Articles
Vol. 58 No. 5 (2025): Prawo i Więź nr 5 (58) 2025
Creating Resilient Artificial Intelligence Systems. A Responsible Approach to Cybersecurity Risks
Pomeranian Univerisity in Slupsk
Université Jean Moulin Lyon 3
University of Warmia and Mazury in Olsztyn
Division of Operational Sciences and Development (France)
Abstract
In a computerised state, where the information society makes extensive use of digital services, artificial intelligence is important. To facilitate the use of cyberspace, AI systems needed to be resilient to cyber threats that can not only limit the operation of such systems, but also take control of them. Ensuring cyber security requires the introduction and use of appropriate protective measures, both at the stage of creating such systems, implementing them and using them. It should be emphasized that the use of new technologies, including artificial intelligence, must be done responsibly, so as not to expose oneself and other users to risks, including those that cause significant damage. The authors use the dogmatic-legal method, through which an analysis was made of legal acts that normalise both artificial intelligence and cyber security issues. The theoretical-legal method was used to analyse the literature on both normative issues related to artificial intelligence and its potential, as well as obligations related to cyber security, including countering threats occurring in cyberspace.
References
- Bierecki Dominik, Gaie Christophe, Karpiuk Mirosław, “Artificial Intelligence in e-Administration” Prawo i Więź, No. 1 (2025): 383-407.
View in Google Scholar
- Brundage Miles, Avin Shahar, Clark Jack, et al., The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation, Cambridge: 2018.
View in Google Scholar
- Calo Ryan, “Artificial Intelligence Policy: A Primer and Roadmap” U.C. Davis Law Review, No. 2 (2018): 399-432.
View in Google Scholar
- Czuryk Małgorzata, “Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues” Studia Iuridica Lublinensia, No. 3 (2022): 31-43.
View in Google Scholar
- Czuryk Małgorzata, “Activities of the Local Government During a State of Natural Disaster” Studia Iuridica Lublinensia, No. 4 (2021): 111-124, https://doi.org/10.17951/sil.2021.30.4.111-124.
View in Google Scholar
- Czuryk Małgorzata, “Cybersecurity and Protection of Critical Infrastructure” Studia Iuridica Lublinensia, No. 5 (2023): 43-52.
View in Google Scholar
- Czuryk Małgorzata, „Dopuszczalne różnicowanie sytuacji pracowników ze względu na religię, wyznanie lub światopogląd” Studia z Prawa Wyznaniowego, No. 27 (2024): 151-163, doi: 10.31743/spw.17518;
View in Google Scholar
- Gaie Christophe, Karpiuk Mirosław, Spaziani Andrea, “Cybersecurity in France, Poland and Italy” Studia Iuridica Lublinensia, No. 1 (2025): 73-95.
View in Google Scholar
- Gaie Christophe, Karpiuk Mirosław, Strizzolo Nicola, “Cybersecurity of Public Sector Institutions” Prawo i Więź, No. 6 (2024): 347-362
View in Google Scholar
- Gaie Christophe, Mueck Markus, „10 – An artificial intelligence framework to ensure a trade-off between sanitary and economic perspectives during the COVID-19 pandemic”, [in:] Deep Learning for Medical Applications with Unique Data, eds. Deepak Gupta, Utku Kose, Ashish Khanna, Valentina Emilia Balas, (Cambridge: Academic Press, 2022): 197-217.
View in Google Scholar
- Gergelewicz Tomasz, “Bipolarity of Artificial Intelligence – Chances and Threats” Ius et Securitas, No. 2 (2024): 71-94.
View in Google Scholar
- Grabowski Bogdan, „Cyfrowe zagrożenia – zarys problemu” Ius et Securitas, No. 1 (2024): 95-105.
View in Google Scholar
- Horvath Laszlo, Oliver James, Susan Banducci, Ana Beduschi, „Citizens' acceptance of artificial intelligence in public services: Evidence from a conjoint experiment about processing permit applications” Government Information Quarterly, No. 4, (2023): 1-18.
View in Google Scholar
- Kaczmarek Krzysztof, “Finland in the light of cyber threats in the context of Russia’s aggression against Ukraine” Cybersecurity and Law, No. 1 (2023): 204-214.
View in Google Scholar
- Kaczmarek Krzysztof, “Nordic countries in the face of digital threats” Cybersecurity and Law, No. 1 (2024): 151-161.
View in Google Scholar
- Kaczmarek Krzysztof, “Vulnerability to cyber threats: a qualitative analysis from societal and institutional perspectives” Cybersecurity and Law, No. 2 (2024): 106-116.
View in Google Scholar
- Kaczmarek Krzysztof, „Sztuczna inteligencja”, [in:] Leksykon cyberbezpieczeństwa, ed. Katarzyna Chałubińska-Jentkiewicz (Warsaw: ASzWoj, 2024): 250-252.
View in Google Scholar
- Kaczmarek Krzysztof, „Wpływ zmian klimatycznych na bezpieczeństwo” Journal of Modern Science, No. 4 (2024): 410-430.
View in Google Scholar
- Kaczmarek Krzysztof, Karpiuk Mirosław, Melchior Claudio, “A Holistic Approach to Cybersecurity and Data Protection in the Age of Artificial Intelligence and Big Data” Prawo i Więź, No. 3 (2024): 103-121.
View in Google Scholar
- Karpiuk Mirosław, “Recognizing an Entity as an Operator of Essential Services and Providing Cybersecurity at the National Level,” Prawo i Więź, No. 4 (2022): 166-179.
View in Google Scholar
- Karpiuk Mirosław, “The Legal Status of Digital Service Providers in the Sphere of Cybersecurity” Studia Iuridica Lublinensia, No. 2 (2023): 189-201.
View in Google Scholar
- Karpiuk Mirosław, „Glosa do wyroku Naczelnego Sądu Administracyjnego z dnia 12 lutego 2018 r. (II OSK 2524/17)” Studia Iuridica Lublinensia, No. 1 (2019): 185-194, doi: 10.17951/sil.2019.28.1.185-194.
View in Google Scholar
- Kostrubiec Jarosław, Karpiuk Mirosław, Tyrawa Dominik, “The status of municipal government in the sphere of ecological security” Hungarian Journal of Legal Studies, No. 2 (2024): 164-181. https://doi.org/10.1556/2052.2024.00510.
View in Google Scholar
- Kostrubiec Jarosław, Sztuczna inteligencja a prawa i wolności człowieka, Warszawa: IWS, 2021.
View in Google Scholar
- Kostrubiec Radosław, Dopuszczalne ograniczenia prawa do swobodnego, pokojowego zgromadzania się w systemie praw człowieka, Zamość: Wydawnictwo Akademii Zamojskiej, 2024.
View in Google Scholar
- Langlois-Berthelot Jean, „Evaluating and Insuring Cyber Risks within Organizations” (Paris: EHESS, 2021).
View in Google Scholar
- Langlois-Berthelot Jean, Gaie Christophe, Lebraty Jean-Fabrice, “Epidemiology Inspired Cybersecurity Threats Forecasting Models Applied to e-Government”, [in:] In Transforming Public Services – Combining Data and Algorithms to Fulfil Citizen’s Expectations, (Cham: Springer 2024): 151-174.
View in Google Scholar
- Mueck Markus, Gaie Christophe, Gkikas Dimitris, „Introduction to the European Artificial Intelligence Act”, [in:] European Digital Regulations, eds. Markus Mueck, Christophe Gaie, (Cham: Springer, 2025): 53-90.
View in Google Scholar
- Pelc Paweł, „Akt w sprawie sztucznej inteligencji” Myśl Strategiczna, No. 1 (2025): 35-46.
View in Google Scholar
- Radanliev Petar, „AI Ethics: Integrating Transparency, Fairness, and Privacy in AI Development”, Applied Artificial Intelligence, No. 1 (2025): 1-41.
View in Google Scholar
- Singla Alex, Sukharevsky Alexander, Yee Lareina, Chui Michael, Hall Bryce, „The state of AI: How organizations are rewiring to capture value”, New York: McKinsey Global Publishing, 2025.
View in Google Scholar
- Stolpe Karin, Hallström Jonas, „Artificial intelligence literacy for technology education” Computers and Education Open, No. 6 (2024): 1-8.
View in Google Scholar
- Tkaczyk Edyta, „Bezpieczeństwo państwa w Konstytucji Rzeczypospolitej Polskiej. Refleksje nad dobrem chronionym” Ius et Securitas, No. 1 (2024): 39-54.
View in Google Scholar
- Tsagourias Elias, Buchan James, „Research Handbook on International Law and Cyberspace”, Cheltenham: Edward Elgar Publishing, 2015.
View in Google Scholar
- Włodyka Ewa Maria, Kaczmarek Krzysztof, “Cyber Security of Electrical Grids – A Contribution to Research” Cybersecurity and Law, No. 2 (2024): 260-272.
View in Google Scholar
- Wojciechowski Tomasz, „Cyberbezpieczeństwo i dezinformacja we współczesnym świecie: strategie ochrony i zarządzania kryzysowego” Ius et Securitas, No. 1 (2024): 83-94.
View in Google Scholar
- Zaman Shakila, Alhazmi Khaled, Aseeri Mohammed, Ahmed Muhammad Raisuddin, Khan Risala Tasin, Kaiser Shamim, Mahmud Mufti, „Security Threats and ArtificialIntelligence based Countermeasures for Internet of Things Networks:A Comprehensive Survey” IEEE Access, No. 9 (2021): 1-22.
View in Google Scholar
Downloads
Download data is not yet available.