Skip to main menu
Scroll to content
Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit
https://bibliotekanauki.pl
Search
Browse
About
test
Issue details
Link to site
Copy
Publisher
Akademia Sztuki Wojennej
Journal
Cybersecurity and Law
Year
2024
Volume
11
Issue
1
Identifiers
Cover
Volume contents
1
article:
Entities Involved in the Policy of Ensuring the Security of Network and Information Systems in the Light of the NIS 2 Directive (Part 1)
(
Chałubińska-Jentkiewicz K.
,
Nowikowska M.
), p. 5-20
article:
Changes Introduced by the NIS Directive 2.0 and their Potential Effect on Shaping the Cybersecurity Labour Market
(
Porzeżyński M.
,
Kulicki Ł.
), p. 21-38
article:
The Legal Status of Digital Service Providers in the National Cybersecurity System
(
Czuryk M.
), p. 39-46
article:
Cybersecurity Issue in the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence from October 30, 2023
(
Pelc P.
), p. 47-57
article:
Cyberthreats in Ukraine, Poland and Slovakia
(
Evsyukova O.
,
Karpiuk M.
,
Kelemen M.
), p. 58-78
article:
Türkey’s Cybersecurity Policy Framework
(
Liszkowska D.
), p. 79-91
article:
Poland’s Path to Building Cyber Capabilities
(
Zdzikot T.
), p. 92-97
article:
Artificial Intelligence in Military Operations – Experiences and Challenges. The British Perspective
(
Eble K.
), p. 98-104
article:
Lawfare – Hostile Actions Against the Legal System of the State Through Activities in Cyberspace
(
Milik P.
), p. 105-119
article:
Hidden Spyware in the Service of State Security. Legal, Organisational and Systemic Aspects
(
Kurek-Sobieraj J.
), p. 120-139
article:
The Functional Model of Local Government Units Based on Ensuring the Appropriate Level of Cybersecurity
(
Romaniuk P.
), p. 140-150
article:
Nordic Countries in the Face of Digital Threats
(
Kaczmarek K.
), p. 151-161
article:
Fake Mirroring in Cyberspace as a Disinformation Tool – Doppelgangers and Deepfakes
(
Gergelewicz T.
), p. 162-184
article:
Disinformation in Cyberspace. Introduction to Discussion on Criminalisation Possibilities
(
Ciesielski M.
), p. 185-199
article:
The Social Dimension of Cybersecurity in the Public Media Systems of Poland and Italy
(
Makuch A.
,
Strizzolo N.
), p. 200-212
article:
Cybereducation and its Possibilities in the Context of Legal and Social Responsibility
(
Pieczywok A.
), p. 213-226
article:
Security of Personal Data in Cyberspace in the Opinion of Students of the University of Udine
(
Melchior C.
,
Soler U.
), p. 227-247
article:
Cybersecurity and its Capabilities in the Sphere of Preventing Road Traffic Threats. On Anger, Aggression and Road Rage
(
Pawelec K.
), p. 248-257
article:
Information Society Services and Their Cybersecurity
(
Bencsik A.
,
Karpiuk M.
,
Strizzolo N.
), p. 258-270
article:
The Digital Future of Information. Determinants of the Use of Open Source Intelligence
(
Lipińska A.
), p. 271-280
article:
Mitigating Cyber Risk in Personal Finance of the Elderly. Insights into Vulnerabilities, Cyber Hygiene and the Role of Personal Cyber Insurance
(
Strupczewski G.
), p. 281-298
open years
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.