Acta Politica Polonica

Previously: Zeszyty Naukowe Uniwersytetu Szczecińskiego. Acta Politica

ISSN: 2451-0432     eISSN: 2719-4388    OAI    DOI: 10.18276/ap.2021.51-01
CC BY-SA   Open Access   DOAJ  ERIH PLUS

Issue archive / 1/2021 (51)
Współczesne zagrożenia cybernetyczne na przykładzie zjawiska cyberwojny. Analiza teoretyczna
(Contemporary cyber threats on the example of the phenomenon of cyberwarfare. A theoretical analysis)

Authors: Marek Górka ORCID
Politechnika Koszalińska, Wydział Humanistyczny
Keywords: cyber warfare cyber threats cyber security policy
Data publikacji całości:2021
Page range:17 (5-21)
Cited-by (Crossref) ?:

Abstract

For the first time in history, advances in digital technology have become so massive that they are potentially accessible to a significant portion of the world’s population. It allows almost any person to disseminate messages, which means that many people have the potential to bypass official channels of communication, to discredit and criticize the way government is run. A key problem is that digital technology dominates the functioning of the economy as well as society, and its widespread use is also one of the basic foundations of modern military operations. Threats in the area of the state’s cyberspace are becoming more and more complex, because the adversary that can cause a lot of damage can be a foreign and hostile state as well as organizations or individuals who are professional and determined in their actions.
Download file

Article file

Bibliography

1.Aleksandrowicz, T.R., Liedel, K. (2014). Społeczeństwo informacyjne – sieć – cyberprzestrzeń. Nowe zagrożenia.
2.W: K. Liedel, P. Piasecka, T.R. Aleksandrowicz (red.), Sieciocentryczne bezpieczeństwo. Wojna, pok j i terroryzm w epoce informacji (s. 9–38). Warszawa: Difin.
3.Arquilla, J., Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12 (2), 141.
4.Arquilla, J. (2011). The Computer Mouse that Roared: Cyberwar in the Twenty-First Century. Brown Journal of World Affairs, 18, 39.
5.Brenner, S.W. (2009). Cyberthreats: The Emerging Fault Lines of the Nation State. Oxford: Oxford University Press.
6.Castells, M. (1996). The Information Age: Economy. Society and Culture, 1, 77–146.
7.Choucri, N., Goldsmith, D. (2012). Lost in cyberspace: Harnessing the Internet, international relations, and global security. DOI:10.1177/0096340212438696
8.Bulletin of the Atomic Scientists, 68 (2), 70–77.Clark, R.M., Hakim, S. (2017). Protecting Critical Infrastructure at the State, Provincial, and Local Level: Issues in
9.Cyber-Physical Security. W: R.M. Clark, S. Hakim, Cyber-Physical Security Protecting Critical Infrastructure (s. 1–18). Philadelphia: Springer.
10.Clarke, R., Knake, R. (2010). Cyber War: The Next Threat to National Security and What To Do About It. New York: HarperCollins Publishers.
11.Dereń, J., Rabiak, A. (2014). NATO a aspekty bezpieczeństwa w cyberprzestrzeni. W: M. G rka, Cyberbezpieczeństwo jako podstawa bezpiecznego państwa i społeczeństwa w XXI wieku (s. 202–221). Warszawa: Difin.
12.Durch, W., Larik, J., Ponzio, R. (2016). Just Security and the Crisis of Global Governance. Survival. Global Politics and Strategy, 58 (4), 95–112.
13.Farwell, J.P., Rohozinski, R. (2011). Stuxnet and the Future of Cyber War. Survival, 53 (1), 23–40.
14.Feil, J.A. (2012). Cyberwar and Unmanned Aerial. Vehicles: Using New. Technologies, from Espionage to. Action. Case Western Reserve Journal of International, 45, 518.
15.Fontana, I. (2017). Disentangling the cyber politics–cyber security nexus: the new challenge of global politics. Global Affairs, 3 (1), 99–104.
16.Gruszczak, A. (2011). Hybridity of contemporary armed conflicts - Critical analysis. W: B. Zapała, W. Sokała, Asymmetry and hybridity – the old army against new conflicts (9–17). Warszawa: Biuro Bezpieczeństwa Narodowego.
17.Ilves, L.K., Evans, T.J., Cilluffo, F.J., Nadeau, A.A. (2016). European Union and NATO Global Cybersecurity Challenges: A Way Forward. Journal of the Center for Complex Operations, 6 (2), 126–141.
18.Jędrzejko, M., Morańska, D. (2013). Pułapki wsp łczesności. Cyfrowi Tubylcy. Socjopedagogiczne aspekty nowych technologii cyfrowych. Dąbrowa G rnicza–Warszawa: ASPRA-JR
19.Kaiser, R. (2015).The birth of cyberwar. Political Geography, 46, 11.
20.Li, Y. (2015). Is a Cyberwar Coming? – The alleged Sony hacking warns of the grave consequences of cyberwarfare. Beijing Review. Pobrane z: http://www.bjreview.com/ expert/txt/ 2015-01/12/content_663937.htm (10.07.2020).
21.Libicki, M.C. (2009). Cyberdeterrence and Cyberwar. RAND Corporation, 179–181.
22.Lindsay, J.R. (2020). Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem. Intelligence and National Security, 1, 1–19.
23.McGraw, G. (2013). Cyber War Is Inevitable (Unless We Build Security In). Journal of Strategic Studies, 36 (1), 109–119.
24.Mehan, J.E. (2009). CyberWar, CyberTerror, CyberCrime. IT Governance, 19–48.
25.Pearson, I. (2010). Cyberwar threats are all too real, assures futurologist. Engineering & Technology, 5, 25–26.
26.Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35 (1), 5–32.
27.Suissa, R. (2012). Military Resilience in Low-Intensity Conflict: A Comparative Study of New Directions Worldwide. Plymouth: Lexington Books.Ventre, D. (2011). Cyberconflict: Stakes of Power. W: D. Ventre, Cyberwar and Information Warfare (s. 213–230). Londyn: Wiley – ISTE.
28.Ventre, D. (2011). Cyberwar and Information Warfare. Londyn: Wiley – ISTE.
29.Wall, D.S. (2008). Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime. International Review of Law, Computers & Technology, 22 (1–2), 45–63.
30.Wlatz, E.(1998). Information Warfare, Principles and Operations. Norwood: Artech House Boston.