{"title":"The Obligations of Public Entities","authors":"Krzysztof Wąsowski","doi":"10.1007/978-3-030-78551-2_20","DOIUrl":"https://doi.org/10.1007/978-3-030-78551-2_20","url":null,"abstract":"","PeriodicalId":305862,"journal":{"name":"Cybersecurity in Poland","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117172287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tasks of the Minister of National Defence in the Field of Cybersecurity","authors":"Krzysztof Wąsowski","doi":"10.1007/978-3-030-78551-2_16","DOIUrl":"https://doi.org/10.1007/978-3-030-78551-2_16","url":null,"abstract":"","PeriodicalId":305862,"journal":{"name":"Cybersecurity in Poland","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128518530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Entities and Institutions in Charge of Combating Cybercrime in Poland","authors":"Jerzy Kosinski","doi":"10.1007/978-3-030-78551-2_26","DOIUrl":"https://doi.org/10.1007/978-3-030-78551-2_26","url":null,"abstract":"","PeriodicalId":305862,"journal":{"name":"Cybersecurity in Poland","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128261739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Space Security and Cybersecurity in Poland","authors":"M. Polkowska","doi":"10.1007/978-3-030-78551-2_12","DOIUrl":"https://doi.org/10.1007/978-3-030-78551-2_12","url":null,"abstract":"","PeriodicalId":305862,"journal":{"name":"Cybersecurity in Poland","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127909787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of the Minister Competent for Computerisation in the Cybersecurity System","authors":"Katarzyna Chałubińska-Jentkiewicz","doi":"10.1007/978-3-030-78551-2_17","DOIUrl":"https://doi.org/10.1007/978-3-030-78551-2_17","url":null,"abstract":"","PeriodicalId":305862,"journal":{"name":"Cybersecurity in Poland","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134401918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Functioning of State Power Structures and Cybersecurity","authors":"Marzena Toumi","doi":"10.1007/978-3-030-78551-2_10","DOIUrl":"https://doi.org/10.1007/978-3-030-78551-2_10","url":null,"abstract":"","PeriodicalId":305862,"journal":{"name":"Cybersecurity in Poland","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131571164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity in the European Union Law","authors":"Filip Radoniewicz","doi":"10.1007/978-3-030-78551-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-78551-2_6","url":null,"abstract":"","PeriodicalId":305862,"journal":{"name":"Cybersecurity in Poland","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132633968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Liability of Entities Providing Services by Electronic Means for Digital Content","authors":"P. Zając","doi":"10.1007/978-3-030-78551-2_23","DOIUrl":"https://doi.org/10.1007/978-3-030-78551-2_23","url":null,"abstract":"","PeriodicalId":305862,"journal":{"name":"Cybersecurity in Poland","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129961379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybercrime in Selected European Countries","authors":"Filip Radoniewicz","doi":"10.1007/978-3-030-78551-2_25","DOIUrl":"https://doi.org/10.1007/978-3-030-78551-2_25","url":null,"abstract":"","PeriodicalId":305862,"journal":{"name":"Cybersecurity in Poland","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129070639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Duties and Legal Status of the Government Plenipotentiary for Cybersecurity and the College for Cybersecurity","authors":"Agnieszka Brzostek","doi":"10.1007/978-3-030-78551-2_18","DOIUrl":"https://doi.org/10.1007/978-3-030-78551-2_18","url":null,"abstract":"","PeriodicalId":305862,"journal":{"name":"Cybersecurity in Poland","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123656454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}