Cybersecurity and the scope of designing information security systems in the organization
 
More details
Hide details
1
Uniwersytet Przyrodniczo - Humanistyczny w Siedlcach
 
2
Wyższa Szkoła Bankowa w Gdańsku
 
 
Submission date: 2023-02-03
 
 
Final revision date: 2023-05-29
 
 
Acceptance date: 2023-05-29
 
 
Publication date: 2023-07-29
 
 
Corresponding author
Grzegorz Wojciech Pietrek   

Uniwersytet Przyrodniczo - Humanistyczny w Siedlcach
 
 
JoMS 2023;51(2):141-173
 
KEYWORDS
TOPICS
ABSTRACT
Objectives:
According to the authors, such an assumption requires describing the impact of information security management on the proper, efficient functioning of the organization in cyberspace. Increasingly, the concept of information is becoming a key category, a central point of consideration, which is a set common to research conducted at the interface of various fields and scientific disciplines.

Material and methods:
method of analyzing literature and documents relating to the studied issues and diagnostic survey, participatory observation. The research problems posed: What are the threats in cyberspace for organizations? Hypothesis: Information security management determines the provision of cybersecurity in the organization, which makes it necessary to implement the applicable norms and standards in this area.

Results:
The result was to draw the final conclusion and verify the research hypothesis adopted in the dissertation, which says that information security management determines the provision of cybersecurity in the organization, which makes it necessary to imply the applicable norm and standards in this area.

Conclusions:
One of the aspects of this utility is the level of security of information resources collected and operated by various types of entities. Currently, in organizations, information technologies support a whole range of manufacturing and service processes. Their efficiency is determined by quick and reliable access to the requested information. Hence, information resources – especially shared ones – require appropriate protection mechanisms. Therefore, attention is paid to problems whose solution may determine the survival of the organization in a turbulent environment. Undoubtedly, one of them is the proper use and assurance of information security – as a key resource of modern organizations.

 
REFERENCES (12)
1.
Bączek, P. (2006). Information threats and the security of the Polish State. Adam Marszałek, Toruń.
 
2.
Beck, U. (1992). Risk Society: Towards a New Modernity. Translated by Ritter. Mark. Sage Publications, London.
 
3.
Biłaś, A. (2017). Security of information and services in a modern institution and company. Warsaw.
 
4.
Cyberprzestępczość– próba diagnozy zjawiska ekspert Wydziału Rozpoznania Biura do Walki z Cyberprzestępczością. KGP Kwartalnik Policyjny 4/2017.
 
5.
Gould, W., Kolb, L. (1964). A Dictionary of the social sciences. Free Press, London.
 
6.
Kulesza, J. (2010). International Internet Law. Poznań.
 
7.
Kwieciński, M. Information and Business Security: Selected Issues. Kraków.
 
8.
Liderman, K. (2012). Information Security. Wydawnictwo Naukowe PWN, Warsaw.
 
9.
Siwicki, M. (2013). Cybercrime. C. H. Beck, Warsaw.
 
10.
Stańczyk, J. (1996). Contemporary understanding of security. ISP PAN, Warsaw.
 
11.
Wójcik, W. (2011). Cybercrime. Selected criminological and legal issues, Problems of Law and Administration. 2011, No. 1.
 
12.
Wrzosek, M. (2010). Information processes in the management of a hierarchical organization. AON, Warsaw.
 
eISSN:2391-789X
ISSN:1734-2031
Journals System - logo
Scroll to top