Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1052))

  • 527 Accesses

Abstract

The aim of the article is to present the issues of security of enterprise information resources in cyberspace as key intangible assets conditioning its development and competitiveness. The implementation of this aim is based on a literature analysis and conducted surveys among companies operating in both the private and public sectors in Poland. In this survey have participated thirty one enterprises classified according to the type of the industry in which they operate and the size of enterprises measured by the number of employees employed in them. The research covered enterprises belonging to the IT sector and companies that do not provide typical IT services, but are active in many industries like investment, banking, logistics, car, bicycle, clothing, cosmetics, aviation and catering as well as in real estate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Barnett, M.L., Jermier, J.M., Lafferty, B.A.: Corporate reputation: the definitional landscape. Corp. Reput. Rev. 9(1), 26–38 (2006)

    Article  Google Scholar 

  2. Cavelty-Dunn, M.: Cyber-Security and Threat Politics. US Efforts to Secure the Information Age, London (2008)

    Google Scholar 

  3. Chmielewski, Z.: Polityka publiczna w zakresie ochrony cyberprzestrzeni w UE i państwach członkowskich. Studia z Polityki Publicznej 10(2), 103–128 (2016)

    Google Scholar 

  4. Department of Defense Dictionary of Military and Associated Terms. https://fas.org/irp/doddir/dod/jp1_02.pdf. Accessed 1 Apr 2019

  5. Dyer, J., Gregersen, H., Christensen, C.M.: DNA innowatora. ICAN Institute Warszawa (2012)

    Google Scholar 

  6. Gibson, W.: Neuromancer, Katowice, Wyd. Książnica (2009). (tłum. P. Cholewa)

    Google Scholar 

  7. Gwoździewicz, S., Tomaszycki, K.: Prawne i społeczne aspekty cyberbezpieczeństwa, Warszawa (2017). (Międzynarodowy Instytut Innowacji « Nauka – Edukacja – Rozwój » w Warszawie 2017)

    Google Scholar 

  8. Kowalewski, J., Kowalewski, M.: Zagrożenia informacji w cyberprzestrzeni, Cyberterroryzm, Oficyna Wydawnicza PW, Warszawa (2017)

    Google Scholar 

  9. Koziej, S.: Bezpieczeństwo: istota, podstawowe kategorie i historyczna ewolucja, Biuro Bezpieczeństwa Narodowego, Warszawa (2011)

    Google Scholar 

  10. Madej, M., Terlikowski, M.: Bezpieczeństwo teleinformatyczne państwa, Warszawa (2009)

    Google Scholar 

  11. Meyer B.: Informacja w procesie obsługi ruchu turystycznego. Ekonomiczne Problemy Turystyki (7) (2006)

    Google Scholar 

  12. Mynarski, S.: Elementy teorii systemów i cybernetyki. PWE, Warszawa (1979)

    Google Scholar 

  13. Strategia Cyberbezpieczeństwa RP na lata 2017–2022 (Cybersecurity Strategy of the Republic of Poland for 2017–2022). https://www.gsmservice.pl/19333,Strategia_Cyberbezpieczenstwa_RP_na_lata_2017__2022news.html. Accessed 11 May 2019

  14. Tarkowski, A.: Internet jako technologia i wyobrażenie. Co robimy z technologią, co technologia robi z nami? In: Marody, M., Nowak, A. (eds.) Społeczna przestrzeń Internetu. Wydawnictwo Szkoły Wyższej Psychologii Społecznej “Academica”, Warszawa (2006)

    Google Scholar 

  15. Wójcik, A.: System Zarządzania Bezpieczeństwem Informacji zgodny z ISO/IEC 27001 (cz. 1). https://www.zabezpieczenia.com.pl/ochrona-informacji/system-zarz%C4%85dzaniabezpiecze%C5%84stwem-informacji-zgodny-z-isoiec-27001-cz-1. Accessed 14 May 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Danuta Seretna-Sałamaj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dereń, A., Seretna-Sałamaj, D., Skonieczny, J., Kondracka, Z. (2020). Security of Enterprise Information Resources in Cyberspace. In: Wilimowska, Z., Borzemski, L., Świątek, J. (eds) Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology – ISAT 2019. ISAT 2019. Advances in Intelligent Systems and Computing, vol 1052. Springer, Cham. https://doi.org/10.1007/978-3-030-30443-0_24

Download citation

Publish with us

Policies and ethics