Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
In the age of the information society, determined by the evolution of digital technology, information has become an essential element of the functioning of every human being. Its acquisition, processing and distribution serves to satisfy the key areas of society's life and constitutes a necessary component of every decision-making process. These days became dominated by the increasing demand for information. The problem of its protection against unwanted obtaining (disclosure) has become a challenge for many scientific communities. This state of affairs has forced us to take a number of steps to ensure the security of useful information, characterized by accuracy, unambiguity, completeness and authenticity. The problem of information security is inseparably linked to the threats present in the cyberspace environment. They are commonly identified with the so-called computer crime, resulting in factors like: infiltration, obtaining passwords and other data used for logging in, identity theft, damage (blocking) of systems and their software. Information manipulation is a completely different and underestimated threat to rational decision-making process. Wherefore, useful information that is characterized by the expected properties, is exposed not only to destruction or unauthorized acquisition, but also to distortion. Rising anxiety about the credibility of the information received in the virtual space and the sources of its transmission forced the need to distinguish the real form from the one that was modified. The presented conditions prompted the author to propose solutions with regard to information security, determined by the difficulty of obtaining it and manipulating it.
Wydawca
Rocznik
Tom
Strony
289--295
Opis fizyczny
Bibliogr. 12 poz., rys.
Twórcy
autor
- University of Security in Poznań, Poland
Bibliografia
- [1] Babik, W., 2011. On manipulating information in private and public information space, in: Man, media education, Pedagogical University, Krakow, 3.
- [2] Gałecki, A., 2005. Sources and methods of pose for information on the air situation, National Defense University, Warsaw, 121.
- [3] Cialdini, R., 2009. Influencing people. Theory and Practice, Gdańskie Wydawnictwo Psychologiczne, Gdańsk, 186-195.
- [4] Doliwa, U., et al., 2018. Precise profiling of Facebook Users or reading tea leaves? A critical analysis of the operation of the algorithm created by Michał Kosiński and used by the Cambridge Analytica software, Zeszyty Prasoznawcze, Kraków, 61, 3 (235), 532.
- [5] Grzywa, A., 2013. Manipulation everything you need to know about it, Wydawnictwo Słowa i Myśli, Lublin, 11.
- [6] Hanas, Z., 2005. Various Forms of Manipulating a Man, Communio, 2000, 1, 56.
- [7] Harwas-Napierała, B., 2005. Ethical aspects of manipulation, Poznań Theological Studies, Adam Mickiewicz University, Poznań, 248.
- [8] NASK CERT Polska, 2019. The security landscape of the Polish Internet, Annual report on the activities of CERT Polska, 9.
- [9] Potejko, P., 2009. Information security in: Wojtaszczyk, K., Materska-Sosnowska, A. (ed.), State security, ASPRA-JR publishing house, Warsaw, 194.
- [10] Schopenhauer, A., 1973. Erystyka, or the art of disputes, Wydawnictwo Literackie Kraków, 45.
- [11] Dictionary of Foreign Words, 1995. PWN Publishing House, Warsaw, 686.
- [12] The phenomenon of disinformation in the age of digital revolution, 2019. State. Society. Polityka, Biznes, NASK National Research Institute, Warsaw, 9.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-6eb575d5-d0d0-4c73-810a-5dc6dd189a22