Uneingeschränkter Zugang

Contemporary Conditions of Information Security


Zitieren

Babik, W., 2011. On manipulating information in private and public information space, in: Man, media education, Pedagogical University, Krakow, 3. Search in Google Scholar

Gałecki, A., 2005. Sources and methods of pose for information on the air situation, National Defense University, Warsaw, 121. Search in Google Scholar

Cialdini, R., 2009. Influencing people. Theory and Practice, Gdańskie Wydawnictwo Psychologiczne, Gdańsk, 186-195. Search in Google Scholar

Doliwa, U., et al., 2018. Precise profiling of Facebook Users or reading tea leaves? A critical analysis of the operation of the algorithm created by Michał Kosiński and used by the Cambridge Analytica software, Zeszyty Prasoznawcze, Kraków, 61, 3 (235), 532. Search in Google Scholar

Grzywa, A., 2013. Manipulation everything you need to know about it, Wydawnictwo Słowa i Myśli, Lublin, 11. Search in Google Scholar

Hanas, Z., 2005. Various Forms of Manipulating a Man, Communio, 2000, 1, 56. Harwas-Napierała, B., 2005. Ethical aspects of manipulation, Poznań Theological Studies, Adam Mickiewicz University, Poznań, 248. Search in Google Scholar

NASK CERT Polska, 2019. The security landscape of the Polish Internet, Annual report on the activities of CERT Polska, 9. Search in Google Scholar

Potejko, P., 2009. Information security in: Wojtaszczyk, K., Materska-Sosnowska, A. (ed.), State security, ASPRA-JR publishing house, Warsaw, 194. Search in Google Scholar

Schopenhauer, A., 1973. Erystyka, or the art of disputes, Wydawnictwo Literackie Kraków, 45. Search in Google Scholar

Dictionary of Foreign Words, 1995. PWN Publishing House, Warsaw, 686. Search in Google Scholar

The phenomenon of disinformation in the age of digital revolution, 2019. State. Society. Polityka, Biznes, NASK National Research Institute, Warsaw, 9. Search in Google Scholar