Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 13

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  Cyberspace
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
The objective of this article is to analyse cyberspace as a warfare environment. The text presents specific forms of action and measures that may be used in cyberspace and become components of modern warfare. As such, they might have a significant impact on warfare and a potential to change its nature, contributing to its hybridisation, although they will not be able to replace conventional means of warfare entirely. Their role will be of utmost importance if they complement conventional measures, and only then will they play a role in determining the balance of power in international relations in the long term.
EN
Together with the development of new information technologies it is necessary to take actions the aim of which is to provide protection of ICT (information and communications technology) systems. Cyber security is mainly ensured by suitable systems with the installed software for counteracting cyber attacks, as well as by cyberspace-related legal regulations.In order to check the condition of cyber security, an analysis of ICT protection has been made in selected countries. The assessment of cyber security has been based on the analysis of work principles of military services, which, because of the type of the information possessed, are very rarely eager to show their potential in the area of information protection. The safety of stored and processed military data is currently an essential element because of the constant growth of reported cases of attacks on these data. Activities aiming at cyber space protection are undertaken also in Poland, and this is reflected in plans and programmes being created, as well as in the policy of protection of ICT critical infrastructure resources. In Poland the Ministry of National Defence is also engaged in the process of protection against computer incidents. It means that computer systems able to respond to computer incidents and protect the ICT critical infrastructure are built. Providing cyber security also requires analysing the legal aspects which regulate the issues of taking retaliatory actions against the ICT network of the opponent. The description of the legal aspect has been made on the basis of the analysis of the act in states of emergency, as well as a state of natural disaster, which regulate the concept of an external threat and of cyberspace. The analysis of cyber security will make it possible to indicate factors which are necessary to fight the opponent by means of the Internet. Moreover, the results of the present condition of cyberspace security will be compared to the expected one, which will allow formulation of conclusions to be applied for the effective detection and elimination of computer incidents.
EN
The development of civilisation has created a new, previously unknown environment called cyberspace. The creationof this new environment determines activities for its protection. One of the most important changes in the contemporary securityenvironment is the emergence of cyberspace as a new field of activity of the state and citizens. This change means the state mustbe prepared for threats which it has not had to deal with before. In a globalised world, such actions must be taken togetherwith the international and European community. The article presents the contemporary descriptions of cyberspace, cyber security,cybercrime and the initiatives taken by the state — the Republic of Poland — in order to meet the challenges posed by the newthreats associated with them. It presents measures to identify these, prevent them and eliminate their consequences. It revealsthe actions taken by the highest authorities, central administrative bodies, state audit organisations, security formations, as wellas within the scientific and research environment. In particular, it focuses on the activities undertaken by the Internal SecurityAgency and the Police. A developed model of cooperation between authorities responsible for the security of cyberspace is presented.Also presented are the initiatives taken by the Polish police to counter ever growing and evolving cybercrime. These includecooperation with Interpol and Europol, not only in combating the phenomena, but also in the area of training. As a consequence,the article shows interdependencies arising in the area of cyber security, including activities of state institutions at the nationaland international levels.
EN
This paper focuses on the phenomenon of bullying in the electronic environment - cyberbullying. It is divided in two parts - a theoretical part in which we define basic concepts such as bullying and cyberbullying, as they are important in our context. The contribution includes several definitions of cyberbullying from authors who first thought of this topic. Cyberbullying also includes various forms, which, together with their means, are elaborated at work. It is important to explain basic bullying that we compare with cyberbullying. Our goal is to design options and solutions for its prevention and elimination. The research part is in the form of a quantitative questionnaire which analyzes the issue of cyberbullying through the eyes of secondary school pupils, especially their real experience and knowledge of the assumed subject to achieve the idea of the current state. We discovered whether students were bullying someone over the internet, cyberbullying, and how they matched cyberbullying. The aim of our research questions was also to find out if students are familiar with some of the web sites that deal with cyberbullying prevention and whether their school provides enough information to address this issue.
EN
Cyberspace is a new global space that is yet not fully explored nor effectively regulated. The authors are not sketching a regulatory framework for cyberspace, but instead are inclined to glean valuable experience from the developments in the regulation of other global spaces, especially the sea. First, the peculiarities of cyberspace and cybercrime are briefly outlined. Then, the other global spaces are analysed drawing comparisons between exploration, appropriation and regulations of the sea and the air and cyberspace. The authors suggest that it is vital to learn lessons from the past in order to achieve an effective model of regulation of cyberspace. One of the main focus points of the paper is the position of a pirate and the ways of regulating piracy in different global spaces.
EN
The paper deals with the issue of negative phenomena related to the field of communication in the workplace and has the character of an interdisciplinary study using knowledge from the theory of law, personnel management, psychology, theory of communication and media studies. The main aim of the paper is to examine the issue of communication in the workplace with a specific emphasis on mobbing and cybermobbing as negative aspects and consequences of this communication, and the legislative and non-legislative options for protection against them. In the paper, we present a reflection of the basic theoretical background and defining frameworks from various author's perspectives. In this paper, we focus on the origin of mobbing, its forms, and manifestations, as well as a brief description of cyberspace as a determinant for the transformation of mobbing into the virtual environment. The dominant part is the second section of the paper, where the current possibilities of legislative protection in the context of victims of mobbing and cybermobbing are identified regarding various manifestations and selected types of aggressive communication and behaviour.
Cybersecurity and Law
|
2021
|
vol. 6
|
issue 2
151-166
EN
There is more than one reason why South-East European States should clarify their public positions on the applicability of sovereignty as a principle or as the rule of international law while addressing the growing ambiguity in cyberspace. The article argues that strategically and legally it is in the SEE States’ interest to step up and fill the vacuum in ever needed opinio iuris on the applicability of sovereignty in cyberspace, particularly after some leading NATO States took an opposing course on the issue. Explaining the evolution in cyberspace and how this affects the Westphalian concept of sovereignty under international law the article introduces the importance of the main thesis. It then provides the rationale for the argument and explains why it is in the SEE States interest to act and express their position on the applicability of sovereignty in cyberspace under international law.
EN
The media have a significant influence on everyday life of an individual as well as on the life of whole social groups (both primary, such as family, and secondary). Particularly noteworthy here is the so called “Generation Z”, i.e. young people born at the turn of the 21st century who cannot conceive of a world without Internet and other mass media. This phenomenon is imposed on youth subcultures that already exist in the social reality and it implies transferring a lot of their aspects to the cyberspace. This not only results in gaining a new quality by the existing subcultures, but also in the emergence of entirely new subcultures which can only exist in virtual reality. The most important among those are: cybergoths and cyberpunks, haters, hackers and pirates, computer games players, bloggers, machinimists, fanficers and sceners.
PL
Media wpływają na całokształt obecnego życia jednostki i całych grup społecznych (zarówno naturalnych, jak rodzina jak też wtórnych). Na szczególną uwagę zasługuje „generacja Z”, czyli młodzież urodzona na przełomie XX i XXI wieku, która nie zna świata bez Internetu i innych massmediów. Zjawisko to nakłada się na istniejące już w rzeczywistości społecznej subkultury młodzieżowe, przenosząc wiele ich aspektów do cyberprzestrzeni. Powoduje to wyłonienie się zupełnie nowej jakości istniejących subkultur, jak również powstanie zupełnie nowych subkultur, które nie mogą istnieć poza rzeczywistością wirtualną. Na szczególną uwagę zasługują: cybergoci i cyberpunki, hejterzy, hakerzy i piraci, gracze komputerowi, bolgerzy, machinimiści, fanfikowcy i scenowcy.
PL
W artykule przedstawiono problematykę edukacji multimedialnej w procesie wychowania przedszkolnego, tak istotną wobec szybkiego tempa rozwoju technologii cyfrowych zmieniających świat, a więc także sposoby i kierunki kształcenia na wszelkich szczeblach nauczania. W celu poprawy wiedzy i umiejętności wykorzystania technologii cyfrowych podczas zajęć z dziećmi przez kadrę pedagogiczną w ww. placówkach, potrzebne było przeprowadzenie szkoleń w formie wykładów i warsztatów. Analiza wyników badań, jakimi objęte były uczestniczki przed i po zakończeniu powyższych szkoleń, wskazała na konieczność wprowadzenia systemowego programu kształcenia nauczycieli wychowania przedszkolnego obejmującego naukę z opisanych w niniejszym artykule obszarów technologii cyfrowych.
EN
The article presents a significant topic of multimedia education in the pre-school period, which is very important because of fast development of digital technologies that are changing the world as well as the ways and directions of education on every level of teaching. In order to improve teachers’ knowledge and skills in digital technology use during classes with children in pre-schools, it was necessary to conduct a series of trainings in the form of lectures and workshops. The analysis of the participants’ surveys before and after the trainings revealed the necessity of introducing a systematic educational program for pre-school teachers, covering areas of digital technologies described in this article.
PL
Artykuł jest analizą wpływu nowego rodzaju zagrożeń, płynących z cyberprzestrzeni na współczesne bezpieczeństwo międzynarodowe i relacje międzynarodowe. Jego celem jest także dokonanie oceny, czy działania prowadzone w cyberprzestrzeni są relewantne z punktu widzenia analiz geopolitycznych. Tekst zawiera opis kluczowych zagrożeń, które wynikają z przeniesienia życia społecznego do cyberprzestrzeni.
EN
The article is an analysis of the impact of the new kinds of threats coming from cyberspace to contemporary international security and international relations. It also aims to assess whether activities in cyberspace are relevant from the point of view of geopolitical analyzes. T1he text contains a description of the key risks that result from the transfer of social life in cyberspace.
Przegląd Krytyczny
|
2020
|
vol. 2
|
issue 1
109-120
EN
The author of the text touches upon the subject of the virtual activity of women’s movements in Poland. By using the netography method, with the specific application of an analysis of social networks, she looks at the digital image of Polish feminism, paying attention to the positive and negative aspects accompanying women in their struggle in online space. The author’s main goal was to study the language used by contemporary feminists in the virtual world, whether it is a language of love or a language of hate. The article presents the activities of women’s organizations online, making an attempt at outlining the main ideas visible in the discourse of these movements. Owing to the conducted analysis, the author presents the impact and the clearly outlining intentions of women’s movements online, with particular attention paid to both the positive and the hostile interactions in the feminist online space.
PL
Autorka tekstu porusza temat wirtualnej działalności ruchów kobiecych w Polsce. Posługując się metodą netografii ze szczególnym wykorzystaniem analizy sieci społecznych przygląda się cyfrowemu obliczu polskiego feminizmu, zwracając uwagę na towarzyszące temu pozytywne, jak i negatywne aspekty walki kobiet w przestrzeni online. Głównym celem artykułu było zbadanie języka, jakim posługują się współczesne feministki w wirtualnym świecie, czy jest to język miłości, czy też język nienawiści. W artykule przedstawiono działania organizacji kobiecych w sieci, podejmując próbę nakreślenia głównych idei widocznych w dyskursie tych ruchów. Autorka dzięki przeprowadzonym analizom przedstawia oddziaływanie i wyraźnie nakreślające się intencje ruchów kobiecych w sieci ze szczególnym uwzględnieniem zarówno pozytywnych, jak i wrogich interakcji w feministycznej przestrzeni online.
PL
Internet jako nowe medium ma duży wpływ na zachowania i postawy młodzieży. To oni są zazwyczaj użytkownikami tego medium. Generacja Awatarów to młodzież, która żyje online. Są obecni w sieci na portalach społecznościowych, czatują, wrzucają filmy na YouTube, zdjęcia na Facebooka, to „celebryci” wirtualnego świata. Dla nich Internet to wirtualny przyjaciel, ale bardziej realny niż cokolwiek innego. Inną grupę stanowi młodzież, która korzystając z sieci, chce pozostać w niej anonimowa i to z różnych powodów. Jest jeszcze grupa wykluczonych, którzy nie maja wciąż dostępu do Internetu i z tego powodu są marginalizowani przez rówieśników. Internet oprócz ogromnych możliwości niesie ze sobą szereg niebezpieczeństw. Do najważniejszych z nich możemy zaliczyć: uzależnienia płynące z sieci, czyli siecioholizm, seks wirtualny, trans dysocjacyjny przed monitorem czy agresywne gry sieciowe. Jak to wszystko wpływa na młodzież i jakie niesie w ich życiu skutki – na te, i inne pytania staramy się znaleźć odpowiedź w oparciu o dostępne dane i prowadzone badania.
EN
The Internet as the dominant contemporary communication medium has gained a considerable impact on the social behavior and mental attitudes of juveniles, which are its main users and beneficiaries. We can properly discern three different types of juvenile internetusers: The first group, generally referred to as “Avatars”, lead a separate life “online”. Representatives of this group are omnipresent on community websites, chat, upload movies on YouTube, photos on the Facebook, indulge in being virtual celebrities. For them, the Internet has corporealized as a virtual friendto such a degree that it assumes more reality than any actual human being. The second group comprehends adolescents who make extensive use of internetservices but prefer to keep their anonymity online for various reasons. The third category comprises adolescents without access to the Internet, which marginalizes them among their peers. Aside from the formidable potential the Internet holds in store for its expert user, its implicit dangerous potential shouldn’t be neglected. Among the most imminent risks for its users number various kinds of psychic addictions that linger in the web, as there are: Internet addiction disorder, cyber sex, aggressive computer games, dissociative display trance and many more. In this paper we try to analyze the impact that emanates from the web on the lifestyle of adolescents and young adults, as well as the longterm consequences that may result therefrom, resorting to available databases and research report s.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.