Skip to main navigation menu Skip to main content Skip to site footer

Articles

No. 3 (2024): Law & Social Bonds Nr 4 (50) 2024

A Holistic Approach to Cybersecurity and Data Protection in the Age of Artificial Intelligence and Big Data

DOI
https://doi.org/10.36128/PRIW.VI50.907
Submitted
April 2, 2024
Published
2024-08-21

Abstract

Given the rapid technological advancements, cybersecurity and personal data protection are developing into key aspects requiring a holistic approach. The dynamic development of artificial intelligence (AI) and big data technologies creates new opportunities for cybersecurity. At the same time, these give rise to potential attack vectors. The article highlights the relationship between cybersecurity and personal data protection, indicating the need for integrated measures to be taken at multiple levels. This includes developing and implementing advanced technological solutions and education to increase users’ digital competencies. The analysis reveals that only by balancing the potential offered by modern technologies with the risks related to the human factor is it possible to protect personal data in the digital ecosystem effectively.

References

  1. Adjerid Idris, Eyal Peer, Alessandro Acquisti, „Beyond the Privacy Paradox” MIS Quarterly, No. 2 (2018): 465-488. https://doi.org/10.25300/MISQ/2018/14316.
    Show in Google Scholar -->>
  2. Arce Daniel G., „Malware and market share” Journal of Cybersecurity, No.1 (2018): 1-6. https://doi.org/10.1093/cybsec/tyy010.
    Show in Google Scholar -->>
  3. Arpetti Jacopo, Marco Delmastro, „The privacy paradox: a challenge to decision theory?” Journal of Industrial and Business Economics, No. 4 (2021): 505-525. https://doi.org/10.1007/s40812-021-00192-z.
    Show in Google Scholar -->>
  4. Baek Young Min, „Solving the privacy paradox: A counter-argument experimental approach” Computers in human behawior, 38 (2014): 33-42. https://doi.org/10.1016/j.chb.2014.05.006.
    Show in Google Scholar -->>
  5. Barth Susanne, Menno D.T. de Jong, „The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review” Telematics and informatics, No. 7 (2017): 1038-1058. https://doi.org/10.1016/j.tele.2017.04.013.
    Show in Google Scholar -->>
  6. BDO Digital, Eliminate Routine Tasks with Automation and Generative AI. 2023. https://www.bdodigital.com/insights/automation/eliminate-routine-tasks-with-automation-and-generative-ai accessed 11 Feb. 2024.
    Show in Google Scholar -->>
  7. Bencsik András, Mirosław Karpiuk, Miroslav Kelemen, Ewa Włodyka, Cybersecurity in the Visegrad Group Countries. Maribor: Institute for Local Self-Government Maribor, 2023. http://dx.doi.org/10.4335/2023.6.
    Show in Google Scholar -->>
  8. Brandimarte Laura, Alessandro Acquisti, George Loewenstein, „Misplaced confidences: Privacy and the control paradox” Social psychological and personality science, No. 3 (2013): 340-347. https://doi.org/10.1177/1948550612455931.
    Show in Google Scholar -->>
  9. Chałubińska-Jentkiewicz Katarzyna, „Disinformation – and what else?” Cybersecurity and Law, No. 2 (2021): 9-19. https://doi.org/10.35467/cal/146453.
    Show in Google Scholar -->>
  10. Czuryk Małgorzata, „Activities of the Local Government During a State of Natural Disaster” Studia Iuridica Lublinensia, No. 4 (2021): 111-124. http://dx.doi.org/10.17951/sil.2021.30.4.111-124.
    Show in Google Scholar -->>
  11. Czuryk Małgorzata, „Cybersecurity and Protection of Critical Infrastructure” Studia Iuridica Lublinensia, No. 5 (2023): 43-52. http://dx.doi.org/10.17951/sil.2023.32.5.43-52.
    Show in Google Scholar -->>
  12. Czuryk Małgorzata, „Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues” Studia Iuridica Lublinensia, No. 3 (2022): 31-43. doi: http://dx.doi.org/10.17951/sil.2022.31.3.31-43.
    Show in Google Scholar -->>
  13. Darem Abdulbasit A., Asma A. Alhashmi, Tareq M. Alkhaldi, Abdullah M. Alashjaee, Sultan M. Alanazi, Shouki A. Ebad, „Cyber Threats Classifications and Countermeasures in Banking and Financial Sector” IEEE Access, No. 11 (2023): 125138-125158. https://doi.org/10.1109/ACCESS.2023.3327016.
    Show in Google Scholar -->>
  14. European Commission, What is personal data?. https://commission.europa.eu/law/law-topic/data-protection/reform/what-personal-data_en accessed 11 Feb. 2024.
    Show in Google Scholar -->>
  15. General Data Protection Regulation (GDPR) (2016). https://gdpr-info.eu/ accessed 11 Feb. 2024.
    Show in Google Scholar -->>
  16. Hsu, Fu-Hau, Min-Hao Wu, Yan-Ling Hwang, Chia-Hao Lee, Chuan-Sheng Wang, Ting-Cheng Chang, „WPFD: Active User-Side Detection of Evil Twins” Applied Sciences, No. 16 (2022): 8088. https://doi.org/10.3390/app12168088.
    Show in Google Scholar -->>
  17. Kaczmarek Krzysztof, „Dezinformacja jako czynnik ryzyka w sytuacjach kryzysowych” Roczniki Nauk Społecznych, No. 2 (2023): 19-30. https://doi.org/10.18290/rns2023.0017.
    Show in Google Scholar -->>
  18. Kaczmarek Krzysztof, „Zapobieganie zagrożeniom cyfrowym na przykładzie Republiki Estońskiej i Republiki Finlandii” Cybersecurity and Law, No. 1 (2019): 143-157. https://doi.org/10.35467/cal/133778.
    Show in Google Scholar -->>
  19. Karpiuk Mirosław, „Recognising an Entity as an Operator of Essential Services and Providing Cybersecurity at the National Level” Prawo i Więź, No. 4 (2022): 166-179. https://doi.org/10.36128/priw.vi42.524.
    Show in Google Scholar -->>
  20. Karpiuk Mirosław, „Organisation of the National System of Cybersecurity: Selected Issues” Studia Iuridica Lublinensia, No. 2 (2021): 233-244. http://dx.doi.org/10.17951/sil.2021.30.2.233-244.
    Show in Google Scholar -->>
  21. Karpiuk Mirosław, „Position of the Local Government of Commune Level in the Space of Security and Public Order” Studia Iuridica Lublinensia, No. 2 (2019): 27-39. https://doi.org/10.17951/sil.2019.28.2.27-39.
    Show in Google Scholar -->>
  22. Karpiuk Mirosław, „The Legal Status of Digital Service Providers in the Sphere of Cybersecurity” Studia Iuridica Lublinensia, No. 2 (2023): 189-201. https://doi.org/10.17951/sil.2023.32.2.189-201.
    Show in Google Scholar -->>
  23. Karpiuk Mirosław, „The Provision of Safety in Water Areas: Legal Issues” Studia Iuridica Lublinensia, No. 2 (2022): 79-92. https://doi.org/10.17951/sil.2022.31.1.79-92.
    Show in Google Scholar -->>
  24. Karpiuk Mirosław, Jarosław Kostrubiec, „Provincial Governor as a Body Responsible for Combating State Security Threats” Studia Iuridica Lublinensia, No. 1 (2024): 107-122.
    Show in Google Scholar -->>
  25. Karpiuk Mirosław, Claudio Melchior, Urszula Soler, „Cybersecurity Management in the Public Service Sector” Prawo i Więź, No. 4, (2023): 7-27. https://doi.org/10.36128/PRIW.VI47.751.
    Show in Google Scholar -->>
  26. Karpiuk Mirosław, Wojciech Pizło, Krzysztof Kaczmarek, „Cybersecurity Management – Current State and Directions of Change” International Journal of Legal Studies, No. 2 (2023): 645-663. http://dx.doi.org/10.5604/01.3001.0054.2880.
    Show in Google Scholar -->>
  27. Khan Sulaiman, Habib Ullah Khan, Shah Nazir, „Systematic analysis of healthcare big data analytics for efficient care and disease diagnosing” Scientific Reports, No. 22377 (2022). https://doi.org/10.1038/s41598-022-26090-5.
    Show in Google Scholar -->>
  28. Kokolakis Spyros, „Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon” Computers & Security, 64 (2017): 122-134. https://doi.org/10.1016/j.cose.2015.07.002.
    Show in Google Scholar -->>
  29. Kurek Justyna, Bezpieczeństwo państwa w warunkach hybrydowej regulacji danych osobowych w dobie analizy Big data. Aspekty prawne, organizacyjne i systemowe. Warsaw: ASzWoj, 2021.
    Show in Google Scholar -->>
  30. Legrand Julien, „Humans and Cybersecurity: The Weakest Link or the Best Defense?” ISACA Journal, 1 (2022). https://www.isaca.org/resources/isaca-journal/issues/2022/volume-1/humans-and-cybersecurity-the-weakest-link-or-the-best-defense.
    Show in Google Scholar -->>
  31. Malużinas Martinas, „Armoured Information as a Promising Concept to Reduce Disinformation – a New Element of Armoured Democracy?” Studia i Analizy Nauk o Polityce, 2 (2023): 149-170. http://dx.doi.org/10.31743/sanp.16411.14661.
    Show in Google Scholar -->>
  32. Melchior Claudio, Urszula Soler, „Security of Personal Data in Cyberspace in the Opinion of Students of the University of Udine” Cybersecurity and Law, No. 1 (2024): 227-247.
    Show in Google Scholar -->>
  33. Taddicken Monika. „The «privacy paradox» in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure” Journal of computer-mediated communication, No. 2 (2014): 248-273. https://doi.org/10.1111/jcc4.12052.
    Show in Google Scholar -->>
  34. Wang Na, Bo Zhang, Bin Liu, Jin Hongxia, „Investigating effects of control and ads awareness on android users’ privacy behaviors and perceptions”, [in:] Proceedings of the 17th international conference on human-computer interaction with mobile devices and services, (2015): 373-382. https://doi.org/10.1145/2785830.2785845.
    Show in Google Scholar -->>
  35. Wang Pei, „On Defining Artificial Intelligence” Journal of Artificial General Intelligence, No. 2 (2019): 1-37. https://doi.org/10.2478/jagi-2019-0002.
    Show in Google Scholar -->>
  36. Warshaw Jeffrey, Tara Matthews, Steve Whittaker, Chris Kau, Mateo Bengualid, Barton A. Smith, „Can an Algorithm Know the «Real You»? Understanding People's Reactions to Hyper-personal Analytics Systems”, [in:] Proceedings of the 33rd annual ACM conference on human factors in computing systems, (2015), 797-806. https://doi.org/10.1145/2702123.2702274.
    Show in Google Scholar -->>
  37. Wasilewski Krzysztof, „Fake News and the Europeanization of Cyberspace” Polish Political Science Yearbook, No. 4 (2021): 61-80. https://doi.org/10.15804/ppsy202153.
    Show in Google Scholar -->>
  38. Włodyka Ewa Maria, „Artificial intelligence as a potential platform for international cooperation of local governments”, [in:] Wybrane aspekty współpracy międzynarodowej jednostek samorządu terytorialnego”, ed. Iwona Wieczorek, Anna Ostrowska, Mariusz Chrzanowski. 201-223. Łódź: Wydawnictwo Narodowego Instytutu Samorządu Terytorialnego, 2023. https://www.nist.gov.pl/downloadfile/15423.
    Show in Google Scholar -->>
  39. Włodyka Ewa Maria, „Dlaczego potrzebujemy e-administracji? Rozwój podstawowych umiejętności cyfrowych pracowników administracji na Pomorzu Zachodnim” Acta Politica Polonica, No. 2 (2021): 89-100. http://dx.doi.org/10.18276/ap.2021.52-08.
    Show in Google Scholar -->>
  40. Włodyka Ewa Maria, „Gotowi – do startu – start? Przyczynek do dyskusji nad gotowością jednostek samorządu terytorialnego do zapewnienia cyberbezpieczeństwa” Cybersecurity and Law, No. 1 (2022): 202-219. https://doi.org/10.35467/cal/151828.
    Show in Google Scholar -->>

Downloads

Download data is not yet available.