Modern administration often uses ICT systems to deliver public services, which must be adequately secured. Public administration bodies must, therefore, also include cybersecurity in their policies. E-services should be the standard. Unfortunately, this standard does not always apply in administration. New technologies in a digital state and information society must be widely used, including by public bodies, so that the quality and accessibility of the services provided meet social needs. The public administration is responsible for continuously developing computerisation, making it possible to function normally in cyberspace where citizens have long been present.
REFERENCES(39)
1.
Adamczyk M., Karpiuk M., Soler U., The use of new technologies in education – opportunities, risks and challenges in the times of intensive intercultural change, „Edukacja Międzykulturowa” 2023, no. 4.
Czuryk M., Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues, „Studia Iuridica Lublinensia” 2022, no. 3.
Czuryk M., Supporting the development of telecommunications services and networks through local and regional government bodies, and cybersecurity, „Cybersecurity and Law” 2019, no. 2.
Gyurák G., Hosszú távú adattárolási szokások a digitálisan aláírt dokumentumok szemszögéböl [in:] A hosszú távú adattárolás kérdései, ed. I. Péter, Pécs 2014.
Karpiuk M., The Protection of State Security in Cyberspace as a Justifying Ground for Restricting Constitutional Freedoms and Rights, „Przegląd Prawa Konstytucyjnego” 2022, no. 3.
Karpiuk M., Pizło W., Kaczmarek K., Cybersecurity Management – Current State and Directions of Change, „International Journal of Legal Studies” 2023, no. 2.
Kołowski J., Wesołek D., Informacje oraz ich dostępność w cyberprzestrzeni. Narzędzia oraz sposoby pozyskiwania i analizy informacji [in:] Zagrożenia wewnętrzne bezpieczeństwa zasobów informacyjnych w organizacji, ed. P. Dziuba, Warszawa 2023.
Kulesza J., Należyta staranność a cyberbezpieczeństwo wewnętrzne organizacji [in:] Zagrożenia wewnętrzne bezpieczeństwa zasobów informacyjnych w organizacji, ed. P. Dziuba, Warszawa 2023.
Kurek J., Operational Activities in the Field of Cybersecurity [in:] Cybersecurity in Poland. Legal Aspects, eds. K. Chałubińska-Jentkiewicz, F. Radoniewicz, T. Zieliński, Cham 2022.
Maglaras L., Ferrag M.A., Derhab A., Mukherjee M., Jakicke H., Rallis S., Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures, „EAI Endorsed Transactions on Security and Safety” 2018, no. 10.
Romaniuk P., Kształtowanie administracyjnoprawnych warunków służących do budowy cyberbezpieczeństwa w administracji publicznej, „Cybersecurity and Law” 2023, no. 2.
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.