Open access


The article describes selected issues related to user safety on the Internet. This safety consists of a number of factors such as the technology that we use to communicate and to browse the Internet, and habits and behaviors that we have acquired and through which we can identify at least some typical hazards encountered on the Web. Knowledge of software and the ability to use it and to configure it properly as well as checking regularly for security updates reduces the risk of data loss or identity theft. Public awareness of threats continues to grow, but there are also new, previously unknown threats; that is why it is so important to inform of the dangers by all available channels of communication.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • Anti-Phishing Working Group Inc. (2016 July 2). Phishing Activity Trends Report 1st Quarter 2016. Retrieved 11 11 2016 from

  • Castells M. (2010). Społeczeństwo sieci. Warszawa:Wydawnictwo Naukowe PWN.

  • CMOD Department of Finance. (2008 December). Protecting the confidentiality of Personal Data. Retrieved 11.11.2016 from

  • Czapiński J. Panek T. (2015). Diagnoza Społeczna 2015 - Warunki i jakość życia Polakow. Retrieved 11.11.2016 from

  • Hadnagy C. (2012). Socjotechnika: sztuka zdobywania władzy nad umysłami. Gliwice: Wydawnictwo Helion. Klempka A. & Stimson A. (2014). Anonymous Communication on the Internet and Trolling. Concordia University Saint Paul MN. Retrieved 11.15.2016 from

  • TrollingPaper-Kozinets R. (2012). Netnografia: badania etnograficzne online. Warszawa:Wydawnictwo Naukowe PWN.

  • Lockhart A. (2007). 125 sposobow na bezpieczeństwo sieci. Gliwice: Helion.

  • Manovich L. (2006). Język nowych mediow. Warszawa:Wydawnictwa Akademickie i Profesjonalne.

  • Mayer-Sch¨onberger V. Cukier K. (2014). Big data: rewolucja ktora zmieni nasze myślenie pracę i życie. Warszawa: MT Biznes.

  • Owens J. (2008). A study of passwords and methods used in brute-force SSH attacks. Clarkson University. Retrieved 11.16.2016 from

  • PCWorld (2007 May 24) 15 Great Free Security Programs. Retrieved 11.11.2016 from

  • Privacy Technical Assistance Center. (2011 December). Data Security: Top Threats to Data Protection. Retrieved 11.15.2016 from

  • Reinecke P. Seybert S. (2014). Internet and cloud services - statistics on the use by individuals - Statistics Explained. Retrieved 11.15.2016 from and cloud services - statistics on the use by individuals

  • Security Awareness Program Special Interest Group & PCI Security Standards Council. (2014). Best Practices for Implementing a Security Awareness Program. Retrieved 11.15.2016 from DSS V1.0 Best Practices for Implementing Security Awareness Program.pdf.

  • Shravani R. & Nagamani O. (2012). Analysis of Equivalence of Network positions and social roles. In National Conference On Social Networking (p. 33). Retrieved 11.15.2016 from

  • Susłow W. Słowik A. Statkiewicz M. (2014). Chcę zostać informatykiem. Gliwice: Wydawnictwo Helion.

  • Symantec Corporation. (2016). Internet Security Threat Report Internet Report (No. 21). Retrieved 11.15.2016 from

  • Symantec Corporation. (2015). Keeping Your Private Data Secure. Retrieved 11.15. 2016 from

  • Top 200 Facebook Statistics (2016 April). (b.d.). Retrieved 11.15.2016 from

  • Toshniwal R. Dastidar K. G. Nath A. (2015). Big Data Security Issues and Challenges. Complexity 2(2). Retrieved 11.15.2016 from

  • Wawrzyniak M. (2015). Hejtoholik czyli Jak zaszczepić się na hejt nie wpaść w pułapkę obgadywania oraz nauczyć zarabiać na tych ktorzy cię oczerniają. Gliwice: Wydawnictwo Helion.

  • W¨uest C. (2010). The Risks of Social Networking. Symantec Corporation. Retrieved 11.15.2016 from

Journal information
Impact Factor

Cite Score 2018: 0.29

SCImago Journal Rank (SJR) 2018: 0.138
Source Normalized Impact per Paper (SNIP) 2018: 0.358

All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 1430 788 36
PDF Downloads 1010 677 127