Internet of the 21st century – a trap of threats for children, youth and the elderly in the time of the Covid-19 pandemic
DOI:
https://doi.org/10.52934/wpz.85Keywords:
cyberspace, cybersecurity, cybercrime, chilg-grooming, digital immigrant, digital native, pandemic, phishing, sponsorship, information technology addiction, social exclusionAbstract
Information and communication technologies at the turn of the 20th and 21st centuries underwent an evolution, the use of which in the conditions of extreme exploration, as the basic medium of interpersonal communication, could be observed after the outbreak of the Covid-19 pandemic in 2020. Forced isolation, as part of the fight against the pandemic, moved socio-economic life into cyberspace. Using the Internet in many aspects has become a necessity, and the functions of cyberspace have acquired a new dimension and importance in interpersonal relations. The Cybersecurity Strategy of the Republic of Poland has become a key instrument for specialized entities dealing with cybersecurity in identifying and combating online threats. Regular use of the Internet in different age groups, which has changed over the years, reached its highest level in 2020. Minors who are so eager to use communication and information technologies, but also with a very large progress in exploring the Internet, seniors 65+ have become the groups most exposed to the traps and threats of the Internet. Through the prism of changes in the use of the Internet during the Covid-19 pandemic, resulting from the legislative activity of the Polish government, the study presents a spectrum of selected threats to which both young people and seniors were exposed to a varying degree. Percentage analysis of the number of people regularly using the Internet in individual age groups in the years 2003‒2020 in comparison with treats in cyberspace, allowed to draw conclusions about the scale and trends of threats in cyberspace resulting from the Covid-19 pandemic.
References
Adamski A., Cyberprzestępczość – aspekty prawne i kryminologiczne, Studia Prawnicze, 2005, nr 4.
Andrzejewska A., Bednarek J., Zagrożenia cyberprzestrzeni i świata wirtualnego, Warszawa 2014.
Andrzejewska A., Dzieci i młodzież w sieci zagrożeń realnych i wirtualnych. Aspekty teoretyczne i empiryczne, Warszawa 2014.
Chmielecka J., Internet złych rzeczy, Bielsko-Biała 2017.
Dąbrówka A., Geller E., Turczyn R., Słownik synonimów, Warszawa 1995.
Dunaj B. (red.), Popularny słownik języka polskiego, Warszawa 2001.
Górka M., Cyberbezpieczeństwo dzieci i młodzieży. Realny i wirtualny problem polityki bezpieczeństwa, Warszawa 2017.
https://www.katowice.uw.gov.pl/aktualnosci/akty-prawne-i-dokumenty-dotyczace- zapobiegania-przeciwdzialania-i-zwalczania-covid-19
Kosiński J., Cyberprzestępczość – przegląd wybranych szkoleń, Przegląd Policyjny, 2004, nr 3.
Kosiński J., Paradygmaty cyberprzestępczości, Warszawa 2015.
Ratajczak M., Czynności pedofilskie – ujęcie prawne i kryminologiczne, Prokuratura i Prawo, 2014, nr 2.
Snopkiewicz K., Cyberbezpieczeństwo w polskich realiach, [w:] Cyberbezpieczeństwo w polskich realiach, G. Skrobotowicz (red.), Wydawnictwo Naukowe TYGIEL, Lublin 2019.
Wasilewski J., Przegląd Bezpieczeństwa Wewnętrznego, 2013, nr 9. https://www.abw.gov.pl/pl/pbw/publikacje/przeglad%20bezpieczenstwa/987,Przeglad-Bezpieczenstwa-Wewnetrznego-nr-9-5-2013.html
Wojciechowska-Filipek S., Ciekanowski Z., Bezpieczeństwo funkcjonowania w cyberprzestrzeni, jednostki-organizacji-państwa, Warszawa 2019.
Wojtaszek K., Materska-Sosnowska A., Bezpieczeństwo państwa, Warszawa 2009.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License
that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).