security – the military system and critical infrastructure elements of the state. The following subject of the research was adopted in the article – models of information fight, related to threats to national security coming from / to cyberspace. The purpose of scientific research is to define models of information combat and to determine the suitability and evaluation of these models for the purpose of evaluating the risks of national security threats. Identifying the subject and objectives of the research led to a general research question: What appropriate models of information fight in cyberspace can be defined and used for the risks of national security threats? The research method applied theoretical methods (analysis, synthesis, generalisation, abstraction, inference, analogy and comparison) as well as the empirical method of dialogue and the method of participant observation.
Źródło:
Security and Defence Quarterly; 2017, 14, 1; 35-50
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
CYBERTERRORYZM ,,KONIEM TROJAŃSKIM” W DOBIE GLOBALIZACJI
CYBERTERRORISM ”TROJAN HORSE” IN THE ERA OF GLOBALIZATION
Autorzy:
MAZURKIEWICZ, Bartosz
Powiązania:
https://bibliotekanauki.pl/articles/909448.pdf
Data publikacji:
2019-06-27
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
cyberterrorism
terrorism
cyberspace
globaliza tion
cri t ical infrastructure
Opis:
The aim of the article is the general characterization of cyberterrorism as a new and constantly evolving form of terrorism. The phenomenon was described in the context of globalization processes and the main definitions of terrorism were cited, followed by the specific factors determining cyberterrorism. The article was based on an analysis of source documents – legislation on terrorism prevention and cyberspace protection. Definitions review was performed. The results of earlier research related to the topic of work are quoted. It has been assessed that in the future the threat of cyber-attacks will be a challenge for states and international organizations. The development of modern technologies and the creation of computerized societies is a factor that provides new areas of action for terrorists. Potential targets of attacks are varied and difficult to protect. Preventive actions should be characterized by a comprehensive approach to the problem and systemic, long-term action in the international sphere.
Źródło:
Historia@Teoria; 2018, 1, 7; 234-247
2450-8047
Pojawia się w:
Historia@Teoria
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
THE CYBER THREATS AND THEIR TRENDS IN SECURITY MANAGEMENT
Autorzy:
Josef, Požár,
Milan, Kný,
Powiązania:
https://bibliotekanauki.pl/articles/891466.pdf
Data publikacji:
2018-08-13
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
Security management
cyberspace
cyber threats and trends
critical infrastructure
Opis:
Target processes of institutions management (from the enterprise, through the administration, to the alliances) are dependent on the provision and reliability of information and knowledge. Total digitization and “cybernation” of most of the processes require durability and protection against attacks and incidents of a new type. To anticipate timely the new risks is more difficult than to react flexibly to new socially pathological and criminal attacks. Reactive approach can’t avoid the initial losses, but this approach is pragmatic. The paper deals with some cyber threats and trends of attacks in an environment of the security management of the organization.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2016, 23; 228-239
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberprzestrzeń a bezpieczeństwo dzieci w świetle rozwiązań Organizacji Narodów Zjednoczonych oraz Rady Europy
Cyberspace and child safety in the light of the solutions of the United Nations and the Council of Europe
Autorzy:
Maciejczuk, Mateusz
Wnorowski, Konrad
Olchanowski, Mateusz
Powiązania:
https://bibliotekanauki.pl/articles/1418505.pdf
Data publikacji:
2018-09-25
Wydawca:
Państwowa Uczelnia Zawodowa we Włocławku
Tematy:
bezpieczeństwo
dzieci
cyberprzestrzeń
cyberbezpieczeństwo
security
children
cyberspace
cyber security
Opis:
Niniejszy artykuł stanowi początek rozważań na temat bezpieczeństwa dzieci w cyberprzestrzeni. W pierwszej kolejności rozważania poświęcone zostały pojęciu używanym w tytule, tj. „bezpieczeństwo”, „dzieci” oraz „cyberprzestrzeń”. W związku z brakiem jednolitych definicji legalnych wyżej wymienionych terminów dokonano analizy aktów prawnych oraz doktryny w tym zakresie. W dalszej kolejności przedstawiono korelację pomiędzy cyberbezpieczeństwem dzieci oraz prawem i stawianymi, w tym kontekście, przed nim zadaniami. Kolejnym elementem analizy stały się osiągnięcia Organizacji Narodów Zjednoczonych oraz Rady Europy dotyczące bezpieczeństwa dzieci w cyberprzestrzeni. Warto podkreślić, iż autorzy starali się wskazać na ewolucję pojmowania zagadnienia oraz efekty podejmowanych działań w sferach: prawnej i faktycznej. Przy każdej okazji wskazywano na skutki poszczególnych aktywności ONZ oraz Rady Europy.
This article launches a reflection on children safety in cyberspace. In the first place, consideration is given to the concept used in the title, i.e. 'security', 'children' and 'cyberspace'. Owing to the absence of any uniform definitions of the legal terms mentioned above, legal acts and doctrines in this area have been analyzed. Next, the correlation between the child cyber security-- the law and its challenges has been presented. Another element of the analysis is the achievements of the United Nations and the Council of Europe on the safety of children in cyberspace. It is worth to emphasize that the authors tried to point out the evolution of the understanding of the issue and the effects of the actions taken in the legal and factual spheres. On each occasion the effects of particular activities of the UN and the Council of Europe were pointed out.
Źródło:
Zeszyty Naukowe Zbliżenia Cywilizacyjne; 2018, 14, 3; 10-34
1896-4087
Pojawia się w:
Zeszyty Naukowe Zbliżenia Cywilizacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Contemporary threats related to content processing in the cyberspace
Autorzy:
Martyniak, Kamil
Szydłowski, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/2033080.pdf
Data publikacji:
2019-04-30
Wydawca:
Wyższa Szkoła Finansów i Prawa w Bielsku-Białej
Tematy:
cyberspace
the law
the Internet
computer crimes
information
cybersecurity
Opis:
The Internet, as a social medium has a wide spectrum of applications. In general, the cyberspace serves as a provider of services, a commercial platform and the arena of social networking. On one hand, the Internet offers unlimited possibilities with respect to the access to all sources of information but, on the other hand, it can generate a series of threats to the established social and legal order. The threats may pertain to systems, data security, computer programs, users' privacy and intellectual property. Although the problem is important socially as well as politically, until recently the Polish literature on the subject did not address the issue of counteracting and punishing offences related to electronic data processing widely enough. The motivation behind this paper was recent social discourse on the free flow of information on the Internet and the multiplicity of controversies accompanying this topic.
Źródło:
Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej; 2019, 1; 20-24
2084-1809
Pojawia się w:
Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hnutie Anonymous a informačná bezpečnosť
Annonymous and information security
Autorzy:
Rozemberg, Peter
Powiązania:
https://bibliotekanauki.pl/articles/1933872.pdf
Data publikacji:
2018-10-02
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
Anonymous
informačná bezpečnosť
kyberpriestor
etika
information security
cyberspace
ethics
Opis:
Anonymous by sme mohli označiť za hnutie, aktivistov, spoločenstvo či myšlienku. Nemajú žiadneho vodcu, žiadnu štruktúru no aj napriek tomu v nedávnej minulosti ovplyvnili rozhodnutia tisícov ľudí po celom svete. Média ich často označujú aj za hackerov, pretože najväčšiu pozornosť vzbudzujú práve svojimi útokmi, ktorými bojujú predovšetkým za slobodu internetu alebo proti rôznym spoločenským javom. Hnutie samo o sebe tvoria okrem hackerov aj ľudia, ktorí buď zdieľajú myšlienky hnutia alebo pomocou rôznych programov atakujú a vypínajú servery organizácií, inštitúcií, vlád či webstránky rôznych bezpečnostných zložiek ako FBI či CIA.
Anonymous could call movement, activists, community or idea. They have no leader, no structure, yet have in the past influenced the decisions of thousands of people around the world. Media is often referred to as hackers, because the greatest attention they raise is their attacks, which are mainly fighting for freedom of the Internet or against various social phenomena. In addition to hackers, the movement itself creates, in addition to hackers, people who either share ideas of movement or use various programs to attack and shut down the servers of organizations, institutions, governments, or websites of various security agencies such as the FBI or the CIA.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2018, 30; 210-244
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity in Hungary and Poland. Military aspects
Autorzy:
Bencsik, András
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/13946892.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
armed forces
the Minister of National Defence
Opis:
Nowadays, ensuring cybersecurity is an important objective of public authority. It must take into account the protection of cybersecurity, both in the current and future perspectives. The state security policy must also take into account its dimension in cyberspace, especially today, where many services are provided through communication and information systems. A special place in the cybersecurity system is given to cyberspace security in the military dimension. In this regard, both the military administration and civil law entities, both acting for defence, will be competent. Effective military operations are directly linked to new digital technologies. As a result, for the sake of state security (both internal and external), it becomes necessary not only to respond to cyberattacks, but also to counteract them.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 82-94
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Türkey’s Cybersecurity Policy Framework
Autorzy:
Liszkowska, Dominika
Powiązania:
https://bibliotekanauki.pl/articles/31341977.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Türkiye
cybersecurity
Türkiye’s cybersecurity policy
cyberspace
security
Policy
Opis:
The Internet and cyberspace are a gradually developing structure. Every second, new devices, systems and users connect within the network, which causes constant growth and changes in the sphere of threats arising from cyberspace. Türkiye is one of the countries in the world most exposed to cyber threats. However, one of its goals was to bring the field of cybersecurity to an international level. The aim of this article is to present the framework of Türkiye’s cybersecurity policy and answer the following questions: What steps have been taken in Türkiye to protect the state and society against the effects of threats in cyberspace? In which areas has Türkiye achieved significant progress in cyberspace protection, and which are still the biggest challenges?
Źródło:
Cybersecurity and Law; 2024, 11, 1; 79-91
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybereducation and its Possibilities in the Context of Legal and Social Responsibility
Autorzy:
Pieczywok, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/31342004.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybersecurity
cybereducation
cyber lessons
legal responsibility
social relations
Opis:
Despite the rapid development of IT security systems, the number of crimes committed in cyberspace continues to rise. The adverse effects of being in cyberspace cause threats to mental, social and health life. Therefore, raising citizens’ awareness of cybercrime is essential. The article addresses the benefits and threats associated with legal responsibility in the context of combating cybercrime. Understanding the mechanisms for, among others, assessing security is the first step towards making rational decisions online. With the increasing risk of attacks that take advantage of imperfections in the human mind, it is the human factor that plays a decisive role in cybersecurity. Cybereducation uses theories of education and also impacts the quality of learning. It is not possible to deliver it effectively without digital resources. Besides legal responsibility, social and psychological relations, and theories of education, the author devotes much attention to modern information and communication technologies. He clearly outlines the introduction and characterises the most important concepts regarding cybereducation, pointing out legal responsibility and web threats, as well as the quality of education with the use of digital resources.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 213-226
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Functional Model of Local Government Units Based on Ensuring the Appropriate Level of Cybersecurity
Autorzy:
Romaniuk, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/31342005.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
local government unit
cyberspace
cybersecurity
public administration
technology
information
Opis:
The article characterises the elements of a model for shaping the conditions for the proper functioning of local government units, which is based on ensuring an acceptable level of cybersecurity. In the practice space, there is a correlation between local government units and cyberspace, thus also cybersecurity. The functioning of local government in different environmental conditions involves visible benefits for its actors as well as many potential threats – all the more so, as even larger self-governments, equipped with greater financial and human resources, cannot avoid them. The dangers involved, which are increasing every year, result in a growing number of various incidents, which is a test for local governments in building appropriate security platforms and models.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 140-150
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Information society in the context of threats to personal security in cyberspace
Autorzy:
Grubicka, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/1933077.pdf
Data publikacji:
2019
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
virtual reality
cyberspace
virtual communities
digital freedom
personal security in cyberspace
rzeczywistość wirtualna
cyberprzestrzeń
społeczności wirtualne
wolność cyfrowa
bezpieczeństwo osobiste w cyberprzestrzeni
Opis:
Significant problems associated with the development and transformation of mass media, which quickly began their expansion in cyberspace, have become one of the most important areas of human life. The author drew attention to the issues of the development of cyberspace whose specific characteristics further the development of cybermedia. She presented selected issues related to cybermedia, the impact they can play in the information society that develops relatively quickly, as well as the threats they pose to personnel security. This article aims to show human threats in the online social space in the context of personal security in cyberspace on the example of pathological behaviour in online communication based on ‘pathostreaming’.
Źródło:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska; 2019, 141; 95-113
1641-3466
Pojawia się w:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Being John Malkovich and the Philosophy of Cyberspace Addiction
Autorzy:
Szczypa, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1804549.pdf
Data publikacji:
2019-10-24
Wydawca:
Katolicki Uniwersytet Lubelski Jana Pawła II. Towarzystwo Naukowe KUL
Tematy:
cyberprzestrzeń; uzależnienie od cyberprzestrzeni; cyberkultura; Spike Jonze; film; Być jak John Malkovich
cyberspace; cyberspace addiction; cyberculture; Spike Jonze; film; Being John Malkovich
Opis:
Być jak John Malkovich i filozofia uzależnienia od cyberprzestrzeni Niniejszy artykuł omawia możliwy przykład symbolicznej interakcji cyberprzestrzeni z przestrzenią rzeczywistą. Jego tematem jest analiza fabuły filmu Spike’a Jonze’a Być jak John Malkovich (oryg. Being John Malkovich) z 1999 roku, a przedstawiona teza dotyczy możliwości interpretacji filmu jako filozoficznej alegorii uzależnienia od cyberprzestrzeni. Analiza filmu skupia się na jego głównych bohaterach oraz różnych formach ich relacji z tytułowym Johnem Malkovichem, który stanowi w filmie uosobienie cyberprzestrzeni.
The present article discusses a possible instance of a symbolic interaction between cyberspace and real-life space, analysing the plot of Spike Jonze’s 1999 film Being John Malkovich, and arguing that it may be interpreted as a philosophical account of an addiction to cyberspace. The analysis focuses on the main characters of the film, discussing various forms of their relationship to John Malkovich, who, as it is claimed, personifies cyberspace in the film.
Źródło:
Roczniki Humanistyczne; 2018, 66, 11; 165-180
0035-7707
Pojawia się w:
Roczniki Humanistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The appearance of cyberspace in the Russian military operation in the light of the Russian-Georgian war in 2008
Autorzy:
Fekete, Csanád
Sipos, Zoltán
Powiązania:
https://bibliotekanauki.pl/articles/98618.pdf
Data publikacji:
2018
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
Russian-Georgian war in 2008
information warfare
cyberspace
information operations
cyberspace operations
wojna rosyjsko-gruzińska w 2008 r.
wojna informacyjna
cyberprzestrzeń
operacje informacyjne
Opis:
The goal of the monograph is to introduce the characteristics and development of the Russian concepts in regards to the informational warfare through the incidences of the Russian-Georgian war in 2008. According to most authors this war can be considered the first armed conflict of the history where in order to achieve certain goals - parallel to the military operations - invasive activities were carried out in the cyberspace (Hollis, 2011). For the purposes of understanding the subject closer we found it of particular importance to review shortly how the information operations arrived in the Russian military strategy and ideas in the years prior to the war. In our opinion it’s practical to start the investigation with the Russian experts’ conception of the nineties in the information operations category that got affected significantly by the political and military changes of the era. In the second part of the script we were looking for a response as how far the information and cyberspace operations parallel to the military operations contributed to achieve the political and strategic goals set during the war. At the end we present shortly how the conflict contributed to the appreciation of the information operations and to the modernization program of the Russian armed forces.
Źródło:
Przegląd Nauk o Obronności; 2018, 3, 6; 1-18
2450-6869
Pojawia się w:
Przegląd Nauk o Obronności
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies