Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Cyberspace as a place for the control and monitoring of people´s privacy Norbert Vrabec To cite this article: Vrabec, N. (2014). Cyberspace as a place for the control and monitoring of people´s privacy. In: M. Baranowska-Szczepańska and K. Gajdka, ed., Bezpieczeństwo współczesnego świata: różne wymiary bezpieczeństwa., 1st ed. Poznań: Wydawnictwo Naukowe Wyższej Szkoły Handlu i Usług, pp.285-292. ISBN 978-83-61449-49-2 See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/325424852 Cyberspace as a place for the control and monitoring of people´s privacy Chapter · December 2014 CITATIONS READS 0 26 1 author: Norbert Vrabec University of St. Cyril and Methodius of Trnava - Univerzita sv. Cyrila a Metoda 23 PUBLICATIONS 8 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Media Literacy and Academic Research View project All content following this page was uploaded by Norbert Vrabec on 29 May 2018. The user has requested enhancement of the downloaded file. 285 Norbert VRABEC University of Ss. Cyril and Methodius in Trnava CYBERSPACE AS A PLACE FOR THE CONTROL AND MONITORING OF PEOPLE'S PRIVACY As for the influence of these phenomena upon a society and a man, there have been critical voices emerging since the very beginnings of the Internet communication warning us against the dangers present in the cyberspace. This applies mainly to so called “digital pessimism” which perceives the cyberspace and its influence from a critical point of view. There are various variants of critical approaches to cyberspace and digital technologies appearing in professional literature. The first variant of the Internet pessimism is characterized by general scepticism to the advantage of Internet communication. It questions any contribution and positive aspects, prefers only negative aspects of this phenomenon such as alienation, deformation of interpersonal relations, oversaturation of affection by superficial and inexact information, spread of pornography, cyber crimes and other negative phenomena. Representatives of these approaches are Neil Postman, Andrew Keen, Lee Siegel and Mark Helprin. Another variant of digital pessimism represented by media theoreticians such as Lawrence Lessig, Jonathan Zittrain and others is less critical to negative influence of online communication upon a society. Their main objection is the gradually increasing level of Internet commercialization. According to their opinion the Internet should remain a space for an open and free share of information and knowledge. The reason for their pessimism is the fact that according to them the digital world is more and more controlled by multinational corporations, secret services and governments which acquire an overview about activities of citizens and institutions. Naturally, they might misuse the information anytime and in various ways. Regardless of how intensive the criticism or scepticism towards the Internet and its negative aspects is it is apparent that the Internet has also several aspects conducive to culture, individuals and society. We may perceive the digital revolution as a significant strengthening of a wide mass of planet inhabitants who have acquired to a large extent an unlimited access to a huge volume of new information, knowledge, services and useable technologies. Democratization process connected the rise if the Internet era and perceived in this way is unprecedented in human history. For every man – regardless of his origin, sex, race or economic status – it may be beneficial to use new technological tools effectively and integrate them into one´s life effectively. It is relatively difficult to imagine mankind would be better off living in the era of information poverty – i.e. in times when immediate and technically uncomplicated access to any information or service did not exist, or if it was at disposal then in a very limited form and for a specific group of political, economic or intellectual elites only. Seen by digital pessimists do these unambiguous advantages of the Internet era have almost no value. Their sceptical attitude emphasizes that the society decays to moral and spiritual crisis due to an intensive use of cyberspace. 286 Accompanying signs of this crisis are on the individual level mainly the alienation of a man, superficiality of perception, deformation of interpersonal relations, overload of man´s attention with number of superficial and inexact information and intellectual scepticism regarding the Internet as means which could in any way contribute to improvements in mankind´s destiny. I admit many of these worries are partially justifiable. Our lives in cyberspace definitely have darker sides – and there are many of them. We deal with many of them in our paper. In order to prevent excessive digital pessimism it is useful to imagine what our everyday lives without the conveniences of the Internet communication would look like. During a more thorough contemplation about this hypothetical script many of us found out that despite the negative phenomena there is a wide range of the Internet advantages we definitely do not want to loose. It is clear we can not stop or turn back time. At the same time it is impossible to figure out how the society would develop if it did not have the Internet and new technologies at its disposal. In this perspective the arguments of the majority of digital pessimists are not based on facts and real visions. They are more nostalgic recollection of the “good old days” which might have lasted up to present days if there had not been the Internet era. Internet as a perfect tool of control It is relatively apparent that one branch of digital pessimism has its justification. It is represented by opinions of authors (such as Lessing, Zittrain, Wu and others) who have a sceptical attitude regarding the Internet as a place for open and free sharing of information and knowledge. According to them the digital world is more and more controlled by multinational corporations, secret services and governments. Users of the achievements in web communication are on one hand attractive objects for the online advertisements, commerce and marketing. On the other hand – and we assess this trend to be even more dangerous – they are at the same time objects of more intensive tracing, monitoring and control. The spectrum of activities which are objects of monitoring, control and data collecting is gradually spreading. For a common user it is both harder to detect. These trends are confirmed also by the events connected to the American IT expert and whistleblower Edward Snowden who has published top-secret documents about the surveillance activities of NSA or British Government Communications Headquarters. Lawrence Lessing predicted a dark future for cyberspace already in 1999 in his book Code: and other laws of cyberspace. “We have every reason to believe that cyberspace, left to itself, will not fulfil promise of freedom. Left to itself, cyberspace will become a perfect tool of control.” [Lessing 1999:4–5]. The main symptoms of this great digital closing are more and more sophisticated ways of controlling and abusing the Internet. In this context the cyberspace becomes a more sophisticated tool for controlling, monitoring and potential abusing of acquired data for various purposes (e.g. for the purposes of various forms of cyber crimes, blackmailing, political fight, etc.). Creating control mechanisms, regulations and restrictions in cyberspace has undergone an interesting development during last 20 years. Along with the dynamic spread of the Internet all around the world his political importance has grown as well. The interest of various interest groups (secret service, governments, corporations, etc.) in introduction of various mechanisms by means of which it 287 would be possible to control activities on the Internet has grown with gradual penetration of new information technologies into all spheres of our lives. This control of global information space constantly acquires new forms – through technologies, government regulations or various legislative norms. In 2008 OpenNet Initiative (ONI) published first global study Access denied: The Practice and Policy of Global Internet Filtering [Deibert et al. 2008]. It documented how states try to create borders in cyberspace. The study focused on 41 countries and discovered that many of them intensively try to introduce various protective measures to prevent the Internet users from the access to content which is by the representative of these states considered to be undesirable or unsuitable. In majority of cases these methods consisted of building firewalls on key Internet spots. China was the first to accept intrastate systems of Internet filtering known as “The Great Firewall of China”. Since then this model of access restriction to some politically delicate web pages has become a model for Internet censorship all across the globe. However, the Chinese way of restricting access to selected web pages and services represents only the first generations of techniques aimed at the Internet control. In Chinese-style filtering, lists of Internet protocol (IP) addresses, keywords, and/or domains are programmed into routers or software packages that are situated at key Internet choke points, typically at international gateways or among major Internet service providers (ISPs). [Murdoch, Anderson 2008: 57–72] The convenient rubric of terrorism, child pornography, and cyber security has contributed to a growing expectation that states should enforce order in cyberspace, including policing unwanted content. Paradoxically, advanced democratic states within the Organization for Security and Cooperation in Europe (OSCE)—including members of the European Union (EU) - are (perhaps unintentionally) leading the way toward the establishment of a global norm around filtering of political content with the introduction of proposals to censor hate speech and militant Islamic content on the Internet. This follows already existing measures in the UK, Canada, and elsewhere aimed at eliminating access to child pornography. Recently and amid great controversy, Australia announced plans to create a nationwide filtering system for Internet connectivity in that country. Although the proposal has ultimately languished, it shows the extent of this growing norm. No longer is consideration of state-sanctioned Internet censorship confined to authoritarian regimes or hidden from public view. Internet censorship is becoming a global norm. [Deibert, Rohozinski 2010: 4–5] Pessimistic view on this situation might indicate the governments will gradually force upon elimination of online freedom and will try to get cyberspace under their scope of authority (and their control). Regulation attempts are spreading incredibly fast and they will not slow down in the near future. It is related to convictions of many stakeholders that cyberspace should be run by a state or elite group according to an amorphous “general will” or “public interest”. This type of so called cyber-collectivism perceives the Internet as a space which should be bound by certain rules. Otherwise it may become a source of a wide spectrum of negative influences upon an individual and society. Such an approach definitely has its logic and justification. Moreover it cab be effectively politically reasoned – e.g. by attempts for elimination of various forms of cyber crimes, child pornography, gambling, etc. 288 Within second-generation control of the Internet, which grew stronger after 2001, we can see an intensive promotion of so called information security doctrine. The control is legitimized and reasoned by the need to preserve citizens´ security – mainly due to the increasing threat of global terrorism. It was the attempt for elimination of terrorism which was at the beginnings of massive government programs focused on mass phone call bugging or massive communication monitoring via e-mails or social networks. However, this model of public interest enforcement in cyberspace has several side effects. On one hand there are illegal or hidden practices of monitoring people and their activities used in online space. These practices often do not have a support in existent legislative even though they are most frequently used by secret services who internally reason their actions by the interest in national security. On the other hand the use of monitoring and control techniques in global context increases. These have support in newly adapted legislative – either on the level of national states or international organizations. This method allows the legitimization of various ways of online content filtering as well as practices the aim of which is to control which type of information may be published, used, shared or communicated in online environment. Second-generation controls create a legal and normative environment and technical capabilities that enable actors to deny access to information resources as and when needed, while reducing the possibility of blowback or discovery. These controls have an overt and covert track. The overt track aims to legalize content controls by specifying the conditions under which they can be denied. Instruments here include the doctrine of information security as well as the application of existent laws, such as slander and defamation, to the online environment... Third-generation controls take a highly sophisticated, multidimensional approach to enhancing state control over national cyberspace and building capabilities for competing in informational space with potential adversaries and competitors. The key characteristic of third-generation controls is that the focus is less on denying access than successfully competing with potential threats through effective counter information campaigns that overwhelm, discredit, or demoralize opponents. Third-generation controls also focus on the active use of surveillance and data mining as means to confuse and entrap opponents.... [Deibert, Rohozinski 2010: 7–8] Privacy as a commodity OpenNet Initiative (ONI) that documents the Internet content filtering all around the world has been recording the increase of the Internet censorship in several countries since the beginning of this millennium. OpenNet Initiative estimates that more than 960 million people live in countries which censor the Internet – almost a half (47%) of the total number of world Internet population. Important problem of current period is the cyber crime and constantly increasing economic costs connected to it. What is most important is the way how the world of cyber crime overlaps with espionage, sabotage and even cold war. Almost every day do we hear about high quality of cyber attacks against government offices, private companies and other infrastructure. The Citizen Lab, at the University of Toronto’s Munk School of Global Affairs joined the investigation of several cases. Two of them were published in Tracking Ghostnet and its follow on a Shadows in 289 the Cloud. Victims threatened by cyber attacks offenders ranged from main suppliers of protection systems and global media up to government agencies, ministries of foreign affairs, embassies and international organizations such as the United Nations, etc. [Deibert 2012: 268–269] Widespread practice of collecting personal data about citizens is no longer an issue of secret services or special security agencies (regardless the fact whether they are financed by public or private sources). The practice of monitoring and collecting personal data penetrates also into the private sphere. Data about consumers, their preferences and purchase behaviour are very valuable information which might be used not only by big corporations but also by small and medium-sized businesses, marketing and consulting agencies or providers of various services. The interest in using this type of data generated in cyberspace is not limited to the online environment only. It is used in business activities carried out offline. “Monetizing privacy” has become something of a holy grail in today’s data economy [Acquisti et al. 2013]. Today, privacy has become a commodity that can be bought and sold. While many would view privacy as a constitutional right or even a fundamental human right, our age of big data has reduced privacy to a dollar figure. There have been efforts—both serious and silly—to quantify the value of privacy. Browser add-ons such as Privacyfix try to show users their value to companies, and a recent study suggested that free Internet services offer $2,600 in value to users in exchange for their data [Varian, 2013]. Privacy clearly has financial value, but in the end there are fewer people in a position to pay to secure their privacy than there are individuals willing to sell it for anything it’s worth. A recent study by the European Network and Information Security Agency discovered that most consumers will buy from a more privacy-invasive provider if that provider charges a lower price. [Jentzsch et al. 2012]. Finding the right balance between privacy risks and big data rewards may very well be the biggest public policy challenge of our time. [Rubinstein 2013: 240-242]. How should privacy risks be weighed against big data rewards? The recent controversy over leaked documents revealing the massive scope of data collection, analysis, and use by the NSA and possibly other national security organizations has hurled to the forefront of public attention the delicate balance between privacy risks and big data opportunities. [Greenwald, MacAskill 2013]. De-identification process In connection to it the process of so called de-identification grows as well. It is about a targeted and systematic interrupting of connections between our personal identity and data collected about us in the online environment or various databases and data media. We may ask companies and organizations that collected these data about us to erase them along with our activities. This initiative is more and more frequently provoked directly by companies and it is represented as a demonstration of their social responsibility related to privacy protection of their clients. Companies may promise the “maintenance of anonymity “ for their clients stating they will guarantee that collected personal data will not be spread further and they will not be sold to third parties. They may also ask a client to express his content with the use of his personal data within marketing campaigns of a 290 particular company. The process of de-identification of collected data may reduce the thread of various forms of personal data abuse. It is the internal employees of a particular company who may stand behind the abuse of personal data. However, more frequently does the thread come from external environment (e.g. attacking information systems by hackers). The abuse of sensitive personal data by internal employees might be illustrated by the unethical cooperation of some health-care facilities with tabloids. Medical staff provides journalists with information about the state of health of some celebrities, politicians or well-known personalities of public life. Regulators have justifiably concluded that strong de-identification techniques are needed to protect privacy before publicly releasing sensitive information. With publicly released datasets, experts agree that weak technical de-identification creates an unacceptably high risk to privacy. [Barth–Jones, 2012] Technical De-Identification (DEID-T) is a process through which organizations remove or obscure links between an individual’s identity and the individual’s personal information. This process involves deleting or masking personal identifiers, such as names and social security numbers, and suppressing or generalizing quasi-identifiers, such as dates of birth and zip codes. Administrative Safeguards mean all non-technical data protection tools that help prevent confidential data from becoming publicly released or improperly used. In the E.U. Directive, these safeguards are referred to as organizational measures. Nontechnical protections include two broad categories: 1) internal administrative and physical controls (internal controls) and 2) external contractual and legal protections (external controls). Internal controls encompass security policies, access limits, employee training, data segregation guidelines, and data deletion practices that aim to stop confidential [Lagos, Polonetsky 2013: 104–108] The motives of cyber attacks The methods of cyber attacks might have various technical parameters, diverse implementation difficulty and various hackers with varied experience and knowledge about this issue may stand behind them. The cyber attacks differ mostly by the motive. They might be divided into following categories: Economic motives. The main aim of the cyber attack is enrichment at the victim´s expenses – whether it is a private person, a company or an institution. Actually, it is one type of economic criminality which might be carried out in various ways – e.g. theft of access data to bank accounts, forged calls for payments, various manipulations with payment systems, etc. Activist motives. The aim of such cyber attacks is not a fraudulent proceeding or enrichment at the expenses of injured institution or a company. It is more about expressing certain opinion: it is a way ho to catch the public attention and draw it to the actions or activities of an organization/company who is the subject of a cyber attack. Most often we speak about various types of attacks on web pages of these institutions/companies. The aim is to prevent the public from the access to these web pages. What is much more important is the publicity the hackers provoke by their actions. Mainly the attacks on important public institutions and big corporations hit the headlines, TV or other traditional media. Political motives. The intentions of these cyber attacks might have diverse character. Their common denominator is the will to harm or paralyse the activities of a public institution or political party. The economic motive is not primary. A direct 291 or indirect attempt to cause economic damage to attacked institutions might be an integral part of the attack. Political motives of cyber hackers might often overlap with activist motives. Reputation motives. The primary purpose of these cyber attacks is to increase hacker’s reputation – mainly in the hackers’ community and in the public. The aim is not to get a financial advantage. Neither are the political or activist motives important. Such a cyber attack is carried out to demonstrate hacker’s abilities, reveal security deficiencies in attacked information systems, overcome complicated security barriers which seemed to be invincible, etc. Cyber criminals use various sophisticated methods of targeted attacks, use data mining, etc. They want to share mastering these new strategies with other members of hackers’ community. Conclusion Regardless the main motive of a cyber-attack it is always about violation of sensitive personal data of private persons or company data. It is only the ways how the criminal obtains them and abuses them which vary. Similar and often even more sophisticated techniques of abusing data are used by secret services and various governmental and private agencies. Cyberspace gets under the control of interest groups that might abuse the information anytime and anyway. It is more and more difficult for a common user to reveal that he/she is the object of monitoring or personal data abuse – either for the purposes of criminal actions or activities carried out by secret services performed in the name of protecting national security. Possibilities of further abuse of collected data are unlimited and uncontrollable. Literature: Literatura: Acquisti, A. et al., 'What Is Privacy Worth? ', The Journal of Legal Studies, vol. 42, no 2, pp. 249 – 274, 2013 Barth-Jones, D., 'The “Re-identification” of Governor William Weld’s Medical Information: A Critical Re-examination of Health Data Identification Risk and Privacy Protections', Then and Now, 24 July, 2012. http://dx.doi.org/10.2139/ssrn.2076397.(accessed 10 March 2014). Deibert, R., Access denied: the practice and policy of global Internet filtering. Cambridge, MIT Press, 2008 Deibert, R., and Rohozinski, R., “Beyond Denial: Introducing Next-Generation Information Access Controls” in Deibert R. et al. (ed.), Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace, Cambridge: MIT Press, 2010 , pp. 3–14. Deibert, R., 'The Growing Dark Side of Cyberspace (…and What To Do About It)', The Penn State Journal of Law & International Affairs, vol.1 no 2, 2012, pp. 260-274 Greenwald, G. and MacAskill, E., 'NSA Prism Program Taps in to User Data of Apple, Google and Others', Guardian, 7 June, 2013, http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data. (accessed 10 March 2014). 292 Jentzsch, N. et al. Study on monetising privacy. An economic model for pricing personal information. Heraklion: European Network and Information Security Agency, 2012. Lagos, Y. and Polonetsky, J., 'Public vs. Nonpublic Data: The Benefits of Administrative Controls', Stanford Law Review vol. 66 no 03, 2013, pp.103109 Lessig, L, Code and other laws of cyberspace. New York, Basic books, 1999. Murdoch, S.J. and Anderson, R., 'Tools and Technology of Internet Filtering', in Deibert R. et al. (ed.), Access Denied: The Practice and Policy of Global Internet Filtering, Cambridge, MIT Press, 2008, pp. 57–72. Rubinstein, I., 'Big Data: The End of Privacy or a New Beginning?', International Data Privacy Law, 5. October, 2012, http://dx.doi.org/10.2139/ssrn.2157659. (accessed 10 March 2014). Varian, H., 'Net Benefits: How to Quantify the Gains that the Internet Has Brought to Consumers', Economist, 9 March 2013, http://www.economist.com/news/finance-and-economics/21573091-howquantify-gains-internet-has-brought-consumers-net-benefits. (accessed 10 March 2014). Cyberspace as a place for the control and monitoring of people's privacy Summary Dynamic spread of the Internet and social networks imminently influences almost every sphere of social life. New media directly or indirectly influence the patterns of behaviour, attitudes and rhythm of everyday activities of individuals and whole social groups. Their influence might be seen on cognitive, psychomotor and affective levels. There is a wide range of segments active within social relations – starting with educational system, economics, politics, and public administration up to the working of media organizations. This paper deals with reflection on new techniques, technologies and strategies to control and monitoring of people's privacy in cyberspace. Reflection of this phenomenon in the sphere of media studies, sociology, psychology and other branches often oscillates in the range of extremely definite opinion positions that consider the increasing influence of digitalization in public and individual spheres. BEZPIECZEŃSTWO WSPÓŁCZESNEGO ŚWIATA Różne wymiary bezpieczeństwa Redakcja naukowa Magdalena Baranowska-Szczepańska Krzysztof Gajdka Wydawnictwo Wyższej Szkoły Handlu i Usług Poznań 2014 Recenzja prof. dr hab. Andrzej Kusztelak Projekt okładki Sławomir Szczepański Skład komputerowy Zbigniew Dziemianko Copyright©2014 by Wyższa Szkoła Handlu i Usług All rights reserved ISBN: 978-83-61449-49-2 Wydawnictwo Naukowe Wyższej Szkoły Handlu i Usług ul. Zwierzyniecka 13, 60-813 Poznań tel. 0-61 842 70 20 wshiu@wshiu.poznan.pl www.wshiu.poznan.pl Zakład Poligraficzny Moś i Łuczak sp.j. ul. Piwna 1 61-065 Poznań www.mos.pl Wydanie pierwsze Druk ukończono w 2014 5 SPIS TREŚCI Spis treści ……………………………………………………………………………….. 5 Wprowadzenie …………………………………………………………….……………. 9 Oliwia BECK, Mateusz ŁAKOMSKI Social security and ageing: the long-term care perspective Bezpieczeństwo socjalne i starzenie się: perspektywa opieki długoterminowej ... 13 Anna BEDNARCZYK Mobbing w miejscu pracy Mobbing in the workplaces ……………………………………………………..…….. 21 Anna CHOJANCKA-WOŹNIAK Mobbing w pracy. Bezpieczeństwo i koszty społeczne Mobbing in job. Safety and social costs ……………………………………….……. 35 Piotr DUBIŃSKI Marketing polityczny w Polsce. Mowa niewerbalna i techniczne komponenty spotów wyborczych Political marketing in Poland. Nonverbal communication and technical components of electoral spots …………………………………….……………………………….... 47 Jarosław HYŻY Ludzie ze złota i ludzie z brązu - w perspektywie ponowoczesnej komunikacji People of gold and people of bronze - in the perspective of post-modern communication …………………………………………………………………………. 57 Katarzyna Magdalena KOCZWARA, Dariusz PAŃKA Mikozy i mikotoksykozy – zagrożenia ze strony grzybów Mycoses and mycotoxicoses – threats posed by fungi …...……………………..… 75 Weronika LENARTOWICZ Zagrożenie społeczne: szariatyzacja Europy Societal threats: shariatisation of Europy ………………………………………….… 83 Renata MATUSZEWSKA, Bożena KROGULSKA, Dorota MAZIARKA Występowanie zanieczyszczeń mikrobiologicznych, w tym pałeczek Legionella, w aerozolu wodnym wytwarzanym na stanowiskach pracy The presence of microbiological contaminants, including Legionella, in water aerosol generated at the workplaces ………………………………………………… 97 6 Arkadiusz MRZYGŁÓD, Mateusz ŁAKOMSKI Zagrożenia wynikające ze stosowania magnetoterapii oraz prądów interferencyjnych dla pacjenta, w przebiegu dyskopatii odcinka lędźwiowo – krzyżowego kręgosłupa Risks resulting from using magnetotherapy and interference current for patient sufferd from degenerative disc disease (discopathy) in lumbar spine ………….. 109 Mateusz ŁAKOMSKI, Dominika GĘBKA Zagrożenia podczas zabiegów fizykalnych Potential Threats During Physical Therapy Treatment …………………………... 119 Dana PETRANOVÁ Vplyv násilných mediálnych obsahov na pocit bezpečia …………….……… 131 Marlena PLEBAŃSKA E-learning in the enterprise and its environment Wykorzystanie e-learningu w przedsiębiorstwach ………………………………... 145 Marlena PLEBAŃSKA Knowledge management students with a modern e-textbooks Zarządzanie wiedzą uczniów poprzez wykorzystanie nowoczesnych epodręczników …………………………………………………………………………. 157 Hana PRAVDOVÁ Kríza mediálnej logiky – kríza demokracie Crisis of Media Logic – Crisis of Democracy ....................................................... 167 Rudolf RYBANSKÝ, Eva BALNOVÁ Krízový manažment vo finančných inštitúciách Crisis management in financial institutions ………………………………………… 179 Maria SIWKO Bezpieczna czy niebezpieczna komunikacja interpersonalna w sieci? Safe or unsafe interpersonal communication on the net? …………………….…. 189 Anna STELIGA Bezpieczeństwo w relacjach interpersonalnych. Rysunek projekcyjny „Ja wśród ludzi” jako metoda badania społecznych aspektów obrazu siebie Security in interpersonal relations. Projection drawing “I among people” as a method of examining social aspects of one’s own image .................................. 201 Renata SUCHENEK Kryzys globalny u podłoża bezrobocia i handlu ludźmi Global crisis as the main reason for unemployment and human trafficking …… 223 7 Kamil SYGIDUS Rewolucja 2.0. Nowe media – nowa rewolucja? Media społecznościowe narzędziem działań rewolucyjnych Revolution 2.0. The new media - a new revolution? Social media as a tool of revolution ……………………………………………..……………………………….. 243 Anna WALC Kapsaicynoidy i ich wpływ na organizm ludzki Capsaicinoids and their impact on the human body ……………………………… 263 Maria WĄSICKA The (un)safe language of politics (Nie)bezpieczny język polityki.............................................................................. 271 Norbert VRABEC Cyberspace as a place for the control and monitoring of people's privacy................................................................................................................ 285 Andrzej ZIARKO Kompetencje nauczycieli w zakresie udzielania pierwszej pomocy Teachers’ competence at first aid education ………………………………………. 293 O autorach……………………………….………………………………………..….. 305 View publication stats