{"title":"波兰网络空间中的虚假信息内容","authors":"J. Lipińska","doi":"10.7862/rz.2023.hss.14","DOIUrl":null,"url":null,"abstract":"The war in Ukraine and the risk of it spreading to other countries strongly undermined Poles’ sense of security. One recurring phenomenon is attacks in cyberspace. Such attacks are aimed at the critical infrastructure of the state; however, they also target citizens who seek knowledge on the Internet in areas related to defense, but also on ordinary matters that translate into everyday activities and knowledge about the world. The purpose of this article is to present the most important topics that function in cyberspace and are currently the most common targets for hackers. The research problem is, which topics functioning in cyberspace are most often modified so that they become disinformation? The research methods used were literature analysis and a diagnostic survey; the techniques were text analysis and a survey with a questionnaire.","PeriodicalId":13234,"journal":{"name":"Humanities and social sciences","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DISINFORMATION CONTENT IN POLISH CYBERSPACE\",\"authors\":\"J. Lipińska\",\"doi\":\"10.7862/rz.2023.hss.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The war in Ukraine and the risk of it spreading to other countries strongly undermined Poles’ sense of security. One recurring phenomenon is attacks in cyberspace. Such attacks are aimed at the critical infrastructure of the state; however, they also target citizens who seek knowledge on the Internet in areas related to defense, but also on ordinary matters that translate into everyday activities and knowledge about the world. The purpose of this article is to present the most important topics that function in cyberspace and are currently the most common targets for hackers. The research problem is, which topics functioning in cyberspace are most often modified so that they become disinformation? The research methods used were literature analysis and a diagnostic survey; the techniques were text analysis and a survey with a questionnaire.\",\"PeriodicalId\":13234,\"journal\":{\"name\":\"Humanities and social sciences\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Humanities and social sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.7862/rz.2023.hss.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Humanities and social sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.7862/rz.2023.hss.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The war in Ukraine and the risk of it spreading to other countries strongly undermined Poles’ sense of security. One recurring phenomenon is attacks in cyberspace. Such attacks are aimed at the critical infrastructure of the state; however, they also target citizens who seek knowledge on the Internet in areas related to defense, but also on ordinary matters that translate into everyday activities and knowledge about the world. The purpose of this article is to present the most important topics that function in cyberspace and are currently the most common targets for hackers. The research problem is, which topics functioning in cyberspace are most often modified so that they become disinformation? The research methods used were literature analysis and a diagnostic survey; the techniques were text analysis and a survey with a questionnaire.