2019
DOI: 10.9770/jssi.2019.8.3(15)
|View full text |Cite
|
Sign up to set email alerts
|

Management of Information Security and Its Protection in in Criminal Matters: Case of Poland

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 0 publications
0
5
0
2
Order By: Relevance
“…Incidental events are related to environmental factors, not targeting by themselves the area of information security; these can be random or result from other potentially threatening activities. On the other hand, non-incidental events have a specific purpose, are strictly organized and thoroughly thought-out, while their execution is preceded by intensive planning; these are aimed at disrupting the process of transmitting or accessing information in IT systems, manipulation or modification of data, or its theft, disclosure or illegal use (Jurgilewicz et al, 2019).…”
Section: The Essence Of Threats To Information Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Incidental events are related to environmental factors, not targeting by themselves the area of information security; these can be random or result from other potentially threatening activities. On the other hand, non-incidental events have a specific purpose, are strictly organized and thoroughly thought-out, while their execution is preceded by intensive planning; these are aimed at disrupting the process of transmitting or accessing information in IT systems, manipulation or modification of data, or its theft, disclosure or illegal use (Jurgilewicz et al, 2019).…”
Section: The Essence Of Threats To Information Securitymentioning
confidence: 99%
“…Meanwhile, art. 267 Penal Code focuses on the crime, in general terms, of gaining access to third-party information by physically acquiring it (opening a letter or a file), as well as interference with the ICT network or its security (Jurgilewicz et al, 2019).…”
Section: Information Security In Cyberspacementioning
confidence: 99%
“…A number of scholars have considered the key economic, social and financial determinants in their work that form the basis for a secure financial environment: (Kuzmenko & Kyrkach, 2014), Petrushenko et al, 2014Petrushenko et al, , 2018, (Dave, 2017a, b), (Bilan et al, 2018(Bilan et al, , 2019a, (Buriak et al, 2015), (Buriak et al, 2019), (Gavurova et al, 2017), (Grybaitė and Stankevičienė, 2018), (Kwilinski et al, 2019), (Li and Ouyang, 2019), (Kostyuchenko et al, 2018), (Njegovanović, 2019), (Pitoňáková, 2019), (Simionescu et al, 2019), (Vasilyeva et al, 2016), (Yakubu et al, 2019), (Jurgilewicz, 2019), (Aqil et al).…”
Section: Literature Reviewmentioning
confidence: 99%
“…All of the determined objectives and directions of activities and tasks are the basis for the implementation of environmental policy (Puacz-Olszewska, 2017), which defines an action plan aimed at improving the quality of ecological and food security in the Baltic Sea area. One of the most important tasks of the Republic of Poland is to ensure environmental protection (Jurgilewicz, M., Jurgilewicz, O., 2019).…”
Section: Life Spacementioning
confidence: 99%