Conquerors of the Cyber Space — the Z generation

2013 ◽  
Vol 31 (2) ◽  
pp. 195-202
Author(s):  
Nikoletta Kutasi
Keyword(s):  
2020 ◽  
Vol 10 (2) ◽  
pp. 11-15
Author(s):  
Volodymyr Shypovskyi ◽  
Volodymyr Cherneha ◽  
Serhiy Marchenkov

Recent events in Ukraine have shown that, along with the advancement of information technology, methods of conducting modern warfare are being enhanced. Cyberspace is deliberately used by the Russian Federation to commit cyber warfare against Ukraine. Therefore, in order to address their influence effectively, it is important not only successfully deal with its consequences but also to foresee the potential adversaryʼs actions by analyzing their previous operations and incorporating the lessons learned by other countries. Across the globe, including Ukraine, the issue of information security and cyberattacks has become exceedingly urgent. Everybody is aware of the ongoing attacks on information networks of various government agencies and energy firms, cyberattacks on e-mail networks of political parties and organizations around the world. Likewise, despite the steadily growing numbers, cyberattack cases against the individuals and private businesses are not reported as widely as they occur. As a result, The North Atlantic Alliance countries began tackling the issue of cyberthreats much earlier than Ukraine. Consequently, NATO and its allies rely on powerful and robust cyber defenses to ensure the Alliance's core tasks of collective defense. The article discusses methods and strategies for providing cyber defense in NATO member states and recommends ways to increase the level of protection in the state's cyber space, as part of Ukraineʼs national security and defense domain.


2020 ◽  
Vol 51 (3) ◽  
pp. 94-102
Author(s):  
MICHAEL M. PUTYATO ◽  
◽  
ALEXANDER S. MAKARYAN ◽  
Keyword(s):  

2018 ◽  
Vol 2018 (97 (153)) ◽  
pp. 115-139
Author(s):  
Elżbieta Szczepankiewicz

The presence of contemporary entities in the cyber-space shows that IT offers unlimited possibilities of running a business and developing an organisation. On the other hand, it involves a greater number of internal and external threats in the area of accounting information resources security. The objective of the paper is to diagnose the current level of accounting information resources security (AIRS) assurance in Polish business entities. The paper analyses two research hypotheses. In accordance with the first one, the AIRS assurance level in various entity groups may be different, even though all entities should have implemented the same requirements of the Accounting Act in the analyzed area. The identified differences may result from the effect of additional, industry-specific regulations. The other hypothesis claims that in the private business area, accounting and auditing companies adhere to AIRS regulations more strictly than other small and medium enterprises. The paper defines the fundamental factors affecting the functioning of corporate accounting systems in the three dimensions of the cyber-space. Subsequently, the author presents the results of empirical research on how corporate information security is ensured in the context of internal accounting control systems and the requirements of the Polish Accounting Act. The results of the empirical research show how the management of the analysed entities crafts the basic elements of their internal environment as well as internal communication and control processes connected with ensuring information resources security. The results also show the management’s approach to various aspects of risk management of accounting information resources security, as well as to adherence to organisational and administrative procedures, and to hardware and software safeguards in the IT environment of the accounting system. The issues analysed in the present paper open a scholarly discussion that should lead to the development of theoretical models, recommendation of efficient methods and tools, as well as indication of adequate legislative initiatives. Research methods used by the author include analysis of literature and legislation, analysis of survey results, deduction and inference.


Author(s):  
A. P. Segal ◽  
A. V. Savchenko ◽  
A. A. Kostikova

Subject of the article is actual as never given the speed and volatility of data transfer and it’s processing. Authors have attended the topic of “digital transformation” multiple times, researching both negative and positive outcomes of this process. To define some of the potentially negative - alienation from other elements of life due to division of labor, personal and professional diviations. Some of the standing out positives - RnD and creative potential provided by virtual space, ability to effectively model technical and social processes, gamification as an additional tool of education development. This article is focused around the methodology of the elective education course “Constructing virtual worlds: game, science fiction and futurology” that was held in 2020/2021. Authors provide detailed description of how this course has been formed and method of its delivery to the audience. Being done as the dialogue between speakers and students, through the means of constant discussion, the course allowed not just to constantly receive and apply feedback to real-time, but also to form a thought process, reasonable for subjects in discussion. The course has provoked a lot of interest both in academic and industrial circles and has been discussed at multiple professional media platforms. Major results are ability to develop disciplines for new masters programs and programs of additional specialization. Authors are also confident that the course can be the beginning of new research and practical transdisciplinary fields aimed to explore vision and ideas of virtual space, cyber space and metaverse.


2010 ◽  
Vol 3 (1) ◽  
pp. 15-19
Author(s):  
Katarina Kuruc

In our current technologically-mediated environment there is in fact a fourth dimension that needs to be taken in to consideration which plays an equally vital role in shaping our identity: that of technology. What happens when experience takes place outside the realm of traditional reality and shifts virtually into cyber-space? Does our identity become free-floating? In other words, because experience relies on our senses and perceptions, when our experiences become mediated what happens to the process of identity creation?


Temida ◽  
2009 ◽  
Vol 12 (3) ◽  
pp. 63-74
Author(s):  
Dejan Vuletic

The accelerated growth of the information-communication technology use brought about cyber crime as a new form of crime connected with the misuse of computer network. Human trafficking and human organ trafficking are changing in line with the state-of-art technological achievements i.e. becoming more and more characteristic of cyber space. Passing appropriate regulations at both national and international levels presents an important step in solving the problem of human organ trafficking through Internet.


2018 ◽  
Vol 189 (4) ◽  
pp. 46-59
Author(s):  
Marian Kopczewski ◽  
Agnieszka Napieralska

The 21<sup>st</sup> century is undoubtedly a period of enormous progress in the field of digital technology, a period in which the boundary between the real world and the virtual world becomes less and less visible. The Internet has undeniably become a facilitation of everyday life, since it is a tool of work, communication or a way to spend free time for many users. The virtual world is present in almost all areas of our lives, and people spend more and more time in front of the computer screens, operating websites, e-mails or social networks. Highly developed digital technology is a boon of the 21st century, but despite its numerous advantages, negative aspects are also visible. Virtual knowledge displaces physical interpersonal contacts; physical activity is replaced by spending free time in front of a computer monitor. Various threats (social, psychological, psychological, ethical and moral) resulting from modern digital technologies and the increasing degree of dependence on them are extremely significant. The authors of this article present the results of own research, aiming at making the reader aware that there are both positive and negative aspects of the virtual world.


Sign in / Sign up

Export Citation Format

Share Document