Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Cyber" wg kryterium: Temat


Tytuł:
Artificial Intelligence in Military Operations – Experiences and Challenges. The British Perspective
Autorzy:
Eble, Keith
Powiązania:
https://bibliotekanauki.pl/articles/31341990.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Artificial Intelligence
Cyber
British
army
military operations
Opis:
This article touches on the issue of understanding and approach to the use of AI by the British army from the perspective of a representative of the British armed forces. The article will address the issues of tripartite division as to the essence of the problem today. This article was an excellent part of the author’s speech delivered during the international conference 2023 Warsaw Cyber Summit.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 98-104
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber Security as A Research Subject: Quantitative and Qualitative Analysis of Data in Scopus Database Covering in 2020–2024
Autorzy:
Włodyka, Ewa Maria
Powiązania:
https://bibliotekanauki.pl/articles/31342026.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber security
public administration
e-government
analysis
Opis:
Modern society is increasingly reliant on digital technologies, thus bringing with it not only opportunities but also threats. This is particularly relevant for the area of the public sector, which by definition serves citizens. This particularity is consists in citizens frequently optionally rather than obligatory entrusting their data via ICT systems. In this context, cyber security is becoming a key research area, and this research is essential for understanding and effectively responding to increasingly complex cyber threats. This study aims to conduct a quantitative and qualitative analysis (within a selected range) of cyber security data for the period of 2020–2024 for the data published in the Scopus repository database.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 131-145
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber Security of Electrical Grids – A Contribution to Research
Autorzy:
Włodyka, Ewa Maria
Kaczmarek, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/31342016.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
electrical grids
public administration
cyber security
critical infrastructure
Opis:
The state’s critical infrastructure involves those elements that function independently yet are interconnected. It is also affected by ICT networks that exist in other states. These interdependencies make critical infrastructure particularly vulnerable to cyber attacks. At the same time, it is electrical grids that constitute the most crucial element of critical infrastructure. The research hypothesis assumes an urgent need to comprehensively address the cyber security policy of electrical grids in a broader perspective, not only the technical one but also taking into account public policies and the human factor. Quantitative and qualitative methods, literature survey and the desk research method were employed in order to verify this hypothesis. The analyses carried out by the Authors indicated unequivocally that electrical grids constitute an element of the critical infrastructure that is the most vulnerable to cyber threats.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 260-272
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybereducation and its Possibilities in the Context of Legal and Social Responsibility
Autorzy:
Pieczywok, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/31342004.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybersecurity
cybereducation
cyber lessons
legal responsibility
social relations
Opis:
Despite the rapid development of IT security systems, the number of crimes committed in cyberspace continues to rise. The adverse effects of being in cyberspace cause threats to mental, social and health life. Therefore, raising citizens’ awareness of cybercrime is essential. The article addresses the benefits and threats associated with legal responsibility in the context of combating cybercrime. Understanding the mechanisms for, among others, assessing security is the first step towards making rational decisions online. With the increasing risk of attacks that take advantage of imperfections in the human mind, it is the human factor that plays a decisive role in cybersecurity. Cybereducation uses theories of education and also impacts the quality of learning. It is not possible to deliver it effectively without digital resources. Besides legal responsibility, social and psychological relations, and theories of education, the author devotes much attention to modern information and communication technologies. He clearly outlines the introduction and characterises the most important concepts regarding cybereducation, pointing out legal responsibility and web threats, as well as the quality of education with the use of digital resources.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 213-226
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity of E-government
Autorzy:
Bencsik, András
Karpiuk, Mirosław
Strizzolo, Nicola
Powiązania:
https://bibliotekanauki.pl/articles/31342025.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
e-government
cyber threats
cybersecurity
Opis:
Modern administration often uses ICT systems to deliver public services, which must be adequately secured. Public administration bodies must, therefore, also include cybersecurity in their policies. E-services should be the standard. Unfortunately, this standard does not always apply in administration. New technologies in a digital state and information society must be widely used, including by public bodies, so that the quality and accessibility of the services provided meet social needs. The public administration is responsible for continuously developing computerisation, making it possible to function normally in cyberspace where citizens have long been present.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 146-160
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mitigating Cyber Risk in Personal Finance of the Elderly. Insights into Vulnerabilities, Cyber Hygiene and the Role of Personal Cyber Insurance
Autorzy:
Strupczewski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/31342006.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyber risk
cyber threats to the elderly
cyber hygiene
personal cyber insurance
Opis:
The paper investigates the growing cyber threats to personal finance, faced by the elderly in the digital age. It begins by acknowledging the surge in cyber incidents, particularly impacting seniors amid their increasing engagement in the digital space. The research explores the theoretical background of individual attitudes towards cybersecurity, emphasizing the unique vulnerabilities of the elderly population and their heightened susceptibility to cyber threats. It offers practical recommendations for personal cyber hygiene. Moreover, it introduces personal cyber insurance (PCI) and discusses its advantages and challenges. As the main contribution to the body of knowledge, the study provides a comprehensive understanding of the specific challenges faced by the elderly in the digital realm. It offers practical strategies for risk mitigation and introduces PCI as a means of enhancing resilience. It also sets the groundwork for further exploration and targeted strategies to protect individuals, especially older adults, in the dynamic landscape of cybersecurity.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 281-298
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nordic Countries in the Face of Digital Threats
Autorzy:
Kaczmarek, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/31342009.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Nordic cooperation
cyber threats
digital skills
DDoS (Distributed Denial of Service)
Opis:
Technological advances and the digital revolution have caused much of social activity to move online. The Internet has become a tool without which it is difficult to imagine the functioning of modern states. However, it is also some of conflicts between states that have moved online, and states with the highest degree of digitization, which include the Nordic states, have become a target of attacks by other states or organizations. In this article, the Author will attempt to answer the question of how the Nordic states and their societies defend themselves against cyber threats. The characteristics of the attacks carried out against them and the levels of digitization of the societies will also be compared.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 151-161
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Poland’s Path to Building Cyber Capabilities
Autorzy:
Zdzikot, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/31341978.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Cyber capabilities
Armed Forces
Cybersecurity
Cyberspace
Cyberwarfare
Opis:
In October 2023, Poland hosted the next edition of the Cyber Commanders Forum, the world’s largest conference of military cyber commanders. For the first time, the Forum was hosted by the Polish Cyberspace Defense Forces Component Command. This is a recognition of the international community for Polish achievements, resources and capabilities. The article is a transcript of a speech delivered during the Forum, describing the Polish path to building cyber capabilities, framed in five key success factors.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 92-97
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Digital as Sacred Space: Exploring the Online Religious Dimension.
Autorzy:
Battista, Daniele
Powiązania:
https://bibliotekanauki.pl/articles/23587439.pdf
Data publikacji:
2024-01-02
Wydawca:
Academicus. International Scientific Journal publishing house
Tematy:
social media
digitisation
social religion
religious influencers
cyber-religiosity
Opis:
In the current context where digitization permeates all aspects of everyday life, the religious world is not immune to the influences associated with technological aspects. In recent years, a space has emerged on the internet where a collective faith is recognized, even through electronic means, bringing together individuals into a community that takes on the characteristics of a sacred place. This raises new questions about the concept of sacredness itself in relation to digitization, as this process has opened up the possibility of new forms of communicating the sacred through electronic means, transforming the very concept of the sacred into a digital dimension. The use of virtual environments or digital tools to spread a religious message has given space to creative figures who experiment with innovative language within the religious traditions. In this scenario, research has emerged aimed at understanding the multiple aspects and meanings of this new sacred experience. The objective is to analyze how these religious traditions adapt to and appropriate the digital dimension, exploring the dynamics of interaction between the sacred and the digital, as well as the theological, cultural, and social implications that arise from it. Through the exploration of these themes, this article aims to explain how digitization has redefined traditional concepts such as sacred place and how religious practice has evolved in the digital age. The goal is to offer a perspective on the transformation of the sacred in the digital context, exploring tensions between tradition and innovation, authenticity and fragmentation, participation, and distance in the contemporary religious sphere. This article aims to provide an understanding of how the digital has redefined the concept of sacredness, opening new horizons and challenges for religion in this new era.
Źródło:
Academicus International Scientific Journal; 2024, 15, 29; 21-37
2079-3715
2309-1088
Pojawia się w:
Academicus International Scientific Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Digital Future of Information. Determinants of the Use of Open Source Intelligence
Autorzy:
Lipińska, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/31341998.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
OSINT
hacktivism
hybrid warfare
disinformation
cyber security
data analytics
internet blocking
Opis:
Cyberspace as a place of information acquisition is in constant flux. Recognizing the threats and challenges associated with it is one of the key elements influencing national security. Knowledge of the current conditions affecting information security and the possibility of obtaining information is an essential element of the work of the institutions forming the state security system. This article will outline the factors affecting the future of information operation and distribution in the digital world confirming the increased need for OSINT in state institutions, especially in the face of new challenges. These include: hacktivism, the dissemination of specialized tools and technologies for data acquisition and analysis among the network user community, hybrid and diplomatic-propaganda activities carried out in the info-sphere by nation states. The article will also provide a forecast of the development of cyberspace in the context of future OSINT activities.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 271-280
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The idea of smart city in the perspective of the development of the capitals of the Visegrad Group countries
Autorzy:
Górka, Marek
Powiązania:
https://bibliotekanauki.pl/articles/31343419.pdf
Data publikacji:
2024-03-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
smart city
Agenda 2030
Visegrad Group
cyber technology
innovation
Opis:
The objective of this study is to analyze the implementation and utilization of information and communication technologies (ICT) in the development of Smart Cities by the authorities of the V4 capitals. This research examines the smart city concept in the context of the development strategies of the V4 capitals. The study utilizes quantitative and qualitative methods to assess the potential of each city and conducts a comparative analysis of strategic documents related to the smart city concept. The article initiates by examining the changing dynamics of public space management in light of the increasing significance of cybertechnology. The subsequent section highlights the key points outlined in the Agenda 2030 document. This is followed by an effort to conceptualize the smart city concept and an explanation for investigating the development of the V4 capitals. The subsequent portion of the article delves into the perception of economic and social development, drawing from the security and cybersecurity strategies of each V4 country. The cases of each country are then analyzed based on selected factors that define their technological potential. The analysis aims to identify the predominant aspects pertaining to the utilization of ICT within the Smart City concept in the V4 capitals. The comparative analysis will reveal commonalities, disparities, strengths, and areas that require further development in each capital. The insights derived from this research prove vital for effective urban management. They facilitate an enhanced understanding of the interconnectedness between various economic and social resources and allow for the systematization of assumptions, visions, and underlying concepts related to urban space management. This, in turn, assists in identifying the factors that influence comprehensive engagement in smart city initiatives.
Źródło:
Nowa Polityka Wschodnia; 2024, 1(40); 86-113
2084-3291
Pojawia się w:
Nowa Polityka Wschodnia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Vulnerability to Cyber Threats: A Qualitative Analysis From Societal and Institutional Perspectives
Autorzy:
Kaczmarek, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/31342040.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
digital society
technological progress
vulnerability to cyber threats
security of institutions
Opis:
With the rapid development of ICT and the shifting of much of social activity online, countering cyber threats has become a challenge both for individuals and governments. The research hypothesis is that the number and type of cyber attacks are directly related to an individual’s vulnerability to cyber threats. In order to verify this hypothesis, quantitative and qualitative methods, literature survey and the desk research method were used. The analyses conducted by the Author explicitly indicated that what is the weakest element in a cyber security system is the human factor. At the same time, it is fatigue and routine that are the worst enemies, even for a cyber security professional. One way to increase the level of security is to assume that every time a network service is used, it may carry the risk of a cyber attack with consequences that are difficult to predict. This allows for vigilance even in everyday activities that require access to the network.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 106-116
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zagrożenia w obszarze bezpieczeństwa informacji i ochrony danych osobowych a rola Inspektora Ochrony Danych w tym zakresie
Threats in the area of security information and personal data protection and the role of Data Protection Officer in this regard
Autorzy:
Janik, Marcin
Hady-Głowiak, Stanisław
Powiązania:
https://bibliotekanauki.pl/articles/29519339.pdf
Data publikacji:
2024-01-16
Wydawca:
Uniwersytet Opolski
Tematy:
bezpieczeństwo informacji
cyberbezpieczeństwo
Inspektor Ochrony Danych
ochrona danych osobowych
incydent
Information security
cyber security
Data Protection Officer
personal data protection
incident
Opis:
W artykule przedstawiono zagadnienia dotyczące aktualnych zagrożeń w obszarze bezpieczeństwa informacji i ochrony danych osobowych oraz działań zapobiegawczych w tym zakresie. Mając powyższe na uwadze w artykule omówione zostały aktualne rozwiązania systemowe i prawne oraz rola doradcza i monitorująca Inspektora ochrony danych w instytucji w przedmiotowym zakresie.
The article presents issues related to current threats in the area of security information and personal data protection as well as preventive measures in this area. With the above in mind, the article discusses the current system and legal solutions as well as the advisory and monitoring role of Data Protection Officer in the institution in this respect.
Źródło:
Opolskie Studia Administracyjno-Prawne; 2023, 21, 2; 119-140
2658-1922
Pojawia się w:
Opolskie Studia Administracyjno-Prawne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Concept of an SME Focused Edge Computing Self-managing Cyber-physical System
Autorzy:
Stadnicka, Dorota
Bonci, Andrea
Longhi, Sauro
Pirani, Massimiliano
Dec, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/24200520.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
cyber-physical system
information communication
knowledge management
edge computing
e-kanban
Opis:
The dynamically changing environment forces companies to introduce changes in production processes and the need for employees to adapt quickly to new tasks. Therefore, it is expected to implement solutions to support employees. The system that will manage the work on a manufacturing line should work in real time to support the ongoing activities and, to be implemented in SMEs, must not be expensive. The authors identified important system components and expected functionalities. The methodology of the work is based on humancentered design. A concept of a cyber-physical system is proposed. The aim of the proposed edge computing-based system is to manage the work on the manufacturing line in which certain elements communicate with each other to achieve common goals. The paper presents what the system can consist of, how information and knowledge are managed in the system, and what can be the benefits for enterprises from its implementation.
Źródło:
Management and Production Engineering Review; 2023, 14, 3; 3--15
2080-8208
2082-1344
Pojawia się w:
Management and Production Engineering Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Concept of V2G Battery Charging Station as the Implementation of IoT and Cyber Physical Network System
Autorzy:
Nasir, Muhammad
Safitri, Nelly
Rachmawati, Yassir
Arhami, Muhammad
Powiązania:
https://bibliotekanauki.pl/articles/27311964.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
IoT
cyber physical network
V2G
EV
SoC
charging station
Opis:
The integration of the internet of things (IoT) and cyber physical network into the battery charging station system is critical to the success and long-term viability of the vehicle to grid (V2G) trend for future automobiles in terms of environmental and energy sustainability. The goal of this article is to create a V2G battery charging station concept using the internet of things (IoT) and a cyber physical network system. The V2G charging station concept was developed with the idea that every charging electric vehicle (EV) can communicate and coordinate with the charging station's control center, which includes a cyber physical system that addresses privacy and security concerns. The communication protocol must also be considered by the charging station. The preliminary test has been taken into consideration. Normal hours (for case one), peak hours (for case two), and valley hours (for case three), respectively, were created as charging circumstances for EVs at charging stations. Simulations were run for each of the three case scenarios. Each EV's battery state of charge (SoC) is provided a 50 percent initial charge and user-defined SoC restrictions. The MATLAB/SIMULINK platform was used to run the case simulations. The grid frequency, charging station output power, and the EV's battery SoC were all observed during the 24- hour simulation. As a result, the developed V2G charging station concept can regulate its input and output power depending on the battery status of the EVs inside the charging station, as well as provide frequency regulation service to the grid while meeting the energy demand of EV customers.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 2; 269--273
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies