The role of the Cybersecurity Strategy of the Republic of Poland in ensuring cybersecurity

  • Author: Mirosław Karpiuk
  • Institution: University of Warmia and Mazury in Olsztyn (Poland)
  • ORCID: https://orcid.org/0000-0001-7012-8999
  • Author: Anna Makuch
  • Institution: University of Economics and Human Sciences in Warsaw (Poland)
  • ORCID: https://orcid.org/0000-0002-5222-4407
  • Author: Urszula Soler
  • Institution: The John Paul II Catholic University of Lublin (Poland)
  • ORCID: https://orcid.org/0000-0001-7868-8261
  • Year of publication: 2023
  • Source: Show
  • Pages: 61-69
  • DOI Address: https://doi.org/10.15804/ppsy202383
  • PDF: ppsy/52/ppsy202383.pdf

Cybersecurity belongs to the area of activity of state and supra-state actors, giving direction to national and international systems of law as components of national and supranational systems of political, economic, military cooperation, etc. Still, the state has a monopoly on the causality of lawmaking, which forms the basis of cyberspace use security activities. The state responds to national security needs by actively participating in the formation of the collective security order of the supranational level. The aim of this paper is to demonstrate the significance of the national Cybersecurity Strategy of the Republic of Poland for ensuring the safe use of cyberspace. The Strategy, while referring to the national order, is at the same time an implementation of supranational arrangements within the scopes adopted by the state authorities, which means that the Strategy is subjected to logical evaluation depending on the impact of cyber conditions or binding arrangements of the international environment. The text is based on two research methods: the doctrinal legal research method to analyse the applicable legal regulations governing the issues related to the strategic aspects of cybersecurity and the law theory method aimed at evaluating the strategic solutions in respect of security in cyberspace.

REFERENCES:

  • Castells, M. (2013). Władza informacji, transl. W. Jedliński, P. Tomanek, PWN.
  • Chałubińska-Jentkiewicz, K. (2019). Cyberbezpieczeństwo – zagadnienia definicyjne. Cybersecurity and Law, 2(2), 7–23. DOI: 10.35467/cal/133828
  • Czuryk, M. (2019). Supporting the development of telecommunications services and networks through local and regional government bodies, and cybersecurity. Cybersecurity and Law, 2(2), 39–50. DOI: 10.35467/cal/133839
  • Czuryk, M. (2022a). Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues. Studia Iuridica Lublinensia, 31(3), 31–43. DOI: 10.17951/sil.2022.31.3.31-43
  • Czuryk, M. (2022b). Special rules of remuneration for individuals performing cybersecurity tasks. Cybersecurity and Law, 8(2), 105–112. DOI: 10.35467/cal/157128
  • Dobrzycki W (2004)., Historia stosunków międzynarodowych w czasach nowożytnych, Scholar.
  • Karpiuk, M. (2021a). Cybersecurity as an element in the planning activities of public administration. Cybersecurity and Law, 5(1), 45–52. DOI: 10.35467/cal/142179
  • Karpiuk, M. (2021b). The Organisation of the National System of Cybersecurity: Selected Issues. Studia Iuridica Lublinensia, 30(2), 233–244. DOI: 10.17951/sil.2021.30.2.233-244
  • Karpiuk, M. (2022a). Crisis management vs. cyber threats. Sicurezza, Terrorismo e Societa, 16(2), 113–123.
  • Karpiuk, M. (2022b). The Protection of State Security in Cyberspace as a Justifying Ground for Restricting Constitutional Freedoms and Rights. Przegląd Prawa Konstytucyjnego, 67(3), 401–412. DOI: 0.15804/ ppk.2022.03.30
  • Karpiuk, M., Kelemen, M. (2022). Cybersecurity in civil aviation in Poland and Slovakia. Cybersecurity and Law, 8(2), 70–83. DOI: 10.35467/cal/157125
  • Kostrubiec, J. (2022). Cybersecurity System in Poland. Selected Issues. In: M. Karpiuk, J. Kostrubiec (Eds.), The Public Dimension of Cybersecurity (pp. 7–17). Maribor: LEX Localis Press. DOI: 10.4335/2022.1.
  • Makuch A. (2020). Twitter jako narzędzie współczesnej dyplomacji – miejsce nowych mediów w procesie kształtowania ładu międzynarodowego, Karpacki Przegląd Naukowy, 3-4(34), 13–27.
  • Skrzypek A. (2009). Historia społeczna Europy XIX i XX wieku, Wydawnictwo Poznańskie.
  • Soler, U. (2022). Social perception of 5G technology. Rocznik Instytutu Europy Środkowej i Wschodniej, 20(2022), 103–120.
  • Szczęsna A. Nadzór nad podmiotami kluczowymi i ważnymi w dyrektywie NIS 2. https://cyberpolicy.nask. pl/nadzor-nad-podmiotami-kluczowymi-i-waznymi-w-dyrektywie-nis2/
  • Wrzosek M. Dyrektywa NIS, czyli pierwsze europejskie prawo w zakresie cyberbezpieczeństwa. https://cyberpolicy.nask.pl/dyrektywa-nis-czyli-pierwsze-europejskie-prawo-w-zakresie-cyberbezpieczenstwa/

cybersecurity strategy cyberspace social security public security cybersecurity

Message to:

 

 

© 2017 Adam Marszałek Publishing House. All rights reserved.

Projekt i wykonanie Pollyart