ArticlePDF Available

THE QUESTION OF THE SECURITY OF FACILITATING, COLLECTING AND PROCESSING INFORMATION IN DATA BASES OF SOCIAL NETWORKING

Authors:

Abstract

In recent years, The number of companies that have been collecting personal information for marketing purposes has grown. Then, they have been reselling it to other companies, banks, institutions. In this way, enterprises, financial and public institutions create huge collections of nonpublic data that are valuable information for taking marketing enterpises. By targetting appropriately profiled product and service offer at a selected group of receivers; trading partners and potential clients, a greater effectiveness used in the marketing strategy is achieved suitably Thereupon, multifaceted and informational personal data base, which are built in institutions, enterpises and social networking sites, become a valuable source of informaton used for the marketing purposes. The development of information processing and dissemination techniques through the Internet is determined by the many conveniences for beneficiaries, customers and users of services offered by the Internet. On the other hand, the development of information technologies on the Internet carries the risk of loss or theft of information by an unauthorized entities. The process of facilitating information online generates a number of threats related to identity theft, capturing nonpublic data by hackers, and accomplishing conversion of funds in the electronic system banking. In response to these threats, specific entities expand security systems for remote facilitating of information and making transactions via the Internet.
International Journal of New Economics and Social Sciences
2(6)2017
D. Prokopowicz
319
JEL O31,32,33,34
dr Dariusz Prokopowicz
Institute of Sociology, Faculty of History and Social Sciences,
Cardinal Stefan Wyszynski University in Warsaw
(Warsaw, Poland)
darprokop@poczta.onet.pl
THE QUESTION OF THE SECURITY OF FACILITATING, COLLECTING AND PROCESSING
INFORMATION IN DATA BASES OF SOCIAL NETWORKING
KWESTIA BEZPIECZEŃSTWA UDOSTĘPNIANIA, GROMADZENIA I PRZETWARZANIA
INFORMACJI W BAZACH DANYCH PORTALI SPOŁECZNOŚCIOWYCH
ВОПРОС О БЕЗОПАСНОСТИ ОБМЕНА, КОЛЛЕКЦИИ И ОБРАБОТКИ
ИНФОРМАЦИИ В ОСНОВЕ ДАННЫХ СОЦИАЛЬНЫХ ПОРТАЛОВ
Abstracts
In recent years, The number of companies that have been collecting personal information
for marketing purposes has grown. Then, they have been reselling it to other companies,
banks, institutions. In this way, enterprises, financial and public institutions create huge
collections of nonpublic data that are valuable information for taking marketing enterpises.
By targetting appropriately profiled product and service offer at a selected group of
receivers; trading partners and potential clients, a greater effectiveness used in the marketing
strategy is achieved suitably Thereupon, multifaceted and informational personal data base,
which are built in institutions, enterpises and social networking sites, become a valuable
source of informaton used for the marketing purposes. The development of information
processing and dissemination techniques through the Internet is determined by the many
conveniences for beneficiaries, customers and users of services offered by the Internet. On the
other hand, the development of information technologies on the Internet carries the risk of
loss or theft of information by an unauthorized entities. The process of facilitating information
online generates a number of threats related to identity theft, capturing nonpublic data by
hackers, and accomplishing conversion of funds in the electronic system banking. In response
to these threats, specific entities expand security systems for remote facilitating of
information and making transactions via the Internet.
Keywords: Internet, social networking sites, internet companies, technology companies,
information facilitating, website, internet server, information service, cyberspace.
D. Prokopowicz, The Question Of The Security Of Facilitating, Collecting And Processing In-
formation In Data Bases Of Social Networking (in:) "International Journal of New Economics
and Social Sciences" (IJONESS), International Institute of Innovations "Science-Education-
Business" in Warsaw, No. 2 (6) 2017, Warsaw 2017, pp. 319-330. ISSN 2450-2146
International Journal of New Economics and Social Sciences
2(6)2017
D. Prokopowicz
320
Streszczenie
W ostatnich latach rośnie liczba firm, które zbierają dane osobowe w celach
marketingowych a następnie je odsprzedają innym firmom, bankom, instytucjom. W ten
sposób przedsiębiorstwa, instytucje finansowe i publiczne tworzą ogromne zbiory danych
niejawnych stanowiące wartościową informację na potrzeby podejmowanych przedsięwzięć
marketingowych. Poprzez kierowanie stosownie sprofilowanej oferty produktowej lub
usługowej do ściśle wyselekcjonowanej grupy odbiorców, kontrahentów, segmentu
docelowego potencjalnych klientów uzyskuje się większą skuteczność zastosowanej strategii
marketingowej podczas kampanii reklamowych. W związku z tym budowane w instytucjach,
przedsiębiorstwach, w tym także w internetowych portalach społecznościowych rozbudowane
wieloaspektowo i informacyjnie bazy danych osobowych stają się cennym zasobem informacji
wykorzystywanej na potrzeby marketingu. Rozwój technik przetwarzania i udostępniania
informacji poprzez Internet zdeterminowany jest wieloma udogodnieniami dla beneficjentów,
klientów i osób korzystających z oferowanych przez Internet usług informacyjnych. Z drugiej
strony z rozwojem technologii informacyjnych funkcjonujących w Internecie wiąże się także
ryzyko utraty bądź kradzieży informacji przez podmioty nieuprawnione. Proces udostępniania
informacji poprzez Internet generuje wiele zagrożeń związanych z przestępstwami kradzieży
tożsamości, przechwytywania przez hakerów danych niejawnych oraz dokonywania
malwersacji środków pieniężnych w systemach elektronicznej bankowości. W odpowiedzi na
te zagrożenia poszczególne podmioty rozbudowują systemy bezpieczeństwa zdalnego
udostępniania informacji oraz dokonywanych transakcji realizowanych za pośrednictwem
Internetu. Słowa kluczowe: Internet, portale społecznościowe, firmy internetowe, firmy
technologiczne, udostępnianie informacji, strona internetowa, serwer internetowy, serwis
informacyjny, bezpieczeństwo w cyberprzestrzeni.
Аннотация
В последние годы растет число компаний, которые собирают персональные данные
в маркетинговых целях, а затем продают их другим компаниям, банкам и
учреждениям. Таким образом, предприятия, финансовые и государственные
учреждения создают огромные коллекции секретных данных, предоставляя ценную
информацию для нужд маркетинговых предприятий. Получая надлежащим образом
профилированный продукт или предложение услуг тщательно отобранной группе
получателей, подрядчиков, целевого сегмента потенциальных клиентов, повышается
эффективность маркетинговой стратегии, применяемой во время рекламных
кампаний. В связи с этим базы данных, созданные в учреждениях, предприятиях,
включая сайты социальных сетей, многогранную и информативную базу данных,
становятся ценным ресурсом информации, используемой в маркетинговых целях.
Разработка методов обработки и обмена информацией через Интернет определяется
многими возможностями для бенефициаров, клиентов и людей, использующих
информационные услуги, предлагаемые Интернетом. С другой стороны, развитие
D. Prokopowicz, The Question Of The Security Of Facilitating, Collecting And Processing In-
formation In Data Bases Of Social Networking (in:) "International Journal of New Economics
and Social Sciences" (IJONESS), International Institute of Innovations "Science-Education-
Business" in Warsaw, No. 2 (6) 2017, Warsaw 2017, pp. 319-330. ISSN 2450-2146
International Journal of New Economics and Social Sciences
2(6)2017
D. Prokopowicz
321
информационных технологий, функционирующих в Интернете, также сопряжено с
риском потери или кражи информации со стороны несанкционированных лиц. Процесс
предоставления информации через Интернет создает множество угроз, связанных с
кражей личных данных, хакеров, загроможденных секретными данными, и денежных
растрат в электронных банковских системах. В ответ на эти угрозы отдельные
организации разрабатывают системы безопасности для удаленного обмена
информацией и транзакциями, осуществляемыми через Интернет.
Ключевые слова: Интернет, социальные сети, интернет-компании,
технологические компании, обмен информацией, веб-сайт, веб-сервер,
информационный сервис, безопасность в киберпространстве.
Introduction
In recent years, the role of improving the logis-
tics and security of information systems have been
increasing together with the development of ac-
quisition techniques, and the multicriterial proc-
essing of information accumulated in the con-
stantly growing online data bases of social net-
working sites, where citizens share information
sometimes even very personal. In addition, the
number of companies that collect personal infor-
mation for marketing purposes and then resell it to
other companies, banks, institutions is increasing.
Increasingly, the collection of personal data is not
limited to basic information such as name, gender
and age, but also refers to other categories of pri-
vate information pertaining to particular citizens
such as shopping preferences, interests, place of
work, income level etc. [S. Gwoździewicz 2014, s.
73]. This way companies, financial and public in-
stitutions create huge collections of nonpublic data
composing valuable information for the need of
marketing enterprises. By directing an appropri-
ately defunct product or service offer at a strictly
targeted audience, trading partners and at the seg-
ment of potential customers, it is more effective
to achieve the greater effectiveness used in strat-
egy marketing during advertising campaigns. Ad-
vertising campaigns conducted in this way gener-
ate a significant reduction of the costs of necessary
marketing activities, in the situation of targeting
this offer at a strictly defined segment of prospec-
tive purchasers [J. Sarnowski, D. Prokopowicz
2015, s. 137].
Therefore, expanded multiperspectively and
informationally data bases, built in institutions, en-
terprises and also in social networking sites, be-
come a valuable resources of information used
marketing. Data bases of personal details, which
grows informatively and measurably valuably, en-
force sustaining their expenditures on entities to
ensure the required level of security. In case of
Internet companies, including social networking
sites, Internet- hosting companies, web sites and
e-mail services, telecoms, public institutions with
an electronic access to profiled services and elec-
tronic agencies of banks and other financial insti-
tutions, there is a significant risk of an unauthor-
ized access to personal data by hackers working
on commission of companies and competing insti-
tutions [S. Gwoździewicz, D. Prokopowicz 2016a,
s. 229-230]. The growing number of these types of
nonpublic databases created by entities also active
on the Internet and the ever-expanding range of in-
formation collected in data bases may generate an
increase of the risk of announcing citizen’s per-
sonal data on the Internet [D. Prokopowicz 2009,
s. 65]. Thereupon, entities maintaining and ex-
tending this type of databases, are forced to spend
more on improving the technical security of non-
public data in order to reduce the potential of ap-
pearing categories named above such as: the risk
D. Prokopowicz, The Question Of The Security Of Facilitating, Collecting And Processing In-
formation In Data Bases Of Social Networking (in:) "International Journal of New Economics
and Social Sciences" (IJONESS), International Institute of Innovations "Science-Education-
Business" in Warsaw, No. 2 (6) 2017, Warsaw 2017, pp. 319-330. ISSN 2450-2146
International Journal of New Economics and Social Sciences
2(6)2017
D. Prokopowicz
322
of loss, theft or announcing of personal data on the Internet.
1. Information security in the context of developing social networking sites
In economic systems of highly developed and
developing countries, both business entities and
the sector of public institutions play a particularly
important role in meeting the needs of the society
and indirectly the whole economy. After more
than a quarter-century of the development of the
Polish economy in the market conditions and
processes of adapting to the European Union sys-
tem standards, one of the spheres of public ser-
vices offered in Poland is fulfilling the information
needs of citizens [D. Wociór red. 2016, s. 48]. De-
cision-making processes indirectly influence on
the pace of the socio-economic development of the
country in enterprises and in the sector of public
institutions such as financial management [M.
Muchacki 2014, s. 27].
As a result, in recent years, new categories of
the ITC system’s risk on the Internet have
emerged as a derivative of the rapidly growing and
continuously growing large collections of the non-
public data generated by companies offering spe-
cific products or services to Internet users. For
several years, this type of data warehouse have
functioned as a collection of information defined
as Big Data and so called. Clouds computing.
Facebook, Twitter, Instagram, YouTube, and other
networking sites are currently having the largest
data collection of this type about the Internet us-
ers. Because each of these commercial entities
creates their own database about the Internet users,
hence so called sensitive data bases about users
are being stored now in many places in the global
network [M. Górka red. 2014, s. 93]. Internet cor-
porations acting globally, offer Internet users free
use of their services, including social networking
platforms [S. Gwoździewicz, D. Prokopowicz
2016c, s. 82-83]. They also create special software
programs called robots that analyze available in-
formation about particular users and collect per-
sonal information for marketing purposes. Proba-
bly a small fraction of the Internet users know how
far this commercialized surveillance carried by the
Internet companies has taken place. The activity of
these entities increases the potential scale of risk
associated with the possible decrease of the secu-
rity of nonpublic information collected in elec-
tronic databases and transferred via ICT systems
[M. Matosek 2015, s. 112].
Unfortunately, under Polish conditions, there
are not so much verified and confirmed quantitive
data in terms of effective hackers attacks perform-
ing on other’s entities IT systems via the Internet
[A. Dmowski, D. Prokopowicz 2006, s. 77-78].
Wróbel quotes that the question of the legal re-
sponsibility is related to the issues of the security
information systems and the information resources
are included in these systems. It has already
been significantly described by American re-
searchers. On the other hand, in Poland, this issues
is not still undertaken in researches, what is con-
nected with a limited resource of analytic data [P.
Wróbel 2014, s. 186-187]. On the basis of re-
searches done in Western countries, a relatively
high level of information leakiness of ICT systems
has been demonstrated. According to the 2011
Websense Research report drawn up on the basis
of 2,000 different types of economic entities and
institutions operating in the US, Canada, Britain,
and Australia employing at least 250 computer us-
ers in the period of one year, there have been
many worrying events that may suggest many
gaps in security systems and in procedures devel-
oped erroneously. In 37% of the surveyed entities,
the employee contributed to the loss of certain
nonpublic information and data that could result or
resulted in advert events for some entity. In 20%
of the surveyed organizations nonpublic informa-
tion was consciously and illegally copied and sto-
len by employees. They were also stolen from in-
ternal IT systems of companies and institutions.
Also in 20% of the surveyed entities nonpublic
data was sent to social networking sites. Besides,
in internal IT systems of 35% surveyed entities
there appeared Trojan horses, malicious programs
like malware or other types of viruses [Websense
Research Raport, 2011, s. 11].
2. Global tendency in terms of the security conducted in social networking sites process-
ing and transfer of data
The dynamic development of Internet services
accelerated the process of the informational glob-
alization but also created a wider field for hackers
and terrorist organizations. Everyday, globally,
there arise many new viruses, that are repeatedly
capable of attacking the IT systems of many com-
International Journal of New Economics and Social Sciences
2(6)2017
D. Prokopowicz
323
panies, public institutions, banks, and home com-
puters. On the other hand, new securities measures
are also created for attacked information systems
every day. This type of rivalry does not always
take the form of a zero-scoring game [D. Pro-
kopowicz 2016, s. 21-22]. Currently, the legal
norms functioning in UE are not fully adequate to
the prevailing standards of digitization of offices
and enterprises, and the infrastructure of the sensi-
tive branches in the national economy. Energetics
, transport, crisis management centers, offices and
financial system belong to branches in the econ-
omy that are threatened by cyberterrorists attack
[A. Dmowski, D. Prokopowicz 2010, s. 326].
In connection with the immigration crisis in
Europe and the war in Syria, the media in Europe
are dominated by reports suggesting that Islamic
fundamentalists are currently responsible for at-
tacks. However, globally, the sources of terrorist
attacks are more diverse, taking into account the
nationality, culture and religion that is the culprit
of the attacks . As terrorism is more and more
concerned with the global medium of the Internet
and the phenomenon of cyberterrorism can cause
not less negative effects than "traditional" acts of
terror, so the global spin of this issues is also im-
portant [A. Suchorzewska 2010, s. 19-20]. Ana-
lyzes refering to the global approach to terrorism
show that Islamic fundamentalism can only be
linked to every fifth terrorist attack in recent
months. Apart from Islamic fundamentalism, ter-
rorist attacks are still assassinated by different
types of neo-Nazi and leftists organizations,
groups of separatist and fundamentalist associated
with different religious currents. Krzysztof Ci-
eślak, who is an expert of the research centre on
Collegium Civitas terrorism, indicated that cy-
berterrorism took a shot at financial sector ,which
doesn’t need to restrict to hacking on bank ac-
counts. It was during Bank Security Forum that
held on 10th May 2016 in Warsaw. The threat of
cyberterrorism in regard of bank may be different.
So far in the structures of the right public services,
teams constituted for the current monitoring of po-
tential threats, including crisis management teams,
have changed the nature of the process of control-
ling and managing potential threats in recent
years. Current threats caused by the forces of na-
ture, failures of energy installations and water
pipes and other facilities give way to potential ter-
rorist or even cyber terrorist threats [K.
Machowski 2016, s. 14].
Therefore, in recent years, new categories of
cybersecurity risk of IT systems have emerged as
a derivative of the rapidly growing and ever-
expanding large data sets about users, customers
that are created by economic entities on the Inter-
net. Recently, these large data sets have func-
tioned in the so-called data cloud developed on a
data warehouse of a given entity. The analysts of
this issue predict that the largest collections of
data on Internet users are currently had and persis-
tently developed by online companies like Google,
Facebook, Twitter, Instagram, YouTube and oth-
ers. In connection with it, the data of Internet us-
ers, including so-called sensitive personal details
are currently stored in many locations, on servers
of different companies and institutions [M. Górka
red. 2014, s. 93]. The largest Internet companies,
that offer a free use of social networking sites,
create special programs called robots, with the
help of which they analyze online data sets and
then copy, convert and collect it in their own data
warehouses. Probably still, most people on Earth
do not know how far this commercialized surveil-
lance of Internet companies has taken place [S.
Gwoździewicz, D. Prokopowicz 2016c, s. 81].
Internet users are generally unaware of the
scale of potential use of their personal data by
online companies that do marketing business on
behalf of other entities. Online companies such as
Google, Facebook, Twitter, Instagram, YouTube
get the most part of their revenues from advertis-
ings on their social networking sites. On the user’s
accounts of these social networking sites, there are
displayed advertisings appropriately profiled ac-
cording to the preferences of the user and his per-
sonal characteristic [T. Trejderowski 2013, s.
165]. These preferences are sometimes defined by
the user at the stage of setting up an account on a
given social networking site. Later, while using a
particular account, specially created robots will
scan preferences of a given user about the areas of
interest and the type of content ad they would like
to receive [J. Kos-Łabędowicz 2015, s. 52].
In addition, the robots that work on these por-
tals collect certain data about the user and create
multi-faceted personal profiles in databases of the
mentioned online concerns. Because the number
of users of these portals is not even millions, and
even billions are data warehouses secured with
the possible latest security techniques and with en-
cryption of data sent on the Internet, including
personal data [J. Kosiński 2015, s. 146]. These
International Journal of New Economics and Social Sciences
2(6)2017
D. Prokopowicz
324
warehouses are created for the huge resources of
information. Most online companies that run a
commercial and advertising business , collect data
about user’s websites by installing in their brows-
ers so called Cookies, ie background programs,
that collect data about users of some webpage [S.
Gwoździewicz, D. Prokopowicz 2016c, s. 83-84].
3. The need to improve risk management systems and adjust the legal regulations to the
technological progress of online information technologies
In accordance with current legal regulations,
Internet users generally know about this trade to
be possible, they may or may not have to agree to
it at the beginning of the website of the company
or institution [K. Machowski 2016, s. 14]. Theo-
retically, because of the prevalence of this solu-
tion, Internet users are more likely to forget or ig-
nore this possibility of deciding on how these
cookies work. Consequently, each web user of a
global village, more or less consciously, consent
to build their digital profile in warehouses of
online concerns, other companies and institutions
[B. Szaruga-Domańska, D. Prokopowicz 2016].
The most extended personal profiles, also
known as avatars of particular online users, are
built in data warehouses of online concerns men-
tioned above. Other important parameters affect-
ing the scope of information generated by an ava-
tar ,are the frequency of use of the global network,
the scope of information provided, and the number
and type of browsed pages. It is now assumed that
each user of the Internet and in particular a user
browsing a wide variety of sites and having an ac-
count on social networking sites, has an Internet
equivalent- an avatar, whose characteristic is
found in databases of the mentioned examples of
Internet concerns [A. Gałach, S. Hoc, A.
Jędruszczak, P. Kowalik i inni 2015, s. 243].
It is also widely acknowledged that Internet
users and users of other news media care for the
protection of their privacy, intimacy that is impor-
tant in everyday existence and in the use of these
dynamically developing media. However, the
scale of progress made in ICT and in the offer of
online companies has depreciated the real oppor-
tunities of user privacy of certain online informa-
tion services available on the Internet. Progress in
this area has significantly outrun the technique that
should provide privacy protection. The awareness
of Internet users is in this respect still negligible.
This is because it is in the interest of these Internet
concerns who bother to build the most informa-
tionally well-formed personal profiles in the form
of avatars in their data warehouses [J. Grzywacz
2016, s. 81].
In recent years, collecting information about
Internet users for developing information avatars
has been facilitated by the next stage of techno-
logical development. This next stage of progress
in the development of global Internet media is de-
termined by the widespread technology of plat-
forms built in the clouds computing [C. M. Olszak
2014, s. 47], that is data warehouses accumulating
huge collections of data with the possibility to
process them and with an access to mobile de-
vices. Sometimes there is also the issue of physical
distribution of data warehouses in different places
of a given country, continent or in a global view.
The issue of distributing the components of the
data warehouse system is determined by the secu-
rity of data storage, the need for data backup and
by the mirroring of data warehouses physically lo-
cated in different parts of the globe. Internet users,
thanks to the widespread cloud computing tech-
nology, have the convenience of an access to their
social networking sites accounts from various mo-
bile devices with the Internet access [A. Krasuski
2012, s. 127].
It is commonly assumed that, in keeping with
the needs of most Internet users, the protection of
personal data is this domain of human existence in
the current digital revolution, which should be also
provided by online companies. According to the
Basic Law, that is the Constitution, the protection
of personal data is one of the fundamental rights of
every citizen and also the Internet user. The dy-
namic advance in technology and In the range of
an offer of Internet services have caused a partial
erosion of the real operation of this law. This is
because either Internet users are not fully aware of
avatars built in the warehouses of the Internet
concerns or new ICTs no longer allow to reserve
the full privacy of citizens in information socie-
ties. The Internet companies such as Google,
Facebook, Twitter, Instagram, and YouTube col-
lect other data about users of their social network-
ing sites every day [S. Gwoździewicz, D. Pro-
kopowicz 2016c, s. 84-85]. They constantly de-
velop avatars that already existed, this is electronic
equivalents of individual citizens and Internet us-
International Journal of New Economics and Social Sciences
2(6)2017
D. Prokopowicz
325
ers. How and when will these data be used, except
for the current advertising activities of these cor-
porations, unfortunately Internet users do not
know [Ł. Libuda 2016, s. 95]. They cannot even
know it even if these companies, online compa-
nies that own social networking sites, do not know
how these constantly growing information col-
lected in data warehouses will be used for 10
years.
As a result, technological advances change the
relationships between Internet users and personal
data owners about individual citizens. When the
disclosure of a violation of citizens' right to pri-
vacy and to the issue of the institutional protection
of personal data, Internet users generally regard it
as a lack of action guaranteed in the Constitution.
Internet companies justify their collection of per-
sonal data about Internet users by consenting citi-
zens to this practice [S. Gwoździewicz, D. Pro-
kopowicz 2016b, s. 65]. Besides, another institu-
tional element that is to provide the required level
of protection of personal data is the adaptation of
regulation by law to the normative standards of the
European Union, that Poland is a member. Ac-
cordingly, the legal norms that exist in Poland
concerning the protection of personal data should
be adjusted to the regulation of European Union
Law and also to the regulation of international law
[P. Hołyst, J. Pomykała 2011, s. 13]. So there is
the question whether these institutional and legal
solutions that currently exist do not contribute to
lulling into a false sense of security of Internet us-
ers in analyzing the security of nonpublic informa-
tion, including the personal data collected and
used by the Internet companies in a specific way?
Internet users should not forget that the legal
protection of personal data as a part of the institu-
tional electronic security system for the collection
and transmission of nonpublic information cannot
always provide real full protection of information
that citizens transmit to individual commercial
companies and institutions that are in operation on
the Internet. Citizens usually assume that provid-
ing security to information is the responsibility of
companies and institutions [A. Gałach, A.
Jędruszczak, B. Nowakowski 2013, s. 116]. These
entities should be obliged to do so, as they control
most of the information resources stored in na-
tional ICT systems and networks. In addition, do-
mestic and foreign operators offer their services
and products to consumers, so they should provide
customers with the protection of their personal
data for the purposes of the transaction. The legal
norms that should oblige those entities to protect
nonpublic data is for example the Law of 16 July
2004,Telecommunication Law and the Law of 18
July 2002 on providing services by electronic
means [D. Prokopowicz 2017, s. 94-95].
According to the text of Article 10 (1) of this
Act, Internet companies and institutions may not
send commercial communication that has not been
ordered to individuals with the help of any elec-
tronic means of communications . On the basis of
legal norms in Poland, it is also forbidden to use
teleinformatic systems, techniques and devices
without the consent of the user of these systems
for marketing purposes [D. Wociór red. 2016, s.
68]. The ban also applies to the use by commercial
operators of automatic calling systems created for
the purposes of doing direct marketing business if
the final user hasn’t agreed with it. These regula-
tions provide the most elementary level of protec-
tion for nonpublic data while realizing certain
commercial and financial transactions, but they
may be insufficient towards the perpetual advance
in teleinformatic technology used by Internet ser-
vice providers, and especially those that usually
offer cost-free usage of social networking services
[A. Buss 2008, s. 74].
Therefore, in the dozen or so years, significant
progress has been made in electronic data trans-
mission systems, which has been determined
mainly by the development of information and
communication technology. Technological ad-
vance in the fields described above, have also led
to the implementation of modern IT solutions in
the processes of enterprise management to im-
prove their economic efficiency. Companies oper-
ating in Poland in the pursuit of market and busi-
ness success try to build their competitive advan-
tage by implementing new IT solutions to their
business. More and more companies and financial
institutions use business analysis conducted on
their IT platforms for Business Intelligence Solu-
tions.
On these platforms, the information needed for
management decision-making processes is con-
stantly updated, archived, categorized and used to
develop Business Intelligence analytics reports.
Research has shown that Business Intelligence
analyses make it easier for managers to perform
analysis of large collections of business-related
data in real time. Consequently, the opinion that
Business Intelligence solutions are becoming more
International Journal of New Economics and Social Sciences
2(6)2017
D. Prokopowicz
326
and more useful in the processes of organization
management [J. Grzegorek, D. Prokopowicz 2017,
s. 224]. In recent years, global Internet corpora-
tions, such as Google and Facebook, have been
trying to combine Big Data technology, computing
data in the cloud computing, creating business in-
telligence platforms and doing researches and im-
plementation for the creation of an artificial intel-
ligence.
4. Summary
The reconstruction of the SME sector in Po-
land in the 1990s was an important factor in the
context of the effective development of the market
economy in Poland. On the other hand, the devel-
opment of information technology determines the
need of tweaking the rules forming the security of
electronic transfer of data on the Internet. When
the number of Internet users grows quickly, the
importance is in improvement of IT systems in the
security of transactions, the risk analysis and bear-
ing the costs of the system solutions. It has to
maintain the high level of security and the protec-
tion of nonpublic data. The issue of improving
system security solutions is particularly important
in the case of the most common hacker attacks on
online banking systems [B. Domańska-Szaruga
2013, s. 269-270].
In addition, as a result of the growth of trans-
national capital flows and trade, the share of fi-
nancial transactions settled electronically also has
increased. In addition, as Poland is a member of
the European Union, Polish regulations on the se-
curity of electronic data transfer and protection of
nonpublic information are adapted to the norma-
tive EU standards. This process is also part of the
improvement of external regulations by law and is
linked to the progressive globalization of financial
systems [J. Kosiński 2015, s. 141].
Accordingly, the progressive economic global-
ization and, therefore, the growing link between
the Polish economy and the world, means that the
improvement of national regulations concerning
the maintenance of a certain level of security of in-
formation systems and protection of nonpublic
data takes place, among other things, as a process
of adapting Polish legislation to European Union
regulation [D. Prokopowicz 2012, s. 27]. On the
other hand, this is not a factor ensuring a full ade-
quacy of legal norms in relation to the dynami-
cally developing electronic banking offering of fi-
nancial institutions and services provided by
online companies. Currently, it is assumed that the
current legal regulations only provide the most
elementary level of protection of nonpublic data
while processing specific commercial and finan-
cial transactions, but may be insufficient with the
ever-evolving technology of information and
communication technology used by Internet ser-
vice providers, especially those who usually offer
the usage of social networking services without
any costs.
In the context of the ongoing digitization of
companies, offices and institutions, it is now ac-
cepted that, as most Internet users need, the pro-
tection of personal data is the domain of human
existence that should be ensured by the Internet.
According to the provisions of the Constitution,
the protection of personal data is one of the basic
rights of every citizen, and therefore also the right
of the Internet user. Perpetual technological ad-
vance and services offered by Internet companies
have caused a partial eradication of the real opera-
tion of this law on Internet users’ side [A. Gałach,
A. Jędruszczak, B. Nowakowski 2013, s. 121].
This is because either Internet users are not fully
aware of avatars built in data warehouses or the
new IT technologies no longer allow to keep the
full privacy of citizens in information societies.
The above mentioned Internet companies such
as Google, Facebook, Twitter, Instagram and
YouTube collect data about users of their social
networking sites every day. They are constantly
developing informative avatars, this is electronic
equivalents of individual citizens and Internet us-
ers. Unfortunately, the Internet users do not know
in what way and when these data will be used ex-
cept for the current advertising of these compa-
nies. They cannot know it even if these compa-
nies, online companies that own social networking
sites also do not know in what way they will use
these constantly growing information collected in
data warehouses.
References:
1. A. Buss, (2008), Internet Marketing, Warszawa: Wydawnictwo Longman Pearson Education.
International Journal of New Economics and Social Sciences
2(6)2017
D. Prokopowicz
327
2. A. Dmowski, D. Prokopowicz, (2006), Przestępczość elektroniczna i kradzież poufnych informacji
dynamicznie rozwijająca się gałąź szarej strefy (w:) „Szara strefa gospodarcza w dobie
globalizacji” - monografia naukowa, Seria wydawnicza: Konferencje i seminaria nr 19, Publikacja
pokonferencyjna dla Konferencji naukowej pt.: „Szara strefa gospodarcza w dobie globalizacji”,
Konferencja naukowa w PWSBiA w dniu 06.10.2006 r., Prywatna Wyższa Szkoła Businessu i
Administracji w Warszawie, Warszawa 2006, s. 76-96.
3. A. Dmowski, D., Prokopowicz, (2010), Rynki finansowe, Warszawa: Wydawnictwo Centrum
Doradztwa i Informacji Difin sp. z o.o.
4. B. Domańska-Szaruga, (2013), Common banking supervision within the financial safety net, (w:)
K. Raczkowski, F. Schneider (red.), The Economic Security of Business Transactions. Management
in business, Oxford: Wydawnictwo Chartridge Books Oxford.
5. A. Gałach, A. Jędruszczak, B. Nowakowski (2013), Ochrona danych osobowych, informacji
niejawnych i systemów teleinformatycznych w sektorze publicznym, Warszawa: Wydawnictwo
C.H. Beck.
6. A. Gałach, S. Hoc, A. Jędruszczak, P. Kowalik, i inni (2015), Ochrona danych osobowych i
informacji niejawnych w sektorze publicznym, Warszawa: Wydawnictwo C.H. Beck.
7. M. Górka, red. (2014), Cyberbezpieczeństwo jako podstawa bezpiecznego państwa i społeczeństwa
w XXI wieku, Warszawa: Wydawnictwo Difin.
8. J. Grzegorek, D. Prokopowicz (2017), The Application Of The MS EXCEL Program And The
Informalized Business Intelligence Analytics Platforms In The Management Of The Enterprises
(w:) "Czasopismo Międzynarodowe Nowa Ekonomia i Nauki Społeczne" "International Journal
of New Economics and Social Sciences" (IJONESS), Międzynarodowy Instytut Innowacji Nauka -
Edukacja - Rozwój w Warszawie, nr 1 (5) 2017, s. 222-237.
9. J. Grzywacz (2016), Bankowość elektroniczna w przedsiębiorstwie, Warszawa: Wydawnictwo
SGH.
10. S. Gwoździewicz (2014), The European Union Towards the Threats in Cyberspace [in]
Internatonal Scientific Journal “Verejna Sprava a Spolocnost”, Rocznik XV, Koszyce, Słowacja,
No 2/2014: 70-79.
11. S. Gwoździewicz, D. Prokopowicz (2016a), Bezpieczeństwo bankowości internetowej i
uwarunkowania elektronicznego transferu danych w technologii Big Data w Polsce (w:) V.
Vlastimil (red.), "Međunarodni naučni zbornik. Pravo Ekonomija Menadžment I"
/Międzynarodowe zeszyty naukowe. Zarządzanie Prawo Gospodarka I/ International scientific
books. Right, Economy and Management I/, Wydawnictwo [Izdavač:] Srpsko Razvojno Udruženje
/Stowarzyszenie Rozwoju Serbii/ Bački Petrovac 2016, s. 228-252.
12. S. Gwoździewicz, D. Prokopowicz, (2016b), Globalization and the process of the system and
normative adaptation of the financial system in Poland to the European Union standards (w:)
Globalization, the State and the Individual, “International Scientific Journal”, Free University of
Varna “Chernorizets Hrabar”, Chayka, Varna, Bułgaria 9007, Varna 2016, nr 1(9) 2016: 63-75.
13. S. Gwoździewicz, D. Prokopowicz (2016c), Prawno-społeczne determinanty bezpieczeństwa
gromadzenia i transferu danych niejawnych w internetowych portalach społecznościowych (w:) V.
Vlastimil (red.), "Međunarodni naučni zbornik. Pravo Ekonomija Menadžment I"
/Międzynarodowe zeszyty naukowe. Zarządzanie Prawo Gospodarka I/ International scientific
books. Right, Economy and Management I/, Wydawnictwo [Izdavač:] Srpsko Razvojno Udruženje
/Stowarzyszenie Rozwoju Serbii/ Bački Petrovac 2016, s. 80-107.
14. P. Hołyst, J. Pomykała (2011), Cyberprzestępczość, ochrona informacji i kryptologii, (w:)
„Prokuratura i Prawo”, nr 1, 2011.
15. J. Kos-Łabędowicz (2015), Internet jako źdło informacji w decyzjach nabywczych konsumenta,
Warszawa: Wydawnictwo C.H. Beck.
16. J. Kosiński (2015), Paradygmaty cyberprzestępczości, Warszawa: Wydawnictwo Difin.
17. A. Krasuski (2012), Dane osobowe w obrocie tradycyjnym i elektronicznym. Praktyczne problemy,
Warszawa: Wydawnictwo Wolters Kluwer.
International Journal of New Economics and Social Sciences
2(6)2017
D. Prokopowicz
328
18. Ł. Libuda (2016), Era Big Data - zarządzanie ryzykiem z dopalaczem (w:) "Bank. Miesięcznik
Finansowy", nr 6 (278), czerwiec.
19. K. Machowski (2016), Hakerzy i terroryści czyli kto zagraża współczesnym bankom (w:) "Bank.
Miesięcznik Finansowy", nr 6 (278), czerwiec 2016.
20. M. Matosek (2015), Marketing partnerski w obliczu wielokulturowości (w:) J. Wróblewski,
„Zarządzanie w czasach kryzysu”, Dąbrowa Górnicza: Wydawnictwo WSBI w Dąbrowie
Górniczej, rozdział. X.
21. M. Muchacki (2014), Cywilizacja informatyczna i Internet. Konteksty współczesnego konsumenta
TI, Warszawa: Wydawnictwo Impuls.
22. C. M. Olszak (2014), Business Intelligence in cloud, (w:) “Polish Journal of Management Studies”,
(10) 2014.
23. D. Prokopowicz (2009), Zagrożenia rozwoju i bezpieczeństwo bankowości elektronicznej (w:)
Zeszyty Naukowe Wyższa Szkoła Zarządzania i Prawa im. Heleny Chodkowskiej w Warszawie.
Rok XIV. Nr 1 (30)/2009, s. 60–73.
24. D. Prokopowicz (2012), Na tle struktur rynkowych Unii Europejskiej (w:) "Przedsiębiorstwo
przyszłości". Kwartalnik Wyższej Szkoły Zarządzania i Prawa im. Heleny Chodkowskiej.
Warszawa, Nr 2 (11) 2012, kwiecień 2012, Rok wyd. IV, s. 25-34.
25. D. Prokopowicz (2016), Social and economic determinants of the processes of economic
globalization that shape the development of the banking system in Poland (w:) Globalization, the
State and the Individual, “International Scientific Journal”, Free University of Varna “Chernorizets
Hrabar”, Chayka, Varna, Bułgaria 9007, Varna 2016, nr 2(10) 2016, s. 21-22.
26. D. Prokopowicz (2017), Bezpieczeństwo udostępniania informacji przez instytucje sektora
publicznego oraz transferu danych niejawnych poprzez sieć Internet (w:) A. Gołębiowska, B.
Zientarski (red.), „Ponowne wykorzystywanie informacji sektora publicznego w administracji”,
Senat Rzeczypospolitej Polskiej, Kancelaria Senatu, Warszawa 2017, s. 91-114.
27. J. Sarnowski, D. Prokopowicz (2015), Zastosowanie innowacji marketingowych w
przedsiębiorstwach w Polsce (w:) M. Sitek, T. Graca (red.), "Nowe wyzwania dla Europy XXI
wieku w dziedzinie zarządzania i edukacji", wydanie pokonferencyjne, Wyższa Szkoła Gospodarki
Euroregionalnej im. Alcide De Gasperi w Józefowie, Józefów 2015, s. 135-156.
28. A. Suchorzewska (2010), Ochrona prawna systemów informatycznych wobec zagrożenia
cyberterroryzmem, Warszawa: Wydawnictwo Wolters Kluwer Polska Sp. z o.o.
29. B. Szaruga-Domańska, D. Prokopowicz (2016), Ochrona transferu danych osobowych w
cyberprzestrzeni (w:) „Secretum. Służby specjalne, bezpieczeństwo i informacja”, Instytut Nauk
Społecznych i Bezpieczeństwa Uniwersytetu Przyrodniczo-Humanistycznego w Siedlcach,
Oficyna Wydawnicza RYTM w Warszawie, nr 2 (2016).
30. T. Trejderowski (2013), Kradzież tożsamości. Terroryzm informatyczny, Warszawa: Wydawnictwo
Eneteia.
31. Websense Research Raport, (2011), s. 11, (www.websense.com).
32. D. Wociór, red. (2016), Ochrona danych osobowych i informacji niejawnych z uwzględnieniem
ogólnego rozporządzenia unijnego, Warszawa: Wydawnictwo C.H. Beck.
33. P. Wróbel (2014), Komunikacja elektroniczna. Zagrożenia i ich skutki dla organizacji, Gdańsk:
Wydawnictwo Uniwersytetu Gdańskiego.
... In addition, some manufacturing companies that produce components for foreign companies received additional orders as a derivative of changes in international supply and sourcing chains. Internet technology companies operating in the new media sector, including social networks [61], are also a type of media and at the same time a type of companies that, despite the potential decline in turnover in the context of the entire media and advertising sector, may record a relative increase in the importance and share in their market. ...
Article
Full-text available
The SARS-CoV-2 (Covid-19) coronavirus pandemic has severely affected the global economy. In 2020, due to the spread of virus, many countries experienced an economic recession. During the first wave of the pandemic, there was also a crash in the capital markets, mainly in the securities markets, as a result of which interventionist measures within the monetary and fiscal policy were applied. When central banks lowered interest rates and the governments of individual countries started implementing anti-crisis, interventionist programs of socio-economic policy, including fiscal policy and monetary policy, pessimistic moods on capital markets improved significantly, the economic situation began to stabilize and the economies of individual countries began to recover from recession and economic crisis. The authors of this article share the view that if the state had not applied specific systemic and normative instruments of anti-pandemic security, and would not introduced a pandemic risk management system and would not have launched state aid under the so-called “anti-crisis shield”, the health of the economy and economic crisis could be much deeper and more severe for society. The pandemic has also largely affected the daily functioning of people and many economic entities. In addition, the coronavirus pandemic has accelerated the digitization of the economy. The increase in computerization and the internetization of economic processes could facilitate the recovery of many companies and enterprises from the crisis caused by the pandemic.
... For many years, however, for most business cycles, political cycles, and economic periods, central budgets and other countries' financial systems have tended to be burdened with debt instead of a surplus. This situation greatly increased the scale of the negative economic effects of the global financial crisis of 2008 36 . Greater indebtedness of the state finance system means lower opportunities for the state to implement pro-development investments. ...
Chapter
Full-text available
The SARS-CoV-2 (Covid-19) coronavirus pandemic has severely affected the global economy. In 2020, due to the pandemic, many countries experienced an economic recession. The pandemic also had a large impact on the daily functioning of people and many economic entities. In addition, the coronavirus pandemic has accelerated the digitization of the economy. Since the beginning of the pandemic, many industries and sectors have accelerated the process of developing the digital economy and the operation of companies on the Internet. More and more companies develop their activities via the Internet, providing their services remotely and selling their products under e-commerce. Many companies that previously did not do this are now switching to remote, electronic operations via the Internet. The importance of internet marketing is increasing, including viral marketing, real-time marketing conducted on social media portals. The development of electronic banking is also increasing, including internet and mobile banking. In recent years, there has been an acceleration in the development of technologies typical of the present, fourth technological revolution. Technological advances in ICT, Internet and Industry 4.0 are taking off rapidly. The coronavirus pandemic might have accelerated this technological progress, because the pandemic caused an increase in the digitization and internetization of communication processes, research and analysis processes, economic processes, etc.
... From the data contained in literature publications ad- dressing the determinants of the develop- ment of online mobile banking, it appears that customers of products and services of- fered by enterprises, public and financial institutions are increasingly contacting these entities remotely via the Internet. The article describes the problem of determi- nants of the online mobile banking devel- opment using synthetic approach to re- search and considerations undertaken by authors in earlier publications by D. Prokopowicz (Prokopowicz D., 2016;Prokopowicz D., 2017a;Prokopowicz D., 2017b;Prokopowicz D., 2017c;Prokopowicz D., 2017d), S. Gwo?dziewicz (Gwo?dziewicz S., Prokopowicz D., 2016a; Gwo?dziewicz S., Prokopowicz D., 2016b; Gwo?dziewicz S., Prokopowicz D., 2016c;), M. Matosek (Matosek M., Prokopowicz D., 2017), J. Grzegorek (Grzegorek J., Prokopowicz D., 2017) and other authors of the cited publi- cations. The analysis of the content of the source literature publication addressing the determinants of the online mobile banking development shows that in the US, re- search into the security of electronic bank- ing development is conducted by experts operating in the Cisco and Trend Micro technology companies (Cisco 2017;TrendLabs 2016). ...
Article
Full-text available
Technological progress and the ongoing globalization processes determine new challenges for the protection, electronic transmission and processing of data, including classified information. According to the guidelines of the European Union Directive of 1995 in the perspective of the development of the Internet and digital society, the ICT infrastructure of individual entities should be modernized and adapted in order to guarantee the right to protect electronically-available information. The development of techniques for processing and providing information via the Internet is determined by many facilities for beneficiaries, clients and people using information services of public sector institutions. In addition, there is a possibility of a significant reduction of transaction costs of financial operations and electronic data transfer. On the other hand, the development of information technologies functioning on the Internet also involves the risk of loss or theft of information by unqualified entities. The process of providing information via the Internet generates many threats related to crime of identity theft, interception of classified data by hackers and impersonation of monetary funds in electronic banking systems. In response to these threats, individual entities, including institutions of the financial sector, develop security systems for remote sharing of information and transactions carried out via the Internet. Currently, the process of improving techniques ensuring a certain level of Internet data transfer security is being continued. Procedures for safe processing, storage and sharing of information in online banking systems are improved. Gradually, national legal regulations are being supplemented, taking into account new emerging technological innovations and technologies of electronic data transfer on the Internet.
Preprint
Full-text available
Introduction: The importance and influence of new Internet media in the process of digitization of documents and in remote communication processes has been growing in recent years. Business entities and institutions increasingly use new Internet media to improve relations with the environment of potential customers and business partners. These processes also apply to the local press and lead to the development of electronic local and self-government magazines. Methods: As part of the research conducted for this article, a comparative analysis was carried out on the key determinants shaping the functioning and development of local and municipal magazines traditionally published in print and electronically published on the internet. The analyzes undertaken in this article were preceded by a questionnaire survey of students of several universities. Empirical microanalysis based on comparison of the results of surveys with the results of quantitative analyzes published on Our Word in Data portal and Google Trends analytics. Results: Retrospective analysis of the development of the issues described in the chapter on the basis of the literature review as well as original observations and experience of using social networks. In the course of the research, the method of synthesizing the key issues of the described problems was used, within which the issue of the development of new Internet media, online editions of local and local government magazines, as well as cybercrime and cybersecurity was treated interdisciplinarily. Response to the research problem and its implications: The analyses carried out show that over the last two decades, the number of magazines, including local magazines and local government magazines, which are switching from the printed form of their publication to the electronic version published on the Internet has been growing rapidly. On the basis of the research carried out, the main factors in the process of digitisation and Internetisation of the above-mentioned magazines were identified. Keywords: law, self-government, new media, online media, electronic media, Internet, information technologies, knowledge-based economy, Internetization, cybersecurity, cybercrime
Preprint
Full-text available
The importance and influence of new Internet media in the process of digitization of documents and in remote communication processes has been growing in recent years. Business entities and institutions increasingly use new Internet media to improve relations with the environment of potential customers and business partners. These processes also apply to the local press and lead to the development of electronic local and self-government magazines. Purpose and hypothesis (Scientific objective): The main purpose of this chapter was to indicate the growing importance of the issue of cybersecurity of the use of new Internet media in the development of electronic local and local government magazines. This chapter indicates the importance and impact of the development of new online media in the process of digitization of documents and the development of electronic, digital versions of local and self-government magazines. In the context of the conducted research, the following research thesis was formulated: The development of cybercrime related to the theft of sensitive data on the Internet determines the need for continuous improvement of cybersecurity techniques and instruments. Improving the cybersecurity of the use of new Internet media is an important factor in the development of electronic and online local and self-government magazines. Research methods: The analyzes undertaken in this chapter were preceded by a questionnaire survey of students of several universities. Empirical microanalysis based on comparison of the results of surveys with the results of quantitative analyzes published on Our Word in Data portal and Google Trends analytics. Retrospective analysis of the development of the issues described in the chapter on the basis of the literature review as well as original observations and experience of using social networks. In the course of the research, the method of synthesizing the key issues of the described problems was used, within which the issue of the development of new Internet media, online editions of local and local government magazines, as well as cybercrime and cybersecurity was treated interdisciplinarily. Results and conclusions: New online media, including social media, have become one of the key factors in the current information and social globalization. The SARS-CoV-2 coronavirus pandemic significantly accelerated the processes of digitization of the economy and the Internetization of remote communication processes. The conclusions from the conducted research confirm the main research thesis. The analysis proves that there is a fundamental relationship between the improvement of cybersecurity techniques and the process of digitization and Internetization of the media, including press media. Cognitive value: The chapter indicates the growing importance of the issue of cybersecurity of the use of new Internet media in the development of electronic local and local government 2 magazines. The considerations and results of the analyzes contained in the chapter confirm the thesis that the development of cybercriminal theft of sensitive data on the Internet forces the need for continuous improvement of cybersecurity techniques and instruments. Improvement of the cybersecurity of the use of new Internet media also concerns the development of electronic and online local and self-government magazines. The text shows how important the role of the Coronavirus pandemic, which occurred in March 2020, was in accelerating the process of the Internetization of journals.
Book
The issue of modelling a secure ICT society is a present-day problem faced by every modern country, which in its development strategy should consider the issue of technological developments and changes in the dynamics and the nature of threats in cyberspace. In today’s world, there is probably no area of activity in which communication and information technology would not play a significant role. This undoubtedly happens in many angles and ranges. It refers to the generally understood “security” as a rather complex issue in the sphere of human life and international relations. The research area presented in the monograph Socio economic and legal dimension of digital transformation. Selected contexts is of interest to academics and that makes it a multidimensional topic related to the issue of digital transformation. A lot has been written about the impact of communication and information technology on the life of modern human being, but this problem keeps evolving and is of a dynamic nature, and so researchers are trying to analyze new dimensions and perspectives of the digital transformation phenomenon. This is because the meaning of the term “digital transformation” keeps constantly expanding and being redefined. Authors of the publication Socio economic and legal dimensions of digital transformation. Selected contexts undertook the difficult task of identifying rudimentary issues related to communication and information technologies, and above all on this basis endeavoured to indicate instruments of operation in various scientific disciplines. It is worth emphasising the issue reflected in this publication is extremely important, where a presentation was made of the scientific research related to the dynamic development of new technologies, as well as the growing importance of the Internet and telecommunications in the life of all social groups. The use of innovative techniques has led to a development of the information and digital society and in such a way it created new hazards in terms of security and public order, but it also contributed to the implementation of new instruments of action. The interdisciplinary nature of the studies offered by representatives of science from various European centres enabled the categorization and selection of research areas included in the monograph entitled Socio economic and legal dimen�sions of digital transformation. The selected contexts comprise the following issues: threats caused by globalization processes and the information society; awareness of security threats in technical civilization; legal regulations in the field of informa�tion and communication technologies; education in the field of information and communication technology; protection of information and sources of informa�tion; education for information; communication; communication in crisis situa�tions in the light of the National Crisis Management Plan, information distortions; exchange and flow of information; the Internet on-line services in the Internet and the knowledge on them; cultural and humanistic context; education in the face of the problems of the information and knowledge society; information ecology and ethics in the world of information. The monograph Socio economic and legal dimension of digital transformation. Selected contexts offers a collection of materials related to selected issues, activities and processes which are the most characteristic in modern societies, with emphasis on the role of communication and information technologies. The presented studies are an attempt at analysing the process indicating the establishing and generation of a new social order in the era of digital transformation, where communication and information technologies are certainly a sine qua non condition for the formation of strategic foundations and the place of communication and information technologies in scientific research conducted in this direction. The monograph presents the statements of scientists from the most renowned Polish and European research centres and individuals dealing with issues of threats and security in a technical civilization. Interdisciplinary research on security issues focuses on areas of activity of individual countries in achieving civilization progress and socio-economic development. Anna Gołębiowska, assoc. prof. Małgorzata Such-Pyrgiel, assoc. prof.
Chapter
Full-text available
Currently, there is rapid progress in the field of IT applications in the analysis of the economic and financial situation of enterprises, in the processes of supporting the management of organizations and in planning the development and management of a company. In the area of the fastest growing fields of ICT technology, which determine the successive stages of progress in the field of online electronic banking, it is necessary to disseminate standards for conducting financial operations carried out in the so-called cloud as well as using the large data sets located in the so-called Big Data platforms. Current Big Data technology solutions are not only large data bases, data warehouses allowing for multi-aspect analysis of huge sets of quantitative data made for the purposes of reports submitted periodically to the managerial staff. The decision-making processes carried out in business entities should be based on the analysis of reliable and current market and business data. Information necessary for managerial decision-making processes is collected, collected, ordered and presented in the form of business intelligence reports in corporations. Analyzes conducted in the Business Intelligence formula give the management team new opportunities to analyze large data sets in real time, which significantly contributes to the improvement of the company's management efficiency. Obecnie dokonuje się szybki postęp w zakresie zastosowań informatyki w analizach sytuacji ekonomiczno-finansowej przedsiębiorstw, w procesach wspomagania zarządzania organizacjami oraz w planowaniu rozwoju i zarządzania przedsiębiorstwem. W zakresie najszybciej rozwijających się dziedzin technologii teleinformatycznej, które warunkują kolejne etapy postępu w zakresie internetowej bankowości elektronicznej, należy upowszechnianie standardów przeprowadzania operacji finansowych realizowanych w tzw. chmurze jak również z zastosowaniem korzystania z dużych zbiorów danych ulokowanych w tzw. platformach Big Data. Obecne rozwiązania technologiczne Big Data to już nie tylko duże bazy danych, hurtownie danych pozwalające na wieloaspektowe analizy ogromnych zbiorów danych ilościowych dokonywanych na potrzeby raportów składanych okresowo kadrze menedżerskiej. Prowadzone w podmiotach gospodarczych procesy decyzyjne powinny być oparte na analizie wiarygodnych i aktualnych danych rynkowych i dotyczących prowadzonej działalności. Informacje niezbędne dla procesów podejmowania decyzji menedżerskich są w korporacjach na bieżąco pozyskiwane, gromadzone, porządkowane i przedstawiane w formie raportów analitycznych Business Intelligence. Analizy przeprowadzane w formule Business Intelligence dają kadrze zarządzającej nowe możliwości analizy dużych zbiorów danych w czasie rzeczywistym, co znacząco przyczynia się do podnoszenia efektywności zarządzania przedsiębiorstwem.
Article
Full-text available
Julian Ursyn Niemcewicz, a Polish writer and politician, fought for the good of his homeland throughout his life. The knowledge gained at the Knight's School allowed for many years to perform the function of Adam Czartoryski, adjutant general of the army of the Podolia region. During the deliberations of the Great Sejm, he actively joined in the efforts to strengthen the army of the Polish-Lithuanian Commonwealth. He took an active part in the battles in defense of the Constitution of May 3. Niemcewicz demonstrated the greatest military activity during the Kościuszko Uprising as Tadeusz Kosciuszko's adjutant. His memories of these events seem to be an important source for learning the final act of the history of the Polish-Lithuanian Commonwealth. The author with high professionalism and accuracy describes the events that took place then.
Article
Full-text available
The publication describes the system and normative determinants of contemporary processes of economic globalization, which take place during the last decades and are linked in Europe with progressive integration of market structures of the European Union. Making the integration of market structures in Europe in 2004 also included Poland. In this way, Poland has significantly increased the scope of the openness of its economy for the development of trade. Therefore, the Polish accession to the European Union is considered to be an important factor in the continuation of the processes of globalization and economic growth. In the context of these processes since the 90s of the last century in Poland functioning economic systems and regulations specifying the functioning of the various branches, sectors and institutions are gradually adapted to EU standards. One of the sectors of the economy, which is relatively more has been adapted institutionally and normatively to the requirements of the EU financial system is in Poland.
Article
Full-text available
The article titled "Social and economic determinants of the processes of economic globalization that shape the development of the banking system in Poland" describes the main determinants and aspects, including social and economic determinants of the processes of economic globalization affecting the economy and affecting the development of the financial system, including the banking system in Poland. system-economic transformation processes that have taken place since 1989 in Poland also included in its influence the financial system, including the banking system in Poland.
Chapter
Full-text available
Rozwój i globalizacja przyniosły nowe wyzwania dla ochrony, elektronicznego przesyłania i przetwarzania danych, w tym informacji niejawnych. Zgodnie z wytycznymi Dyrektywy Unii Europejskiej z 1995 r. w perspektywie kontynuacji rozwoju internetu i społeczeństwa cyfrowego infrastruktura teleinformatyczna poszczególnych podmiotów powinna zostać zmodernizowana i dostosowana, aby zagwarantować prawo do ochrony udostępnianych elektronicznie informacji. Z rozwojem technik udostępniania informacji poprzez Internet wiąże się wiele udogodnień dla beneficjentów, klientów i osób korzystających z usług informacyjnych instytucji sektora publicznego. Natomiast dla podmiotów udostępniających elektronicznie informacje poprzez Internet pojawia się możliwość znaczącej redukcji kosztów transakcyjnych przeprowadzanych operacji finansowych oraz elektronicznego transferu danych. Z drugiej strony proces udostępniania informacji poprzez Internet generuje wiele zagrożeń związanych z przestępstwami kradzieży tożsamości, przechwytywania przez hakerów danych niejawnych oraz dokonywania malwersacji środków pieniężnych w systemach elektronicznej bankowości. W odpowiedzi na te zagrożenia poszczególne podmioty w tym instytucje sektora publicznego rozbudowują systemy bezpieczeństwa zdalnego udostępniania informacji oraz dokonywanych transakcji realizowanych za pośrednictwem Internetu. Obecnie dokonuje się kontynuacja procesu doskonalenia technik zapewniających określony poziom bezpieczeństwa internetowego transferu danych. Doskonalone są procedury bezpiecznego przetwarzania, składowania i udostępniania informacji. Stopniowo także uzupełniane są krajowe regulacje prawne uwzględniające nowe, pojawiające się innowacje technologiczne oraz dokonuje się proces dostosowywania tych normatywów prawnych do standardów ponadnarodowych wyznaczanych przez centralne decyzyjne organy Unii Europejskiej.
Book
Full-text available
Problem badawczy podjęty w monografii został sformułowany w postaci pytania: Jak zastosowanie środków komunikacji elektronicznej wpływa na organizacje? Jako tezę przyjęto stwierdzenie, iż stosowanie środków komunikacji elektronicznej może uruchamiać zagrożenia dla organizacji: 1. przeciążenia informacyjne, 2. wykorzystywanie środków komunikacji elektronicznej w procesach informacyjnych prowadzące do ograniczania ich sprawności, 3. nadużywanie przez pracodawców dostępności pracowników poza czasem pracy, 4. nadużywanie przez pracowników internetu do celów prywatnych w czasie pracy. Celem badania było poznanie natury wybranych zagrożeń dla organizacji wynikających ze stosowania środków komunikacji elektronicznej oraz wskazanie możliwości zapobiegania i minimalizowania zagrożeń oraz ich skutków.
Article
The paper reviews and critiques current research on Business Intelligence (BI) in cloud. This review highlights that organizations face various challenges using BI cloud. The research objectives for this study are a conceptualization of the BI cloud issue, as well as an investigation of some benefits and risks from BI cloud. The study was based mainly on a critical analysis of literature and some reports on BI cloud using. The results of this research can be used by IT and business leaders as they plan and develop BI cloud in their organizations. © 2014, Czestochowa University of Technology. All Rights reserved.
Rynki finansowe, Warszawa: Wydawnictwo Centrum Doradztwa i Informacji Difin sp
  • A Dmowski
  • D Prokopowicz
A. Dmowski, D., Prokopowicz, (2010), Rynki finansowe, Warszawa: Wydawnictwo Centrum Doradztwa i Informacji Difin sp. z o.o.
Common banking supervision within the financial safety net
  • B Domańska-Szaruga
B. Domańska-Szaruga, (2013), Common banking supervision within the financial safety net, (w:) K. Raczkowski, F. Schneider (red.), The Economic Security of Business Transactions. Management in business, Oxford: Wydawnictwo Chartridge Books Oxford.
Ochrona danych osobowych, informacji niejawnych i systemów teleinformatycznych w sektorze publicznym
  • A Gałach
  • A Jędruszczak
  • B Nowakowski
A. Gałach, A. Jędruszczak, B. Nowakowski (2013), Ochrona danych osobowych, informacji niejawnych i systemów teleinformatycznych w sektorze publicznym, Warszawa: Wydawnictwo C.H. Beck.