AB

Bibliografia publikacji pracowników
Państwowej Szkoły Wyższej w Białej Podlaskiej

Baza tworzona przez Bibliotekę Akademii Bialskiej im. Jana Pawła II.



Zapytanie: CYBERSPACE
Liczba odnalezionych rekordów: 9



Przejście do opcji zmiany formatu | Wyświetl/ukryj etykiety | Wyświetlenie wyników w wersji do druku | Pobranie pliku do edytora | Nowe wyszukiwanie
1/9
Nr opisu:
Tytuł czasopisma:
Charakterystyka formalna:
Charakterystyka merytoryczna:
Język publikacji:
Index Copernicus: heir targets in cyberspace, as well as the analysis of techniques and tools used in cyber activities. The aim of the article is to identify the role of cyber threat analysis in the context of two current conflicts - the war in Ukraine and the Hamas attack on Israel. The article describes the essence of cyber threat analysis. The research problem focuses on identifying and understanding the role of cyber threat analysis in these conflicts and their potential consequences for international security and regional stability. Through the analysis of reports, online sources, and scientific literature, the article aims to familiarize readers with the role of cyber threat analysis in the context of these conflicts and to propose possible strategies for cyber risk management in the face of contemporary armed conflicts. The results of the analysis of cyber threats (CTA) in current conflicts include the identification of specific actors operating in cyberspace
Praca recenzowana
Słowa kluczowe ang.: ; ;

2/9
Nr opisu:
Autorzy: .
Tytuł czasopisma:
Charakterystyka formalna:
Charakterystyka merytoryczna:
Język publikacji:
Wskaźnik Impact Factor ISI: study utilizes the latest research presented in documents and reports on cybersecurity, published in 2023 by international and national organizations and institutions. Additionally, an analysis was conducted based on scientific articles from recent years. Information was also obtained from national legal acts and documents published by European Union bodies. Findings: Cybersecurity management is a crucial element of the functioning of a modern organization. Organizations that do not take action in the field of cybersecurity risk not only financial losses or loss of reputation but also the possibility of ceasing operations. Practical Implications: Cybersecurity plays a key role in managing a modern organization, protecting the company's data, systems, reputation, and financial resources. In the face of the increasing number and complexity of threats, organizations must constantly adapt their security strategies. An effective cybersecurity strategy can protect against significant financial losses, loss of reputation, and legal consequences. Moreover, it can help build trust among customers and business partners, which is essential for the long-term success of the organization. Cyber threats are constantly evolving, requiring continuous monitoring and analysis of new trends and techniques used by cybercriminals. Continuous research on new threats, including research on specific industries and sectors, is needed to create dedicated protection strategies. Originality/Value: In this study, the authors characterize the security environment within an organization, describe the cybersecurity framework for organizations in both EU and Polish legal regulations, and present contemporary cybersecurity threats within organizations. Continuous research and implementation of the latest protection technologies, such as artificial intelligence (AI) and machine learning (ML), which can predict and detect new types of threats, are necessary. Further research on the application of AI and ML in cybersecurity can significantly improve an organization's ability to respond quickly to threats.^acyberspace^amanagement^aorganization^athreats
Praca recenzowana
Słowa kluczowe ang.: ; ;

3/9
Nr opisu: D^bCC-BY^cAT_PUBLICATION^eOPEN_JOURNAL^aPurpose: The study encompasses the characterization of cyberspace, and the threats present on the Internet. Furthermore, the changes resulting from the development of information technologies are presented, with particular emphasis on the scale of the phenomenon. The authors elucidate the distinction between the Internet and cyberspace, as well as the origins of the term "cyberspace," which continues to evoke criticism within the scientific community and poses challenges in terms of definition. The authors also address the hazards associated with Internet usage, categorizing them as physical, psychological, social, and dependencies on cyberspace. Design/Methodology/Approach: Taking into account the magnitude of the phenomenon, the subject of investigation for this study is defined as security threats in cyberspace. Adhering to the theoretical principles of research goal specification, the aim of this study is to present the threats and their impact on cybersecurity in cyberspace. The aforementioned objective is achieved by utilizing theoretical information from the literature on the subject and conducting original research. The primary research problem adopted for this study is as follows: What are the most influential threats to cybersecurity in cyberspace, and what countermeasures exist to mitigate these threats? Accordingly, the following hypothesis is formulated in response to the research problem: Each type of threat carries significant consequences, and it is imperative to counteract these threats through appropriate Internet usage practices. The research employs a methodology that involves literature analysis, the examination o
Autorzy: , .
Tytuł pracy:
Punktacja ministerstwa:
Praca recenzowana
Słowa kluczowe ang.:
Streszczenie:

4/9
Nr opisu:
Autorzy: , Wydawnictwo Naukowe TYGIEL Lublin978-83-67104-19-7informacjacyberspaceThe aim of the analysis is to indicate the changes occurring in information consumption in cyberspace. The Internet has become a new space for the development of consumption; this is the means which facilitates consumption at an unprecedented level. Taking into account the development of cyberspace as an area of information consumption, the article focuses on .
Tytuł równoległy: Lublin978-83-67104-19-7informacjacyberspaceThe aim of the analysis is to indicate the changes occurring in information consumption in cyberspace. The Internet has become a new space for the development of consumption; this is the means which facilitates consumption at an unprecedented level. Taking into account the development of cyberspace as an area of information consumption, the article focuses on an analysis of this impact and the changes which occur as a result of the influence of new information and communications technologies in the field of information consumption. Information risks in the 21st century have also been indicated. The use of mobile technologies in consumption is a key element of the knowledge economy. The virtualisation of consumption is a good example of using technological solutions to meet consumer needs. The article is synthetic and analytical in nature.InternetinformationkonsumpcjaInternet : Wydawnictwo Naukowe TYGIEL
Tytuł całości: W:
Miejsce wydania:
Wydawca:
Rok wydania:
ISBN:
Opis fizyczny:
Język publikacji:
Słowa kluczowe ang.: ion. Information risks in the 21st century have also been indicated. The use of mobile technologies in consumption is a key element of the knowledge economy. The virtualisation of consumption is a good example of using technological solutions to meet consumer needs. The article is synthetic and analytical in nature.^aInternet^ainformation^akonsumpcja^aInternet
Słowa kluczowe:
Słowa kluczowe ang.: ;

5/9
Nr opisu: 544-7122^bQ^e2545-0719^iX^jXY^kQ200027^a003^b003^c2022-11-25, 12:12^d2022-11-25, 12:13^e3219799027^f3219799026^aSecurity threats in cyberspace^aScientific Journal of the Military University of Land Forces^a2022^bVol. 205^cno. 3^dp. 415--426^a2544-7122^a2022/2023^a10.5604/01.3001.0016.0040^aCiekanowski, Zbigniew^cy^acybersecurity^aFINAL_PUBLISHED^bCC-BY^cAT_PUBLICATION^eOPEN_JOURNAL^aThe article is an attempt to highlight the main types of security threats in cyberspace. As literature provides a multitude of different approaches, standards, methodologies, and proposals for the classification of threats, the article focuses on threats to privacy and national ICT security. Cyberspace is subject to increasingly sophisticated and targeted threats, while our growing reliance on cyberspace exposes our privacy to risks, giving rise to new and significant security gaps. Due to its specific characteristics, it generates serious threats to individuals as well as to national and international security. Depending on the research perspective we adopt, these threats are variable, multidimensional, and multifaceted in nature. Therefore, they require systematic analysis and response.^acyberspace^acybercrime^asecurity
Autorzy: , , Q 003 Vol. 205 CC-BY 2544-7122003Security threats in cyberspaceScientific Journal of the Military University of Land Forces20222544-71222022/202310.5604/01.3001.0016.0040Ciekanowski, ZbigniewcybersecurityFINAL_PUBLISHEDThe article is an attempt to highlight the main types of security threats in cyberspace. As literature provides a multitude of different approaches, standards, methodologies, and proposals for the classification of threats, the article focuses on threats to privacy and national ICT security. Cyberspace is subject to increasingly sophisticated and targeted threats, while our growing reliance on cyberspace exposes our privacy to risks, giving rise to new and significant security gaps. Due to its specific characteristics, it generates serious threats to individuals as well as to national and international security. Depending on the research perspective we adopt, these threats are variable, multidimensional, and multifaceted in nature. Therefore, they require systematic analysis and response.cyberspacecybercrimesecurity.
Tytuł pracy:
Seria: 2544-7122003Security threats in cyberspaceScientific Journal of the Military University of Land Forces2022, Q, 003, Vol. 205, 2022-11-25, 12:12, n ; 2022-11-25, 12:13, 2545-0719, 3219799027, 3219799026
Miejsce: cyberspacecybercrimesecurity
Punktacja ministerstwa:
Praca recenzowana
Słowa kluczowe ang.:
Streszczenie:

6/9
Autorzy: .
Tytuł równoległy:
Seria: cyberterroryzmcyberterrorismThe largest civilization threats of the 21st century include terrorism, which causes fear and anxiety of people around the world. Until recently, it took the form of bomb attacks, abductions and kidnapping of hostages. Unfortunately, as a result of the development of new t
Uwagi:
Charakterystyka formalna: esult of the development of new technologies over the past years, a new threat called cyber terrorism has emerged. The authors in the first part of the article define the concept of cyber-terrorism and discuss the problems of cybercrime that they divide into groups. In the next part, they characterize the protection of cyberspace in the country on the example of Poland. In summary, they argue that combating such a threat as cyberterrorism is very, difficult, arduous and very expensive, but it is particularly important to ensure the security of the state.^acyberprzestrzeń^acyberspace^acyberataki^acyber attacks^asystemy^asystems
Charakterystyka wg MNiSW:
Index Copernicus: postać przede wszystkim zamachów bombowych, uprowadzeń, porywania zakładników. Niestety na skutek rozwoju nowych technologii na przestrzeni ostatnich lat, powstało nowe zagrożenie nazywane cyberterroryzmem. Autorzy w pierwszej części artykułu definiują pojęcie cyberterroryzmu oraz omawiają problematykę cyberprzestępstw, które dzielą na grupy. W kolejnej części charakteryzują ochronę cyberprzestrzeni w państwie na przykładzie Polski. W podsumowaniu stwierdzają, iż walka z takim zagrożeniem jak cyberterroryzm jest bardzo, trudna, mozolna i bardzo kosztowna, ale jest szczególnie ważna do zapewnienia bezpieczeństwa państwa.^acyberterroryzm^acyberterrorism^aThe largest civilization threats of the 21st century include terrorism, which causes fear and anxiety of people around the world. Until recently, it took the form of bomb attacks, abductions and kidnapping of hostages. Unfortunately, as a result of the development of new technologies over the past years, a new threat called cyber terrorism has emerged. The authors in the first part of the article define the concept of cyber-terrorism and discuss the problems of cybercrime that they divide into groups. In the next part, they characterize the protection of cyberspace in the country on the example of Poland. In summary, they argue that combating such a threat as cyberterrorism is very, difficult, arduous and very expensive, but it is particularly important to ensure the security of the state.^acyberprzestrzeń^acyberspace^acyberataki^acyber attacks^asystemy^asystems
Słowa kluczowe: ;
Słowa kluczowe ang.: ;


7/9
Nr opisu: achildren^aResearch results
Autorzy: .
Tytuł równoległy:
Seria:
ISBN:
Charakterystyka wg MNiSW:
Index Copernicus: net can be used for illegal purposes. Free access to cyberspace for everyone makes the network full of threats. Particularly vulnerable are children whose minds are just developing. Inappropriate content can be harmful to them, leading to many serious disorders and health problems, both psychological and physical. It is therefore essential to observe basic safety rules, to educate the environment in which children are staying and to control the material being viewed. Research shows that the most important element of ensuring children safety is parental interest and control that is not possible without sufficient knowledge of the risks and how to counteract them. That is why it is so important to educate both children and parents who exercise such control. Helpful in this may be different types of guides, which are available in electronic or paper form. Parents can learn how to prevent dangers without leaving home.^acyberprzestrzeń^acyberspace^adzieci^achildren^aResearch results
Praca recenzowana
Słowa kluczowe:
Słowa kluczowe:
Słowa kluczowe ang.: ;


8/9
Nr opisu: w w sieci, które ustala prawodawstwo międzynarodowe. Wskazano zatem na podstawowe regulacje zatwierdzone przez Unię Europejską, ale i państwa skupione wokół NATO. Ponieważ działalność cyberterrorystów zorientowana jest na wywołanie paraliżu płaszczyzny politycznej, społecznej, psychologicznej oraz ekonomicznej, próby monitorowania zagrożeń dotyczą bardzo szerokiego pola oddziaływania. W treści opracowania wskazano, że szczególnie narażone na działanie cyberterrorystów są sektory, w których funkcjonują sieci telekomunikacyjne (infrastruktura telefoniczna, satelitarna oraz komputerowa), sektor finansowy i bankowy, transport, sektor energetyczny oraz instytucje władz publicznych. Autorzy opracowania snują rozważania wokół tezy, że zakłócenie działania, choć jednego z wymienionych wyżej sektorów, może doprowadzić do ogromnych, negatywnych konsekwencji dla każdego obywatela danego państwa.^acyberprzestępstwo^acybercrime^aWith the development of computer technology a new term appeared - cyberterrorism as a modern type of weapons of mass destruction, which along with further development will become more and more dangerous. Cyber terrorism as a specific category of threats includes actions in relation to ICT systems, undertaken to achieve specific terrorist goals. Terrorist organizations are usually associated with a state, its special services, religious denominations, criminal groups or they can function in order to gain popularity in the national (local) or international arena. These activities have specific goals that allow them to influence social, political or even military decisions. The article attempts to analyze the essence and conditions of cyberterrorism. It indicates which elements determine the ease of dissemination of cyberaggression and what determines the asymmetry of the conflict caused by the undesirable activities of criminals in the network. Concepts closely related to the topics discussed include: cyberspace, cybercrime, cyberagression, cyberterrorists and reference to the framework of functioning of entities in the network, whi
Autorzy: .
Tytuł równoległy:
Tytuł równoległy:
Charakterystyka merytoryczna: ormatycznych, podejmowane dla osiągnięcia konkretnych celów terrorystycznych. Organizacje terrorystyczne są z reguły powiązane z jakimś państwem, jego służbami specjalnymi, wyznaniami religijnymi, grupami przestępczymi lub mogą funkcjonować w celu zdobycia popularności na arenie krajowej (lokalnej) czy międzynarodowej. Działania te mają specyficzne cele, które pozwalają uzyskać wpływ na decyzje socjalne, polityczne czy nawet militarne. W artykule podjęto próbę analizy istoty i uwarunkowań cyberterroryzmu. Wskazano jakie elementy warunkują łatwość rozpowszechniania się cyberagresji oraz określono co wpływa na asymetryczność konfliktu wywołanego przez niepożądaną działalność przestępców w sieci. Przedstawiono pojęcia ściśle związane z poruszaną tematyką jak m.in.: cyberprzestrzeń, cyberprzestępstwo, cyberagresja, cyberterroryści oraz odniesiono się do ram funkcjonowania podmiotów w sieci, które ustala prawodawstwo międzynarodowe. Wskazano zatem na podstawowe regulacje zatwierdzone przez Unię Europejską, ale i państwa skupione wokół NATO. Ponieważ działalność cyberterrorystów zorientowana jest na wywołanie paraliżu płaszczyzny politycznej, społecznej, psychologicznej oraz ekonomicznej, próby monitorowania zagrożeń dotyczą bardzo szerokiego pola oddziaływania. W treści opracowania wskazano, że szczególnie narażone na działanie cyberterrorystów są sektory, w których funkcjonują sieci telekomunikacyjne (infrastruktura telefoniczna, satelitarna oraz komputerowa), sektor finansowy i bankowy, transport, sektor energetyczny oraz instytucje władz publicznych. Autorzy opracowania snują rozważania wokół tezy, że zakłócenie działania, choć jednego z wymienionych wyżej sektorów, może doprowadzić do ogromnych, negatywnych konsekwencji dla każdego obywatela danego państwa.^acyberprzestępstwo^acybercrime^aWith the development of computer technology a new term appeared - cyberterrorism as a modern type of weapons of mass destruction, which along with further development will beco
Charakterystyka wg MNiSW:
Praca recenzowana
Słowa kluczowe: ;
Słowa kluczowe ang.:
Uwaga:


9/9
Autorzy: .
Tytuł równoległy:
Seria:
ISBN:
Charakterystyka wg MNiSW:
Index Copernicus: the threats it poses to children, and how to counter them. There are a number of definitions both in expert publications and in government documents, which can help to understand what cyberspace is. The changes that have taken place in the beginning of the IT revolution have led to the emergence of new types of cyber threats. A virtual reality user is free to use e-mail, social networking, a wide variety of websites or databases. All this is available anywhere on the ground, the only limitation is the device for Internet access and network coverage. The multiplicity of both portable and fixed devices makes access to cyberspace ever easier. Younger children are getting their mobile devices as a gift, guaranteeing them free surfing the Internet. Old ways of spending free time disappear. Family walks, outdoor fun, playing football with friends is a thing of the past. Fewer children spend time in this way, most of them choose cyberspace.^adzieci^acyberspace^azagrożenia^achildren and adolescents^aprevention
Praca recenzowana
Słowa kluczowe ang.: ieci^acyberspace^azagrożenia^achildren and adolescents^aprevention
Słowa kluczowe:
Słowa kluczowe ang.: ;


  Wyświetl ponownie stosując format:
Wyświetl/ukryj etykiety | Wyświetlenie wyników w wersji do druku | Pobranie pliku do edytora | Nowe wyszukiwanie | Biblioteka AB