PURPOSE: The aim of the article is to present the legal solutions for cyber security in the European Union and in Poland, as well as to identify the cyber security challenges faced by individual countries, their institutions and society.DESIGN/METHODOLOGY/APPROACH: The article analyzes the activities undertaken at the national and international level to build IT security systems and assesses the activities in this area in Poland and Europe to date. Based on the data collected, the main obstacles to improving cyber security competence were identified, as well as proposals for action in the area under study. The research method adopted by the author is secondary research, based on the analysis of literature, research results and legal ...
This open access book explores the legal aspects of cybersecurity in Poland. The authors are not lim...
The EU Global Strategy for Foreign and Security Policy was adopted by the European Council on June 2...
The problem of cyberattacks may seem distant in Poland. Although most entrepreneurs operating in Pol...
PURPOSE: The aim of the article is to present the legal solutions for cyber security in the Europea...
PURPOSE: The aim of the article is to present the legal solutions for cyber security in the Europea...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
The purpose of this article is to provide a detailed overview of the essential measures and regulati...
Aim: The main purpose of these considerations is to identify the cyberspace protection issues in the...
The article presents interpretations of the concepts of cybersecurity and cybercrime as well as the ...
The article analyzes the state of European cybersecurity on selected examples. In the face of the in...
The purpose of the article is to analyze the state of legal support cybersecurity in Ukraine and to ...
The aim of the article is to analyse the concepts of «cyber hygiene», «cyber security», «cyber prote...
The aim of the article is to study the issue of achieving a balance between information protection ...
This open access book explores the legal aspects of cybersecurity in Poland. The authors are not lim...
The EU Global Strategy for Foreign and Security Policy was adopted by the European Council on June 2...
The problem of cyberattacks may seem distant in Poland. Although most entrepreneurs operating in Pol...
PURPOSE: The aim of the article is to present the legal solutions for cyber security in the Europea...
PURPOSE: The aim of the article is to present the legal solutions for cyber security in the Europea...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
PURPOSE: The main aim of this article is to characterize threats in the cyber domain affecting the ...
The purpose of this article is to provide a detailed overview of the essential measures and regulati...
Aim: The main purpose of these considerations is to identify the cyberspace protection issues in the...
The article presents interpretations of the concepts of cybersecurity and cybercrime as well as the ...
The article analyzes the state of European cybersecurity on selected examples. In the face of the in...
The purpose of the article is to analyze the state of legal support cybersecurity in Ukraine and to ...
The aim of the article is to analyse the concepts of «cyber hygiene», «cyber security», «cyber prote...
The aim of the article is to study the issue of achieving a balance between information protection ...
This open access book explores the legal aspects of cybersecurity in Poland. The authors are not lim...
The EU Global Strategy for Foreign and Security Policy was adopted by the European Council on June 2...
The problem of cyberattacks may seem distant in Poland. Although most entrepreneurs operating in Pol...