An information society is a society that makes widespread use of teleinformation systems to meet the needs of its members. Information society services are rendered in cyberspace, which is a vulnerable domain. The development of information technologies to provide digital services should be coupled with adequate protection. Considering the above, providing information society services must be accompanied by cybersecurity. A suitable level of cybersecurity of the teleinformation systems used to provide services should ensure their proper operation and reduce vulnerabilities.
REFERENCES(41)
1.
Beauchamp T.L., Childress J.F., Principles of biomedical ethics, New York 2009.
Czuryk M., Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues, „Studia Iuridica Lublinensia” 2022, no. 3.
Czuryk M., Supervision and Inspection in the Field of Cybersecurity [in:] The Public Dimension of Cybersecurity, eds. M. Karpiuk, J. Kostrubiec, Maribor 2022.
Czuryk M., Supporting the development of telecommunications services and networks through local and regional government bodies, and cybersecurity, „Cybersecurity and Law” 2019, no. 2.
Gwoździewicz S., Prokopowicz D., Determinants of Electronic Data Interchange Security in the Context of Big Data and Cloud Computing Technology Development. Sentiment Analysis Conducted for Cybercrime Issues Occurred in the Period from May 2017 to February 2019, „International Journal of New Economics and Social Sciences” 2022, no. 1.
Kaczmarek K., Digital Competencies of the General Public and the State’s Vulnerability to Cyberspace Threats [in:] The Public Dimension of Cybersecurity, eds. M. Karpiuk, J. Kostrubiec, Maribor 2022.
Karpiuk M., The Protection of State Security in Cyberspace as a Justifying Ground for Restricting Constitutional Freedoms and Rights, „Przegląd Prawa Konstytucyjnego” 2022, no. 3.
Kurek J., Operational Activities in the Field of Cybersecurity [in:] Cybersecurity in Poland. Legal Aspects, eds. K. Chałubińska-Jentkiewicz, F. Radoniewicz, T. Zieliński, Cham 2022.
Maglaras L., Ferrag M.A., Derhab A., Mukherjee M., Jakicke H., Rallis S., Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures, „EAI Endorsed Transactions on Security and Safety” 2018, no. 10.
Prokopowicz D., Matosek M., Importance and Security of Information Provided by the Internet in the Context of the Development of Economic Entities in Poland, „International Journal of New Economics and Social Sciences” 2017, no. 2.
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.