Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 2

first rewind previous Page / 1 next fast forward last

Search results

help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
One effect of rapid technological progress in the field of processing and storage of information is crime committed withthe use of modern information and communication technologies. Some time ago a completely new area known as cyberspaceappeared within the rapidly evolving sphere of computing. Mankind with its knowledge or ignorance, together with motivation,is the primary source of threats in the era of the information society. Nowadays, in order to commit an offence one does notneed to leave one’s place of residence, it is enough to have a computer, a particular idea and access to the Internet. Knowledgeof masking and hiding on the Web greatly increases the chances of success and confounds the instruments of law enforcementand justice. Law and order, when disrupted by various types of crime, generate in society a sense of fear, injustice and lack of statecontrol. The article discusses the real threat of cyber‑terrorismand ways to use modern tools against state security, and in particularin relation to the safety of railway infrastructure. The authors are of the opinion that the primary element of staying safein cyberspace is the education of institutions responsible for the operation of the Web and ICT systems. Equally important maybe the adoption of permanent rules of law enforcement cooperation with private sector entities, such as internet service providers(ISPs) and administrators of sites, domains and websites relevant to the management of accounts, resources, and permissions.The article also notes that police actions may not be sufficient to effectively combat computer crime related to the threat to criticalinfrastructure systems if the entire society is not also involved in this fight.
EN
Capabilities of monitoring P2P networks for illegal content sharing have increased substantially with the databases containing illegal content information reaching their operational capacity. Easy data gathering and processing has become possible thanks to the employment of the hash function.. Unfortunately the law enforcement agencies and p2p users are locked up in a sort of an arms race. With the steady rise in monitoring capabilities grows the number of processed files stemming from the ever increasing popularity of the video recording equipment. At the same time vast majority of the existing systems do not allow for fast and effective transfer of monitored information. Identified illegal files added to a hash cache in Norway not necessarily find the way to a data bank in Portugal. With the amount of data growing exponentially international law enforcement community concurred on creating platforms to effectively collaborate and share information about the files containing illegal content. American company TLO devised a system supporting p2p networks monitoring and user identification procedures in the area of child pornography. The system is a set of extremely useful instruments that may dramatically enhance the effectiveness of child porn countering. Great recommendation of the system is its successful application by the law enforcement agencies in the USA, United Kingdom, Denmark, Norway and Sweden.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.