The Internet network creates many possibilities for all its users. Much is said about
the benefits of this medium, and much less about the security rules in the network.
The Internet allows you to publish your own content on different types of websites,
which can cause positive and negative effects. The aim of this article is to educate
and broaden knowledge about security in cyberspace, and to make the public aware
that despite many advantages and opportunities offered by the Internet, there are
also serious threats that may affect the functioning of people.
Banaszak A. (2013). Oświata i edukacja a bezpieczeństwo społeczne, [w:] M. Such-Pyrgiel, Bezpieczeństwo społeczne w XXI wieku w ujęciu socjologicznym, pedagogicznym, prawnym i nauk o zarządzaniu. Józefów: Wydawnictwo WSGE.
Doswell F. (2008). A case study on computer security for non-expert computer user, USA, 361-365, doi.acm.org/10.1145/1593105.1593201 (dostęp: 12.09.2017).
Hofstede G. (1992). Cultural and Organizations – Software of the Mind Intercultural Cooperation and its importance for survival, New York: McGraw-Hill.
Które pliki z internetu są bezpieczne, a które niebezpieczne?, https://www.akademiakomputroni... artykul/ ktore-pliki-z-internetu-sa-bezpieczne-a-ktore-niebezpieczne (dostęp: 12.09.2017).
Majewski A., Jak sprawdzić, czy można ufać wiadomości e-mail?, http://www.ekademia.pl/blog/ bezpieczenstwoinformacji/4395. dn. 19.02.2009 (dostęp: 12.09.2017).
Ng B.Y., Rahim M.A. (2005). A Socio-Behavioral Study of Home Computer Users Intention to Practice Security, Proceedings of the Ninth Pacific Asia Conference on Information Systems, Bangkok, 7–10 July, Thailand.
Ng B.Y., Kankanhalli A., Xu Y.C. (2009). Studying users’ computer security behavior: A health belief perspective, “Decision Support System”, 46 (4), 815–825.
Sobianek M., Bezpieczna strona internetowa – jak ją rozpoznać?, http://biznes.gazetaprawna.pl/ artykuly/28904,bezpieczna-strona-internetowa-jak-ja-rozpoznac.html. dn. 31.07.2008 (dostęp: 12.09.2017).
Tu Z., Yuan Y. (2012). Understanding User’s Behaviors in Coping with Security Threat of Mobile Devices Loss and Theft, 2012 45th Hawaii International Conference on System Science (HICSS), 4–7 January 2012, 1393-1402, doi:10.1109/HICSS.2012.620.
Van Niekerk J., Goss R. (2013). Towards information security education 3.0: A call for information security educational ontologies, January 2013 IFIP Advances in Information and Communication.
Wiśniewska A., Ochrona danych osobowych w serwisach społecznościowych, http://www.infor.pl/ prawo/ prawo-karne/ ciekawostki/298879,Ochrona-danych-osobowych-wserwisach-spolecznosciowych.html (dostęp: 2.09.2017).
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.