Przejdź do głównego menu Przejdź do sekcji głównej Przejdź do stopki

Artykuły

Tom 58 Nr 5 (2025): Prawo i Więź nr 5 (58) 2025

Creating Resilient Artificial Intelligence Systems. A Responsible Approach to Cybersecurity Risks

DOI:
https://doi.org/10.36128/0akf8v90
Przesłane
16 września 2025
Opublikowane
18-11-2025

Abstrakt

In a computerised state, where the information society makes extensive use of digital services, artificial intelligence is important. To facilitate the use of cyberspace, AI systems needed to be resilient to cyber threats that can not only limit the operation of such systems, but also take control of them. Ensuring cyber security requires the introduction and use of appropriate protective measures, both at the stage of creating such systems, implementing them and using them. It should be emphasized that the use of new technologies, including artificial intelligence, must be done responsibly, so as not to expose oneself and other users to risks, including those that cause significant damage. The authors use the dogmatic-legal method, through which an analysis was made of legal acts that normalise both artificial intelligence and cyber security issues. The theoretical-legal method was used to analyse the literature on both normative issues related to artificial intelligence and its potential, as well as obligations related to cyber security, including countering threats occurring in cyberspace.

Bibliografia

  1. Bierecki Dominik, Gaie Christophe, Karpiuk Mirosław, “Artificial Intelligence in e-Administration” Prawo i Więź, No. 1 (2025): 383-407.
    Pokaż w Google Scholar
  2. Brundage Miles, Avin Shahar, Clark Jack, et al., The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation, Cambridge: 2018.
    Pokaż w Google Scholar
  3. Calo Ryan, “Artificial Intelligence Policy: A Primer and Roadmap” U.C. Davis Law Review, No. 2 (2018): 399-432.
    Pokaż w Google Scholar
  4. Czuryk Małgorzata, “Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues” Studia Iuridica Lublinensia, No. 3 (2022): 31-43.
    Pokaż w Google Scholar
  5. Czuryk Małgorzata, “Activities of the Local Government During a State of Natural Disaster” Studia Iuridica Lublinensia, No. 4 (2021): 111-124, https://doi.org/10.17951/sil.2021.30.4.111-124.
    Pokaż w Google Scholar
  6. Czuryk Małgorzata, “Cybersecurity and Protection of Critical Infrastructure” Studia Iuridica Lublinensia, No. 5 (2023): 43-52.
    Pokaż w Google Scholar
  7. Czuryk Małgorzata, „Dopuszczalne różnicowanie sytuacji pracowników ze względu na religię, wyznanie lub światopogląd” Studia z Prawa Wyznaniowego, No. 27 (2024): 151-163, doi: 10.31743/spw.17518;
    Pokaż w Google Scholar
  8. Gaie Christophe, Karpiuk Mirosław, Spaziani Andrea, “Cybersecurity in France, Poland and Italy” Studia Iuridica Lublinensia, No. 1 (2025): 73-95.
    Pokaż w Google Scholar
  9. Gaie Christophe, Karpiuk Mirosław, Strizzolo Nicola, “Cybersecurity of Public Sector Institutions” Prawo i Więź, No. 6 (2024): 347-362
    Pokaż w Google Scholar
  10. Gaie Christophe, Mueck Markus, „10 – An artificial intelligence framework to ensure a trade-off between sanitary and economic perspectives during the COVID-19 pandemic”, [in:] Deep Learning for Medical Applications with Unique Data, eds. Deepak Gupta, Utku Kose, Ashish Khanna, Valentina Emilia Balas, (Cambridge: Academic Press, 2022): 197-217.
    Pokaż w Google Scholar
  11. Gergelewicz Tomasz, “Bipolarity of Artificial Intelligence – Chances and Threats” Ius et Securitas, No. 2 (2024): 71-94.
    Pokaż w Google Scholar
  12. Grabowski Bogdan, „Cyfrowe zagrożenia – zarys problemu” Ius et Securitas, No. 1 (2024): 95-105.
    Pokaż w Google Scholar
  13. Horvath Laszlo, Oliver James, Susan Banducci, Ana Beduschi, „Citizens' acceptance of artificial intelligence in public services: Evidence from a conjoint experiment about processing permit applications” Government Information Quarterly, No. 4, (2023): 1-18.
    Pokaż w Google Scholar
  14. Kaczmarek Krzysztof, “Finland in the light of cyber threats in the context of Russia’s aggression against Ukraine” Cybersecurity and Law, No. 1 (2023): 204-214.
    Pokaż w Google Scholar
  15. Kaczmarek Krzysztof, “Nordic countries in the face of digital threats” Cybersecurity and Law, No. 1 (2024): 151-161.
    Pokaż w Google Scholar
  16. Kaczmarek Krzysztof, “Vulnerability to cyber threats: a qualitative analysis from societal and institutional perspectives” Cybersecurity and Law, No. 2 (2024): 106-116.
    Pokaż w Google Scholar
  17. Kaczmarek Krzysztof, „Sztuczna inteligencja”, [in:] Leksykon cyberbezpieczeństwa, ed. Katarzyna Chałubińska-Jentkiewicz (Warsaw: ASzWoj, 2024): 250-252.
    Pokaż w Google Scholar
  18. Kaczmarek Krzysztof, „Wpływ zmian klimatycznych na bezpieczeństwo” Journal of Modern Science, No. 4 (2024): 410-430.
    Pokaż w Google Scholar
  19. Kaczmarek Krzysztof, Karpiuk Mirosław, Melchior Claudio, “A Holistic Approach to Cybersecurity and Data Protection in the Age of Artificial Intelligence and Big Data” Prawo i Więź, No. 3 (2024): 103-121.
    Pokaż w Google Scholar
  20. Karpiuk Mirosław, “Recognizing an Entity as an Operator of Essential Services and Providing Cybersecurity at the National Level,” Prawo i Więź, No. 4 (2022): 166-179.
    Pokaż w Google Scholar
  21. Karpiuk Mirosław, “The Legal Status of Digital Service Providers in the Sphere of Cybersecurity” Studia Iuridica Lublinensia, No. 2 (2023): 189-201.
    Pokaż w Google Scholar
  22. Karpiuk Mirosław, „Glosa do wyroku Naczelnego Sądu Administracyjnego z dnia 12 lutego 2018 r. (II OSK 2524/17)” Studia Iuridica Lublinensia, No. 1 (2019): 185-194, doi: 10.17951/sil.2019.28.1.185-194.
    Pokaż w Google Scholar
  23. Kostrubiec Jarosław, Karpiuk Mirosław, Tyrawa Dominik, “The status of municipal government in the sphere of ecological security” Hungarian Journal of Legal Studies, No. 2 (2024): 164-181. https://doi.org/10.1556/2052.2024.00510.
    Pokaż w Google Scholar
  24. Kostrubiec Jarosław, Sztuczna inteligencja a prawa i wolności człowieka, Warszawa: IWS, 2021.
    Pokaż w Google Scholar
  25. Kostrubiec Radosław, Dopuszczalne ograniczenia prawa do swobodnego, pokojowego zgromadzania się w systemie praw człowieka, Zamość: Wydawnictwo Akademii Zamojskiej, 2024.
    Pokaż w Google Scholar
  26. Langlois-Berthelot Jean, „Evaluating and Insuring Cyber Risks within Organizations” (Paris: EHESS, 2021).
    Pokaż w Google Scholar
  27. Langlois-Berthelot Jean, Gaie Christophe, Lebraty Jean-Fabrice, “Epidemiology Inspired Cybersecurity Threats Forecasting Models Applied to e-Government”, [in:] In Transforming Public Services – Combining Data and Algorithms to Fulfil Citizen’s Expectations, (Cham: Springer 2024): 151-174.
    Pokaż w Google Scholar
  28. Mueck Markus, Gaie Christophe, Gkikas Dimitris, „Introduction to the European Artificial Intelligence Act”, [in:] European Digital Regulations, eds. Markus Mueck, Christophe Gaie, (Cham: Springer, 2025): 53-90.
    Pokaż w Google Scholar
  29. Pelc Paweł, „Akt w sprawie sztucznej inteligencji” Myśl Strategiczna, No. 1 (2025): 35-46.
    Pokaż w Google Scholar
  30. Radanliev Petar, „AI Ethics: Integrating Transparency, Fairness, and Privacy in AI Development”, Applied Artificial Intelligence, No. 1 (2025): 1-41.
    Pokaż w Google Scholar
  31. Singla Alex, Sukharevsky Alexander, Yee Lareina, Chui Michael, Hall Bryce, „The state of AI: How organizations are rewiring to capture value”, New York: McKinsey Global Publishing, 2025.
    Pokaż w Google Scholar
  32. Stolpe Karin, Hallström Jonas, „Artificial intelligence literacy for technology education” Computers and Education Open, No. 6 (2024): 1-8.
    Pokaż w Google Scholar
  33. Tkaczyk Edyta, „Bezpieczeństwo państwa w Konstytucji Rzeczypospolitej Polskiej. Refleksje nad dobrem chronionym” Ius et Securitas, No. 1 (2024): 39-54.
    Pokaż w Google Scholar
  34. Tsagourias Elias, Buchan James, „Research Handbook on International Law and Cyberspace”, Cheltenham: Edward Elgar Publishing, 2015.
    Pokaż w Google Scholar
  35. Włodyka Ewa Maria, Kaczmarek Krzysztof, “Cyber Security of Electrical Grids – A Contribution to Research” Cybersecurity and Law, No. 2 (2024): 260-272.
    Pokaż w Google Scholar
  36. Wojciechowski Tomasz, „Cyberbezpieczeństwo i dezinformacja we współczesnym świecie: strategie ochrony i zarządzania kryzysowego” Ius et Securitas, No. 1 (2024): 83-94.
    Pokaż w Google Scholar
  37. Zaman Shakila, Alhazmi Khaled, Aseeri Mohammed, Ahmed Muhammad Raisuddin, Khan Risala Tasin, Kaiser Shamim, Mahmud Mufti, „Security Threats and ArtificialIntelligence based Countermeasures for Internet of Things Networks:A Comprehensive Survey” IEEE Access, No. 9 (2021): 1-22.
    Pokaż w Google Scholar

Downloads

Download data is not yet available.

Inne teksty tego samego autora