Open Access

INTERNET SECURITY – TECHNOLOGY AND SOCIAL AWARENESS OF THE DANGERS


Cite

Anti-Phishing Working Group, Inc. (2016, July 2). Phishing Activity Trends Report 1st Quarter 2016. Retrieved 11 11, 2016, from http://docs.apwg.org/reports/apwg_trends_report_q1_2016.pdfSearch in Google Scholar

Castells, M. (2010). Społeczeństwo sieci. Warszawa:Wydawnictwo Naukowe PWN.Search in Google Scholar

CMOD Department of Finance. (2008, December). Protecting the confidentiality of Personal Data. Retrieved 11.11.2016, from https://www.dataprotection.ie/documents/guidance/GuidanceFinance.pdf Search in Google Scholar

Czapiński J., Panek T. (2015). Diagnoza Społeczna 2015 - Warunki i jakość życia Polakow. Retrieved 11.11.2016, from http://www.diagnoza.com/Search in Google Scholar

Hadnagy, C. (2012). Socjotechnika: sztuka zdobywania władzy nad umysłami. Gliwice: Wydawnictwo Helion. Klempka, A., & Stimson, A. (2014). Anonymous Communication on the Internet and Trolling. Concordia University, Saint Paul, MN. Retrieved 11.15.2016, from https://comjournal.csp.edu/wp-content/uploads/sites/16/2013/12/ Search in Google Scholar

TrollingPaper-Kozinets, R. (2012). Netnografia: badania etnograficzne online. Warszawa:Wydawnictwo Naukowe PWN. Search in Google Scholar

Lockhart, A. (2007). 125 sposobow na bezpieczeństwo sieci. Gliwice: Helion. Search in Google Scholar

Manovich, L. (2006). Język nowych mediow. Warszawa:Wydawnictwa Akademickie i Profesjonalne. Search in Google Scholar

Mayer-Sch¨onberger, V., Cukier, K. (2014). Big data: rewolucja, ktora zmieni nasze myślenie, pracę i życie. Warszawa: MT Biznes. Search in Google Scholar

Owens J. (2008). A study of passwords and methods used in brute-force SSH attacks. Clarkson University. Retrieved 11.16.2016, from http://people.clarkson.edu/~owensjp/pubs/Owens_MS_thesis.pdfSearch in Google Scholar

PCWorld (2007, May 24) 15 Great, Free Security Programs. Retrieved 11.11.2016, from http://www.pcworld.com/article/133631/article.htmlSearch in Google Scholar

Privacy Technical Assistance Center. (2011, December). Data Security: Top Threats to Data Protection. Retrieved 11.15.2016, from http://ptac.ed.gov/sites/default/files/issue-brief-threats-to-your-data.pdfSearch in Google Scholar

Reinecke P., Seybert S. (2014). Internet and cloud services - statistics on the use by individuals - Statistics Explained. Retrieved 11.15.2016, from http://ec.europa.eu/eurostat/statistics-explained/index.php/Internet and cloud services - statistics on the use by individuals Search in Google Scholar

Security Awareness Program Special Interest Group, & PCI Security Standards Council. (2014). Best Practices for Implementing a Security Awareness Program. Retrieved 11.15.2016, from https://www.pcisecuritystandards.org/documents/PCI DSS V1.0 Best Practices for Implementing Security Awareness Program.pdf.Search in Google Scholar

Shravani, R., & Nagamani, O. (2012). Analysis of Equivalence of Network positions and social roles. In National Conference On Social Networking (p. 33). Retrieved 11.15.2016, from http://repository.um.edu.my/26680/1/Jar-Kumar-Conference%20PROCEEDINGS-MAIL%20(1)%20(1).pdf#page=41Search in Google Scholar

Susłow W., Słowik A., Statkiewicz M. (2014). Chcę zostać informatykiem. Gliwice: Wydawnictwo Helion. Search in Google Scholar

Symantec Corporation. (2016). Internet Security Threat Report Internet Report (No. 21). Retrieved 11.15.2016, from https://www.symantec.com/securitycenter/threat-report Search in Google Scholar

Symantec Corporation. (2015). Keeping Your Private Data Secure. Retrieved 11.15. 2016, from https://www.symantec.com/content/dam/symantec/docs/whitepapers/keeping-your-private-data-secure-en.pdfSearch in Google Scholar

Top 200 Facebook Statistics (2016, April). (b.d.). Retrieved 11.15.2016, from http://expandedramblings.com/index.php/by-the-numbers-17-amazing-facebook-stats/ Search in Google Scholar

Toshniwal R., Dastidar K. G., Nath, A. (2015). Big Data Security Issues and Challenges. Complexity, 2(2). Retrieved 11.15.2016, from http://www.ijirae.com/volumes/Vol2/iss2/03.FBCS10080.pdfSearch in Google Scholar

Wawrzyniak M. (2015). Hejtoholik czyli Jak zaszczepić się na hejt, nie wpaść w pułapkę obgadywania oraz nauczyć zarabiać na tych, ktorzy cię oczerniają. Gliwice: Wydawnictwo Helion. Search in Google Scholar

W¨uest C. (2010). The Risks of Social Networking. Symantec Corporation. Retrieved 11.15.2016, from https://www.symantec.com/content/en/us/enterprise/media/securityresponse/whitepapers/the_risks_of_social_networking.pdfSearch in Google Scholar

eISSN:
2199-6059
ISSN:
0860-150X
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Philosophy, other