Przejdź do głównego menu Przejdź do sekcji głównej Przejdź do stopki

Artykuły

Tom 59 Nr 6 (2025): Prawo i Więź nr 6 (59) 2025

The Impact of Digital Transformation on Cybersecurity in Poland, Slovakia, and Ukraine

DOI:
https://doi.org/10.36128/c2xvy848
Przesłane
6 listopada 2025
Opublikowane
23-12-2025

Abstrakt

Digital transformation is becoming increasingly widespread, and it can be said that it is an inevitable process. Digitization has enabled the streamlining of a wide range of tasks, from simple everyday activities to complex operations, enhancing efficiency, speed, and cost-effectiveness in their execution. The degree of digitization in a country is a key indicator of its level of development and the competitiveness of its economy. However, the phenomenon of digitization necessitates a heightened focus on cybersecurity measures. Investment in solutions that guarantee cybersecurity is essential for the success of digital transformation, as new technologies are integral to such transformations and will be effectively exploited by cybercriminals and cyberterrorists if not protected. IT systems used in strategic sectors responsible for national or international security must be adequately protected (cybersecurity). Such systems must be resistant to cyberthreats.

Bibliografia

  1. Bencsik András, “The Opportunities of Digitalisation in Public Administration with a Special Focus on the Use of Artificial Intelligence” Studia Iuridica Lublinensia, No. 2 (2024): 11-23, https://doi.org/10.17951/sil.2024.33.2.11-23.
    Pokaż w Google Scholar
  2. Bierecki Dominik, Gaie Christophe, Karpiuk Mirosław, “Artificial Intelligence in e-Administration” Prawo i Więź, No. 1 (2025): 387-407, https://doi.org/10.36128/PRIW.VI54.1201.
    Pokaż w Google Scholar
  3. Boudy Pierre-Alexandre, Czuryk Małgorzata, Melchior Claudio, “The Use of New Technologies in the Field of Security” Ius et Securitas, No. 2 (2025): 67-78.
    Pokaż w Google Scholar
  4. Ciesielski Maciej, “Disinformation in Cyberspace. Introduction to Discussion on Criminalisation Possibilities” Cybersecurity and Law, No. 1 (2024): 185-199.
    Pokaż w Google Scholar
  5. Czuryk Małgorzata, “Activities of the Local Government During a State of Natural Disaster” Studia Iuridica Lublinensia, No. 4 (2021): 111-124, https://doi.org/10.17951/sil.2021.30.4.111-124.
    Pokaż w Google Scholar
  6. Czuryk Małgorzata, “Cybersecurity and Protection of Critical Infrastructure” Studia Iuridica Lublinensia No. 5 (2023): 43-52, https://doi.org/10.17951/sil.2023.32.5.43-52.
    Pokaż w Google Scholar
  7. Czuryk Małgorzata, “Dopuszczalne różnicowanie sytuacji pracowników ze względu na religię, wyznanie lub światopogląd” Studies in Religious Law, No. 27 (2024): 151-163, https://doi.org/10.31743/spw.17518.
    Pokaż w Google Scholar
  8. Czuryk Małgorzata, “Jurisdiction of the Voivode in the Field of Crisis Management” Studia Iuridica Lublinensia No. 2 (2025): 87-98, https://doi.org/10.17951/sil.2025.34.2.87-98.
    Pokaż w Google Scholar
  9. Czuryk Małgorzata, “Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues” Studia Iuridica Lublinensia, No. 3, (2022): 31-43, https://doi.org/10.17951/sil.2022.31.3.31-43 .
    Pokaż w Google Scholar
  10. Czuryk Małgorzata, “Zarządzanie kryzysowe w obszarze cyberbezpieczeństwa” Ius et Securitas, No. 1 (2025): 5-12.
    Pokaż w Google Scholar
  11. Gaie Christophe, Karpiuk Mirosław, Strizzolo Nicola, “Cybersecurity of Public Sector Institutions” Prawo i Więź, No. 6 (2024): 347-362, https://doi.org/10.36128/PRIW.VI53.1129.
    Pokaż w Google Scholar
  12. Gergelewicz Tomasz, “Bipolarity of Artificial Intelligence – Chances and Threats” Ius et Securitas, No. 2 (2024): 71-94.
    Pokaż w Google Scholar
  13. Gergelewicz Tomasz, “Countering Disinformation Concept for building social resilience in times of cognitive warfare” Defence Science Review, No. 20 (2024): 31-44, https://doi.org/10.37055/pno/200300;
    Pokaż w Google Scholar
  14. Gergelewicz Tomasz, “Jailbreak – Unveiling Security Vulnerabilities of ChatGPT” Ius et Securitas, No. 2 (2025): 19-53.
    Pokaż w Google Scholar
  15. Grabowski Bogdan, “Cyfrowe zagrożenia – zarys problemu”, Ius et Securitas, No. 1 (2024): 95-105.
    Pokaż w Google Scholar
  16. Kaczmarek Krzysztof, “Consequences of disinformation: an overview of selected tools and techniques of manipulation,” National Security, No. 2 (2024): 11-27, https://doi.org/10.59800/bn/196693.
    Pokaż w Google Scholar
  17. Kaczmarek Krzysztof, “Disinformation as a risk factor in crisis situations” Roczniki Nauk Społecznych, No. 2 (2023): 19-30 , https://doi.org/10.18290/rns2023.0017.
    Pokaż w Google Scholar
  18. Kaczmarek Krzysztof, “Możliwości stosowania technologii informacyjno-komunikacyjnych w walce z korupcją” Cybersecurity and Law, No. 1 (2021): 65-76.
    Pokaż w Google Scholar
  19. Kaczmarek Krzysztof, “Russian disinformation as an element of influence building in Europe: analysis and perspectives” Roczniki Nauk Społecznych, No. 1 (2024): 109-121, https://doi.org/10.18290/rns2024.0002.
    Pokaż w Google Scholar
  20. Kaczmarek Krzysztof, “Sztuczna inteligencja”, [in:] Leksykon cyberbezpieczeństwa, ed. Katarzyna Chałubińska-Jentkiewicz (Warszawa: ASzWoj, 2024): 250-252.
    Pokaż w Google Scholar
  21. Kaczmarek Krzysztof, Karpiuk Mirosław, Melchior Claudio, “A Holistic Approach to Cybersecurity and Data Protection in the Age of Artificial Intelligence and Big Data” Prawo i Więź, No. 3 (2024): 103-121, https://doi.org/10.36128/PRIW.VI50.907.
    Pokaż w Google Scholar
  22. Karpiuk Mirosław, “Recognising an Entity as an Operator of Essential Services and Providing Cybersecurity at the National Level,” Prawo i Więź, No. 4 (2022): 166-179, https://doi.org/10.36128/priw.vi42.524.
    Pokaż w Google Scholar
  23. Karpiuk Mirosław, “The Legal Status of Digital Service Providers in the Sphere of Cybersecurity” Studia Iuridica Lublinensia, No. 2 (2023): 189-201, https://doi.org/10.17951/sil.2023.32.2.189-201.
    Pokaż w Google Scholar
  24. Karpiuk Mirosław, Melchior Claudio, Soler Urszula, “Cybersecurity Management in the Public Service Sector” Prawo i Więź, No. 4 (2023): 7-27, https://doi.org/ 10.36128/PRIW.VI47.751.
    Pokaż w Google Scholar
  25. Pelc Paweł, “Akt w sprawie sztucznej inteligencji,” Myśl Strategiczna, No. 1 (2025): 35-46.
    Pokaż w Google Scholar
  26. Pieczywok Andrzej, “Wirtualna przestrzeń edukacji człowieka” Ius et Securitas, No. 1 (2025): 53:64.
    Pokaż w Google Scholar
  27. Vasylieva Nataliia, Vasylieva Oleksandra, Prylipko Sergii, Kapitanets Svitlana, „Approaches to the formation of Public Administration in the Context of Decentralization Reform in Ukraine” Cuestiones Políticas, No. 38 (2020): 301-320, https://doi.org/10.46398/cuestpol.38e.19.
    Pokaż w Google Scholar
  28. Włodyka Ewa Maria, “Artificial Intelligence and Ecology: Sustainability in Local Management Concepts”, [in:] Ekologia w dyskursie. Sztuczna inteligencja, eds. Daniel Kalinowski, Patryk Toczyński (Słupsk: UP, 2024): 309-340.
    Pokaż w Google Scholar
  29. Włodyka Ewa Maria, “Artificial Intelligence as a Supporting Tool for Local Government Decision Making in Public Safety” Defence Science Review, No. 17 (2023): 80-91, https://doi.org/10.37055/pno/185616.
    Pokaż w Google Scholar
  30. Włodyka Ewa Maria, Kaczmarek Krzysztof, “Cyber Security of Electrical Grids – A Contribution to Research” Cybersecurity and Law, No. 2 (2024): 260-272.
    Pokaż w Google Scholar
  31. Wojciechowski Tomasz, “Cyberbezpieczeństwo i dezinformacja we współczesnym świecie: strategie ochrony i zarządzania kryzysowego” Ius et Securitas, No. 1 (2024): 83-94.
    Pokaż w Google Scholar

Downloads

Download data is not yet available.

Inne teksty tego samego autora

<< < 1 2