• facebook

Punktacja czasopism naukowych Wydawnictwa Adam Marszałek według wykazu czasopism naukowych i recenzowanych materiałów z konferencji międzynarodowych, ogłoszonego przez Ministra Edukacji i Nauki 17 lipca 2023 r.

Scoring of scientific journals of Wydawnictwo Adam Marszałek according to the list of scientific journals and reviewed materials from international conferences, announced by the Minister of Education and Science on July 17, 2023.


  • Athenaeum. Polskie Studia Politologiczne – 100 pts
  • Edukacja Międzykulturowa – 100 pts
  • Historia Slavorum Occidentis – 100 pts
  • Polish Political Science Yearbook – 100 pts
  • Przegląd Prawa Konstytucyjnego – 100 pts
  • The New Educational Review – 100 pts
  • Art of the Orient – 70 pts
  • Italica Wratislaviensia – 70 pts
  • Nowa Polityka Wschodnia – 70 pts
  • Polish Biographical Studies – 70 pts
  • Azja-Pacyfik - 40 pts
  • Krakowskie Studia Małopolskie – 40 pts
  • Kultura i Edukacja – 40 pts
  • Reality of Politics - 40 pts
  • Studia Orientalne – 40 pts
  • Sztuka Ameryki Łacińskiej – 40 pts
  • Annales Collegii Nobilium Opolienses – 20 pts
  • Cywilizacja i Polityka – 20 pts
  • Defence Science Review - 20 pts
  • Pomiędzy. Polsko-Ukraińskie Studia Interdyscyplinarne – 20 pts
  • African Journal of Economics, Politics and Social Studies - 0 pts
  • Copernicus Political and Legal Studies - 0 pts
  • Copernicus. Czasy Nowożytne i Współczesne - 0 pts
  • Copernicus. De Musica - 0 pts
  • Viae Educationis. Studies of Education and Didactics - 0 pts

Journals

New journals

Co-published journals

Past journals

Coloquia Communia

Coloquia Communia

Paedagogia Christiana

Paedagogia Christiana

The Copernicus Journal of Political Studies

The Copernicus Journal of Political Studies

The Peculiarity of Man

The Peculiarity of Man

Czasopisma Marszalek.com.pl

Central and Eastern European Countries under Cyberthreats

  • Author: Joanna Świątkowska
  • Institution: Pedagogical University of Kraków (Poland)
  • Year of publication: 2017
  • Source: Show
  • Pages: 30-39
  • DOI Address: http://dx.doi.org/10.15804/ppsy2017102
  • PDF: ppsy/46-1/ppsy2017102.pdf

The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this issue from the perspective of Central and Eastern European Countries. It argues that this form of hostile actions will be increasingly utilized in the region. The main assumption, following Alvin Toffler’s theory, is that “information” – as an increasingly important element of modern societies and as their strategic resource – also serves as a significant tool of modern conflicts. Since information is nowadays strongly related to new technologies, mainly the aspects connected to cybersecurity are analysed. The article looks closer at different aspects of cyberthreats and explains their possible consequences. It may serve as good material for further research and recommendations on countermeasures that may increase security in Europe. 

Wybrane aspekty definicyjne cyberterroryzmu i ich znaczenie w perspektywie polityki bezpieczeństwa

  • Author: Marek Górka
  • Institution: Politechnika Koszalińska
  • Year of publication: 2017
  • Source: Show
  • Pages: 295-315
  • DOI Address: https://doi.org/10.5604/cip201718
  • PDF: cip/15/cip1518.pdf

Cyberterroryzm stwarza poważne i szybko rozwijające się zagrożenia dla społeczeństwa oraz infrastruktury krytycznej państwa. Fakt ten wywołuje istotne zmiany w zakresie zapobiegania oraz zwalczania terroryzmu. Cyfrowy świat, w którym żyje społeczeństwo zapewnia szerokie możliwości dla cyberprzestępczości, ponieważ inicjuje i zachęca do wykorzystania ukrytych możliwości Internetu. Cyberterroryzm jest rodzajem przestępstwa, który jest skierowany przeciwko państwu i jego obywatelom. Obecnie sieci komputerowe są zagrożone i codziennie atakowane z powodu m.in. niezdolności do utrzymania dynamicznego rozwoju usług internetowych oraz szeroko dostępnych narzędzi i technik hakerskich. Jest to najbardziej trudne wyzwanie w walce cyberterroryzmem. Jednak sam termin jest często niewłaściwie wykorzystywany i nadużywany. Zrozumienie niebezpieczeństwa cyberterroryzmu musi zaczynać się od klarownego określenia jego definicji.

System Elektronicznych Ksiąg Wieczystych, a cyberataki. Zagrożenia i możliwe skutki

  • Author: Szymon Stach
  • Institution: aplikant radcowski przy Okręgowej Izbie Radców Prawnych w Poznaniu, doktorant na Wydziale Prawa SWPS Uniwersytetu Humanistycznospołecznego w Warszawie
  • Year of publication: 2018
  • Source: Show
  • Pages: 172-185
  • DOI Address: https://doi.org/10.15804/tpn2018.1.10
  • PDF: tpn/13/TPN2018110.pdf

This article discusses the issue of the significance of property rights in the Polish legal order in the context of the digitization of the main state registers and possible consequences of attacks on them. Technological progress makes it possible to transfer registers from a traditional paper form to a digital form. This process has also been performed in the area of Land and Mortgage Registers. Due to the above, every Internet user, who knows the number of the Land and Mortgage Register, is able to verify its legal status. There are real material values related to the data in the Electronic Land and Mortgage Registers. The above may cause that, like banking systems, also the system of the Electronic Land and Mortgage Registers, may become subject to attacks by cybercriminals. This article considers the possible effects of such actions and possibilities of protecting against them.

Rola cyberprzestrzeni w wojnie Rosji z Ukrainą

  • Author: Agnieszka Warchoł
  • Institution: Uniwersytet Pedagogiczny im. KEN w Krakowie
  • ORCID: https://orcid.org/0000-0003-0786-6440
  • Year of publication: 2023
  • Source: Show
  • Pages: 64-79
  • DOI Address: https://doi.org/10.15804/npw20233904
  • PDF: npw/39/npw3904.pdf

The role of cyberspace in Russia’s war against Ukraine

The aim of article is to present the ways in which cyberspace has been used in Russia’s war against Ukraine. The article consists of several parts. The first deals with Ukraine’s preparations for potential Russian cyber attacks. In the second part, the author presents information on the use of cyberspace in the Russian-Ukrainian war. The last part presents possible scenarios for the use of cyberspace in wars in the future. The study used the following research methods: historical method, comparative analysis, literature analysis and criticism, source analysis and criticism, and case study.

Perception of Cyber Threats in Polish Cyber Security Policy on the Example of Strategic Documents in the Period 2013–2024

  • Author: Marek Górka
  • Institution: Koszalin University of Technology
  • ORCID: https://orcid.org/0000-0002-6964-1581
  • Author: Małgorzata Kamola-Cieślik
  • Institution: University of Szczecin
  • ORCID: https://orcid.org/0000-0003-2956-3969
  • Year of publication: 2024
  • Source: Show
  • Pages: 24-38
  • DOI Address: https://doi.org/10.15804/rop2024302
  • PDF: rop/29/rop2902.pdf

The article analyzes the growing role of digitization and the related security challenges in the context of the increasing number of internet-connected devices and increasingly sophisticated cyberattacks. In the context of the dynamic development of technology and the increase in cyber incidents, the article focuses on an interdisciplinary analysis of strategic documents on cyber security policy in Poland, such as Polish Cyberspace Protection Policy and Polish Cyber Security Strategy. The study identifies key threats and assesses the state’s responses to the growing challenges of cyberattacks. The relevant research question around which the analysis in the article is conducted is: What actions are needed to strengthen the cyber security culture in society and organizations? In the face of growing threats, the article also highlights the need to build a culture of cyber security and cooperation between public and private sectors.

Message to:

 

 

© 2017 Adam Marszałek Publishing House. All rights reserved.

Projekt i wykonanie Pollyart