PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Hacking in the (cyber)space

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The article analyzes the concept of hacking, taking into account its evolution from a neutral term that means going beyond specific schemes of action to a negative context in which the concept is often equated with a cyber-security breach or cyber- crime. A study of the understanding of the concept of space and cyberspace, as well as selected cyber threats, shows the impact of the development of modern technologies on the blurring of the boundaries between real and virtual space. Based on selected cases in the field of cybercrime, the specific features of actions in cyberspace and their effects in the real world are indicated. New methods of cybercriminals open up new areas of criminological research on the geography of crime. The paper points out the involvement of State-Actors in cyber attacks, which makes it challenging to eliminate safe harbors for cyber criminals and reduces the effectiveness of instruments of international cooperation in criminal cases.
Czasopismo
Rocznik
Strony
141--152
Opis fizyczny
Bibliogr. 37 poz.
Twórcy
  • Cardinal Stefan Wyszyński University in Warsaw, Faculty of Law and Administration, Department of Informatics Law
  • Cardinal Stefan Wyszyński University in Warsaw, Faculty of Law and Administration, Department of Informatics Law
Bibliografia
  • 1. Banasiński C. (ed.). (2018). Cyberbezpieczeństwo (Cybersecurity). Warszawa 2018, p. 23.
  • 2. Britannica. https://www.britannica.com/topic/cybercrime/Hacking [access: 14.08.2022]. Cambridge Dictionary. https://dictionary.cambridge.org/pl/dictionary/english/hack [access: 14.08.2022].
  • 3. Castillo W. (2015). Air Force intel uses ISIS 'moron' post to track fighters, CNN, 5.06.2015. https://edition.cnn.com/2015/06/05/politics/air-force-isis-moron-twitter/index.html [access: 14.08.2022].
  • 4. Chang L.YC., Whitehead J. (2022). What the Hack: Reconsidering Responses to Hacking. Asian J Criminol, 17, pp. 113-126. https://doi.org/10.1007/s11417-021-09356-1.
  • 5. Corcoran B. (2020). A Comparative Study of Domestic Laws Constraining Private Sector Active Defense Measures in Cyberspace. Harvard National Security Journal, 11, no. 1, 1-ix.
  • 6. Criminal Code of June 6, 1997 (Journal of Laws of 2020, item 1444, as amended).
  • 7. Criminal Complaint. 2018. United States District Court for the Central District of California, Case No. MJ 18 - 1479. https://www.justice.gov/opa/press-release/file/1092091/download [access: 15.08.2022].
  • 8. DataReportal, Digital 2022. Global Overview Report, https://datareportal.com/reports/digital-2022-global-overview-report [access: 14.08.2022].
  • 9. Dobrzeniecki K. (2004). Prawo a etos cyberprzestrzeni (Law and the ethos of cyberspace). Toruń, p. 10.
  • 10. Eckart J.P. (2019). The Department of Justice Versus Apple Inc. - The Great Encryption Debate Between Privacy and National Security, 27 Cath. U. J. L. & Tech 1. https://scholarship.law.edu/jlt/vol27/iss2/3 [access: 14.08.2022].
  • 11. Europol, 2020. Pandemic profiteering: how criminals exploit the COVID-19 crisis. Europol. https://www.europol.europa.eu/publications-documents/pandemic- profiteering-how-criminals-exploit-covid-19-crisis [access: 14.08.2022].
  • 12. Glossary of key cybersecurity terms (Słownik kluczowych pojęć z zakresu cyberbezpieczeństwa) NSC 7298 1.0 01/09/2021 https://www.gov.pl/web/baza-wiedzy/narodowe-standardy-cyber [access: 26.08.2022].
  • 13. Goldschneider M. (2010). Geography of crime. Remarks on spatial analyses of crime with the use of digital technologies (Geografia przestępczości. Uwagi na temat przestrzennych analiz przestępczości przy wykorzystaniu technik cyfrowych), Archiwum Kryminologii, XXXII (2010), p. 23-43, DOI 10.7420/AK2010B.
  • 14. Great Encyclopedia of Law, T. XXII, Information Technology Law (Wielka Encyklopedia Prawa, T. XXII, Prawo informatyczne), Warsaw 2021, pp. 149-150.
  • 15. Gryszczyńska A. (2019). Handling incidents involving spatial data breaches. In: I. Basista, P. Cichociński, E. Dębińska, M. Gajos-Grzetić (ed.), 26th Geographic Information Systems Conference and Exhibition “GIS Odyssey 2019”. Zagreb, Croatian Information Technology Society - GIS Forum, pp. 81-90, http://www.gis.us.edu.pl/index.php/past-gis-conferences/26-gis-odyssey- 2019/1081-10-handling-incidents-involving-spatial-data-breaches [access: 14.08.2022].
  • 16. Harari Y. Rich elites and exploited "data colonies", https://businessdialog.pl/artykuly/bogate-elity-i-wyzyskiwane?xg_source=linkedin [access: 26.08.2022].
  • 17. Indictment. 2020 a. United States District Court for the Central District of California, CR 2:20-cr-00614-DMG 2020. https://www.justice.gov/opa/press- release/file/1367701/download [access: 15.08.2022].
  • 18. Indictment. 2020 b. United States District Court Western District of Pennsylvania, Criminal No. 20 316. 2020. https://www.justice.gov/opa/press- release/file/1328521/download [access: 15.08.2022].
  • 19. Janowski J., 2012. Cyberkultura prawa. Współczesne problemy filozofii i informatyki prawa (Cyberculture of Law. Contemporary problems of the philosophy and computer science of law). Warsaw, p. 38.
  • 20. Jaquet-Chiffelle D.O., Loi M. 2020. Ethical and Unethical Hacking. In: M. Christen, B. Gordijn, M. Loi (ed.), The Ethics of Cybersecurity. The International Library of Ethics, Law and Technology, vol 21. Springer, Cham. https://doi.org/10.1007/978-3-030-29053-5_9.
  • 21. Lakomy M. (2015). Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw (Cyberspace as a new dimension of competition and cooperation among states). Katowice, pp. 168-172.
  • 22. Legal Frameworks for Hacking by Law Enforcement: Identification, Evaluation and Comparison of Practices (2017). Directorate General For Internal Policies Policy Department C: Citizens’ Rights And Constitutional Affairs. https://www.europarl.europa.eu/RegData/etudes/STUD/2017/583137/IPOL_STU(2017)583137_EN.pdf [access: 14.08.2022].
  • 23. Madej M., Terlikowski M. (ed.) (2009). Bezpieczeństwo teleinformatyczne państwa (State ICT security). Warszawa, pp. 96-97.
  • 24. Morańska D. (2015). Patologie w cyberprzestrzeni. Profilaktyka zagrożeń medialnych (Pathologies in cyberspace. Prevention of media threats). Dąbrowa Górnicza.
  • 25. Nikiforova A. (2022). Open data hackathon as a tool for increased engagement of Generation Z: to hack or not to hack? Electronic Governance with Emerging Technologies Conference, Springer. Forthcoming, Available from: https://www.researchgate.net/publication/362229959_Open_data_hackathon_as_a _tool_for_increased_engagement_of_Generation_Z_to_hack_or_not_to_hack [access: 14.08.2022].
  • 26. Radoniewicz F. (2016). Odpowiedzialność karna za hacking i inne przestępstwa przeciwko danym komputerowym i systemom informatycznym (Criminal liability for hacking and other crimes against computer data and information systems). Warsaw.
  • 27. Resolution 74/247. 2019. Resolution adopted by the General Assembly on 27 December 2019, A/RES/74/247; https://documents-dds- ny.un.org/doc/UNDOC/GEN/N19/440/28/PDF/N1944028.pdf?OpenElement [access: 14.08.2022].
  • 28. RFC1392. 1993. Malkin G., LaQuey Parker T., Internet Users' Glossary, RFC 1392, Interop, Inc., January 1993, https://www.rfc-editor.org/rfc/rfc1392 [access: 14.08.2022].
  • 29. Scott M. (2022). How Ukraine used Russia’s digital playbook against the Kremlin. From hacktivists to info wars, Kyiv is mastering digital warfare in ways previously associated with the Kremlin. 24.08.2022. https://www.politico.eu/article/ukraine-russia-digital-playbook-war [access: 25.08.2022].
  • 30. Szpor G. (2016). Jawność i jej ograniczenia. Idee i pojęcia (Openness and its limitation. Ideas and concepts). Warsaw 2016.
  • 31. The American Heritage Dictionary of the English Language (2022). Fifth Edition, https://www.ahdictionary.com/word/search.html?q=hacking [access: 14.08.2022].
  • 32. The Convention on Cybercrime of the Council of Europe (CETS No.185) (2001). https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185 [access: 14.08.2022].
  • 33. The Jargon File, version 4.4.7, http://catb.org/jargon/html/H/hack.html [access: 14.08.2022].
  • 34. Wasilewski J. (2013). Zarys definicyjny cyberprzestrzeni (A definitional outline of cyberspace). Przegląd Bezpieczeństwa Wewnętrznego, no. 9, p. 226.
  • 35. Wired (2020). A Patient Dies After a Ransomware Attack Hits a Hospital. 19.09.2020. https://www.wired.com/story/a-patient-dies-after-a-ransomware-attack-hits-a-hospital/ [access: 14.08.2022].
  • 36. Worona J. (2020). Cyberprzestrzeń a prawo międzynarodowe. Status quo i perspektywy (Cyberspace and International Law. Status quo and perspectives). Warsaw, p. 56.
  • 37. Yagoda B. (2014). A Short History of Hack. The New Yorker. https://www.newyorker.com/tech/annals-of-technology/a-short-history-of-hack [access: 14.08.2022].
Uwagi
PL
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e50da523-a3b5-48f8-91e3-6369a2d8edf1
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.