Skip to main navigation menu Skip to main content Skip to site footer

Articles

No. 4 (47) (2023)

Cybersecurity Management in the Public Service Sector

DOI
https://doi.org/10.36128/PRIW.VI47.751
Submitted
September 12, 2023
Published
2024-02-14

Abstract

This paper refers to the issues that bring together the elements of management, law and security, which must be harmonized well enough to allow effective cybersecurity management in the public service sector, which is mainly focused on the effective performance of its tasks (also with the use of ICT systems), at local, regional and national levels. The paper aims to evaluate the processes occurring in cyberspace and the mechanisms for stimulating them, in terms of effective cybersecurity management in the public service sector. The issues related to cybersecurity management in the public service sector have not been the subject of comprehensive analyses. The subject has been treated in a fragmentary manner. Therefore, this article is part of new research. The authors have contributed equally to the study.

References

  1. Chałubińska-Jentkiewicz Katarzyna, „Cyberbezpieczeństwo – zagadnienia definicyjne” Cybersecurity and Law, No. 2 (2019): 7-23. doi.org/10.35467/cal/133828.
    Show in Google Scholar -->>
  2. Cheung Kam-Fung, Bell Michael, Bhattacharjya Jyoti, „Cybersecurity in Logistics and Supply Chain Management: An Overview and Future Research Directions” Transportation Research Part E: Logistics and Transportation Review, No. 146 (2021): 1-18. https://doi.org/10.1016/j.tre.2020.102217.
    Show in Google Scholar -->>
  3. Chodakowska Aneta, Sławomira Kańduła, Joanna Przybylska, „Cybersecurity in the Local Government Sector in Poland: More Work Needs to be Done” Lex Localis. Journal of Local Self-Government, No. 1 (2022): 161-192. doi.org/10.4335/20.1.161-192(2022).
    Show in Google Scholar -->>
  4. Czuryk Małgorzata, „Supporting the Development of Telecommunications Services and Networks Through Local and Regional Government Bodies and Cybersecurity” Cybersecurity and Law, No. 2 (2019): 39-50. doi.org/10.35467/cal/133839.
    Show in Google Scholar -->>
  5. Czuryk Małgorzata, „Activities of the Local Government During a State of Natural Disaster, Studia Iuridica Lublinensia, No. 4 (2021): 111-124. doi.org/10.17951/sil.2021.30.4.111-124.
    Show in Google Scholar -->>
  6. Czuryk Małgorzata, „Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues” Studia Iuridica Lublinensia, No. 3 (2022): 31-43. doi.org/10.17951/sil.2022.31.3.31-43.
    Show in Google Scholar -->>
  7. Ganin Alexander, Phuoc Quach, Mahesh Panwar, Zachary Collier, Jeffrey Keisler, Dayton Marchese, Igor Linkov, „Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management” Risk Analysis, No. 1 (2020): 183-199. doi.org/10.1111/risa.12891.
    Show in Google Scholar -->>
  8. Guść Janusz, „Dogmatyka prawa”, [in:] Leksykon współczesnej teorii i filozofii prawa. 100 podstawowych pojęć, ed. Jerzy Zajadło. 53-54. Warsaw: C. H. Beck, 2007.
    Show in Google Scholar -->>
  9. Hoffman Istvan, Mirosław Karpiuk, „E-administration in Polish and Hungarian Municipalities – a Comparative Analysis of the Regulatory Issues” Lex Localis. Journal of Local Self-Government, No. 3 (2022): 617-640. doi.org/10.4335/20.3.617-640(2022).
    Show in Google Scholar -->>
  10. Incident reporting. https://ciras.enisa.europa.eu/ciras-consolidated-reporting.
    Show in Google Scholar -->>
  11. Jenab Kouroush, Saeid Moslehpour, „Cyber Security Management A Review” Business Management Dynamics, No. 11 (2016): 6-39.
    Show in Google Scholar -->>
  12. Karpiuk Mirosław, „The Organisation of the National System of Cybersecurity: Selected Issues” Studia Iuridica Lublinensia, No. 2 (2021): 233-244. doi.org/10.17951/sil.2021.30.2.233-244.
    Show in Google Scholar -->>
  13. Karpiuk Mirosław, „The Local Government’s Position in the Polish Cybersecurity System” Lex Localis. Journal of Local Self-Government, No. 3 (2021): 609-620. doi.org/10.4335/19.3.609-620(2021).
    Show in Google Scholar -->>
  14. Karpiuk Mirosław, „Crisis Management vs Cyber Threats” Sicurezza, Terrorismo e Societa, No. 2 (2022): 113-123.
    Show in Google Scholar -->>
  15. Karpiuk Mirosław, „Position of the Local Government of Commune Level in the Space of Security and Public Order” Studia Iuridica Lublinensia, No. 2 (2019): 27-39. doi.org/10.17951/sil.2019.28.2.27-39.
    Show in Google Scholar -->>
  16. Karpiuk Mirosław, „Recognising an Entity as an Operator of Essential Services and Providing Cybersecurity at the National Level” Prawo i Więź, No. 4 (2022b): 166-179. doi.org/ 10.36128/priw.vi42.524.
    Show in Google Scholar -->>
  17. Karpiuk Mirosław, „The Legal Status of Digital Service Providers in the Sphere of Cybersecurity” Studia Iuridica Lublinensia, No. 2 (2023): 189-201. doi.org/10.17951/sil.2023.32.2.189-201.
    Show in Google Scholar -->>
  18. Karpiuk Mirosław, „The Protection of State Security in Cyberspace as a Justifying Ground for Restricting Constitutional Freedoms and Rights” Przegląd Prawa Konstytucyjnego, No. 3 (2022c): 401-412. doi.org/0.15804/ppk.2022.03.30.
    Show in Google Scholar -->>
  19. Karpiuk Mirosław, „The Provision of Safety in Water Areas: Legal Issues” Studia Iuridica Lublinensia, No. 1 (2022): 79-92. doi.org/10.17951/sil.2022.31.1.79-92.
    Show in Google Scholar -->>
  20. Karpiuk Mirosław, Tomasz Włodek, „Wygaśnięcie mandatu wójta na skutek skazania na karę grzywny za niedopełnienie obowiązków z zakresu zarządzania kryzysowego. Glosa do wyroku Sądu Rejonowego w P. z dnia 18 kwietnia 2019 r. (II K 1164/14)” Studia Iuridica Lublinensia, No. 1 (2020): 273-290. doi.org/10.17951/sil.2020.29.1.273-290.
    Show in Google Scholar -->>
  21. Kostrubiec Jarosław, „Cybersecurity System in Poland. Selected Legal Issues”, [in:] The Public Dimension of Cybersecurity, ed. Mirosław Karpiuk, Jarosław Kostrubiec. 7-17. Maribor: Lex Localis Press, 2022. doi.org/10.4335/2022.1.1.
    Show in Google Scholar -->>
  22. Kostrubiec Jarosław, „The Position of the Computer Security Incidents Response Teams in the National Cybersecurity System” Cybersecurity and Law, No. 2 (2022): 27-37. doi.org/10.35467/cal/157121.
    Show in Google Scholar -->>
  23. Kościelecki Lech, Karolina Doran, „Model zarządzania bezpieczeństwem informacji w przedsiębiorstwie” Systemy Logistyczne Wojsk, No. 4 (2017): 107-134.
    Show in Google Scholar -->>
  24. Krajobraz bezpieczeństwa polskiego internetu. Raport roczny 2019 z działalności CERT Polska. Warsaw: NASK.CERT.PL, 2020.
    Show in Google Scholar -->>
  25. Krajobraz bezpieczeństwa polskiego internetu. Raport roczny 2020 z działalności CERT Polska. Warsaw: NASK.CERT.PL, 2021.
    Show in Google Scholar -->>
  26. Krajobraz bezpieczeństwa polskiego internetu. Raport roczny 2021 z działalności CERT Polska. Warsaw: NASK.CERT.PL, 2022.
    Show in Google Scholar -->>
  27. Limba Tadas, Tomas Plėta, Konstantin Agafonov, Martynas Damkus, „Cyber Security Management Model for Critical Infrastructure” Entrepreneurship and Sustainability Issues, No. 4 (2017): 559-573. http://dx.doi.org/10.9770/jesi.2017.4.4(12).
    Show in Google Scholar -->>
  28. Makuch Anna, „Strategic and Political Responsibility in the Domain of Cybersecurity – Problems and Challenges”, [in:] The Role of Cybersecurity in the Public Sphere – The European Dimension, ed. Katarzyna Chałubińska-Jentkiewicz, Istvan Hoffman. 69-78. Maribor: Lex Localis Press, 2022. doi.org/10.4335/2022.2.5.
    Show in Google Scholar -->>
  29. Makuch Anna, „Raising Public and Private User Awareness of the Threats and Risks Related to Cyberspace Security” Cybersecurity and Law, No. 2 (2022): 44-55. doi.org/10.35467/cal/157123.
    Show in Google Scholar -->>
  30. Pizło Wojciech, „Management in Cyberspace: From Firewall to Zero Trust”, [in:] The Public Dimension of Cybersecurity, ed. Mirosław Karpiuk, Jarosław Kostrubiec. 133-146. Maribor: Lex Localis Press, 2022. doi.org/10.4335/2022.1.13.
    Show in Google Scholar -->>
  31. Sarkowicz Ryszard, Stelmach Jerzy, Teoria prawa. Kraków: Wydawnictwo Uniwersytetu Jagiellońskiego, 2001.
    Show in Google Scholar -->>
  32. Soler Urszula, „The Role of Network Technologies in European Cybersecurity”, [in:] The Role of Cybersecurity in the Public Sphere – The European Dimension, eds. Katarzyna Chałubińska-Jentkiewicz, Istvan Hoffman. 47-58. Maribor: Lex Localis Press, 2022. doi.org/10.4335/2022.2.3.
    Show in Google Scholar -->>
  33. Szczepankiewicz Elżbieta, „Model zarządzania bezpieczeństwem informacji korporacyjnych w przedsiębiorstwie” Przedsiębiorczość i Zarządzanie, No. 2 (2018): 191-209.
    Show in Google Scholar -->>
  34. Tyrawa Dominik, „The Axiological and Legal Aspects of the Multi-faceted Nature of Cybersecurity”, [in:] The Public Dimension of Cybersecurity, eds. Mirosław Karpiuk, Jarosław Kostrubiec. 19-37. Maribor: Lex Localis Press, 2022. doi.org/10.4335/2022.1.2.
    Show in Google Scholar -->>
  35. Wyrzykowska Barbara, Tetiana Balanowska, „Zarządzanie w warunkach rewolucji cyfrowej”, [in:] Współczesne obszary zarządzania, ed. Wojciech Pizło. 13-28. Warsaw: SGGW, 2021.
    Show in Google Scholar -->>
  36. Zeliaś Aleksander, Metody Statystyczne. Warsaw: Polskie Wydawnictwo Ekonomiczne, 2000.
    Show in Google Scholar -->>

Downloads

Download data is not yet available.