PL EN
Wydawnictwo
AWSGE
Akademia Nauk Stosowanych
WSGE
im. Alcide De Gasperi
BOOK CHAPTER (148-164)
Identity Theft. Protection of Personal Data in Cyberspace
 
More details
Hide details
1
War Studies University, Warsaw, Poland
 
 
KEYWORDS
 
REFERENCES (26)
1.
Anderson K.B., Durbin E., Salinger M.A., Identity Theft, The Journal of Economic Perspectives 2008, vol. 22, no. 2.
 
2.
Bosetta M., The Weaponization of Social Media: Spear Phishing and Cyberattacks on Democracy, Journal of International Affairs 2018, vol. 71, no. 1.5.
 
3.
Brown G., Poellet K., The Customary International Law of Cyberspace, Strategic Studies Quarterly 2012, vol. 6, no. 3.
 
4.
Chałubińska-Jentkiewicz K., Cyberodpowiedzialność, Toruń 2019.
 
5.
Chałubińska-Jentkiewicz K., Cyberspace as an Area of Legal Regulation, (in:) Cybersecurity in Poland. Legal aspects, eds. K. Chałubińska-Jentkiewicz, F. Radoniewicz, T. Zieliński, Springer Cham 2021.
 
6.
Chałubińska-Jentkiewicz K., Karpiuk M., Prawo nowych technologii, Warszawa 2015.
 
7.
Chałubińska-Jentkiewicz K., Nowikowska M., Artificial Intelligence v. Personal Data, Polish Political Science Yearbook 2022, vol. 51(3).
 
8.
Chałubińska-Jentkiewicz K., Nowikowska M., Ochrona danych osobowych w cyberprzestrzeni, Warszawa 2021.
 
9.
Chałubińska-Jentkiewicz K., Nowikowska M., Security v. Privacy – Legal Aspects, Maribor 2021.
 
10.
Denning D.E., Wojna informacyjna i bezpieczeństwo informacji, Warszawa 2002.
 
11.
Gibson W., Neuromancer, Katowice 2009.
 
12.
Gobeo A., Flower C., Buchanan W.J., GDPR and Cyber Security for Business Information System, River Publishers 2018.
 
13.
Johnson D.R., Post D., Law and Bodrers: The Rise of law in Cyberspace, Stanford Law Review 1996, vol. 48, no. 5.
 
14.
Karpiuk M., Cybersecurity as an element in the planning activities of public administration, Cybersecurity and Law 2021, vol. 5(1).
 
15.
Lynch J., Identity Theft in Cyberspace: Crime Control Methods and Their Effectiveness in Combating Phishing Attacks, Berkeley Technology Law Journal 2005, vol. 20, no. 1.
 
16.
Malish A.S., Navigating Cyber Coverages for Modern Day Cybercrimes, Tort Trial & Insurance Practice Law Journal 2019, vol. 54, no. 3.
 
17.
Mukerji A., The Need for an International Convention on Cyberspace, Horizons: Journal of International Relations and Sustainable Development 2020, no. 16.
 
18.
Nowikowska M., Ochrona danych osobowych w dokumentach kontrolnych, (in:) Reforma ochrony danych osobowych. Cel, narzędzia, skutki, J. Taczkowska-Olszewska, M. Nowikowska, & A. Brzostek (eds.), Poznań 2018.
 
19.
Nowikowska M., Protection of personal data in audit documents, (in:) Reform of protection of personal data system. Purposes, tools, effects, J. Taczkowska-Olszewska, A. Brzostek, M. Nowikowska (eds.), Poznań 2018.
 
20.
Nowikowska M., Personal Data Protection in the Context of the Act on the National Cybersecurity System, (in:) Cybersecurity in Poland. Legal Aspects, K. Chałubińska-Jentkiewicz, F. Radoniewicz, & T. Zieliński (eds.), Springer Cham 2022.
 
21.
Rattray G.T., Wojna strategiczna w cyberprzestrzeni, Warszawa 2004.
 
22.
Reed T.S., Cybercrime And Technology Losses: Claims And Potential Insurance Coverage For Modern Cyber Risks, Tort Trial & Insurance Practice Law Journal 2019, vol. 54, no. 1.
 
23.
Safjan M., Ochrona danych osobowych – granice autonomii i informacji, (in:) Ochrona danych osobowych, M. Wyrzykowski (ed.), Warsaw 1999.
 
24.
Szczepaniuk E., Bezpieczeństwo struktur administracyjnych w warunkach zagrożeń cyberprzestrzeni państwa, Warszawa 2016.
 
25.
Voigt P., Bussche A., The EU General Data Protection Regulation (GDPR). A Practical Guide, Springer Cham 2017.
 
26.
Walters R., Trakman L., Zeller B., Data Protection Law. A comparative Analysis of Asia-Pacific and European Approaches, Springer Cham 2019.
 
Journals System - logo
Scroll to top