Contemporary Conditions of Information Security

Author:

Gałecki Andrzej1ORCID

Affiliation:

1. University of Security in Poznań , Poland

Abstract

Abstract In the age of the information society, determined by the evolution of digital technology, information has become an essential element of the functioning of every human being. Its acquisition, processing and distribution serves to satisfy the key areas of society’s life and constitutes a necessary component of every decision-making process. These days became dominated by the increasing demand for information. The problem of its protection against unwanted obtaining (disclosure) has become a challenge for many scientific communities. This state of affairs has forced us to take a number of steps to ensure the security of useful information, characterized by accuracy, unambiguity, completeness and authenticity. The problem of information security is inseparably linked to the threats present in the cyberspace environment. They are commonly identified with the so-called computer crime, resulting in factors like: infiltration, obtaining passwords and other data used for logging in, identity theft, damage (blocking) of systems and their software. Information manipulation is a completely different and underestimated threat to rational decision-making process. Wherefore, useful information that is characterized by the expected properties, is exposed not only to destruction or unauthorized acquisition, but also to distortion. Rising anxiety about the credibility of the information received in the virtual space and the sources of its transmission forced the need to distinguish the real form from the one that was modified. The presented conditions prompted the author to propose solutions with regard to information security, determined by the difficulty of obtaining it and manipulating it.

Publisher

Walter de Gruyter GmbH

Reference11 articles.

1. Babik, W., 2011. On manipulating information in private and public information space, in: Man, media education, Pedagogical University, Krakow, 3.

2. Gałecki, A., 2005. Sources and methods of pose for information on the air situation, National Defense University, Warsaw, 121.

3. Cialdini, R., 2009. Influencing people. Theory and Practice, Gdańskie Wydawnictwo Psychologiczne, Gdańsk, 186-195.

4. Doliwa, U., et al., 2018. Precise profiling of Facebook Users or reading tea leaves? A critical analysis of the operation of the algorithm created by Michał Kosiński and used by the Cambridge Analytica software, Zeszyty Prasoznawcze, Kraków, 61, 3 (235), 532.

5. Grzywa, A., 2013. Manipulation everything you need to know about it, Wydawnictwo Słowa i Myśli, Lublin, 11.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3