INTERNET SECURITY – TECHNOLOGY AND SOCIAL AWARENESS OF THE DANGERS

Open access

Abstract

The article describes selected issues related to user safety on the Internet. This safety consists of a number of factors such as the technology that we use to communicate and to browse the Internet, and habits and behaviors that we have acquired and through which we can identify at least some typical hazards encountered on the Web. Knowledge of software and the ability to use it and to configure it properly as well as checking regularly for security updates reduces the risk of data loss or identity theft. Public awareness of threats continues to grow, but there are also new, previously unknown threats; that is why it is so important to inform of the dangers by all available channels of communication.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • Anti-Phishing Working Group Inc. (2016 July 2). Phishing Activity Trends Report 1st Quarter 2016. Retrieved 11 11 2016 from http://docs.apwg.org/reports/apwg_trends_report_q1_2016.pdf

  • Castells M. (2010). Społeczeństwo sieci. Warszawa:Wydawnictwo Naukowe PWN.

  • CMOD Department of Finance. (2008 December). Protecting the confidentiality of Personal Data. Retrieved 11.11.2016 from https://www.dataprotection.ie/documents/guidance/GuidanceFinance.pdf

  • Czapiński J. Panek T. (2015). Diagnoza Społeczna 2015 - Warunki i jakość życia Polakow. Retrieved 11.11.2016 from http://www.diagnoza.com/

  • Hadnagy C. (2012). Socjotechnika: sztuka zdobywania władzy nad umysłami. Gliwice: Wydawnictwo Helion. Klempka A. & Stimson A. (2014). Anonymous Communication on the Internet and Trolling. Concordia University Saint Paul MN. Retrieved 11.15.2016 from https://comjournal.csp.edu/wp-content/uploads/sites/16/2013/12/

  • TrollingPaper-Kozinets R. (2012). Netnografia: badania etnograficzne online. Warszawa:Wydawnictwo Naukowe PWN.

  • Lockhart A. (2007). 125 sposobow na bezpieczeństwo sieci. Gliwice: Helion.

  • Manovich L. (2006). Język nowych mediow. Warszawa:Wydawnictwa Akademickie i Profesjonalne.

  • Mayer-Sch¨onberger V. Cukier K. (2014). Big data: rewolucja ktora zmieni nasze myślenie pracę i życie. Warszawa: MT Biznes.

  • Owens J. (2008). A study of passwords and methods used in brute-force SSH attacks. Clarkson University. Retrieved 11.16.2016 from http://people.clarkson.edu/~owensjp/pubs/Owens_MS_thesis.pdf

  • PCWorld (2007 May 24) 15 Great Free Security Programs. Retrieved 11.11.2016 from http://www.pcworld.com/article/133631/article.html

  • Privacy Technical Assistance Center. (2011 December). Data Security: Top Threats to Data Protection. Retrieved 11.15.2016 from http://ptac.ed.gov/sites/default/files/issue-brief-threats-to-your-data.pdf

  • Reinecke P. Seybert S. (2014). Internet and cloud services - statistics on the use by individuals - Statistics Explained. Retrieved 11.15.2016 from http://ec.europa.eu/eurostat/statistics-explained/index.php/Internet and cloud services - statistics on the use by individuals

  • Security Awareness Program Special Interest Group & PCI Security Standards Council. (2014). Best Practices for Implementing a Security Awareness Program. Retrieved 11.15.2016 from https://www.pcisecuritystandards.org/documents/PCI DSS V1.0 Best Practices for Implementing Security Awareness Program.pdf.

  • Shravani R. & Nagamani O. (2012). Analysis of Equivalence of Network positions and social roles. In National Conference On Social Networking (p. 33). Retrieved 11.15.2016 from http://repository.um.edu.my/26680/1/Jar-Kumar-Conference%20PROCEEDINGS-MAIL%20(1)%20(1).pdf#page=41

  • Susłow W. Słowik A. Statkiewicz M. (2014). Chcę zostać informatykiem. Gliwice: Wydawnictwo Helion.

  • Symantec Corporation. (2016). Internet Security Threat Report Internet Report (No. 21). Retrieved 11.15.2016 from https://www.symantec.com/securitycenter/threat-report

  • Symantec Corporation. (2015). Keeping Your Private Data Secure. Retrieved 11.15. 2016 from https://www.symantec.com/content/dam/symantec/docs/whitepapers/keeping-your-private-data-secure-en.pdf

  • Top 200 Facebook Statistics (2016 April). (b.d.). Retrieved 11.15.2016 from http://expandedramblings.com/index.php/by-the-numbers-17-amazing-facebook-stats/

  • Toshniwal R. Dastidar K. G. Nath A. (2015). Big Data Security Issues and Challenges. Complexity 2(2). Retrieved 11.15.2016 from http://www.ijirae.com/volumes/Vol2/iss2/03.FBCS10080.pdf

  • Wawrzyniak M. (2015). Hejtoholik czyli Jak zaszczepić się na hejt nie wpaść w pułapkę obgadywania oraz nauczyć zarabiać na tych ktorzy cię oczerniają. Gliwice: Wydawnictwo Helion.

  • W¨uest C. (2010). The Risks of Social Networking. Symantec Corporation. Retrieved 11.15.2016 from https://www.symantec.com/content/en/us/enterprise/media/securityresponse/whitepapers/the_risks_of_social_networking.pdf

Search
Journal information
Impact Factor


Cite Score 2018: 0.29

SCImago Journal Rank (SJR) 2018: 0.138
Source Normalized Impact per Paper (SNIP) 2018: 0.358

Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 1430 788 36
PDF Downloads 1010 677 127