1. bookVolume 3 (2021): Issue 1 (May 2021)
Journal Details
License
Format
Journal
First Published
30 Mar 2019
Publication timeframe
1 time per year
Languages
English
access type Open Access

Contemporary Conditions of Information Security

Published Online: 20 Jun 2021
Page range: 289 - 295
Received: 15 Nov 2020
Accepted: 18 Mar 2021
Journal Details
License
Format
Journal
First Published
30 Mar 2019
Publication timeframe
1 time per year
Languages
English
Abstract

In the age of the information society, determined by the evolution of digital technology, information has become an essential element of the functioning of every human being. Its acquisition, processing and distribution serves to satisfy the key areas of society’s life and constitutes a necessary component of every decision-making process. These days became dominated by the increasing demand for information. The problem of its protection against unwanted obtaining (disclosure) has become a challenge for many scientific communities. This state of affairs has forced us to take a number of steps to ensure the security of useful information, characterized by accuracy, unambiguity, completeness and authenticity. The problem of information security is inseparably linked to the threats present in the cyberspace environment. They are commonly identified with the so-called computer crime, resulting in factors like: infiltration, obtaining passwords and other data used for logging in, identity theft, damage (blocking) of systems and their software. Information manipulation is a completely different and underestimated threat to rational decision-making process. Wherefore, useful information that is characterized by the expected properties, is exposed not only to destruction or unauthorized acquisition, but also to distortion. Rising anxiety about the credibility of the information received in the virtual space and the sources of its transmission forced the need to distinguish the real form from the one that was modified. The presented conditions prompted the author to propose solutions with regard to information security, determined by the difficulty of obtaining it and manipulating it.

Keywords

Babik, W., 2011. On manipulating information in private and public information space, in: Man, media education, Pedagogical University, Krakow, 3. Search in Google Scholar

Gałecki, A., 2005. Sources and methods of pose for information on the air situation, National Defense University, Warsaw, 121. Search in Google Scholar

Cialdini, R., 2009. Influencing people. Theory and Practice, Gdańskie Wydawnictwo Psychologiczne, Gdańsk, 186-195. Search in Google Scholar

Doliwa, U., et al., 2018. Precise profiling of Facebook Users or reading tea leaves? A critical analysis of the operation of the algorithm created by Michał Kosiński and used by the Cambridge Analytica software, Zeszyty Prasoznawcze, Kraków, 61, 3 (235), 532. Search in Google Scholar

Grzywa, A., 2013. Manipulation everything you need to know about it, Wydawnictwo Słowa i Myśli, Lublin, 11. Search in Google Scholar

Hanas, Z., 2005. Various Forms of Manipulating a Man, Communio, 2000, 1, 56. Harwas-Napierała, B., 2005. Ethical aspects of manipulation, Poznań Theological Studies, Adam Mickiewicz University, Poznań, 248. Search in Google Scholar

NASK CERT Polska, 2019. The security landscape of the Polish Internet, Annual report on the activities of CERT Polska, 9. Search in Google Scholar

Potejko, P., 2009. Information security in: Wojtaszczyk, K., Materska-Sosnowska, A. (ed.), State security, ASPRA-JR publishing house, Warsaw, 194. Search in Google Scholar

Schopenhauer, A., 1973. Erystyka, or the art of disputes, Wydawnictwo Literackie Kraków, 45. Search in Google Scholar

Dictionary of Foreign Words, 1995. PWN Publishing House, Warsaw, 686. Search in Google Scholar

The phenomenon of disinformation in the age of digital revolution, 2019. State. Society. Polityka, Biznes, NASK National Research Institute, Warsaw, 9. Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo