Cybersecurity in Poland : Legal Aspects

This open access book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by the NCSA (National Cybersecurity System Act – this act was the first attempt to create a legal regulation of cybersecurity and, in addition, has implemented the provis...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2021
Language:English
Physical Description:1 online resource (506 p.)
Notes:Description based upon print version of record.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993546094604498
ctrlnum (CKB)5340000000068534
EBL6795398
(AU-PeEL)EBL6795398
(MiAaPQ)EBC6795398
(oapen)https://directory.doabooks.org/handle/20.500.12854/72822
(PPN)258301775
(EXLCZ)995340000000068534
collection bib_alma
record_format marc
spelling Chałubińska-Jentkiewicz, Katarzyna.
Cybersecurity in Poland [electronic resource] : Legal Aspects
Cham : Springer International Publishing AG, 2021.
1 online resource (506 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based upon print version of record.
This open access book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by the NCSA (National Cybersecurity System Act – this act was the first attempt to create a legal regulation of cybersecurity and, in addition, has implemented the provisions of the NIS Directive) but may discuss a number of other issues. The book presents international and EU regulations in the field of cybersecurity and issues pertinent to combating cybercrime and cyberterrorism. Moreover, regulations concerning cybercrime in a few select European countries are presented in addition to the problem of collision of state actions in ensuring cybersecurity and human rights. The advantages of the book include a comprehensive and synthetic approach to the issues related to the cybersecurity system of the Republic of Poland, a research perspective that takes as the basic level of analysis issues related to the security of the state and citizens, and the analysis of additional issues related to cybersecurity, such as cybercrime, cyberterrorism, and the problem of collision between states ensuring security cybernetics and human rights. The book targets a wide range of readers, especially scientists and researchers, members of legislative bodies, practitioners (especially judges, prosecutors, lawyers, law enforcement officials), experts in the field of IT security, and officials of public authorities. Most authors are scholars and researchers at the War Studies University in Warsaw. Some of them work at the Academic Centre for Cybersecurity Policy – a thinktank created by the Ministry of National Defence of the Republic of Poland.
English
Entertainment & media law bicssc
Criminal law & procedure bicssc
Constitutional & administrative law bicssc
Crime & criminology bicssc
Open access
Cybercrime
NIS Directive
Cyberterrorism
Operational reconnaissance
Right to privacy
3-030-78550-5
Radoniewicz, Filip.
Zieliński, Tadeusz.
language English
format Electronic
eBook
author Chałubińska-Jentkiewicz, Katarzyna.
spellingShingle Chałubińska-Jentkiewicz, Katarzyna.
Cybersecurity in Poland Legal Aspects
author_facet Chałubińska-Jentkiewicz, Katarzyna.
Radoniewicz, Filip.
Zieliński, Tadeusz.
author_variant k c j kcj
author2 Radoniewicz, Filip.
Zieliński, Tadeusz.
author2_variant f r fr
t z tz
author2_role TeilnehmendeR
TeilnehmendeR
author_sort Chałubińska-Jentkiewicz, Katarzyna.
title Cybersecurity in Poland Legal Aspects
title_sub Legal Aspects
title_full Cybersecurity in Poland [electronic resource] : Legal Aspects
title_fullStr Cybersecurity in Poland [electronic resource] : Legal Aspects
title_full_unstemmed Cybersecurity in Poland [electronic resource] : Legal Aspects
title_auth Cybersecurity in Poland Legal Aspects
title_new Cybersecurity in Poland
title_sort cybersecurity in poland legal aspects
publisher Springer International Publishing AG,
publishDate 2021
physical 1 online resource (506 p.)
isbn 3-030-78551-3
3-030-78550-5
callnumber-first K - Law
callnumber-subject K - General Law
callnumber-label K4240-4343
callnumber-sort K 44240 44343
illustrated Not Illustrated
work_keys_str_mv AT chałubinskajentkiewiczkatarzyna cybersecurityinpolandlegalaspects
AT radoniewiczfilip cybersecurityinpolandlegalaspects
AT zielinskitadeusz cybersecurityinpolandlegalaspects
status_str n
ids_txt_mv (CKB)5340000000068534
EBL6795398
(AU-PeEL)EBL6795398
(MiAaPQ)EBC6795398
(oapen)https://directory.doabooks.org/handle/20.500.12854/72822
(PPN)258301775
(EXLCZ)995340000000068534
carrierType_str_mv cr
is_hierarchy_title Cybersecurity in Poland Legal Aspects
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1796651434590076929
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03257nam a22004933u 4500</leader><controlfield tag="001">993546094604498</controlfield><controlfield tag="005">20230221134152.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr -n---------</controlfield><controlfield tag="008">220617s2021||||||| o|||||||||||eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-030-78551-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5340000000068534</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">EBL6795398</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(AU-PeEL)EBL6795398</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6795398</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/72822</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)258301775</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995340000000068534</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">AU-PeEL</subfield><subfield code="b">eng</subfield><subfield code="c">AU-PeEL</subfield><subfield code="d">AU-PeEL</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">K4240-4343</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chałubińska-Jentkiewicz, Katarzyna.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity in Poland</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">Legal Aspects</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (506 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by the NCSA (National Cybersecurity System Act – this act was the first attempt to create a legal regulation of cybersecurity and, in addition, has implemented the provisions of the NIS Directive) but may discuss a number of other issues. The book presents international and EU regulations in the field of cybersecurity and issues pertinent to combating cybercrime and cyberterrorism. Moreover, regulations concerning cybercrime in a few select European countries are presented in addition to the problem of collision of state actions in ensuring cybersecurity and human rights. The advantages of the book include a comprehensive and synthetic approach to the issues related to the cybersecurity system of the Republic of Poland, a research perspective that takes as the basic level of analysis issues related to the security of the state and citizens, and the analysis of additional issues related to cybersecurity, such as cybercrime, cyberterrorism, and the problem of collision between states ensuring security cybernetics and human rights. The book targets a wide range of readers, especially scientists and researchers, members of legislative bodies, practitioners (especially judges, prosecutors, lawyers, law enforcement officials), experts in the field of IT security, and officials of public authorities. Most authors are scholars and researchers at the War Studies University in Warsaw. Some of them work at the Academic Centre for Cybersecurity Policy – a thinktank created by the Ministry of National Defence of the Republic of Poland.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Entertainment &amp; media law</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal law &amp; procedure</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Constitutional &amp; administrative law</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crime &amp; criminology</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Open access</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybercrime</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NIS Directive</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Operational reconnaissance</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Right to privacy</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-030-78550-5</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Radoniewicz, Filip.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zieliński, Tadeusz.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-05-20 09:10:26 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2021-11-06 21:41:15 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338110970004498&amp;Force_direct=true</subfield><subfield code="Z">5338110970004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338110970004498</subfield></datafield></record></collection>