Chałubińska-Jentkiewicz K., Cyberspace as an Area of Legal Regulation, (in:) Cybersecurity in Poland. Legal aspects, eds. K. Chałubińska-Jentkiewicz, F. Radoniewicz, T. Zieliński, Springer Cham 2021.
Lynch J., Identity Theft in Cyberspace: Crime Control Methods and Their Effectiveness in Combating Phishing Attacks, Berkeley Technology Law Journal 2005, vol. 20, no. 1.
Mukerji A., The Need for an International Convention on Cyberspace, Horizons: Journal of International Relations and Sustainable Development 2020, no. 16.
Nowikowska M., Ochrona danych osobowych w dokumentach kontrolnych, (in:) Reforma ochrony danych osobowych. Cel, narzędzia, skutki, J. Taczkowska-Olszewska, M. Nowikowska, & A. Brzostek (eds.), Poznań 2018.
Nowikowska M., Protection of personal data in audit documents, (in:) Reform of protection of personal data system. Purposes, tools, effects, J. Taczkowska-Olszewska, A. Brzostek, M. Nowikowska (eds.), Poznań 2018.
Nowikowska M., Personal Data Protection in the Context of the Act on the National Cybersecurity System, (in:) Cybersecurity in Poland. Legal Aspects, K. Chałubińska-Jentkiewicz, F. Radoniewicz, & T. Zieliński (eds.), Springer Cham 2022.
Reed T.S., Cybercrime And Technology Losses: Claims And Potential Insurance Coverage For Modern Cyber Risks, Tort Trial & Insurance Practice Law Journal 2019, vol. 54, no. 1.
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.