THREATS FROM THE WEB AND CYBERSECURITY ISSUES FROM THE PERSPECTIVE OF PUBLIC RELATIONS PROFESSIONALS
HSS-okładka-30-2023-04 - part I
pdf

Keywords

cybersecurity
public relations
communication management
ChatGPT

How to Cite

TWORZYDŁO, D., ŻYCZYŃSKI, N., OLEXOVÁ, C., & SZUBA, P. (2023). THREATS FROM THE WEB AND CYBERSECURITY ISSUES FROM THE PERSPECTIVE OF PUBLIC RELATIONS PROFESSIONALS. Humanities and Social Sciences, 30(4 - part 1), 279-293. https://doi.org/10.7862/rz.2023.hss.58

Abstract

This article aims to evaluate the approach of the public relations (PR) industry to cybersecurity-related topics. The article is based on research results conducted by a team under the authors’ supervision. In 2022, we conducted quantitative research using the Computer-Assisted Web Interviewing technique (CAWI), and its purpose was to acquire knowledge in the field of perception and understanding of the cybersecurity topic by specialists in the public relations industry in Poland. The research results revealed several previously unexplored areas, highlighting gaps in current understanding. This research contributes new insights into the cybersecurity perceptions of PR professionals, enriching the existing body of scientific knowledge.

https://doi.org/10.7862/rz.2023.hss.58
pdf

References

Agrafiotis, I., Nurse, J.R.C., Goldsmith, M., Creese, S., Upton, D. (2018). A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. “Journal of Cybersecurity”, Vol. 4(1). DOI: 10.1093/cybsec/tyy006.

Ahmad, R., Alsmadi, I., Alhamdani, W., Tawalbeh, L. (2023). Zero-day attack detection: a systematic literature review. “Artificial Intelligence review”, Vol. 56.

Aji, G.G., Widod S., Aji, G.N., Aji, G.G., Prawitasari, D. (2023) Building trust in the digital age: How HRM and cybersecurity collaborate for effective stakeholder relations. “Management Analysis Journal”, Vol. 12(2).

Bansal, G. (2017). Distinguishing between privacy and security concerns: an empirical examination and scale validation. “Journal of Computer Information Systems”, Vol. 57(4).

Commetric. (2023). Is Banking´s Crisis PR Stuck in the Stone Age? Why Media Analytics is Crucial for Today´s Cybersecurity Challenges. Access on the internet: https://commetric.com/2023/09/18/is-bankings-crisis-pr-stuck-in-the-stone-age-why-media-analytics-is-crucial-for-todays-cybersecurity-challenges/.

Chałubińska-Jentkiewicz, K. (2019). Cyberbezpieczeństwo – zagadnienia definicyjne. “Cybersecurity and Law”, Vol. 2(2).

Craigen, D., Diakun-Thibault, N., Purse, R. (2014). Defining Cybersecurity. “Technology Innovation Management Review”, Vol. 4(10).

Franco, M.F., Lacerda, F.M., Stiller, B. (2022). A Framework for the planning and management of cybersecurity projects in small and medium-sized enterprises. “Revista de Gestão e Projetos”, Vol. 13(3).

Gaule, H. (2023). Artificial Intelligence in Public Relations and Communication: An Approach for Integrating AI Education into Communications Curricula [In:] Adi, A., ed., Artificial Intelligence in Public Relations and Communications: cases, reflections and predictions. Berlin: Quadriga University of Applied Sciences.

Hoffmann, T. (2018). Główni aktorzy cyberprzestrzeni i ich działalność [in:] Dębowski T., ed., Cyberbezpieczeństwo wyzwaniem XXI wieku. Łódź–Wrocław: ArchaeGraph.

Hu, T., Wang, K.-Y., Chih, W., Yang, X.-H. (2018). Trade off Cybersecurity Concerns for Co-Created Value. “Journal of Computer Information Systems”, Vol. 60(5).

Janczewski, R. (2022). Cyberbezpieczeństwo w życiu społecznym [In:] Stala, J., Butrymowicz, M., ed., W służbie społeczeństwu. Polska w obronie praw człowieka na świecie i w kraju. Kraków: Wydawnictwo Naukowe UPJPII.

Kaczmarczyk, B., Dobrowolski, P., Dąbrowska, M. (2018). Wybrane aspekty edukacji dla bezpieczeństwa. Toruń: Wydawnictwo Adam Marszałek.

Kemmerer, R.A. (2003). Cybersecurity. Portland: 25th International Conference on Software Engineering.

Kim, N., Lee, S. (2018). Cybersecurity Breach and Crisis Response: An Analysis of Organizations’ Official Statements in the United States and South Korea. “International Journal of Business Communication”, 58(4).

Knight, R., Nurse, J.R.C. (2020). A framework for effective corporate communication after cyber security incidents. “Computers & Security”, Vol. 99.

Korzeniowska, H. (2004). Edukacja dla bezpieczeństwa w systemie oświatowym Europy na przykładzie Polski i Słowacji. Kraków: European Association for Security.

Krawczyk-Sokołowska, I., Caputa, W. (2023). Awareness of network security and customer value – The company and customer perspective. “Technological Forecasting & Social Change”, Vol. 190.

Li, Y. (2011). Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework. “Communications of the Association for Information Systems”, 28(1).

McGregor, R., Reaiche, C., Boyle, S., de Zunielqui, G.C. (2023). Cyberspace and Personal Cyber Insurance: A Systematc Review. “Journal of Computer Information Systems”. DOI: 10.1080/08874417.2023.2185551.

Mijwil, M.M., Aljanabi, M., Hussein, A. Ali (2023). ChatGPT: Exploring the Role of Cybersecurity in the Protection of MedicalInformation. “Mesopotamian Journal of CyberSecurity”. DOI: 10.58496/MJCS/2023/004.

Nguyen, D. (2023). How news media frame data risks in their coverage of big data and AI. “Internet Policy Review”, Vol 12(2). DOI: 10.14763/2023.2.1708.

Piecuch, I. (2020). Cyberbezpieczeństwo w czasach kryzysu. „Nowa Energia”, Vol. 4(74).

Radhi, M.A.H., Hussien, N.M., Mohialden, Y.M. (2023). Reviewing Organized Crime:

A Global Perspective on Cyber Security. “Scientific Research Journal of Engineering and Computer Science”, Vol. 3(4).

Sarabi, A., Naghizadeh, P., Liu, Y., Liu, M. (2016). Risky business: Fine-grained data breach prediction using business profiles. “Journal of Cybersecurity”, Vol. 2(1).

Veale, M., Brown, I. (2020). Cybersecurity. “Internet Policy Review”, Vol. 9(4).

Vestad, A., Yang, B. (2023). Municipal Cybersecurity – A Neglected Research Area? A Survey of Current Research [In:] Onwubiko, C. et al., ed., Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media. Singapore: Springer Proceedings in Complexity.

All texts published in the journal Humanities and Social Sciences are available in the full version on the website of HSS.

Open Access – CC BY 4.0

This is an open access journal which means that all content is freely available without charge to the user or his/her institution. The articles are published under the terms of the Creative Commons licence (CC-BY 4.0), including the following fields of exploitation comprising:

1) the right to publish the Work in print in book and digital form and to distribute it in book and digital form, including by displaying, playing, broadcasting, making it publicly available by the Publisher and third parties,

2) the right to record and reproduce all or part of the Work on paper and in the form of a digital record and in any other possible way by the Publisher,

3) the right to enter the Work into computer memory and save the Work in the IT systems of the Publisher and other entities distributing digital content,

4) the right to archive the Work and make copies of the Work on electronic media by the Publisher, without quantitative restrictions,

5) the right to digitise the Work and to perform conversions/transformations of the Work in electronic form into other digital formats by the Publisher and third parties,

6) the right to distribute the Work, including via the Internet or other ICT networks by the Publisher and other third parties, in a way that allows viewing, reading, copying the content of the Work in electronic form, i.e. all elements belonging to it, whereby copying shall be understood as the saving of the Work made available to an interested person on a medium of their choice,

7) the right to store the Work in the database of the Publisher and other entities distributing the Work in any form, as well as its processing in the database of the Publisher and third parties,

8) right to translate and publish the Work in one of the modern languages in any form by the Publisher and third parties.

The full text of the license is available at the following link: https://creativecommons.org/licenses/by/4.0/deed.en