Modern Management Review
(dawna nazwa: Zarządzanie i Marketing)
27 (1/2020), DOI: 10.7862/rz.2020.mmr.4
NO SECURITY OF INFORMATION TECHNOLOGY
Justyna LIPIŃSKA
DOI: 10.7862/rz.2020.mmr.4
Abstract
Using the Internet is inseparably connected with building the awareness of its users, hence the
tasks that arise for a modern man in relation to information technologies, especially in terms
of online threats. Children are particularly vulnerable. The most common threats include:
contact with pornographic content, contact with violent materials, contact with pedophiles,
internet addiction, contact with online cheaters, unconscious participation in illegal activities,
financial consequences, unconscious disclosure of information. The purpose of the article was
to indicate tasks for parents along with identification of dangerous situations affecting
children's behavior. Readers will also learn about forms of sexual abuse of children on the
Internet and methods of filtering Internet content. The adopted research method is a qualitative
analysis supported by the retrospective analysis technique.
References
- Barabach, M., www.junior.dialog.
- Calcetas-Santos, O. (2001). United Nations Documents Index: April-June, Vol. 4, Edition 1, Part 2.
- http://statystyka.policja.pl/st/kodeks-karny.
- https://depot.ceon.pl/bitstream/handle/123456789/3651/Toczyski-Jak-bardzo-niebezpieczny-jest-internet-2008.pdf?sequence=1&isAllowed=y.
- https://szkolnictwo.pl/.
- https://www.enisa.europa.eu/publications/CyberBullying%20and%20Online%20Groomin
- Jenkins, P. (2001). Child Pornography on the Internet, Access on the internet:
http://www.ncdsv.org/images/COPS_Child-Pornography-on-the-Internet_5-2006.pdf. - Pastuch, J., www.junior.dialog.
- Raport Fundacji „Dzieci Niczyje”: Pedofilia i pornografia dziecięca w Internecie – Ł. Wojtasik.
- Spiegel, J. (2003). Sexual Abuse of Males: The SAM Model of Theory and Practice. NY: Brunner-Routledge.
- Taylor, M. (2002). The role of cognitive distortions in paedophilic offending: Internet and
contact offenders compared. Access on the internet: https://www.tandfonline.com/doi/abs/ 10.1080/10683160601060564?scroll=top&needAccess=true&journalCode=gpcl20. - Wortal Jana Pawła II Wielkiego – Pokolenie JP2, http://www.jp2w.pl/pl/42118/.
About this Article
TITLE:
NO SECURITY OF INFORMATION TECHNOLOGY
AUTHORS:
Justyna LIPIŃSKA
AUTHORS AFFILIATIONS:
The Faculty of Management and Command, The War Studies University, l. gen. A. Chruściela „Montera” 103, 00-910 Warszawa-Rembertów.
JOURNAL:
Modern Management Review
27 (1/2020)
KEY WORDS AND PHRASES:
information technologies, Internet threats, child pornography on the Internet.
FULL TEXT:
http://doi.prz.edu.pl/pl/pdf/zim/412
DOI:
10.7862/rz.2020.mmr.4
URL:
http://dx.doi.org/10.7862/rz.2020.mmr.4
COPYRIGHT:
Oficyna Wydawnicza Politechniki Rzeszowskiej, al. Powstańców Warszawy 12, 35-959 Rzeszów