Skip to main navigation menu Skip to main content Skip to site footer

Articles

No. 3 (2024): Law & Social Bonds Nr 4 (50) 2024

A Holistic Approach to Cybersecurity and Data Protection in the Age of Artificial Intelligence and Big Data

Submitted
2 April 2024
Published
21-08-2024

Abstract

Given the rapid technological advancements, cybersecurity and personal data protection are developing into key aspects requiring a holistic approach. The dynamic development of artificial intelligence (AI) and big data technologies creates new opportunities for cybersecurity. At the same time, these give rise to potential attack vectors. The article highlights the relationship between cybersecurity and personal data protection, indicating the need for integrated measures to be taken at multiple levels. This includes developing and implementing advanced technological solutions and education to increase users’ digital competencies. The analysis reveals that only by balancing the potential offered by modern technologies with the risks related to the human factor is it possible to protect personal data in the digital ecosystem effectively.

References

  1. Adjerid Idris, Eyal Peer, Alessandro Acquisti, „Beyond the Privacy Paradox” MIS Quarterly, No. 2 (2018): 465-488. https://doi.org/10.25300/MISQ/2018/14316.
    View in Google Scholar
  2. Arce Daniel G., „Malware and market share” Journal of Cybersecurity, No.1 (2018): 1-6. https://doi.org/10.1093/cybsec/tyy010.
    View in Google Scholar
  3. Arpetti Jacopo, Marco Delmastro, „The privacy paradox: a challenge to decision theory?” Journal of Industrial and Business Economics, No. 4 (2021): 505-525. https://doi.org/10.1007/s40812-021-00192-z.
    View in Google Scholar
  4. Baek Young Min, „Solving the privacy paradox: A counter-argument experimental approach” Computers in human behawior, 38 (2014): 33-42. https://doi.org/10.1016/j.chb.2014.05.006.
    View in Google Scholar
  5. Barth Susanne, Menno D.T. de Jong, „The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review” Telematics and informatics, No. 7 (2017): 1038-1058. https://doi.org/10.1016/j.tele.2017.04.013.
    View in Google Scholar
  6. BDO Digital, Eliminate Routine Tasks with Automation and Generative AI. 2023. https://www.bdodigital.com/insights/automation/eliminate-routine-tasks-with-automation-and-generative-ai accessed 11 Feb. 2024.
    View in Google Scholar
  7. Bencsik András, Mirosław Karpiuk, Miroslav Kelemen, Ewa Włodyka, Cybersecurity in the Visegrad Group Countries. Maribor: Institute for Local Self-Government Maribor, 2023. http://dx.doi.org/10.4335/2023.6.
    View in Google Scholar
  8. Brandimarte Laura, Alessandro Acquisti, George Loewenstein, „Misplaced confidences: Privacy and the control paradox” Social psychological and personality science, No. 3 (2013): 340-347. https://doi.org/10.1177/1948550612455931.
    View in Google Scholar
  9. Chałubińska-Jentkiewicz Katarzyna, „Disinformation – and what else?” Cybersecurity and Law, No. 2 (2021): 9-19. https://doi.org/10.35467/cal/146453.
    View in Google Scholar
  10. Czuryk Małgorzata, „Activities of the Local Government During a State of Natural Disaster” Studia Iuridica Lublinensia, No. 4 (2021): 111-124. http://dx.doi.org/10.17951/sil.2021.30.4.111-124.
    View in Google Scholar
  11. Czuryk Małgorzata, „Cybersecurity and Protection of Critical Infrastructure” Studia Iuridica Lublinensia, No. 5 (2023): 43-52. http://dx.doi.org/10.17951/sil.2023.32.5.43-52.
    View in Google Scholar
  12. Czuryk Małgorzata, „Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues” Studia Iuridica Lublinensia, No. 3 (2022): 31-43. doi: http://dx.doi.org/10.17951/sil.2022.31.3.31-43.
    View in Google Scholar
  13. Darem Abdulbasit A., Asma A. Alhashmi, Tareq M. Alkhaldi, Abdullah M. Alashjaee, Sultan M. Alanazi, Shouki A. Ebad, „Cyber Threats Classifications and Countermeasures in Banking and Financial Sector” IEEE Access, No. 11 (2023): 125138-125158. https://doi.org/10.1109/ACCESS.2023.3327016.
    View in Google Scholar
  14. European Commission, What is personal data?. https://commission.europa.eu/law/law-topic/data-protection/reform/what-personal-data_en accessed 11 Feb. 2024.
    View in Google Scholar
  15. General Data Protection Regulation (GDPR) (2016). https://gdpr-info.eu/ accessed 11 Feb. 2024.
    View in Google Scholar
  16. Hsu, Fu-Hau, Min-Hao Wu, Yan-Ling Hwang, Chia-Hao Lee, Chuan-Sheng Wang, Ting-Cheng Chang, „WPFD: Active User-Side Detection of Evil Twins” Applied Sciences, No. 16 (2022): 8088. https://doi.org/10.3390/app12168088.
    View in Google Scholar
  17. Kaczmarek Krzysztof, „Dezinformacja jako czynnik ryzyka w sytuacjach kryzysowych” Roczniki Nauk Społecznych, No. 2 (2023): 19-30. https://doi.org/10.18290/rns2023.0017.
    View in Google Scholar
  18. Kaczmarek Krzysztof, „Zapobieganie zagrożeniom cyfrowym na przykładzie Republiki Estońskiej i Republiki Finlandii” Cybersecurity and Law, No. 1 (2019): 143-157. https://doi.org/10.35467/cal/133778.
    View in Google Scholar
  19. Karpiuk Mirosław, „Recognising an Entity as an Operator of Essential Services and Providing Cybersecurity at the National Level” Prawo i Więź, No. 4 (2022): 166-179. https://doi.org/10.36128/priw.vi42.524.
    View in Google Scholar
  20. Karpiuk Mirosław, „Organisation of the National System of Cybersecurity: Selected Issues” Studia Iuridica Lublinensia, No. 2 (2021): 233-244. http://dx.doi.org/10.17951/sil.2021.30.2.233-244.
    View in Google Scholar
  21. Karpiuk Mirosław, „Position of the Local Government of Commune Level in the Space of Security and Public Order” Studia Iuridica Lublinensia, No. 2 (2019): 27-39. https://doi.org/10.17951/sil.2019.28.2.27-39.
    View in Google Scholar
  22. Karpiuk Mirosław, „The Legal Status of Digital Service Providers in the Sphere of Cybersecurity” Studia Iuridica Lublinensia, No. 2 (2023): 189-201. https://doi.org/10.17951/sil.2023.32.2.189-201.
    View in Google Scholar
  23. Karpiuk Mirosław, „The Provision of Safety in Water Areas: Legal Issues” Studia Iuridica Lublinensia, No. 2 (2022): 79-92. https://doi.org/10.17951/sil.2022.31.1.79-92.
    View in Google Scholar
  24. Karpiuk Mirosław, Jarosław Kostrubiec, „Provincial Governor as a Body Responsible for Combating State Security Threats” Studia Iuridica Lublinensia, No. 1 (2024): 107-122.
    View in Google Scholar
  25. Karpiuk Mirosław, Claudio Melchior, Urszula Soler, „Cybersecurity Management in the Public Service Sector” Prawo i Więź, No. 4, (2023): 7-27. https://doi.org/10.36128/PRIW.VI47.751.
    View in Google Scholar
  26. Karpiuk Mirosław, Wojciech Pizło, Krzysztof Kaczmarek, „Cybersecurity Management – Current State and Directions of Change” International Journal of Legal Studies, No. 2 (2023): 645-663. http://dx.doi.org/10.5604/01.3001.0054.2880.
    View in Google Scholar
  27. Khan Sulaiman, Habib Ullah Khan, Shah Nazir, „Systematic analysis of healthcare big data analytics for efficient care and disease diagnosing” Scientific Reports, No. 22377 (2022). https://doi.org/10.1038/s41598-022-26090-5.
    View in Google Scholar
  28. Kokolakis Spyros, „Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon” Computers & Security, 64 (2017): 122-134. https://doi.org/10.1016/j.cose.2015.07.002.
    View in Google Scholar
  29. Kurek Justyna, Bezpieczeństwo państwa w warunkach hybrydowej regulacji danych osobowych w dobie analizy Big data. Aspekty prawne, organizacyjne i systemowe. Warsaw: ASzWoj, 2021.
    View in Google Scholar
  30. Legrand Julien, „Humans and Cybersecurity: The Weakest Link or the Best Defense?” ISACA Journal, 1 (2022). https://www.isaca.org/resources/isaca-journal/issues/2022/volume-1/humans-and-cybersecurity-the-weakest-link-or-the-best-defense.
    View in Google Scholar
  31. Malużinas Martinas, „Armoured Information as a Promising Concept to Reduce Disinformation – a New Element of Armoured Democracy?” Studia i Analizy Nauk o Polityce, 2 (2023): 149-170. http://dx.doi.org/10.31743/sanp.16411.14661.
    View in Google Scholar
  32. Melchior Claudio, Urszula Soler, „Security of Personal Data in Cyberspace in the Opinion of Students of the University of Udine” Cybersecurity and Law, No. 1 (2024): 227-247.
    View in Google Scholar
  33. Taddicken Monika. „The «privacy paradox» in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure” Journal of computer-mediated communication, No. 2 (2014): 248-273. https://doi.org/10.1111/jcc4.12052.
    View in Google Scholar
  34. Wang Na, Bo Zhang, Bin Liu, Jin Hongxia, „Investigating effects of control and ads awareness on android users’ privacy behaviors and perceptions”, [in:] Proceedings of the 17th international conference on human-computer interaction with mobile devices and services, (2015): 373-382. https://doi.org/10.1145/2785830.2785845.
    View in Google Scholar
  35. Wang Pei, „On Defining Artificial Intelligence” Journal of Artificial General Intelligence, No. 2 (2019): 1-37. https://doi.org/10.2478/jagi-2019-0002.
    View in Google Scholar
  36. Warshaw Jeffrey, Tara Matthews, Steve Whittaker, Chris Kau, Mateo Bengualid, Barton A. Smith, „Can an Algorithm Know the «Real You»? Understanding People's Reactions to Hyper-personal Analytics Systems”, [in:] Proceedings of the 33rd annual ACM conference on human factors in computing systems, (2015), 797-806. https://doi.org/10.1145/2702123.2702274.
    View in Google Scholar
  37. Wasilewski Krzysztof, „Fake News and the Europeanization of Cyberspace” Polish Political Science Yearbook, No. 4 (2021): 61-80. https://doi.org/10.15804/ppsy202153.
    View in Google Scholar
  38. Włodyka Ewa Maria, „Artificial intelligence as a potential platform for international cooperation of local governments”, [in:] Wybrane aspekty współpracy międzynarodowej jednostek samorządu terytorialnego”, ed. Iwona Wieczorek, Anna Ostrowska, Mariusz Chrzanowski. 201-223. Łódź: Wydawnictwo Narodowego Instytutu Samorządu Terytorialnego, 2023. https://www.nist.gov.pl/downloadfile/15423.
    View in Google Scholar
  39. Włodyka Ewa Maria, „Dlaczego potrzebujemy e-administracji? Rozwój podstawowych umiejętności cyfrowych pracowników administracji na Pomorzu Zachodnim” Acta Politica Polonica, No. 2 (2021): 89-100. http://dx.doi.org/10.18276/ap.2021.52-08.
    View in Google Scholar
  40. Włodyka Ewa Maria, „Gotowi – do startu – start? Przyczynek do dyskusji nad gotowością jednostek samorządu terytorialnego do zapewnienia cyberbezpieczeństwa” Cybersecurity and Law, No. 1 (2022): 202-219. https://doi.org/10.35467/cal/151828.
    View in Google Scholar

Downloads

Download data is not yet available.