Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Authors help
Years help

Results found: 191

first rewind previous Page / 10 next fast forward last

Search results

Search:
in the keywords:  cyberspace
help Sort By:

help Limit search:
first rewind previous Page / 10 next fast forward last
EN
Cyberspace is a place of many opportunities that allows young people to search and create their own identity. Unfortunately, interacting (being) in a virtual world is seemingly safe can promote the development of many negative phenomena such as cyberbullying and the occurrence of threats and dangers to adolescents
EN
Cyberspace as well as virtual worlds are a new environment created by state-of-the-art digital media and information and communication technologies. Also, for the first time in world history and human evolution, they enrich the real-world public sphere on an extraordinary scale and at an amazing speed, and at the same time dramatically change the functioning of all people, especially the young generation. Without any doubt, this new space presents many challenges as well. The paper analyzes the following issues: 1. Cyberspace versus childhood care and education. 2. Waves of social and information development and transformations in education and communication. 3. Teenagers’ activities on the Web. 4. Theoretical concepts of the subject being analyzed. 5. New developmental opportunities and trends in education. 6. Attempt to classify new cyberspace threats.
Zarządzanie Mediami
|
2015
|
vol. 3
|
issue 2
107–120
EN
It can be regarded as we have a problem with the application of its provisions to the content present in the network in terms of law because regulations on media infiltrate boundaries – so, and the media themselves. Polish law is not adapted to the changing technology reality. And it is not only the universal use of social media. Traditional media also taking into account the convergence process are present in the network. The purpose of this publication is to analyze certain aspects of legal regulations concerning the distribution of content in cyberspace – on the basis of the law in Poland the media. To demonstrate that self-regulation in the area of electronic media has the great advantage that it can go in a relatively short distance for the development of “new” media. In contrast, new, precise regulations in the matter of electronic media are difficult to be implemented in a short time.
PL
Contemporary armed conflicts are increasingly based on new technologies. These technologies enable to conduct hostilities from a distance, often eliminate the human factor from the battlefield. Nowadays, cyberspace created by the Internet allows to frame the idea of armed conflict outside the traditional recognition of the fight between belligerent armed forces. This article addresses issues of the direct participation of hostilities in cyberspace. In the first part it discusses technological development and its impact on the activation of the civil factor during armed conflicts. In the second part by analysing the current practice of cyber conflicts it refers to the concept of direct participation in hostilities and its constituent elements as a threshold of harm, direct causation, belligerent nexus at the cybernetic level. The third and final part examines the possibility of the loss of protection, in particular, it addresses the issues related to its temporal nature and the question of means and methods of attacking civilians involved in cyber warfare.
EN
The ability to conduct attacks in cyberspace from any location in the world, together with a high level of anonymity for the perpetrator, underlines the global nature of this issue. Consequently, threats within cyberspace have become one of the most serious challenges for the national and economic security of countries. The immaterial character of cyberspace and the threats emerging from within its framework transcend borders in respect of both the subject and territorial dimension. The illegal activities conducted in cyberspace are also connected with the low, and constantly decreasing, costs of initiating and conducting attacks along with the relatively high possibility of by the attacking entity remaining anonymous.3 Cyber-security strategies are the response of the European Union and its Member States to the emerging threats. Developing national strategies is a relatively new trend. In such documents Member States present their national perspective in respect of cyberspace protection as well as the rules of conduct, perception of the threat, risk assessment and a strategic objective complemented by other specific objectives. These documents help national decision-makers with policy making in terms of cyberspace protection and the allocation of the resources essential for its development. Apart from cyberspace, strategies designate crucial areas of the state’s functioning as principal area of the protection that require special preventive action, i.e. critical infrastructure, economic development, national security, social development and a sense of security as a component within information-communications technologies applications.
6
80%
EN
Anonymous could call movement, activists, community or idea. They have no leader, no structure, yet have in the past influenced the decisions of thousands of people around the world. Media is often referred to as hackers, because the greatest attention they raise is their attacks, which are mainly fighting for freedom of the Internet or against various social phenomena. In addition to hackers, the movement itself creates, in addition to hackers, people who either share ideas of movement or use various programs to attack and shut down the servers of organizations, institutions, governments, or websites of various security agencies such as the FBI or the CIA.
EN
Cybersecurity is one of the most common security topics at present times. Society has enormous capabilities and possibilities in the cyberspace, which create opportunities and threats as well. A cyberwar, cyberterrorism and cybercrime have permanently entered the catalog of threats for security. This kind of situation in a cyberspace determines the need for coordinated activities at international and national level which will provide an acceptable level of security in this area. This article presents and briefly outlines threats for the state cybersecurity. There are also presented activities aimed to provide protection in this area. In addition, the author analyzed the current structure of the cybersecurity system in the Republic of Poland.
EN
The need for security is one of the most fundamental human needs. The scale of the threats posed by cybercrime to IT systems is large. It is mostly the result of the high vulnerability of IT systems to threats, the high risk of data theft, a very high occurrence of Internet frauds, the low efficiency of the systems protecting computers and networks, and an inadequately low level, as related to the existing threats, of security measures utilized by the users of IT systems. In this article, the authors discuss the underestimated problem of crime on the Internet and its nature in today’s reality.
EN
The usage of information as a weapon in the foreign and domestic policies of Russia is not a new phenomenon. Still, the sophistication and intensity of it grow with each passing year. Recently the EU and USA have realized the powerful latent influence of Russian media and propaganda, including on electoral processes and the activities of State administration. They have realized that Russian disinformation poses a serious threat to the United States and its European allies, first and foremost with regard to Poland, the Baltic States and Ukraine. Moreover, unlike Soviet propaganda, the modern methods of the Russian information war do not rudely promote the agenda of the Kremlin. Instead, they aim to confuse, daze and divert citizens from supporting the EU and Ukraine. Russia seeks to undermine the support for European values; producing disarray among European allies in order to increase its influence. Ethnic, linguistic, regional, social and historical contradictions and stereotypes are used for this purpose. As current experience shows, Russian advocacy efforts in Europe make up an important part of their hybrid approach to the projection of force. Despite the fact that the crisis in Ukraine for the first time drew the attention of the West to the importance and real meaning of the information campaign in Russia, the Kremlin’s use of disinformation was launched long before the crisis. Russia carefully and purposefully prepared an information war against Ukraine.
PL
W pierwszej części artykułu przybliżony został problem odpowiedniego zabezpieczenia dzieci i młodzieży od zagrożeń występujących w cyberprzestrzeni. W dalszej kolejności autor pracy przybliżył regulacje „Krajowych Ram Polityki Cyberbezpieczeństwa Rzeczypospolitej Polskiej na lata 2017–2022” i zarazem dokonał ich analizy pod kątem zabezpieczenia w cyberprzestrzeni interesu najmłodszych. Intencją autora było m. in. zweryfikowanie czy zapewnienie bezpieczeństwa dzieci i młodzieży w cyberświecie jest dla rządu polskiego priorytetem, czy może jednak problem ten jest zupełnie ignorowany? Analiza poprzedzona jest przedstawieniem status quo polskich regulacji prawnych stojących na straży bezpieczeństwa dzieci i młodzieży w cyberprzestrzeni. W podsumowaniu zawarte są wnioski, jakie autor wyciągnął z przedmiotowej analizy.
EN
The first part of the article depicts the problem of adequate protection of children and young people against the dangers occurring in cyberspace. Subsequently, the author of the paper described the 'National Framework of Cyber Security Policy of the Republic of Poland for years 2017–2022’ ańd at the same time ańalysed it iń terms of securing in cyberspace the interests of the youngest. The intention of the author was, among other things, to verify whether ensuring the safety of children and young people in cyberspace is a priority for the Polish Government or whether this problem is completely ignored. The analysis is preceded by the presentation of the status quo of Polish legal regulations that protect the safety of children and young people in cyberspace. The final part contains the conclusions the author drew from the analysis of the issue.
EN
In the era of common access to freedom on the Internet, there are more and more controversies between advocates of complete freedom and followers of the idea of limiting the usage of the global network’s resources. Should the Internet become a space of unlimited freedom? Contrary to common belief, the answer to such a question is not that obvious, although intuitively one would like to say yes. The Internet is basically an egalitarian tool of communication, a space of easy creation and transfer of content, for which the only limit is technology and unlimited human imagination. Freedom seems to be not only an immanent, but even a constitutive feature of the virtual space in which the Internet functions.
EN
The article discusses the issue of health and social effects of remote work resulting from epidemic isolation for children and schoolchildren. Basic concepts related to cyberspace were discussed and health and social threats resulting from the use of the Internet by children and adolescents were presented. Based on the literature on the subject and the professional experience of the authors, conclusions were made that are important for pedagogical practice.
Cybersecurity and Law
|
2022
|
vol. 8
|
issue 2
44-55
EN
Modern cybersecurity efforts require the identification ofthe risks and threats associated with the cyberenvironment by consistently increasing public awareness of the dual nature of cyberspace and its use for the purposes of cooperation, and for the purposes of warfare and crime. Raising awareness today means involving both public and private users in cooperationfor the sake of both the common good and common interests involving standards for the use of virtual space.
14
Publication available in full text mode
Content available

Money laundering and cybercrime

80%
Cybersecurity and Law
|
2022
|
vol. 8
|
issue 2
160-165
EN
In order to be used legally, proceeds from criminal activity must be laundered first. One type of crime that can be linked to money laundering is cybercrime, which has to be fought with special tools allowing for operation in cyberspace. Money laundering, and the related financing of terrorism and organised crime, pose a major threat to state security and financial stability.
EN
Technology is an integral part of social life. The widespread use of computers and the development of information and communication technologies have made people dependent on this technology in many ways. Computer products such as Internet, mobile phone, satellite are among the indispensables of daily life. The developments in information technologies attract the attention of the international community as much as the individuals and affect this society as well. In particular, the tools and methods that are created by using computers have created cyber area life in addition to the real world, and this area has begun to provide significant benefits and facilities in the daily lives of individuals and communities. In this article the relation between cyberspace and protection of human rights in this sphere will be examined socially and legally
EN
Along with the development of technologies, surrounding reality has extended to include the world of cyberspace. The great majority of schools, however, still function according to the rules and patterns adopted in the past. It is particularly important in relation to the fact that along with cyberspace not only a new communication networkappeared in schools, but also new entities in the process of communication between the teacher and a pupil. It should be emphasized that cyberspace has both a formal and informal aspect. Looking at the functioning of many schools, it seems that one can forward the thesis that the latter aspect is often overlooked. Meanwhile, it has an extremely signifi cant infl uence on the quality of the education process and the relations that occur in this process at each of its stages.
EN
Nowadays, the vast majority of the threats to our security come from cyberspace, resulting in a significant transformation of national security systems. Behind these changes, we can find some organisational and capability responses to technological developments, seeing that the function of national security is inseparable from the social environment and its processes. The study examines certain impacts of cyberspace on national security as a system, addressing some features of the changing external environment. The topic is related to the research on the relationship between the information society and security in the 21st century. Therefore, the study explores some processes visible at the international level and reviews some external environment trends in connection with national security. The changes affect the future of national security thinking and the development of principles and methods. It is the task of national security services operating under strict legislation to respond effectively to various threats in a changing environment. All this is only possible through the continuous monitoring of changes in the environment and long-term strategic thinking.
EN
Nowadays, ensuring cybersecurity is an important objective of public authority. It must take into account the protection of cybersecurity, both in the current and future perspectives. The state security policy must also take into account its dimension in cyberspace, especially today, where many services are provided through communication and information systems. A special place in the cybersecurity system is given to cyberspace security in the military dimension. In this regard, both the military administration and civil law entities, both acting for defence, will be competent. Effective military operations are directly linked to new digital technologies. As a result, for the sake of state security (both internal and external), it becomes necessary not only to respond to cyberattacks, but also to counteract them.
Cybersecurity and Law
|
2023
|
vol. 9
|
issue 1
48-60
EN
The national cybersecurity system is formed of a number of public entities, including executive agencies with legal personality as entities of the public finance sector. The executive agency could implement cybersecurity tasks important to the functioning of the state and its institutions. Through this legal organisational form, it would be possible to shape the development of new technologies that could then serve a digital society or digital state, including the protection of ICT systems for communication, as well as the provision of digital services and key services. Due to the widespread activity in cyberspace, it is necessary to have entities in place to protect its users. Such an entity could have the form of a cyber agency, working with other institutions (public and private), that is competent for cybersecurity
EN
This work follows on from two previous articles on the cyber security of the youngest children in international and European law. The article discusses the issue of cyber security of children and youth on the basis of Polish law. The authors start their analysis with the presentation of the provisions of the constitution. Next, the provisions of substantive criminal law and criminal procedure are introduced. The authors then present the laws ratifying the international agreements on the issue of the safety of the youngest children in cyberspace. The summary contains conclusions drawn from the analysis of the overall content of the regulations of both inter¬national and European law, as well as national solutions in the scope of the title.
PL
Niniejsza praca stanowi kontynuację dwóch wcześniejszych artykułów dotyczących cyberbezpieczeństwa najmłodszych w prawie międzynarodowym oraz europejskim. W artykule poruszone zostało zagadnienie cyberbezpieczeństwa dzieci i młodzieży na gruncie prawa polskiego. Autorzy rozpoczynają analizę od przedstawienia przepisów ustawy zasadniczej. Następnie przybliżone zostały zapisy prawa karnego materialnego i procedury karnej. Dalej autorzy przedstawiają ustawy ratyfikujące umowy międzynarodowe dotyczące zagadnienia bezpieczeństwa najmłodszych w cyberprzestrzeni. W podsumowaniu zawarte są wnioski płynące z analizy całościowej treści przepisów zarówno prawa międzynarodowego i europejskiego, jak i rozwiązań krajowych w tym zakresie.
first rewind previous Page / 10 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.