Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2018 | 13 | 2 |

Article title

Przyszłość Internetu – pułapki prognozowania. Internet Rzeczy i Rzeczywistość Rozszerzona w kontekście militarnym

Content

Title variants

Languages of publication

EN

Abstracts

EN
Modern information technologies are double-edged weapons, because on the one hand, they provide a huge tactical advantage, but on the other, they are a source of many dangers. Therefore, when designing the most effective solutions in the field of IT security, one should examine contemporary trends and anticipate possible scenarios concerning the future of the Internet and online tools, because solutions suited to the current conditions may be ineffective in the future. This is due not only to technological factors related to the development of computer hardware or software, but also to decisions, cooperation and competition. It is impossible to specify all the factors that will determine the future of the Internet. Therefore, the author’s intention is to pay attention to only a few, subjectively selected tendencies. The aim of the article is indicating the possible directions of development of two Internet technologies – the Internet of Things and Augmented Reality, and analysing possible mistakes that could be made in the process. The second research goal is to identify threats that are a consequence of the more frequent and wider use of both technologies.
PL
Nowoczesne technologie informatyczne są bronią obusieczną, bo z jednej strony dają ogromną przewagę taktyczną, ale z drugiej są źródłem wielu niebezpieczeństw. Dlatego projektując najbardziej skuteczne rozwiązania w zakresie bezpieczeństwa informatycznego, należy badać współczesne trendy oraz przewidywać możliwe scenariusze przyszłości Internetu i narzędzi internetowych, bo rozwiązania przystosowane do obecnych warunków mogą być nieskuteczne w przyszłości. Mają na to wpływ m.in. czynniki technologiczne związane z rozwojem sprzętu komputerowego czy oprogramowania, a także decyzje, współdziałanie oraz współzawodnictwo. Wyznaczonym w artykule celem badawczym jest wskazanie możliwych kierunków rozwoju dwóch technologii internetowych – Internetu Rzeczy i Rzeczywistości Rozszerzonej – oraz błędów popełnianych przy prognozowaniu ich przyszłości. Drugim celem badawczym jest rozpoznanie zagrożeń będących konsekwencją coraz częstszego i szerszego stosowania obu technologii.

Year

Volume

13

Issue

2

Physical description

Dates

published
2018
online
2019-07-08

Contributors

References

  • 1. Alberts D.S., Garstka J.J., Stein F.P. (1999), Network Centric Warfare: Developing and Leveraging Information Superiority, National Defense University Press, Washington D.C.
  • 2. Capstone Concept for Joint Operations: Joint Force 2020, U.S. Joint Chiefs of Staff, September 10, 2012, http://www.jcs.mil/Portals/36/Documents/Doctrine/concepts/ccjo_jointforce2020.pdf?ver=2017-12-28-162037-167 [access: 14.03.2018].
  • 3. CISCO, The Internet of Things. How the Next Evolution of the Internet Is Changing Everything, April 2011.
  • 4. Dziwisz D. (2015), Stany Zjednoczone a międzynarodowe bezpieczeństwo cybernetyczne, Sowa Druk, Kraków.
  • 5. Ellis A.K. (1970), Teaching and Learning Elementary Social Studies, Allyn and Bacon, Boston, p. 431.
  • 6. It’s a Smart World. A Special Report on Smart Systems, “The Economist”, November 6, 2010, http://www.economist.com/sites/default/files/special-reports-pdfs/17408526.pdf [access: 23.03.2018].
  • 7. Kennedy J.B. (1926), When Woman is Boss. An Interview with Nikola Tesla by John B. Kennedy, “Collier’s”, January 30 (own translation).
  • 8. Koniarski K. (2015), Augmented reality using optical flow, “Annals of Computer Science and Information Systems”, vol. 5, pp. 841–847. DOI: https://doi.org/10.15439/2015F202.
  • 9. Laperche B., Uzunidis D., von Tunzelmann G.N. (2008), The Genesis of Innovation. Systemic Linkages Between Knowledge and the Market, Edward Elgar Publishing, Cheltenham, pp. 120–125.
  • 10. Lockie A. (2017), The Air Force just demonstrated an autonomous F-16 that can fly and take out a target all by itself, April 4, http://www.businessinsider.com/f-16-drone-have-raider-ii-loyalwingman-f-35-lockheed-martin-2017-4?IR=T [access: 20.02.2018].
  • 11. LOPEZ Research, An Introduction to the Internet of Things (IoT), November 2013, https://www.cisco.com/c/dam/en_us/solutions/trends/iot/introduction_to_IoT_november.pdf [access: 1.03.2018].
  • 12. Lynch G. (2017), AR warfare: How the military is using augmented reality, September 16, https://www.techradar.com/news/death-becomes-ar-how-the-military-is-using-augmented-reality [access: 20.03.2018].
  • 13. Maintaining NATO’S Technology Edge: Strategic Adaptation and Defence Research & Development, 2017, NATO Parliamentary Assembly, STC General Report, https://www.nato-pa.int/document/2017-maintaining-natos-technological-edge-marino-report-174-stc-17-e-bis [access: 25.03.2018].
  • 14. Milgram P., Kishino F. (1994), A taxonomy of mixed reality visual displays, “IEICE Transactions on Information Systems”, vol. E77-D(12), pp. 1321–1329.
  • 15. Mitnick K., Simon W. (2003), Sztuka podstępu. Łamałem ludzi, nie hasła, Helion, Gliwice.
  • 16. Mossberg W. (2014), SmartThings Automates Your House Via Sensors, App, January 28, https://www.recode.net/2014/1/28/11622774/smartthings-automates-your-house-via-sensors-app [access: 21.02.2018].
  • 17. Mrożewski B. (2016), AR na polu walki, „PC Format”, p. 2, https://www.pcformat.pl/AR-na-polu-walki,a,4500 [access: 23.03.2018].
  • 18. Piątek Z. (2006), Wojskowe ze sklepowej półki, „Elektronika B2B”, July 17, https://elektronikab2b.pl/biznes/637-wojskowe-ze-sklepowej-polki-cz-1#.WrTD97aBj2R [access: 4.03.2018].
  • 19. Resilient Military Systems and the Advanced Cyber Threat, Defense Science Board, Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, Washington, D.C. January 2013, http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf; after: Zheng D.E., Carter W.A., 2015, Leveraging the Internet of Things for a More Efficient and Effective Military, CSIS, September 17, p. 20.
  • 20. Seffers G.I. (2015), Defense Department Awakens to Internet of Things, “AFCEA”, January 1, https://www.afcea.org/content/defense-department-awakens-internet-things (access: 20.02.2018).
  • 21. Sienkiewicz P., Świeboda H. (2009), Sieci teleinformatyczna jako instrument państwa – zjawisko walki informacyjnej, [in:] M. Madej, M. Terlikowski (red.), Bezpieczeństwo teleinformatyczne państwa, PISM, Warszawa, pp. 75–93.
  • 22. Singer E. (2010), Robotic limbs that plug into the brain, “MIT Technology Review”, October 27, https://www.technologyreview.com/s/421347/robotic-limbs-that-plug-into-the-brain/ [access: 23.03.2018].
  • 23. Sly L. (2018), U.S. soldiers are revealing sensitive and dangerous information by jogging, “The Washington Post”, January 29, https://www.washingtonpost.com/world/a-map-showing -the-users-of-fitness-devices-lets-the-world-see-where-us-soldiers-are-and-what-they-are-doing/2018/01/28/86915662-0441-11e8-aa61-f3391373867e_story.html?utm_term=.eb9246385083 [access: 20.03.2018].
  • 24. Strategic Plan 2014–2019. VERSION 2, Defense Information Systems Agency (DISA), https://www.hsdl.org/?view&did=753878 [access: 29.03.2018].
  • 25. (U) Da Jiang Innovations (DJI) Likely Providing U.S. Critical Infrastructure and Law Enforcement Data to Chinese Government, 2017, “Intelligence Bulletin”, August 9.
  • 26. Vodafone, The IoT Barometer 2016, https://www.vodafone.com/business/news-and-insights/white-paper/the-iot-barometer-2016 [access: 20.03.2018].
  • 27. Zheng D.E., Carter W.A. (2015), Leveraging the Internet of Things for a More Efficient and Effective Military, CSIS, September 17.

Document Type

Publication order reference

YADDA identifier

bwmeta1.element.ojs-doi-10_17951_teka_2018_13_2_115-128
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.