- Author:
Joanna Świątkowska
- E-mail:
joanna.swiatkowska@ik.org.pl
- Institution:
Pedagogical University of Kraków (Poland)
- Year of publication:
2017
- Source:
Show
- Pages:
30-39
- DOI Address:
http://dx.doi.org/10.15804/ppsy2017102
- PDF:
ppsy/46-1/ppsy2017102.pdf
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this issue from the perspective of Central and Eastern European Countries. It argues that this form of hostile actions will be increasingly utilized in the region. The main assumption, following Alvin Toffler’s theory, is that “information” – as an increasingly important element of modern societies and as their strategic resource – also serves as a significant tool of modern conflicts. Since information is nowadays strongly related to new technologies, mainly the aspects connected to cybersecurity are analysed. The article looks closer at different aspects of cyberthreats and explains their possible consequences. It may serve as good material for further research and recommendations on countermeasures that may increase security in Europe.
- Author:
Marek Górka
- Institution:
Politechnika Koszalińska
- Year of publication:
2017
- Source:
Show
- Pages:
295-315
- DOI Address:
https://doi.org/10.5604/cip201718
- PDF:
cip/15/cip1518.pdf
Cyberterroryzm stwarza poważne i szybko rozwijające się zagrożenia dla społeczeństwa oraz infrastruktury krytycznej państwa. Fakt ten wywołuje istotne zmiany w zakresie zapobiegania oraz zwalczania terroryzmu. Cyfrowy świat, w którym żyje społeczeństwo zapewnia szerokie możliwości dla cyberprzestępczości, ponieważ inicjuje i zachęca do wykorzystania ukrytych możliwości Internetu. Cyberterroryzm jest rodzajem przestępstwa, który jest skierowany przeciwko państwu i jego obywatelom. Obecnie sieci komputerowe są zagrożone i codziennie atakowane z powodu m.in. niezdolności do utrzymania dynamicznego rozwoju usług internetowych oraz szeroko dostępnych narzędzi i technik hakerskich. Jest to najbardziej trudne wyzwanie w walce cyberterroryzmem. Jednak sam termin jest często niewłaściwie wykorzystywany i nadużywany. Zrozumienie niebezpieczeństwa cyberterroryzmu musi zaczynać się od klarownego określenia jego definicji.
- Author:
Szymon Stach
- Institution:
aplikant radcowski przy Okręgowej Izbie Radców Prawnych w Poznaniu, doktorant na Wydziale Prawa SWPS Uniwersytetu Humanistycznospołecznego w Warszawie
- Year of publication:
2018
- Source:
Show
- Pages:
172-185
- DOI Address:
https://doi.org/10.15804/tpn2018.1.10
- PDF:
tpn/13/TPN2018110.pdf
This article discusses the issue of the significance of property rights in the Polish legal order in the context of the digitization of the main state registers and possible consequences of attacks on them. Technological progress makes it possible to transfer registers from a traditional paper form to a digital form. This process has also been performed in the area of Land and Mortgage Registers. Due to the above, every Internet user, who knows the number of the Land and Mortgage Register, is able to verify its legal status. There are real material values related to the data in the Electronic Land and Mortgage Registers. The above may cause that, like banking systems, also the system of the Electronic Land and Mortgage Registers, may become subject to attacks by cybercriminals. This article considers the possible effects of such actions and possibilities of protecting against them.
- Author:
Agnieszka Warchoł
- E-mail:
agnieszka.warchol@uken.krakow.pl
- Institution:
Uniwersytet Pedagogiczny im. KEN w Krakowie
- ORCID:
https://orcid.org/0000-0003-0786-6440
- Year of publication:
2023
- Source:
Show
- Pages:
64-79
- DOI Address:
https://doi.org/10.15804/npw20233904
- PDF:
npw/39/npw3904.pdf
The role of cyberspace in Russia’s war against Ukraine
The aim of article is to present the ways in which cyberspace has been used in Russia’s war against Ukraine. The article consists of several parts. The first deals with Ukraine’s preparations for potential Russian cyber attacks. In the second part, the author presents information on the use of cyberspace in the Russian-Ukrainian war. The last part presents possible scenarios for the use of cyberspace in wars in the future. The study used the following research methods: historical method, comparative analysis, literature analysis and criticism, source analysis and criticism, and case study.
- Author:
Marek Górka
- E-mail:
marek_gorka@wp.pl
- Institution:
Koszalin University of Technology
- ORCID:
https://orcid.org/0000-0002-6964-1581
- Author:
Małgorzata Kamola-Cieślik
- E-mail:
malgorzata.kamola-cieslik@usz.edu.pl
- Institution:
University of Szczecin
- ORCID:
https://orcid.org/0000-0003-2956-3969
- Year of publication:
2024
- Source:
Show
- Pages:
24-38
- DOI Address:
https://doi.org/10.15804/rop2024302
- PDF:
rop/29/rop2902.pdf
The article analyzes the growing role of digitization and the related security challenges in the context of the increasing number of internet-connected devices and increasingly sophisticated cyberattacks. In the context of the dynamic development of technology and the increase in cyber incidents, the article focuses on an interdisciplinary analysis of strategic documents on cyber security policy in Poland, such as Polish Cyberspace Protection Policy and Polish Cyber Security Strategy. The study identifies key threats and assesses the state’s responses to the growing challenges of cyberattacks. The relevant research question around which the analysis in the article is conducted is: What actions are needed to strengthen the cyber security culture in society and organizations? In the face of growing threats, the article also highlights the need to build a culture of cyber security and cooperation between public and private sectors.