Treść głównego artykułu

Abstrakt

With rapid technological advances, cybersecurity and personal data protection are becoming key issues that require a holistic approach. The dynamic development of artificial intelligence (AI) and big data technologies creates new opportunities for cybersecurity. At the same time, potential attack vectors are emerging. The paper highlights the relationship between cybersecurity and the protection of personal data, and points to the need for integrated action at several levels. These include the development and implementation of advanced technological solutions and education to increase users' digital literacy. The analysis shows that only by balancing the potential of modern technologies with the risks associated with the human factor is it possible to effectively protect personal data in the digital ecosystem.


 

Słowa kluczowe

cybersecurity personal data protection artificial intelligence (AI) big data digital education cybersecurity personal data protection artificial intelligence big data digital education

Szczegóły artykułu

Referencje

  1. Adjerid Idris, Eyal Peer, Alessandro Acquisti, „Beyond the Privacy Paradox” MIS Quarterly, No. 2 (2018): 465-488. https://doi.org/10.25300/MISQ/2018/14316.
  2. Arce Daniel G., „Malware and market share” Journal of Cybersecurity, No.1 (2018): 1-6. https://doi.org/10.1093/cybsec/tyy010.
  3. Arpetti Jacopo, Marco Delmastro, „The privacy paradox: a challenge to decision theory?” Journal of Industrial and Business Economics, No. 4 (2021): 505-525. https://doi.org/10.1007/s40812-021-00192-z.
  4. Baek Young Min, „Solving the privacy paradox: A counter-argument experimental approach” Computers in human behawior, 38 (2014): 33-42. https://doi.org/10.1016/j.chb.2014.05.006.
  5. Barth Susanne, Menno D.T. de Jong, „The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review” Telematics and informatics, No. 7 (2017): 1038-1058. https://doi.org/10.1016/j.tele.2017.04.013.
  6. BDO Digital, Eliminate Routine Tasks with Automation and Generative AI. 2023. https://www.bdodigital.com/insights/automation/eliminate-routine-tasks-with-automation-and-generative-ai accessed 11 Feb. 2024.
  7. Bencsik András, Mirosław Karpiuk, Miroslav Kelemen, Ewa Włodyka, Cybersecurity in the Visegrad Group Countries. Maribor: Institute for Local Self-Government Maribor, 2023. http://dx.doi.org/10.4335/2023.6.
  8. Brandimarte Laura, Alessandro Acquisti, George Loewenstein, „Misplaced confidences: Privacy and the control paradox” Social psychological and personality science, No. 3 (2013): 340-347. https://doi.org/10.1177/1948550612455931.
  9. Chałubińska-Jentkiewicz Katarzyna, „Disinformation – and what else?” Cybersecurity and Law, No. 2 (2021): 9-19. https://doi.org/10.35467/cal/146453.
  10. Czuryk Małgorzata, „Activities of the Local Government During a State of Natural Disaster” Studia Iuridica Lublinensia, No. 4 (2021): 111-124. http://dx.doi.org/10.17951/sil.2021.30.4.111-124.
  11. Czuryk Małgorzata, „Cybersecurity and Protection of Critical Infrastructure” Studia Iuridica Lublinensia, No. 5 (2023): 43-52. http://dx.doi.org/10.17951/sil.2023.32.5.43-52.
  12. Czuryk Małgorzata, „Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues” Studia Iuridica Lublinensia, No. 3 (2022): 31-43. doi: http://dx.doi.org/10.17951/sil.2022.31.3.31-43.
  13. Darem Abdulbasit A., Asma A. Alhashmi, Tareq M. Alkhaldi, Abdullah M. Alashjaee, Sultan M. Alanazi, Shouki A. Ebad, „Cyber Threats Classifications and Countermeasures in Banking and Financial Sector” IEEE Access, No. 11 (2023): 125138-125158. https://doi.org/10.1109/ACCESS.2023.3327016.
  14. European Commission, What is personal data?. https://commission.europa.eu/law/law-topic/data-protection/reform/what-personal-data_en accessed 11 Feb. 2024.
  15. General Data Protection Regulation (GDPR) (2016). https://gdpr-info.eu/ accessed 11 Feb. 2024.
  16. Hsu, Fu-Hau, Min-Hao Wu, Yan-Ling Hwang, Chia-Hao Lee, Chuan-Sheng Wang, Ting-Cheng Chang, „WPFD: Active User-Side Detection of Evil Twins” Applied Sciences, No. 16 (2022): 8088. https://doi.org/10.3390/app12168088.
  17. Kaczmarek Krzysztof, „Dezinformacja jako czynnik ryzyka w sytuacjach kryzysowych” Roczniki Nauk Społecznych, No. 2 (2023): 19-30. https://doi.org/10.18290/rns2023.0017.
  18. Kaczmarek Krzysztof, „Zapobieganie zagrożeniom cyfrowym na przykładzie Republiki Estońskiej i Republiki Finlandii” Cybersecurity and Law, No. 1 (2019): 143-157. https://doi.org/10.35467/cal/133778.
  19. Karpiuk Mirosław, „Recognising an Entity as an Operator of Essential Services and Providing Cybersecurity at the National Level” Prawo i Więź, No. 4 (2022): 166-179. https://doi.org/10.36128/priw.vi42.524.
  20. Karpiuk Mirosław, „Organisation of the National System of Cybersecurity: Selected Issues” Studia Iuridica Lublinensia, No. 2 (2021): 233-244. http://dx.doi.org/10.17951/sil.2021.30.2.233-244.
  21. Karpiuk Mirosław, „Position of the Local Government of Commune Level in the Space of Security and Public Order” Studia Iuridica Lublinensia, No. 2 (2019): 27-39. https://doi.org/10.17951/sil.2019.28.2.27-39.
  22. Karpiuk Mirosław, „The Legal Status of Digital Service Providers in the Sphere of Cybersecurity” Studia Iuridica Lublinensia, No. 2 (2023): 189-201. https://doi.org/10.17951/sil.2023.32.2.189-201.
  23. Karpiuk Mirosław, „The Provision of Safety in Water Areas: Legal Issues” Studia Iuridica Lublinensia, No. 2 (2022): 79-92. https://doi.org/10.17951/sil.2022.31.1.79-92.
  24. Karpiuk Mirosław, Jarosław Kostrubiec, „Provincial Governor as a Body Responsible for Combating State Security Threats” Studia Iuridica Lublinensia, No. 1 (2024): 107-122.
  25. Karpiuk Mirosław, Claudio Melchior, Urszula Soler, „Cybersecurity Management in the Public Service Sector” Prawo i Więź, No. 4, (2023): 7-27. https://doi.org/10.36128/PRIW.VI47.751.
  26. Karpiuk Mirosław, Wojciech Pizło, Krzysztof Kaczmarek, „Cybersecurity Management – Current State and Directions of Change” International Journal of Legal Studies, No. 2 (2023): 645-663. http://dx.doi.org/10.5604/01.3001.0054.2880.
  27. Khan Sulaiman, Habib Ullah Khan, Shah Nazir, „Systematic analysis of healthcare big data analytics for efficient care and disease diagnosing” Scientific Reports, No. 22377 (2022). https://doi.org/10.1038/s41598-022-26090-5.
  28. Kokolakis Spyros, „Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon” Computers & Security, 64 (2017): 122-134. https://doi.org/10.1016/j.cose.2015.07.002.
  29. Kurek Justyna, Bezpieczeństwo państwa w warunkach hybrydowej regulacji danych osobowych w dobie analizy Big data. Aspekty prawne, organizacyjne i systemowe. Warsaw: ASzWoj, 2021.
  30. Legrand Julien, „Humans and Cybersecurity: The Weakest Link or the Best Defense?” ISACA Journal, 1 (2022). https://www.isaca.org/resources/isaca-journal/issues/2022/volume-1/humans-and-cybersecurity-the-weakest-link-or-the-best-defense.
  31. Malużinas Martinas, „Armoured Information as a Promising Concept to Reduce Disinformation – a New Element of Armoured Democracy?” Studia i Analizy Nauk o Polityce, 2 (2023): 149-170. http://dx.doi.org/10.31743/sanp.16411.14661.
  32. Melchior Claudio, Urszula Soler, „Security of Personal Data in Cyberspace in the Opinion of Students of the University of Udine” Cybersecurity and Law, No. 1 (2024): 227-247.
  33. Taddicken Monika. „The «privacy paradox» in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure” Journal of computer-mediated communication, No. 2 (2014): 248-273. https://doi.org/10.1111/jcc4.12052.
  34. Wang Na, Bo Zhang, Bin Liu, Jin Hongxia, „Investigating effects of control and ads awareness on android users’ privacy behaviors and perceptions”, [in:] Proceedings of the 17th international conference on human-computer interaction with mobile devices and services, (2015): 373-382. https://doi.org/10.1145/2785830.2785845.
  35. Wang Pei, „On Defining Artificial Intelligence” Journal of Artificial General Intelligence, No. 2 (2019): 1-37. https://doi.org/10.2478/jagi-2019-0002.
  36. Warshaw Jeffrey, Tara Matthews, Steve Whittaker, Chris Kau, Mateo Bengualid, Barton A. Smith, „Can an Algorithm Know the «Real You»? Understanding People's Reactions to Hyper-personal Analytics Systems”, [in:] Proceedings of the 33rd annual ACM conference on human factors in computing systems, (2015), 797-806. https://doi.org/10.1145/2702123.2702274.
  37. Wasilewski Krzysztof, „Fake News and the Europeanization of Cyberspace” Polish Political Science Yearbook, No. 4 (2021): 61-80. https://doi.org/10.15804/ppsy202153.
  38. Włodyka Ewa Maria, „Artificial intelligence as a potential platform for international cooperation of local governments”, [in:] Wybrane aspekty współpracy międzynarodowej jednostek samorządu terytorialnego”, ed. Iwona Wieczorek, Anna Ostrowska, Mariusz Chrzanowski. 201-223. Łódź: Wydawnictwo Narodowego Instytutu Samorządu Terytorialnego, 2023. https://www.nist.gov.pl/downloadfile/15423.
  39. Włodyka Ewa Maria, „Dlaczego potrzebujemy e-administracji? Rozwój podstawowych umiejętności cyfrowych pracowników administracji na Pomorzu Zachodnim” Acta Politica Polonica, No. 2 (2021): 89-100. http://dx.doi.org/10.18276/ap.2021.52-08.
  40. Włodyka Ewa Maria, „Gotowi – do startu – start? Przyczynek do dyskusji nad gotowością jednostek samorządu terytorialnego do zapewnienia cyberbezpieczeństwa” Cybersecurity and Law, No. 1 (2022): 202-219. https://doi.org/10.35467/cal/151828.