Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyberspace law" wg kryterium: Temat


Tytuł:
Four Areas of Cybersecurity – Discussion of the Subject Area
Autorzy:
STALMACH, SŁAWOMIR
Powiązania:
https://bibliotekanauki.pl/articles/1798598.pdf
Data publikacji:
2021-07-15
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
cybersecurity
cyberspace
cyberspace law
Internet
media
artificial intelligence
Opis:
The article briefl y discusses four areas that should be considered when analysing the concept of cybersecurity: the legal aspect of cyberspace, the state security system, the specifi city of the media in the Internet environment, and last but not least – new virtual reality emerging in cyberspace. In the context of cybersecurity, all of these research areas have to be considered together.
Źródło:
Przegląd Policyjny; 2021, 141(1); 108-120
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Prawne dylematy regulacji cyberprzestrzeni: konflikt pomiędzy bezpieczeństwem narodowym a prawem do prywatności z perspektywy prawodawstwa UE iUSA
Autorzy:
Rojszczak, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/624760.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
right to privacy, national security, human rights, cyberspace, international law
prawo do prywatności, bezpieczeństwo narodowe, prawa człowieka, cyberprzestrzeń, prawo międzynarodowe
Opis:
The model of protection of privacy in cyberspace implemented in the European Union is widely recognized as the most sophisticated, both in terms of protection of data subjects’ rights and consistency of obligations imposed on data processors. The current regulations – including the broadly discussed new general data protection regulation – are the results of more than twenty years of evolution, initiated by the EC in 1990 by submitting projects of the first Community regulations. Information security professionals point on the issue of inevitable collision of EU regulations with the regulations applied by one of its main trade partners – the United States. The US laws, including constitutional norms, lead to significantly different level of privacy protection. The most noticeable difference is the scope of permissible interference from the public authorities, taking the form of extensive electronic surveillance programs. Programs of this type are oriented on collecting bulk data, including – inevitably – also information about EU citizens. Mass surveillance raises serious constitutional objections in many European countries, and its conduct has also become one of the reasons for the invalidation of the Safe Harbor program by the CJEU. This program was the main method of transferring personal data from the EU to US-based processors. The incompatibility of EU and US laws regarding the different relations between right to privacy and national security is a practical and current problem in building mutual relations. Cyberspace has no boundaries, so this problem has an additional dimension – related to the attempt to determine to what extent territorial standards can be effectively applied in the supranational space. The purpose of the article is to present considerations regarding the potential conflict between rights of the individuals and national security objectives, together with the presentation of the most important EU and US laws in this area and with explanation of the causes of their mutual incompatibility.
Unijny model ochrony prywatności jest powszechnie uznawany za najbardziej rozbudowany i kompleksowy, zarówno pod względem zakresu ochrony praw osób, których dane dotyczą, jak i spójności obowiązków nałożonych na podmioty zobowiązane. Coraz wyraźniej dostrzegalna jest jednak niespójność unijnych przepisów z regulacjami stosowanymi przez Stany Zjednoczone Ameryki, a więc jednego z głównych partnerów handlowych UE. Zarówno amerykańskie przepisy federalne, jak i normy konstytucyjne nie wprowadzają równie silnego reżimu w zakresie ochrony prywatności. Co więcej, prawodawca amerykański inaczej wyważa znaczenie ochrony praw podstawowych z uwagi na potrzeby związane z zapewnieniem bezpieczeństwa narodowego. Niezgodność przepisów UE i USA dotyczących różnych relacji między prawem do prywatności a celami bezpieczeństwa ogólnego jest praktycznym i aktualnym problemem w budowaniu partnerstwa transatlantyckiego. Celem artykułu jest przedstawienie rozważań dotyczących potencjalnego konfliktu między prawami jednostek a celami bezpieczeństwa narodowego, wraz z przedstawieniem najważniejszych przepisów UE i USA w tej dziedzinie oraz wyjaśnieniem przyczyn ich wzajemnej niezgodności.
Źródło:
Teka Komisji Politologii i Stosunków Międzynarodowych; 2018, 13, 2
1896-8279
Pojawia się w:
Teka Komisji Politologii i Stosunków Międzynarodowych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Cybersecurity Strategy of the Republic of Poland as a Source of Internal Law
Autorzy:
Karpiuk, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/31342044.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
cyberspace
internal law
Opis:
Cybersecurity as a subject of regulation can be found in a number of legal acts, both generally applicable and internal. This type of regulation is also found in the Cybersecurity Strategy of the Republic of Poland. The Strategy, however, as an act of internal law, has limited power. It does not influence external entities and, therefore, cannot form grounds for individual decisions relating to citizens, entrepreneurs, and other entities. Its primary objective of increasing the level of resilience to cyberthreats should be a priority for the state policy.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 234-245
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nowe oblicze komunikacji. Wybrane aspekty prawne i etyczne rozpowszechniania treści w cyberprzestrzeni
Autorzy:
Różycka, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/667317.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Jagielloński. Wydawnictwo Uniwersytetu Jagiellońskiego
Tematy:
cyberspace
convergence
law
media
Opis:
It can be regarded as we have a problem with the application of its provisions to the content present in the network in terms of law because regulations on media infiltrate boundaries – so, and the media themselves. Polish law is not adapted to the changing technology reality. And it is not only the universal use of social media. Traditional media also taking into account the convergence process are present in the network. The purpose of this publication is to analyze certain aspects of legal regulations concerning the distribution of content in cyberspace – on the basis of the law in Poland the media. To demonstrate that self-regulation in the area of electronic media has the great advantage that it can go in a relatively short distance for the development of “new” media. In contrast, new, precise regulations in the matter of electronic media are difficult to be implemented in a short time.
Źródło:
Zarządzanie Mediami; 2015, 3, 2; 107-120
2353-5938
Pojawia się w:
Zarządzanie Mediami
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Can mouse clicking be seen as involvement in armed conflict? Some notes on the direct participation in hostilities in cyberspace
Can mouse clicking be seen as involvement in armed conflict? Some notes on the direct participation in hostilities in cyberspace
Autorzy:
Lewandowski, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/684880.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
Humanitarian law
armed conflicts
cyberspace
Opis:
Contemporary armed conflicts are increasingly based on new technologies. These technologies enable to conduct hostilities from a distance, often eliminate the human factor from the battlefield. Nowadays, cyberspace created by the Internet allows to frame the idea of armed conflict outside the traditional recognition of the fight between belligerent armed forces. This article addresses issues of the direct participation of hostilities in cyberspace. In the first part it discusses technological development and its impact on the activation of the civil factor during armed conflicts. In the second part by analysing the current practice of cyber conflicts it refers to the concept of direct participation in hostilities and its constituent elements as a threshold of harm, direct causation, belligerent nexus at the cybernetic level. The third and final part examines the possibility of the loss of protection, in particular, it addresses the issues related to its temporal nature and the question of means and methods of attacking civilians involved in cyber warfare.
Źródło:
Adam Mickiewicz University Law Review; 2013, 2; 195-204
2450-0976
Pojawia się w:
Adam Mickiewicz University Law Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wokół definicji cyberbezpieczeństwa
Autorzy:
Żywucka-Kozłowska, Elżbieta
Dziembowski, Robert
Powiązania:
https://bibliotekanauki.pl/articles/20311663.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
security
law
digitization
directive
European Union
Opis:
The concept of cyber security has become part of the reality of the late 20th and 21st centuries. This term is understood as a system that blocks threats consisting in destroying, changing and unauthorized interception of data. The importance of the cybersecurity problem was emphasized by making legal regulations in the legislation of many countries around the world, including Poland, the United States, Russia and China, and on the basis of the provisions of state associations or international organizations, which is reflected in the relevant regulations of the European Union. The concept of cyber security is multi-faceted, becoming an object of interest not only to countries or organizations, but also to individual individuals living in given communities. The progressive digitization of many areas of life, regardless of the geographical location of the country, means that the need to ensure the proper and safe functioning of this sphere of reality determines the universality of cyber security.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 123-132
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected security threats in cyberspace
Autorzy:
Chronowska, Emilia
Powiązania:
https://bibliotekanauki.pl/articles/2143013.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
threats
cyberspace
cyber threats
international law
Opis:
This article presents selected cybersecurity threats, identifies them, and points out their evolving nature. Cyberspace is a realm without defined geographic or political boundaries and is highly interactive. This article indicates the important role of cybersecurity in the context of building the information society and presents the most important legal regulations, both international and national, along with the indication of the proposed directions of changes at the national level, which would help to increase cybersecurity. The article emphasizes the importance of legislative and organizational regulations in the field of the addressed issues.
Źródło:
Cybersecurity and Law; 2022, 7, 1; 7-16
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Międzynarodowe regulacje prawne dotyczące cyberprzestrzeni
Autorzy:
Wąsik, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/20311661.pdf
Data publikacji:
2023-10-31
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cyber security
international law
international organizations
Opis:
This article aims to present the different approaches of countries around the world regarding the legal regulations of cyberspace. The creation of a unified legal system for cyberspace will be a difficult process due to major conflicts of interest. International organizations such as the EU and NATO, which bring together countries that have a similar vision of the world and how it should function, contribute to the unification of legal norms governing cyberspace in specific countries. On the other hand, vague initiatives of the world’s largest organization – the UN as well as the lack of implementation of newly adopted regulations by all member countries, unfortunately slow down the fight against cyberterrorism and cybercrimes that are transnational in nature. All countries around the world are increasing financial investment in improving information networks, creating new institutions to combat threats in the digital space and adapting laws to a dynamically changing world.
Źródło:
Cybersecurity and Law; 2023, 10, 2; 133-155
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Disinformation in Cyberspace. Introduction to Discussion on Criminalisation Possibilities
Autorzy:
Ciesielski, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/31341996.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
disinformation
cyberspace
criminalisation
law
security systems
security studies
Opis:
Disinformation is a phenomenon that has always accompanied humankind. The objective of disinformation is not only to mislead specified addressees – social groups, interest groups, public opinion, or whole societies – but also to yield the expected results in the form of social response. Cyberspace, where all the weaknesses of the infosphere are converged, generating significant vulnerabilities to disinformation, has a growing influence on creating social circumstances. All the more so that, in cyberspace, we are dealing not only with the transfer of information decoded from computer data but also with reflecting, complementing and creating entirely new social interactions, social relationships and individual contacts. This paper aims to introduce readers to the analysis of social and legal conditions concerning the possibility of criminalising disinformation in cyberspace effectively. It outlines the general conceptual framework and places it in the social and legal dimensions. The research problem being addressed in this paper is as follows: How can instances of disinformation in cyberspace be identified in the context of criteria of a prohibited act?
Źródło:
Cybersecurity and Law; 2024, 11, 1; 185-199
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Contemporary threats related to content processing in the cyberspace
Autorzy:
Martyniak, Kamil
Szydłowski, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/2033080.pdf
Data publikacji:
2019-04-30
Wydawca:
Wyższa Szkoła Finansów i Prawa w Bielsku-Białej
Tematy:
cyberspace
the law
the Internet
computer crimes
information
cybersecurity
Opis:
The Internet, as a social medium has a wide spectrum of applications. In general, the cyberspace serves as a provider of services, a commercial platform and the arena of social networking. On one hand, the Internet offers unlimited possibilities with respect to the access to all sources of information but, on the other hand, it can generate a series of threats to the established social and legal order. The threats may pertain to systems, data security, computer programs, users' privacy and intellectual property. Although the problem is important socially as well as politically, until recently the Polish literature on the subject did not address the issue of counteracting and punishing offences related to electronic data processing widely enough. The motivation behind this paper was recent social discourse on the free flow of information on the Internet and the multiplicity of controversies accompanying this topic.
Źródło:
Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej; 2019, 1; 20-24
2084-1809
Pojawia się w:
Zeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies