Artykuły
Tom 58 Nr 5 (2025): Prawo i Więź nr 5 (58) 2025
Creating Resilient Artificial Intelligence Systems. A Responsible Approach to Cybersecurity Risks
Pomeranian Univerisity in Slupsk
Université Jean Moulin Lyon 3
University of Warmia and Mazury in Olsztyn
Division of Operational Sciences and Development (France)
Abstrakt
In a computerised state, where the information society makes extensive use of digital services, artificial intelligence is important. To facilitate the use of cyberspace, AI systems needed to be resilient to cyber threats that can not only limit the operation of such systems, but also take control of them. Ensuring cyber security requires the introduction and use of appropriate protective measures, both at the stage of creating such systems, implementing them and using them. It should be emphasized that the use of new technologies, including artificial intelligence, must be done responsibly, so as not to expose oneself and other users to risks, including those that cause significant damage. The authors use the dogmatic-legal method, through which an analysis was made of legal acts that normalise both artificial intelligence and cyber security issues. The theoretical-legal method was used to analyse the literature on both normative issues related to artificial intelligence and its potential, as well as obligations related to cyber security, including countering threats occurring in cyberspace.
Bibliografia
- Bierecki Dominik, Gaie Christophe, Karpiuk Mirosław, “Artificial Intelligence in e-Administration” Prawo i Więź, No. 1 (2025): 383-407.
Pokaż w Google Scholar
- Brundage Miles, Avin Shahar, Clark Jack, et al., The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation, Cambridge: 2018.
Pokaż w Google Scholar
- Calo Ryan, “Artificial Intelligence Policy: A Primer and Roadmap” U.C. Davis Law Review, No. 2 (2018): 399-432.
Pokaż w Google Scholar
- Czuryk Małgorzata, “Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues” Studia Iuridica Lublinensia, No. 3 (2022): 31-43.
Pokaż w Google Scholar
- Czuryk Małgorzata, “Activities of the Local Government During a State of Natural Disaster” Studia Iuridica Lublinensia, No. 4 (2021): 111-124, https://doi.org/10.17951/sil.2021.30.4.111-124.
Pokaż w Google Scholar
- Czuryk Małgorzata, “Cybersecurity and Protection of Critical Infrastructure” Studia Iuridica Lublinensia, No. 5 (2023): 43-52.
Pokaż w Google Scholar
- Czuryk Małgorzata, „Dopuszczalne różnicowanie sytuacji pracowników ze względu na religię, wyznanie lub światopogląd” Studia z Prawa Wyznaniowego, No. 27 (2024): 151-163, doi: 10.31743/spw.17518;
Pokaż w Google Scholar
- Gaie Christophe, Karpiuk Mirosław, Spaziani Andrea, “Cybersecurity in France, Poland and Italy” Studia Iuridica Lublinensia, No. 1 (2025): 73-95.
Pokaż w Google Scholar
- Gaie Christophe, Karpiuk Mirosław, Strizzolo Nicola, “Cybersecurity of Public Sector Institutions” Prawo i Więź, No. 6 (2024): 347-362
Pokaż w Google Scholar
- Gaie Christophe, Mueck Markus, „10 – An artificial intelligence framework to ensure a trade-off between sanitary and economic perspectives during the COVID-19 pandemic”, [in:] Deep Learning for Medical Applications with Unique Data, eds. Deepak Gupta, Utku Kose, Ashish Khanna, Valentina Emilia Balas, (Cambridge: Academic Press, 2022): 197-217.
Pokaż w Google Scholar
- Gergelewicz Tomasz, “Bipolarity of Artificial Intelligence – Chances and Threats” Ius et Securitas, No. 2 (2024): 71-94.
Pokaż w Google Scholar
- Grabowski Bogdan, „Cyfrowe zagrożenia – zarys problemu” Ius et Securitas, No. 1 (2024): 95-105.
Pokaż w Google Scholar
- Horvath Laszlo, Oliver James, Susan Banducci, Ana Beduschi, „Citizens' acceptance of artificial intelligence in public services: Evidence from a conjoint experiment about processing permit applications” Government Information Quarterly, No. 4, (2023): 1-18.
Pokaż w Google Scholar
- Kaczmarek Krzysztof, “Finland in the light of cyber threats in the context of Russia’s aggression against Ukraine” Cybersecurity and Law, No. 1 (2023): 204-214.
Pokaż w Google Scholar
- Kaczmarek Krzysztof, “Nordic countries in the face of digital threats” Cybersecurity and Law, No. 1 (2024): 151-161.
Pokaż w Google Scholar
- Kaczmarek Krzysztof, “Vulnerability to cyber threats: a qualitative analysis from societal and institutional perspectives” Cybersecurity and Law, No. 2 (2024): 106-116.
Pokaż w Google Scholar
- Kaczmarek Krzysztof, „Sztuczna inteligencja”, [in:] Leksykon cyberbezpieczeństwa, ed. Katarzyna Chałubińska-Jentkiewicz (Warsaw: ASzWoj, 2024): 250-252.
Pokaż w Google Scholar
- Kaczmarek Krzysztof, „Wpływ zmian klimatycznych na bezpieczeństwo” Journal of Modern Science, No. 4 (2024): 410-430.
Pokaż w Google Scholar
- Kaczmarek Krzysztof, Karpiuk Mirosław, Melchior Claudio, “A Holistic Approach to Cybersecurity and Data Protection in the Age of Artificial Intelligence and Big Data” Prawo i Więź, No. 3 (2024): 103-121.
Pokaż w Google Scholar
- Karpiuk Mirosław, “Recognizing an Entity as an Operator of Essential Services and Providing Cybersecurity at the National Level,” Prawo i Więź, No. 4 (2022): 166-179.
Pokaż w Google Scholar
- Karpiuk Mirosław, “The Legal Status of Digital Service Providers in the Sphere of Cybersecurity” Studia Iuridica Lublinensia, No. 2 (2023): 189-201.
Pokaż w Google Scholar
- Karpiuk Mirosław, „Glosa do wyroku Naczelnego Sądu Administracyjnego z dnia 12 lutego 2018 r. (II OSK 2524/17)” Studia Iuridica Lublinensia, No. 1 (2019): 185-194, doi: 10.17951/sil.2019.28.1.185-194.
Pokaż w Google Scholar
- Kostrubiec Jarosław, Karpiuk Mirosław, Tyrawa Dominik, “The status of municipal government in the sphere of ecological security” Hungarian Journal of Legal Studies, No. 2 (2024): 164-181. https://doi.org/10.1556/2052.2024.00510.
Pokaż w Google Scholar
- Kostrubiec Jarosław, Sztuczna inteligencja a prawa i wolności człowieka, Warszawa: IWS, 2021.
Pokaż w Google Scholar
- Kostrubiec Radosław, Dopuszczalne ograniczenia prawa do swobodnego, pokojowego zgromadzania się w systemie praw człowieka, Zamość: Wydawnictwo Akademii Zamojskiej, 2024.
Pokaż w Google Scholar
- Langlois-Berthelot Jean, „Evaluating and Insuring Cyber Risks within Organizations” (Paris: EHESS, 2021).
Pokaż w Google Scholar
- Langlois-Berthelot Jean, Gaie Christophe, Lebraty Jean-Fabrice, “Epidemiology Inspired Cybersecurity Threats Forecasting Models Applied to e-Government”, [in:] In Transforming Public Services – Combining Data and Algorithms to Fulfil Citizen’s Expectations, (Cham: Springer 2024): 151-174.
Pokaż w Google Scholar
- Mueck Markus, Gaie Christophe, Gkikas Dimitris, „Introduction to the European Artificial Intelligence Act”, [in:] European Digital Regulations, eds. Markus Mueck, Christophe Gaie, (Cham: Springer, 2025): 53-90.
Pokaż w Google Scholar
- Pelc Paweł, „Akt w sprawie sztucznej inteligencji” Myśl Strategiczna, No. 1 (2025): 35-46.
Pokaż w Google Scholar
- Radanliev Petar, „AI Ethics: Integrating Transparency, Fairness, and Privacy in AI Development”, Applied Artificial Intelligence, No. 1 (2025): 1-41.
Pokaż w Google Scholar
- Singla Alex, Sukharevsky Alexander, Yee Lareina, Chui Michael, Hall Bryce, „The state of AI: How organizations are rewiring to capture value”, New York: McKinsey Global Publishing, 2025.
Pokaż w Google Scholar
- Stolpe Karin, Hallström Jonas, „Artificial intelligence literacy for technology education” Computers and Education Open, No. 6 (2024): 1-8.
Pokaż w Google Scholar
- Tkaczyk Edyta, „Bezpieczeństwo państwa w Konstytucji Rzeczypospolitej Polskiej. Refleksje nad dobrem chronionym” Ius et Securitas, No. 1 (2024): 39-54.
Pokaż w Google Scholar
- Tsagourias Elias, Buchan James, „Research Handbook on International Law and Cyberspace”, Cheltenham: Edward Elgar Publishing, 2015.
Pokaż w Google Scholar
- Włodyka Ewa Maria, Kaczmarek Krzysztof, “Cyber Security of Electrical Grids – A Contribution to Research” Cybersecurity and Law, No. 2 (2024): 260-272.
Pokaż w Google Scholar
- Wojciechowski Tomasz, „Cyberbezpieczeństwo i dezinformacja we współczesnym świecie: strategie ochrony i zarządzania kryzysowego” Ius et Securitas, No. 1 (2024): 83-94.
Pokaż w Google Scholar
- Zaman Shakila, Alhazmi Khaled, Aseeri Mohammed, Ahmed Muhammad Raisuddin, Khan Risala Tasin, Kaiser Shamim, Mahmud Mufti, „Security Threats and ArtificialIntelligence based Countermeasures for Internet of Things Networks:A Comprehensive Survey” IEEE Access, No. 9 (2021): 1-22.
Pokaż w Google Scholar
Downloads
Download data is not yet available.