{"id":3014,"date":"2024-06-30T17:02:17","date_gmt":"2024-06-30T15:02:17","guid":{"rendered":"https:\/\/ewspa.edu.pl\/e-czasopismo\/nr-nr-1-2\/wyzwania-i-zagrozenia-dla-edukacji-o-bezpieczenstwie-w-dobie-spoleczenstwa-cyfrowego-wnioski-z-analizy-polskiego-systemu-edukacyjnego\/"},"modified":"2024-07-03T19:56:35","modified_gmt":"2024-07-03T17:56:35","slug":"wyzwania-i-zagrozenia-dla-edukacji-o-bezpieczenstwie-w-dobie-spoleczenstwa-cyfrowego-wnioski-z-analizy-polskiego-systemu-edukacyjnego","status":"publish","type":"e-czasopismo","link":"https:\/\/ewspa.edu.pl\/en\/e-czasopismo\/nr-nr-1-2\/wyzwania-i-zagrozenia-dla-edukacji-o-bezpieczenstwie-w-dobie-spoleczenstwa-cyfrowego-wnioski-z-analizy-polskiego-systemu-edukacyjnego\/","title":{"rendered":"Challenges and Threats to Safety Education in the Age of Digital Society. Analysis and conclusions based on the Polish education system"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Abstract<\/h3>\n\n\n\n<p>The article presents the challenges faced by safety education in the world of threats posed by the emergence of digital society. As many researchers have already pointed out, the present-day changes associated with technological development affect all areas of life, including ways of making transactions (widespread use of cashless payments) and the acquisition and protection of data. The article defines the notion of digital society, and discusses a few selected threats related thereto. In this context, the authors referred to the need to educate the society in order to prepare it for those new challenges and threats. Special emphasis was placed on the curriculum of primary and secondary schools in Poland.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">References<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Chayko M. (2017), Superconnected: the Internet, digital media, &amp; techno-social life, Thousand Oaks, CA, Sage. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Chayko M. (2017), Superconnected: the Internet, digital media, &amp; techno-social life, Thousand Oaks, CA, Sage.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Chinowski B. (2013), Elektroniczne metody p\u0142atno\u015bci. Istota, rozw\u00f3j, prognoza. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Chinowski B. (2013), Elektroniczne metody p\u0142atno\u015bci. Istota, rozw\u00f3j, prognoza.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Poradnik klienta us\u0142ug finansowych, Komisja Nadzoru Finansowego, Warszawa. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Poradnik klienta us\u0142ug finansowych, Komisja Nadzoru Finansowego, Warszawa.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>CIA, INTellingence: Open Source Intelligence, available: <a href=\"https:\/\/www.cia.gov\/news-information\/featured-story-archive\/2010-featured-story-archive\/open-source-in-telligence.html\">https:\/\/www.cia.gov\/news-information\/featured-story-archive\/2010-featured-story-archive\/open-source-in-telligence.html<\/a> [20.05.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22CIA, INTellingence: Open Source Intelligence, available: <a href=&quot;https:\/\/www.cia.gov\/news-information\/featured-story-archive\/2010-featured-story-archive\/open-source-in-telligence.html&quot;&gt;https:\/\/www.cia.gov\/news-information\/featured-story-archive\/2010-featured-story-archive\/open-source-in-telligence.html<\/a&gt; [20.05.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Gospodarowicz A.(2005), Bankowo\u015b\u0107 elektroniczna, PWE, Warszawa. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Gospodarowicz A.(2005), Bankowo\u015b\u0107 elektroniczna, PWE, Warszawa.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.policja.pl\/pol\/aktualnosci\/11364,Co-to-jest-skimming.html\">http:\/\/www.policja.pl\/pol\/aktualnosci\/11364,Co-to-jest-skimming.html<\/a> [25.02.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22<a href=&quot;http:\/\/www.policja.pl\/pol\/aktualnosci\/11364,Co-to-jest-skimming.html&quot;&gt;http:\/\/www.policja.pl\/pol\/aktualnosci\/11364,Co-to-jest-skimming.html<\/a&gt; [25.02.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/bankomania.pkobp.pl\/finanse-na-co-dzien\/bezpieczenstwo\/skimming-jak-sie-przed-nim-chronic\/\">https:\/\/bankomania.pkobp.pl\/finanse-na-co-dzien\/bezpieczenstwo\/skimming-jak-sie-przed-nim-chronic\/<\/a> [12.02.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22<a href=&quot;https:\/\/bankomania.pkobp.pl\/finanse-na-co-dzien\/bezpieczenstwo\/skimming-jak-sie-przed-nim-chronic\/&quot;&gt;https:\/\/bankomania.pkobp.pl\/finanse-na-co-dzien\/bezpieczenstwo\/skimming-jak-sie-przed-nim-chronic\/<\/a&gt; [12.02.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/bitdefender.pl\/phishing-co-to-jest-i-czy-potrafisz-go-rozpoznac\/\">https:\/\/bitdefender.pl\/phishing-co-to-jest-i-czy-potrafisz-go-rozpoznac\/<\/a> [02.02.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22<a href=&quot;https:\/\/bitdefender.pl\/phishing-co-to-jest-i-czy-potrafisz-go-rozpoznac\/&quot;&gt;https:\/\/bitdefender.pl\/phishing-co-to-jest-i-czy-potrafisz-go-rozpoznac\/<\/a&gt; [02.02.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/mobirank.pl\/2018\/06\/08\/kim-sa-uzytkownicy-social-mediow-w-polsce-maj-2018\/\">https:\/\/mobirank.pl\/2018\/06\/08\/kim-sa-uzytkownicy-social-mediow-w-polsce-maj-2018\/<\/a> [04.02.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22<a href=&quot;https:\/\/mobirank.pl\/2018\/06\/08\/kim-sa-uzytkownicy-social-mediow-w-polsce-maj-2018\/&quot;&gt;https:\/\/mobirank.pl\/2018\/06\/08\/kim-sa-uzytkownicy-social-mediow-w-polsce-maj-2018\/<\/a&gt; [04.02.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.nbp.pl\/\">https:\/\/www.nbp.pl\/<\/a> [28.02.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22<a href=&quot;https:\/\/www.nbp.pl\/&quot;&gt;https:\/\/www.nbp.pl\/<\/a&gt; [28.02.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.nbp.pl\/systemplatniczy\/karty\/q_04_2018.pdf\">https:\/\/www.nbp.pl\/systemplatniczy\/karty\/q_04_2018.pdf<\/a> [15.02.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22<a href=&quot;https:\/\/www.nbp.pl\/systemplatniczy\/karty\/q_04_2018.pdf&quot;&gt;https:\/\/www.nbp.pl\/systemplatniczy\/karty\/q_04_2018.pdf<\/a&gt; [15.02.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Jakubski K. J., Bezpieczna karta? [in:] J. Kosi\u0144ski (ed.): Przest\u0119pczo\u015b\u0107 z wykorzystaniem elektronicznych instrument\u00f3w p\u0142atniczych (2006), Wydawnictwo Wy\u017cszej Szko\u0142y Policji w Szczytnie, Szczytno. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Jakubski K. J., Bezpieczna karta? [in:] J. Kosi\u0144ski (ed.): Przest\u0119pczo\u015b\u0107 z wykorzystaniem elektronicznych instrument\u00f3w p\u0142atniczych (2006), Wydawnictwo Wy\u017cszej Szko\u0142y Policji w Szczytnie, Szczytno.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Koops Bert-Jaan, Leenes Ronald (2006), ID Theft, ID Fraud and\/or ID-related Crime. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Koops Bert-Jaan, Leenes Ronald (2006), ID Theft, ID Fraud and\/or ID-related Crime.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Definitions matter, Datenschutz und Datensicherheit \u2013 DuD, September. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Definitions matter, Datenschutz und Datensicherheit \u2013 DuD, September.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Kuchci\u0144ski A. (2013), Rynek kart p\u0142atniczych w Polsce, Akademia Finans\u00f3w i Biznesu Vistula \u2013 Warszawa, \u201eKwartalnik Naukowy Uczelni Vistula\u201d, 4 (38). <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Kuchci\u0144ski A. (2013), Rynek kart p\u0142atniczych w Polsce, Akademia Finans\u00f3w i Biznesu Vistula \u2013 Warszawa, \u201eKwartalnik Naukowy Uczelni Vistula\u201d, 4 (38).%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Kukulski J. (2002), Aspekty prawne bankowych kart p\u0142atniczych w polskim systemie pieni\u0119\u017cnym, Wyd. Kodeks Sp. z. o. o., Warszawa. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Kukulski J. (2002), Aspekty prawne bankowych kart p\u0142atniczych w polskim systemie pieni\u0119\u017cnym, Wyd. Kodeks Sp. z. o. o., Warszawa.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Livingstone, S., Haddon, L., G\u00f6rzig, A. &amp; \u00d3lafsson, K. (2011). Risks and safety on the internet: The perspective of European children. Full findings. LSE, London, EU Kids Online. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Livingstone, S., Haddon, L., G\u00f6rzig, A. &amp; \u00d3lafsson, K. (2011). Risks and safety on the internet: The perspective of European children. Full findings. LSE, London, EU Kids Online.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>London School of Economics, Livingstone S., Blum-Ross A., Zhang D., (2018), What do parents think, and do, about their children\u2019s online privacy? Parenting for a Digital Future: Survey Report 3, London School of Economics, <a href=\"http:\/\/eprints.lse.ac.uk\/87954\/1\/Livingstone_Parenting%20Digital%20Survey%20Report%203_\">http:\/\/eprints.lse.ac.uk\/87954\/1\/Livingstone_Parenting%20Digital%20Survey%20Report%203_<\/a> Published.pdf [05.05.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22London School of Economics, Livingstone S., Blum-Ross A., Zhang D., (2018), What do parents think, and do, about their children\u2019s online privacy? Parenting for a Digital Future: Survey Report 3, London School of Economics, <a href=&quot;http:\/\/eprints.lse.ac.uk\/87954\/1\/Livingstone_Parenting%20Digital%20Survey%20Report%203_&quot;&gt;http:\/\/eprints.lse.ac.uk\/87954\/1\/Livingstone_Parenting%20Digital%20Survey%20Report%203_<\/a&gt; Published.pdf [05.05.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Lorek M. (2018), Wyzwania stoj\u0105ce przed edukacj\u0105 dla bezpiecze\u0144stwa w dobie spo\u0142ecze\u0144stwa informacyjnego, \u201eEdukacja \u2013 Technika \u2013 Informatyka\u201d no. 2 (24), Wydawnictwo UR. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Lorek M. (2018), Wyzwania stoj\u0105ce przed edukacj\u0105 dla bezpiecze\u0144stwa w dobie spo\u0142ecze\u0144stwa informacyjnego, \u201eEdukacja \u2013 Technika \u2013 Informatyka\u201d no. 2 (24), Wydawnictwo UR.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Majdan P. (2018), Wp\u0142yw dezinformacji i propagandy na geopolityk\u0119 w regionie Europy Wschodniej [in:] Paulina Szymczyk, Kamil Maci\u0105g (eds.), Cz\u0142owiek a technologia cyfrowa \u2013 przegl\u0105d aktualnych doniesie\u0144, Wydawnictwo Naukowe TYGIEL, Lublin. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Majdan P. (2018), Wp\u0142yw dezinformacji i propagandy na geopolityk\u0119 w regionie Europy Wschodniej [in:] Paulina Szymczyk, Kamil Maci\u0105g (eds.), Cz\u0142owiek a technologia cyfrowa \u2013 przegl\u0105d aktualnych doniesie\u0144, Wydawnictwo Naukowe TYGIEL, Lublin.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Manning, J. (2014), Social media, definition and classes of [in:] K. Harvey (ed.), Encyclopedia of social media and politics, Thousand Oaks, CA: Sage. Miko\u0142ajczyk K. (2014), Przest\u0119pstwa z wykorzystaniem bankowo\u015bci elektronicznej \u2013 skimming, \u201ePrzegl\u0105d Bezpiecze\u0144stwa Wewn\u0119trznego\u201d, 6 (10). <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Manning, J. (2014), Social media, definition and classes of [in:] K. Harvey (ed.), Encyclopedia of social media and politics, Thousand Oaks, CA: Sage. Miko\u0142ajczyk K. (2014), Przest\u0119pstwa z wykorzystaniem bankowo\u015bci elektronicznej \u2013 skimming, \u201ePrzegl\u0105d Bezpiecze\u0144stwa Wewn\u0119trznego\u201d, 6 (10).%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Molotokien\u0117 E. (2020), The transformation of narrative identity into digital identity: challenges and perspectives, \u201eColloquium\u201d, 2 (38). <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Molotokien\u0117 E. (2020), The transformation of narrative identity into digital identity: challenges and perspectives, \u201eColloquium\u201d, 2 (38).%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>NBP (2021), National Bank of Poland, Information on payment cards Q3 2020, Payment Systems Department, Warszawa. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22NBP (2021), National Bank of Poland, Information on payment cards Q3 2020, Payment Systems Department, Warszawa.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>NBP (2019), National Bank of Poland, Information on payment cards IV quarter 2018, Payment System Department, Warsaw. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22NBP (2019), National Bank of Poland, Information on payment cards IV quarter 2018, Payment System Department, Warsaw.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Paul P. K., Aithal P. S. (2018), Digital Society: It\u2019s Foundation and Towards an Interdisciplinary Field, Advances in Information Technology, Management, Social Sciences and Education December. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Paul P. K., Aithal P. S. (2018), Digital Society: It\u2019s Foundation and Towards an Interdisciplinary Field, Advances in Information Technology, Management, Social Sciences and Education December.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Pieczywok A. (2011), Wybrane problemy z zakresu edukacji dla bezpiecze\u0144stwa. Konteksty, zagro\u017cenia, wyzwania, AON, Warszawa. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Pieczywok A. (2011), Wybrane problemy z zakresu edukacji dla bezpiecze\u0144stwa. Konteksty, zagro\u017cenia, wyzwania, AON, Warszawa.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Rabong M. (2013), Stan rozwoju obrotu bezgot\u00f3wkowego w Polsce na tle innych kraj\u00f3w UE [in:] Helena \u017bukowska, Marian \u017bukowski (eds.), Obr\u00f3t bezgot\u00f3wkowy w Polsce, Wydawnictwo KUL Lublin 2013. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Rabong M. (2013), Stan rozwoju obrotu bezgot\u00f3wkowego w Polsce na tle innych kraj\u00f3w UE [in:] Helena \u017bukowska, Marian \u017bukowski (eds.), Obr\u00f3t bezgot\u00f3wkowy w Polsce, Wydawnictwo KUL Lublin 2013.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Redshaw T. (2018), What is digital society? Reflections on the aims and purpose of digital sociology, University of Salford, UK, SAGE Publications. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Redshaw T. (2018), What is digital society? Reflections on the aims and purpose of digital sociology, University of Salford, UK, SAGE Publications.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Steele R.D. (2006), Open Source Intelligence. \/\/ Handbook of Intelligence Studies \/Johnson, Loch K. (ed.). New York, Routledge. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Steele R.D. (2006), Open Source Intelligence. \/\/ Handbook of Intelligence Studies \/Johnson, Loch K. (ed.). New York, Routledge.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Svalastog A., Donev D., Jahren Kristoffersen N., Gajovi\u0107 S. (2017), Concepts and definitions of health and health-related values in the knowledge landscapes of the digital society, Croat Med. J., Dec. 58(6). <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Svalastog A., Donev D., Jahren Kristoffersen N., Gajovi\u0107 S. (2017), Concepts and definitions of health and health-related values in the knowledge landscapes of the digital society, Croat Med. J., Dec. 58(6).%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Szymczykiewicz R., Czym jest skimming, available: <a href=\"https:\/\/www.infor.pl\/prawo\/prawo-karne\/przestepstwa-komputerowe\/298321,Czym-jest-skimming.html\">https:\/\/www.infor.pl\/prawo\/prawo-karne\/przestepstwa-komputerowe\/298321,Czym-jest-skimming.html<\/a> [19.02.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Szymczykiewicz R., Czym jest skimming, available: <a href=&quot;https:\/\/www.infor.pl\/prawo\/prawo-karne\/przestepstwa-komputerowe\/298321,Czym-jest-skimming.html&quot;&gt;https:\/\/www.infor.pl\/prawo\/prawo-karne\/przestepstwa-komputerowe\/298321,Czym-jest-skimming.html<\/a&gt; [19.02.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>VSNU, The Digital Society \u2013 September 5, 2016, available: <a href=\"https:\/\/www.thedigitalsociety.info\/wp-content\/uploads\/2018\/04\/VSNU-The-Digital-Society.pdf\">https:\/\/www.thedigitalsociety.info\/wp-content\/uploads\/2018\/04\/VSNU-The-Digital-Society.pdf<\/a> [10.02.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22VSNU, The Digital Society \u2013 September 5, 2016, available: <a href=&quot;https:\/\/www.thedigitalsociety.info\/wp-content\/uploads\/2018\/04\/VSNU-The-Digital-Society.pdf&quot;&gt;https:\/\/www.thedigitalsociety.info\/wp-content\/uploads\/2018\/04\/VSNU-The-Digital-Society.pdf<\/a&gt; [10.02.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Wilk A., Kradzie\u017c to\u017csamo\u015bci. Research report, Fellowes, Biuro Informacji Kredytowej, <a href=\"https:\/\/archiwum.giodo.gov.pl\/pl\/file\/6594\">https:\/\/archiwum.giodo.gov.pl\/pl\/file\/6594<\/a> [01.06.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Wilk A., Kradzie\u017c to\u017csamo\u015bci. Research report, Fellowes, Biuro Informacji Kredytowej, <a href=&quot;https:\/\/archiwum.giodo.gov.pl\/pl\/file\/6594&quot;&gt;https:\/\/archiwum.giodo.gov.pl\/pl\/file\/6594<\/a&gt; [01.06.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Wojciechowska-Filipek (2010), Technologia informacyjna w us\u0142ugach bankowo\u015bci elektronicznej, Difin, Warszawa. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Wojciechowska-Filipek (2010), Technologia informacyjna w us\u0142ugach bankowo\u015bci elektronicznej, Difin, Warszawa.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>W\u00f3jcicka K., Karty p\u0142atnicze w Polsce, available: <a href=\"https:\/\/www.knf.gov.pl\/knf\/pl\/komponenty\/img\/Wojcicka_Karty_platnicze_w_Polsce.pdf\">https:\/\/www.knf.gov.pl\/knf\/pl\/komponenty\/img\/Wojcicka_Karty_platnicze_w_Polsce.pdf<\/a> [10.02.2021]. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22W\u00f3jcicka K., Karty p\u0142atnicze w Polsce, available: <a href=&quot;https:\/\/www.knf.gov.pl\/knf\/pl\/komponenty\/img\/Wojcicka_Karty_platnicze_w_Polsce.pdf&quot;&gt;https:\/\/www.knf.gov.pl\/knf\/pl\/komponenty\/img\/Wojcicka_Karty_platnicze_w_Polsce.pdf<\/a&gt; [10.02.2021].%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n\n\n\n<li>Zajda M. (2003), Prawno-kryminalistyczne aspekty przest\u0119pczo\u015bci z u\u017cyciem elektronicznych instrument\u00f3w p\u0142atniczych, Szko\u0142a Policji w S\u0142upsku, S\u0142upsk. <a href=\"https:\/\/scholar.google.com\/scholar?as_q=%22Zajda M. (2003), Prawno-kryminalistyczne aspekty przest\u0119pczo\u015bci z u\u017cyciem elektronicznych instrument\u00f3w p\u0142atniczych, Szko\u0142a Policji w S\u0142upsku, S\u0142upsk.%22\" target=\"_blank\" rel=\"noreferrer noopener\">[Google Scholar]<\/a><\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Most read articles by the same author(s)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Urszula Sta\u015bkiewicz, <a href=\"https:\/\/ewspa.edu.pl\/en\/e-czasopismo\/nr-1\/kaitseliit-estonian-civilian-organization-working-for-state-defence-and-population-security\/\">Kaitseliit \u2013 esto\u0144ska organizacja cywilna dzia\u0142aj\u0105ca na rzecz obronno\u015bci pa\u0144stwa i bezpiecze\u0144stwa ludno\u015bci <\/a>, <a href=\"https:\/\/ojs.academicon.pl\/eppism\/issue\/view\/563\">Europejski Przegl\u0105d Prawa i S<\/a><a href=\"https:\/\/ewspa.edu.pl\/en\/e-czasopismo\/nr-1\/\">t<\/a><a href=\"https:\/\/ojs.academicon.pl\/eppism\/issue\/view\/563\">osunk\u00f3w Mi\u0119dzynarodowych: Nr 1 (2024)<\/a><\/li>\n<\/ul>\n","protected":false},"featured_media":0,"parent":2797,"menu_order":0,"template":"","categories":[18],"class_list":["post-3014","e-czasopismo","type-e-czasopismo","status-publish","hentry","category-artykul-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/ewspa.edu.pl\/en\/wp-json\/wp\/v2\/e-czasopismo\/3014"}],"collection":[{"href":"https:\/\/ewspa.edu.pl\/en\/wp-json\/wp\/v2\/e-czasopismo"}],"about":[{"href":"https:\/\/ewspa.edu.pl\/en\/wp-json\/wp\/v2\/types\/e-czasopismo"}],"up":[{"embeddable":true,"href":"https:\/\/ewspa.edu.pl\/en\/wp-json\/wp\/v2\/e-czasopismo\/2797"}],"wp:attachment":[{"href":"https:\/\/ewspa.edu.pl\/en\/wp-json\/wp\/v2\/media?parent=3014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ewspa.edu.pl\/en\/wp-json\/wp\/v2\/categories?post=3014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}