Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2023 | 3(53) | 155-163

Article title

The role of the Cybersecurity Strategy of the Republic of Poland in ensuring cybersecurity

Content

Title variants

Languages of publication

Abstracts

EN
Cybersecurity belongs to the area of activity of state and supra-state actors, giving direction to national and international systems of law as components of national and supranational systems of political, economic, military cooperation, etc. Still, the state has a monopoly on the causality of lawmaking, which forms the basis of cyberspace use security activities. The state responds to national security needs by actively participating in the formation of the collective security order of the supranational level. The aim of this paper is to demonstrate the significance of the national Cybersecurity Strategy of the Republic of Poland for ensuring the safe use of cyberspace. The Strategy, while referring to the national order, is at the same time an implementation of supranational arrangements within the scopes adopted by the state authorities, which means that the Strategy is subjected to logical evaluation depending on the impact of cyber conditions or binding arrangements of the international environment. The text is based on two research methods: the doctrinal legal research method to analyse the applicable legal regulations governing the issues related to the strategic aspects of cybersecurity and the law theory method aimed at evaluating the strategic solutions in respect of security in cyberspace.

Year

Issue

Pages

155-163

Physical description

Dates

published
2023

Contributors

  • University of Warmia and Mazury in Olsztyn
author
  • University of Economics and Human Sciences in Warsaw
author
  • The John Paul II Catholic University of Lublin

References

  • Castells, M. (2013). Władza informacji, transl. W. Jedliński, P. Tomanek, PWN.
  • Chałubińska-Jentkiewicz, K. (2019). Cyberbezpieczeństwo – zagadnienia definicyjne. Cybersecurity and Law, 2(2), 7–23. DOI: 10.35467/cal/133828
  • Czuryk, M. (2019). Supporting the development of telecommunications services and networks through local and regional government bodies, and cybersecurity. Cybersecurity and Law, 2(2), 39–50. DOI: 10.35467/cal/133839
  • Czuryk, M. (2022a). Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues. Studia Iuridica Lublinensia, 31(3), 31–43. DOI: 10.17951/sil.2022.31.3.31-43
  • Czuryk, M. (2022b). Special rules of remuneration for individuals performing cybersecurity tasks. Cybersecurity and Law, 8(2), 105–112. DOI: 10.35467/cal/157128
  • Dobrzycki W (2004)., Historia stosunków międzynarodowych w czasach nowożytnych, Scholar.
  • Karpiuk, M. (2021a). Cybersecurity as an element in the planning activities of public administration. Cybersecurity and Law, 5(1), 45–52. DOI: 10.35467/cal/142179
  • Karpiuk, M. (2021b). The Organisation of the National System of Cybersecurity: Selected Issues. Studia Iuridica Lublinensia, 30(2), 233–244. DOI: 10.17951/sil.2021.30.2.233-244
  • Karpiuk, M. (2022a). Crisis management vs. cyber threats. Sicurezza, Terrorismo e Societa, 16(2), 113–123.
  • Karpiuk, M. (2022b). The Protection of State Security in Cyberspace as a Justifying Ground for Restricting Constitutional Freedoms and Rights. Przegląd Prawa Konstytucyjnego, 67(3), 401–412. DOI: 0.15804/ppk.2022.03.30
  • Karpiuk, M., Kelemen, M. (2022). Cybersecurity in civil aviation in Poland and Slovakia. Cybersecurity and Law, 8(2), 70–83. DOI: 10.35467/cal/157125
  • Kostrubiec, J. (2022). Cybersecurity System in Poland. Selected Issues. In: M. Karpiuk, J. Kostrubiec (Eds.), The Public Dimension of Cybersecurity (pp. 7–17). Maribor: LEX Localis Press. DOI: 10.4335/2022.1.
  • Makuch A. (2020). Twitter jako narzędzie współczesnej dyplomacji – miejsce nowych mediów w procesie kształtowania ładu międzynarodowego, Karpacki Przegląd Naukowy, 3-4(34), 13–27.
  • Skrzypek A. (2009). Historia społeczna Europy XIX i XX wieku, Wydawnictwo Poznańskie.
  • Soler, U. (2022). Social perception of 5G technology. Rocznik Instytutu Europy Środkowej i Wschodniej, 20(2022), 103–120.
  • Szczęsna A. Nadzór nad podmiotami kluczowymi i ważnymi w dyrektywie NIS 2. https://cyberpolicy.nask.pl/nadzor-nad-podmiotami-kluczowymi-i-waznymi-w-dyrektywie-nis2/
  • Wrzosek M. Dyrektywa NIS, czyli pierwsze europejskie prawo w zakresie cyberbezpieczeństwa. https://cyberpolicy.nask.pl/dyrektywa-nis-czyli-pierwsze-europejskie-prawo-w-zakresie-cyberbezpieczenstwa/

Document Type

Publication order reference

Identifiers

Biblioteka Nauki
22180772

YADDA identifier

bwmeta1.element.ojs-doi-10_15804_ppsy202383
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.