Cyberspace as a place for the control and monitoring of people´s privacy
Norbert Vrabec
To cite this article:
Vrabec, N. (2014). Cyberspace as a place for the control and monitoring of
people´s privacy. In: M. Baranowska-Szczepańska and K. Gajdka, ed.,
Bezpieczeństwo współczesnego świata: różne wymiary bezpieczeństwa., 1st ed.
Poznań: Wydawnictwo Naukowe Wyższej Szkoły Handlu i Usług, pp.285-292.
ISBN 978-83-61449-49-2
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/325424852
Cyberspace as a place for the control and monitoring of people´s privacy
Chapter · December 2014
CITATIONS
READS
0
26
1 author:
Norbert Vrabec
University of St. Cyril and Methodius of Trnava - Univerzita sv. Cyrila a Metoda
23 PUBLICATIONS 8 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Media Literacy and Academic Research View project
All content following this page was uploaded by Norbert Vrabec on 29 May 2018.
The user has requested enhancement of the downloaded file.
285
Norbert VRABEC
University of Ss. Cyril and Methodius in Trnava
CYBERSPACE AS A PLACE FOR THE CONTROL AND MONITORING
OF PEOPLE'S PRIVACY
As for the influence of these phenomena upon a society and a man, there
have been critical voices emerging since the very beginnings of the Internet
communication warning us against the dangers present in the cyberspace. This
applies mainly to so called “digital pessimism” which perceives the cyberspace and
its influence from a critical point of view. There are various variants of critical
approaches to cyberspace and digital technologies appearing in professional
literature. The first variant of the Internet pessimism is characterized by general
scepticism to the advantage of Internet communication. It questions any
contribution and positive aspects, prefers only negative aspects of this
phenomenon such as alienation, deformation of interpersonal relations,
oversaturation of affection by superficial and inexact information, spread of
pornography, cyber crimes and other negative phenomena. Representatives of
these approaches are Neil Postman, Andrew Keen, Lee Siegel and Mark Helprin.
Another variant of digital pessimism represented by media theoreticians such as
Lawrence Lessig, Jonathan Zittrain and others is less critical to negative influence
of online communication upon a society. Their main objection is the gradually
increasing level of Internet commercialization. According to their opinion the
Internet should remain a space for an open and free share of information and
knowledge. The reason for their pessimism is the fact that according to them the
digital world is more and more controlled by multinational corporations, secret
services and governments which acquire an overview about activities of citizens
and institutions. Naturally, they might misuse the information anytime and in
various ways.
Regardless of how intensive the criticism or scepticism towards the Internet
and its negative aspects is it is apparent that the Internet has also several aspects
conducive to culture, individuals and society. We may perceive the digital
revolution as a significant strengthening of a wide mass of planet inhabitants who
have acquired to a large extent an unlimited access to a huge volume of new
information, knowledge, services and useable technologies. Democratization
process connected the rise if the Internet era and perceived in this way is
unprecedented in human history. For every man – regardless of his origin, sex,
race or economic status – it may be beneficial to use new technological tools
effectively and integrate them into one´s life effectively. It is relatively difficult to
imagine mankind would be better off living in the era of information poverty – i.e. in
times when immediate and technically uncomplicated access to any information or
service did not exist, or if it was at disposal then in a very limited form and for a
specific group of political, economic or intellectual elites only.
Seen by digital pessimists do these unambiguous advantages of the Internet
era have almost no value. Their sceptical attitude emphasizes that the society
decays to moral and spiritual crisis due to an intensive use of cyberspace.
286
Accompanying signs of this crisis are on the individual level mainly the alienation of
a man, superficiality of perception, deformation of interpersonal relations, overload
of man´s attention with number of superficial and inexact information and
intellectual scepticism regarding the Internet as means which could in any way
contribute to improvements in mankind´s destiny.
I admit many of these worries are partially justifiable. Our lives in cyberspace
definitely have darker sides – and there are many of them. We deal with many of
them in our paper. In order to prevent excessive digital pessimism it is useful to
imagine what our everyday lives without the conveniences of the Internet
communication would look like. During a more thorough contemplation about this
hypothetical script many of us found out that despite the negative phenomena
there is a wide range of the Internet advantages we definitely do not want to loose.
It is clear we can not stop or turn back time. At the same time it is impossible to
figure out how the society would develop if it did not have the Internet and new
technologies at its disposal. In this perspective the arguments of the majority of
digital pessimists are not based on facts and real visions. They are more nostalgic
recollection of the “good old days” which might have lasted up to present days if
there had not been the Internet era.
Internet as a perfect tool of control
It is relatively apparent that one branch of digital pessimism has its
justification. It is represented by opinions of authors (such as Lessing, Zittrain, Wu
and others) who have a sceptical attitude regarding the Internet as a place for open
and free sharing of information and knowledge. According to them the digital world
is more and more controlled by multinational corporations, secret services and
governments. Users of the achievements in web communication are on one hand
attractive objects for the online advertisements, commerce and marketing. On the
other hand – and we assess this trend to be even more dangerous – they are at
the same time objects of more intensive tracing, monitoring and control. The
spectrum of activities which are objects of monitoring, control and data collecting is
gradually spreading. For a common user it is both harder to detect. These trends
are confirmed also by the events connected to the American IT expert and whistleblower Edward Snowden who has published top-secret documents about the
surveillance activities of NSA or British Government Communications
Headquarters. Lawrence Lessing predicted a dark future for cyberspace already in
1999 in his book Code: and other laws of cyberspace. “We have every reason to
believe that cyberspace, left to itself, will not fulfil promise of freedom. Left to itself,
cyberspace will become a perfect tool of control.” [Lessing 1999:4–5]. The main
symptoms of this great digital closing are more and more sophisticated ways of
controlling and abusing the Internet. In this context the cyberspace becomes a
more sophisticated tool for controlling, monitoring and potential abusing of acquired
data for various purposes (e.g. for the purposes of various forms of cyber crimes,
blackmailing, political fight, etc.).
Creating control mechanisms, regulations and restrictions in cyberspace has
undergone an interesting development during last 20 years. Along with the
dynamic spread of the Internet all around the world his political importance has
grown as well. The interest of various interest groups (secret service, governments,
corporations, etc.) in introduction of various mechanisms by means of which it
287
would be possible to control activities on the Internet has grown with gradual
penetration of new information technologies into all spheres of our lives. This
control of global information space constantly acquires new forms – through
technologies, government regulations or various legislative norms.
In 2008 OpenNet Initiative (ONI) published first global study Access denied:
The Practice and Policy of Global Internet Filtering [Deibert et al. 2008]. It
documented how states try to create borders in cyberspace. The study focused on
41 countries and discovered that many of them intensively try to introduce various
protective measures to prevent the Internet users from the access to content which
is by the representative of these states considered to be undesirable or unsuitable.
In majority of cases these methods consisted of building firewalls on key Internet
spots. China was the first to accept intrastate systems of Internet filtering known as
“The Great Firewall of China”. Since then this model of access restriction to some
politically delicate web pages has become a model for Internet censorship all
across the globe. However, the Chinese way of restricting access to selected web
pages and services represents only the first generations of techniques aimed at the
Internet control. In Chinese-style filtering, lists of Internet protocol (IP) addresses,
keywords, and/or domains are programmed into routers or software packages that
are situated at key Internet choke points, typically at international gateways or
among major Internet service providers (ISPs). [Murdoch, Anderson 2008: 57–72]
The convenient rubric of terrorism, child pornography, and cyber security has
contributed to a growing expectation that states should enforce order in
cyberspace, including policing unwanted content. Paradoxically, advanced
democratic states within the Organization for Security and Cooperation in Europe
(OSCE)—including members of the European Union (EU) - are (perhaps
unintentionally) leading the way toward the establishment of a global norm around
filtering of political content with the introduction of proposals to censor hate speech
and militant Islamic content on the Internet. This follows already existing measures
in the UK, Canada, and elsewhere aimed at eliminating access to child
pornography. Recently and amid great controversy, Australia announced plans to
create a nationwide filtering system for Internet connectivity in that country.
Although the proposal has ultimately languished, it shows the extent of this growing
norm. No longer is consideration of state-sanctioned Internet censorship confined
to authoritarian regimes or hidden from public view. Internet censorship is
becoming a global norm. [Deibert, Rohozinski 2010: 4–5]
Pessimistic view on this situation might indicate the governments will gradually
force upon elimination of online freedom and will try to get cyberspace under their
scope of authority (and their control). Regulation attempts are spreading incredibly
fast and they will not slow down in the near future. It is related to convictions of
many stakeholders that cyberspace should be run by a state or elite group
according to an amorphous “general will” or “public interest”. This type of so called
cyber-collectivism perceives the Internet as a space which should be bound by
certain rules. Otherwise it may become a source of a wide spectrum of negative
influences upon an individual and society. Such an approach definitely has its
logic and justification. Moreover it cab be effectively politically reasoned – e.g. by
attempts for elimination of various forms of cyber crimes, child pornography,
gambling, etc.
288
Within second-generation control of the Internet, which grew stronger after
2001, we can see an intensive promotion of so called information security doctrine.
The control is legitimized and reasoned by the need to preserve citizens´ security –
mainly due to the increasing threat of global terrorism. It was the attempt for
elimination of terrorism which was at the beginnings of massive government
programs focused on mass phone call bugging or massive communication
monitoring via e-mails or social networks.
However, this model of public interest enforcement in cyberspace has several
side effects. On one hand there are illegal or hidden practices of monitoring people
and their activities used in online space. These practices often do not have a
support in existent legislative even though they are most frequently used by secret
services who internally reason their actions by the interest in national security. On
the other hand the use of monitoring and control techniques in global context
increases. These have support in newly adapted legislative – either on the level of
national states or international organizations. This method allows the legitimization
of various ways of online content filtering as well as practices the aim of which is to
control which type of information may be published, used, shared or communicated
in online environment.
Second-generation controls create a legal and normative environment and
technical capabilities that enable actors to deny access to information resources as
and when needed, while reducing the possibility of blowback or discovery. These
controls have an overt and covert track. The overt track aims to legalize content
controls by specifying the conditions under which they can be denied. Instruments
here include the doctrine of information security as well as the application of
existent laws, such as slander and defamation, to the online environment...
Third-generation controls take a highly sophisticated, multidimensional
approach to enhancing state control over national cyberspace and building
capabilities for competing in informational space with potential adversaries and
competitors. The key characteristic of third-generation controls is that the focus is
less on denying access than successfully competing with potential threats through
effective counter information campaigns that overwhelm, discredit, or demoralize
opponents. Third-generation controls also focus on the active use of surveillance
and data mining as means to confuse and entrap opponents....
[Deibert, Rohozinski 2010: 7–8]
Privacy as a commodity
OpenNet Initiative (ONI) that documents the Internet content filtering all
around the world has been recording the increase of the Internet censorship in
several countries since the beginning of this millennium. OpenNet Initiative
estimates that more than 960 million people live in countries which censor the
Internet – almost a half (47%) of the total number of world Internet population.
Important problem of current period is the cyber crime and constantly increasing
economic costs connected to it. What is most important is the way how the world of
cyber crime overlaps with espionage, sabotage and even cold war. Almost every
day do we hear about high quality of cyber attacks against government offices,
private companies and other infrastructure. The Citizen Lab, at the University of
Toronto’s Munk School of Global Affairs joined the investigation of several cases.
Two of them were published in Tracking Ghostnet and its follow on a Shadows in
289
the Cloud. Victims threatened by cyber attacks offenders ranged from main
suppliers of protection systems and global media up to government agencies,
ministries of foreign affairs, embassies and international organizations such as the
United Nations, etc. [Deibert 2012: 268–269]
Widespread practice of collecting personal data about citizens is no longer an
issue of secret services or special security agencies (regardless the fact whether
they are financed by public or private sources). The practice of monitoring and
collecting personal data penetrates also into the private sphere. Data about
consumers, their preferences and purchase behaviour are very valuable
information which might be used not only by big corporations but also by small and
medium-sized businesses, marketing and consulting agencies or providers of
various services. The interest in using this type of data generated in cyberspace is
not limited to the online environment only. It is used in business activities carried
out offline.
“Monetizing privacy” has become something of a holy grail in today’s data
economy [Acquisti et al. 2013]. Today, privacy has become a commodity that can
be bought and sold. While many would view privacy as a constitutional right or
even a fundamental human right, our age of big data has reduced privacy to a
dollar figure. There have been efforts—both serious and silly—to quantify the value
of privacy. Browser add-ons such as Privacyfix try to show users their value to
companies, and a recent study suggested that free Internet services offer $2,600 in
value to users in exchange for their data [Varian, 2013]. Privacy clearly has
financial value, but in the end there are fewer people in a position to pay to secure
their privacy than there are individuals willing to sell it for anything it’s worth. A
recent study by the European Network and Information Security Agency
discovered that most consumers will buy from a more privacy-invasive provider if
that provider charges a lower price. [Jentzsch et al. 2012]. Finding the right
balance between privacy risks and big data rewards may very well be the biggest
public policy challenge of our time. [Rubinstein 2013: 240-242]. How should privacy
risks be weighed against big data rewards? The recent controversy over leaked
documents revealing the massive scope of data collection, analysis, and use by
the NSA and possibly other national security organizations has hurled to the
forefront of public attention the delicate balance between privacy risks and big data
opportunities. [Greenwald, MacAskill 2013].
De-identification process
In connection to it the process of so called de-identification grows as well. It is
about a targeted and systematic interrupting of connections between our personal
identity and data collected about us in the online environment or various databases
and data media. We may ask companies and organizations that collected these
data about us to erase them along with our activities. This initiative is more and
more frequently provoked directly by companies and it is represented as a
demonstration of their social responsibility related to privacy protection of their
clients.
Companies may promise the “maintenance of anonymity “ for their clients
stating they will guarantee that collected personal data will not be spread further
and they will not be sold to third parties. They may also ask a client to express his
content with the use of his personal data within marketing campaigns of a
290
particular company. The process of de-identification of collected data may reduce
the thread of various forms of personal data abuse. It is the internal employees of a
particular company who may stand behind the abuse of personal data. However,
more frequently does the thread come from external environment (e.g. attacking
information systems by hackers). The abuse of sensitive personal data by internal
employees might be illustrated by the unethical cooperation of some health-care
facilities with tabloids. Medical staff provides journalists with information about the
state of health of some celebrities, politicians or well-known personalities of public
life. Regulators have justifiably concluded that strong de-identification techniques
are needed to protect privacy before publicly releasing sensitive information. With
publicly released datasets, experts agree that weak technical de-identification
creates an unacceptably high risk to privacy. [Barth–Jones, 2012]
Technical De-Identification (DEID-T) is a process through which organizations
remove or obscure links between an individual’s identity and the individual’s
personal information. This process involves deleting or masking personal
identifiers, such as names and social security numbers, and suppressing or
generalizing quasi-identifiers, such as dates of birth and zip codes. Administrative
Safeguards mean all non-technical data protection tools that help prevent
confidential data from becoming publicly released or improperly used. In the E.U.
Directive, these safeguards are referred to as organizational measures. Nontechnical protections include two broad categories: 1) internal administrative and
physical controls (internal controls) and 2) external contractual and legal
protections (external controls). Internal controls encompass security policies,
access limits, employee training, data segregation guidelines, and data deletion
practices that aim to stop confidential [Lagos, Polonetsky 2013: 104–108]
The motives of cyber attacks
The methods of cyber attacks might have various technical parameters,
diverse implementation difficulty and various hackers with varied experience and
knowledge about this issue may stand behind them. The cyber attacks differ mostly
by the motive. They might be divided into following categories:
Economic motives. The main aim of the cyber attack is enrichment at the
victim´s expenses – whether it is a private person, a company or an institution.
Actually, it is one type of economic criminality which might be carried out in various
ways – e.g. theft of access data to bank accounts, forged calls for payments,
various manipulations with payment systems, etc.
Activist motives. The aim of such cyber attacks is not a fraudulent proceeding
or enrichment at the expenses of injured institution or a company. It is more about
expressing certain opinion: it is a way ho to catch the public attention and draw it to
the actions or activities of an organization/company who is the subject of a cyber
attack. Most often we speak about various types of attacks on web pages of these
institutions/companies. The aim is to prevent the public from the access to these
web pages. What is much more important is the publicity the hackers provoke by
their actions. Mainly the attacks on important public institutions and big
corporations hit the headlines, TV or other traditional media.
Political motives. The intentions of these cyber attacks might have diverse
character. Their common denominator is the will to harm or paralyse the activities
of a public institution or political party. The economic motive is not primary. A direct
291
or indirect attempt to cause economic damage to attacked institutions might be an
integral part of the attack. Political motives of cyber hackers might often overlap
with activist motives.
Reputation motives. The primary purpose of these cyber attacks is to increase
hacker’s reputation – mainly in the hackers’ community and in the public. The aim
is not to get a financial advantage. Neither are the political or activist motives
important. Such a cyber attack is carried out to demonstrate hacker’s abilities,
reveal security deficiencies in attacked information systems, overcome complicated
security barriers which seemed to be invincible, etc. Cyber criminals use various
sophisticated methods of targeted attacks, use data mining, etc. They want to
share mastering these new strategies with other members of hackers’ community.
Conclusion
Regardless the main motive of a cyber-attack it is always about violation of
sensitive personal data of private persons or company data. It is only the ways how
the criminal obtains them and abuses them which vary. Similar and often even
more sophisticated techniques of abusing data are used by secret services and
various governmental and private agencies. Cyberspace gets under the control of
interest groups that might abuse the information anytime and anyway. It is more
and more difficult for a common user to reveal that he/she is the object of
monitoring or personal data abuse – either for the purposes of criminal actions or
activities carried out by secret services performed in the name of protecting
national security. Possibilities of further abuse of collected data are unlimited and
uncontrollable.
Literature:
Literatura:
Acquisti, A. et al., 'What Is Privacy Worth? ', The Journal of Legal Studies, vol. 42,
no 2, pp. 249 – 274, 2013
Barth-Jones, D., 'The “Re-identification” of Governor William Weld’s Medical
Information: A Critical Re-examination of Health Data Identification Risk and
Privacy
Protections',
Then
and
Now,
24
July,
2012.
http://dx.doi.org/10.2139/ssrn.2076397.(accessed 10 March 2014).
Deibert, R., Access denied: the practice and policy of global Internet filtering.
Cambridge, MIT Press, 2008
Deibert, R., and Rohozinski, R., “Beyond Denial: Introducing Next-Generation
Information Access Controls” in Deibert R. et al. (ed.), Access Controlled: The
Shaping of Power, Rights, and Rule in Cyberspace, Cambridge: MIT Press,
2010 , pp. 3–14.
Deibert, R., 'The Growing Dark Side of Cyberspace (…and What To Do About It)',
The Penn State Journal of Law & International Affairs, vol.1 no 2, 2012, pp.
260-274
Greenwald, G. and MacAskill, E., 'NSA Prism Program Taps in to User Data of
Apple,
Google
and
Others',
Guardian,
7
June,
2013,
http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data.
(accessed 10 March 2014).
292
Jentzsch, N. et al. Study on monetising privacy. An economic model for pricing
personal information. Heraklion: European Network and Information Security
Agency, 2012.
Lagos, Y. and Polonetsky, J., 'Public vs. Nonpublic Data: The Benefits of
Administrative Controls', Stanford Law Review vol. 66 no 03, 2013, pp.103109
Lessig, L, Code and other laws of cyberspace. New York, Basic books, 1999.
Murdoch, S.J. and Anderson, R., 'Tools and Technology of Internet Filtering', in
Deibert R. et al. (ed.), Access Denied: The Practice and Policy of Global
Internet Filtering, Cambridge, MIT Press, 2008, pp. 57–72.
Rubinstein, I., 'Big Data: The End of Privacy or a New Beginning?', International
Data Privacy Law, 5. October, 2012, http://dx.doi.org/10.2139/ssrn.2157659.
(accessed 10 March 2014).
Varian, H., 'Net Benefits: How to Quantify the Gains that the Internet Has Brought
to
Consumers',
Economist,
9
March
2013,
http://www.economist.com/news/finance-and-economics/21573091-howquantify-gains-internet-has-brought-consumers-net-benefits. (accessed 10
March 2014).
Cyberspace as a place for the control and monitoring
of people's privacy
Summary
Dynamic spread of the Internet and social networks imminently influences
almost every sphere of social life. New media directly or indirectly influence the
patterns of behaviour, attitudes and rhythm of everyday activities of individuals and
whole social groups. Their influence might be seen on cognitive, psychomotor and
affective levels. There is a wide range of segments active within social relations –
starting with educational system, economics, politics, and public administration up
to the working of media organizations. This paper deals with reflection on new
techniques, technologies and strategies to control and monitoring of people's
privacy in cyberspace. Reflection of this phenomenon in the sphere of media
studies, sociology, psychology and other branches often oscillates in the range of
extremely definite opinion positions that consider the increasing influence of
digitalization in public and individual spheres.
BEZPIECZEŃSTWO
WSPÓŁCZESNEGO ŚWIATA
Różne wymiary bezpieczeństwa
Redakcja naukowa
Magdalena Baranowska-Szczepańska
Krzysztof Gajdka
Wydawnictwo
Wyższej Szkoły Handlu i Usług
Poznań 2014
Recenzja
prof. dr hab. Andrzej Kusztelak
Projekt okładki
Sławomir Szczepański
Skład komputerowy
Zbigniew Dziemianko
Copyright©2014 by
Wyższa Szkoła Handlu i Usług
All rights reserved
ISBN: 978-83-61449-49-2
Wydawnictwo Naukowe Wyższej Szkoły Handlu i Usług
ul. Zwierzyniecka 13, 60-813 Poznań
tel. 0-61 842 70 20
wshiu@wshiu.poznan.pl
www.wshiu.poznan.pl
Zakład Poligraficzny Moś i Łuczak sp.j.
ul. Piwna 1
61-065 Poznań
www.mos.pl
Wydanie pierwsze
Druk ukończono w 2014
5
SPIS TREŚCI
Spis treści ……………………………………………………………………………….. 5
Wprowadzenie …………………………………………………………….……………. 9
Oliwia BECK, Mateusz ŁAKOMSKI
Social security and ageing: the long-term care perspective
Bezpieczeństwo socjalne i starzenie się: perspektywa opieki długoterminowej ... 13
Anna BEDNARCZYK
Mobbing w miejscu pracy
Mobbing in the workplaces ……………………………………………………..…….. 21
Anna CHOJANCKA-WOŹNIAK
Mobbing w pracy. Bezpieczeństwo i koszty społeczne
Mobbing in job. Safety and social costs ……………………………………….……. 35
Piotr DUBIŃSKI
Marketing polityczny w Polsce. Mowa niewerbalna i techniczne komponenty
spotów wyborczych
Political marketing in Poland. Nonverbal communication and technical components
of electoral spots …………………………………….……………………………….... 47
Jarosław HYŻY
Ludzie ze złota i ludzie z brązu - w perspektywie ponowoczesnej komunikacji
People of gold and people of bronze - in the perspective of post-modern
communication …………………………………………………………………………. 57
Katarzyna Magdalena KOCZWARA, Dariusz PAŃKA
Mikozy i mikotoksykozy – zagrożenia ze strony grzybów
Mycoses and mycotoxicoses – threats posed by fungi …...……………………..… 75
Weronika LENARTOWICZ
Zagrożenie społeczne: szariatyzacja Europy
Societal threats: shariatisation of Europy ………………………………………….… 83
Renata MATUSZEWSKA, Bożena KROGULSKA, Dorota MAZIARKA
Występowanie zanieczyszczeń mikrobiologicznych, w tym pałeczek
Legionella, w aerozolu wodnym wytwarzanym na stanowiskach pracy
The presence of microbiological contaminants, including Legionella, in water
aerosol generated at the workplaces ………………………………………………… 97
6
Arkadiusz MRZYGŁÓD, Mateusz ŁAKOMSKI
Zagrożenia wynikające ze stosowania magnetoterapii oraz prądów
interferencyjnych dla pacjenta, w przebiegu dyskopatii odcinka lędźwiowo –
krzyżowego kręgosłupa
Risks resulting from using magnetotherapy and interference current for patient
sufferd from degenerative disc disease (discopathy) in lumbar spine ………….. 109
Mateusz ŁAKOMSKI, Dominika GĘBKA
Zagrożenia podczas zabiegów fizykalnych
Potential Threats During Physical Therapy Treatment …………………………... 119
Dana PETRANOVÁ
Vplyv násilných mediálnych obsahov na pocit bezpečia …………….……… 131
Marlena PLEBAŃSKA
E-learning in the enterprise and its environment
Wykorzystanie e-learningu w przedsiębiorstwach ………………………………... 145
Marlena PLEBAŃSKA
Knowledge management students with a modern e-textbooks
Zarządzanie wiedzą uczniów poprzez wykorzystanie nowoczesnych epodręczników …………………………………………………………………………. 157
Hana PRAVDOVÁ
Kríza mediálnej logiky – kríza demokracie
Crisis of Media Logic – Crisis of Democracy ....................................................... 167
Rudolf RYBANSKÝ, Eva BALNOVÁ
Krízový manažment vo finančných inštitúciách
Crisis management in financial institutions ………………………………………… 179
Maria SIWKO
Bezpieczna czy niebezpieczna komunikacja interpersonalna w sieci?
Safe or unsafe interpersonal communication on the net? …………………….…. 189
Anna STELIGA
Bezpieczeństwo w relacjach interpersonalnych. Rysunek projekcyjny „Ja
wśród ludzi” jako metoda badania społecznych aspektów obrazu siebie
Security in interpersonal relations. Projection drawing “I among people” as a
method of examining social aspects of one’s own image .................................. 201
Renata SUCHENEK
Kryzys globalny u podłoża bezrobocia i handlu ludźmi
Global crisis as the main reason for unemployment and human trafficking …… 223
7
Kamil SYGIDUS
Rewolucja 2.0. Nowe media – nowa rewolucja? Media społecznościowe
narzędziem działań rewolucyjnych
Revolution 2.0. The new media - a new revolution? Social media as a tool of
revolution ……………………………………………..……………………………….. 243
Anna WALC
Kapsaicynoidy i ich wpływ na organizm ludzki
Capsaicinoids and their impact on the human body ……………………………… 263
Maria WĄSICKA
The (un)safe language of politics
(Nie)bezpieczny język polityki.............................................................................. 271
Norbert VRABEC
Cyberspace as a place for the control and monitoring of people's
privacy................................................................................................................ 285
Andrzej ZIARKO
Kompetencje nauczycieli w zakresie udzielania pierwszej pomocy
Teachers’ competence at first aid education ………………………………………. 293
O autorach……………………………….………………………………………..….. 305
View publication stats