Zapraszam na debatę wokół książki „Sztuka wywiadu” prof. Z. Siemiątkowskiego o naturze pracy wywiadowczej, analizie strategicznej i roli służb specjalnych w systemie bezpieczeństwa państwa.
📅 10 marca 2026
#wywiad #bezpieczeństwo #studiastrategiczne #UW
Posts by Prof. Aleksandra Gasztold
A must-read, highly recommended by the editor-in-chief.
Cover illustration of ACIG Vol. 4, No. 1; wide band of warm-coloured lines forming a male and a female profiles against a dark blue background, along with the journal’s title and metadata. Below there is a caption “Latest issue now complete,” at the top the logos of ACIG and NASK can be seen.
Dear readers,
We are happy to announce that following the publication of the letter from our Editor-in-Chief, volume 4 of ACIG is now complete. Read the introduction to our latest issue by @agasztold.bsky.social, revisit its contents and stay tuned for this year’s papers! tinyurl.com/36aynbd7
Okładka poradnika cyberbezpieczeństwo dla seniorów.
Polecam lekturę poradnika „Halo! Tu cyberbezpieczny senior. Nie zadzierAI ze mną” przygotowanego przez NASK. Publikacja wyjaśnia mechanizmy działania współczesnych technologii cyfrowych, opisuje typowe metody oszustw internetowych oraz przedstawia praktyczne strategie ochrony danych i prywatności.
Call for papers 2026. Submission deadline: September 30, 2026. In the upper right corner there is a designation “2026 Volume 5, No. 1” on a teal background. At the top of the image the logos of ACIG and NASK can be seen. A human hand holding a loudspeaker emerges from behind the bottom edge of the illustration.
📢 Call for Papers
Applied Cybersecurity & Internet Governance – an #openAccess, peer-reviewed scholarly journal dedicated to multidisciplinary research on #cybersecurity – is now accepting submissions for the 2026 issue.
Author guidelines are available on the ACIG website: tinyurl.com/277nh5yg
Jasper Uyi Egbobamwonyi-Bedaux, “Problematisation Analytics: New Foucauldian Direction in Theory and Method for Cybersecurity and AI Governance Research.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
🚨 New article available!
In his new paper aiming at developing a holistic approach to the interplay of various factors contributing to the current #cybersecurity picture Jasper Uyi Egbobamwonyi-Bedaux provides an outline of the Problematisation Analytics framework. Read more: tinyurl.com/4x9dkf8h
Inda Kreso, “Cyber Threats and Vulnerability Mapping in the Energy Sector: Laying the Groundwork for Smart Grid Resilience.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
Inda Kreso’s new publication identifies the most critical cyber threats and vulnerabilities within the energy sector and provides the first comprehensive mapping between them, providing a practical foundation for aligning #cybersecurity practices with existing frameworks. tinyurl.com/mwy86bxv
Irina Aristova, Nataliia Kapitanenko, Andrii Lyseiuk, Ievgenii Kryvolap, Oleksii Kharytonov, “Information Sovereignty under Fire: Legal Challenges for Ukraine.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
The newly published paper “Information Sovereignty under Fire: Legal Challenges for Ukraine” addresses the sovereignty aspect of regulations pertaining to #cybersecurity in Ukraine, pointing to the necessity of a coherent National Strategy of Information Sovereignty. Read it at tinyurl.com/3ze9hb62
Lidong Wang, Reed Mosher, Patti Duett, Terril Falls, “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”
The paper “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process” provides a mathematical analysis of interactions with network honeypots under conditions of uncertainty tinyurl.com/5ezuzrvh
#cyberFriday #cybersecurity
Emir Muhić, “Transforming the Intelligence Cycle through Adapting to Complex Environments and the Operational Dynamics of Special Warfare.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
In his new paper Emir Muhić reviews the existing approaches to so called special or hybrid warfare and develops a network model, presenting how intelligence processes can evolve towards real-time adaptability to meet the demands of today’s multi-faceted threats to public safety.
tinyurl.com/4b9k243e
Tomorrow at the CEE Tech Summit in Warsaw 🇵🇱 I’ll join a panel on how AI is transforming social impact and civic innovation.
@irexintl.bsky.social! 🤖✨
#CEETechSummit #AI #Innovation #SocialImpact #CEEProgram
Cover of the “ENISA Threat Landscape 2025” report. Publication date is October 2025. At the top the logos of the European Union Agency for Cybersecurity are visible.
This #cyberFriday, to conclude the #EuropeanCybersecurityMonth we recommend you the latest ENISA Threat Landscape report. This year’s edition of the analysis sketches out current trends and highlights the most important threats to the European #cybersecurity. Find it at tinyurl.com/4wezyd66
Spotkajmy się w Łodzi na Igrzyskach Wolności!
Andreanne Bergeron, “Tell Me Where You Live and I Will Tell Your P@Ssw0rd: Understanding the Macrosocial Variables Influencing Password’s Strength.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”
Do you follow the rules of making a strong password? Do people with similar background? Read the paper “Tell Me Where You Live and I Will Tell Your P@Ssw0rd: Understanding the Macrosocial Variables Influencing Password’s Strength” by Andreanne Bergeron tinyurl.com/29dr9se2
#ACIG #cybersecurity
Khutso Lebea, Sherali Zeadally, Aditya Sood, “The Role of Cybersecurity in Addressing Express Kidnappings: Challenges and Innovative Solutions.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
🚨 New article now available online!
In their paper “The Role of Cybersecurity in Addressing Express Kidnappings: Challenges and Innovative Solutions” Khutso Lebea, Sherali Zeadally and Aditya Sood analyse a particular kind of kidnapping for ransom and the ways to counter it.
tinyurl.com/ff5rcwwn
Ahmad Sanmorino, Rendra Gustriansyah, Shinta Puspasari, Fauziah Afriyani, “Improving Threat Detection in Information Security with Ensemble Learning.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”
🚨 New article now available online!
In their new paper Ahmad Sanmorino, Rendra Gustriansyah, Shinta Puspasari, and Fauziah Afriyani demonstrate how combining multiple machine learning algorithms may result in greater precision of cyberattack detection. Read it oline: tinyurl.com/4bbjat3v
Text: Prof. Alina Bargaoanu, Cyber Influence Defence: Applying the DISARM Framework to a Cognitive Hacking Case from the Romanian Digital Space
This #CyberFriday we recall an important article by Prof. Alina Bargaoanu and Mihaela Pana. Using the DISARM model, the authors identified key technological factors and emerging threats that challenge the detection and resilience of the Romanian digital space.
➡️ tinyurl.com/26prsggh
ACIG by #NASK
Text: Ronil Christian, Durgesh Babu P, Hrishitva Patel, Keyur Modi Building Trustworthy Autonomous AI: Essential Principles beyond Traditional Software Design
ACIG is excited to share a new paper:
“Building Trustworthy Autonomous AI: Essential Principles beyond Traditional Software Design ” by R. Christian, D.Babu P, H. Patel, and K. Modi. It explores how to design autonomous AI that is both powerful and trustworthy.
tinyurl.com/2ymxw4qz
Text: Giacomo Assenza, Alessandro Ortalda , Roberto Setola Redefining Systemic Cybersecurity Risk in Interconnected Environments
We feature "Redefining Systemic Cybersecurity Risk in Interconnected Environments" by G. Assenza, A. Ortalda, R. Setola, which reviews key events, assesses risk-management tools, and stresses that systemic risk is shared-requiring collective understanding and coordinated action.
tinyurl.com/22zggkhu
Kovid Tiwari, Ajay Kumar Phulre, Devraj Vishnu, Saravanan D “Enhancing Secure Key Management Techniques for Optimised 5G Network Slicing Security.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”
This #cyberFriday we would like to remind you about the fantastic article “Enhancing Secure Key Management Techniques for Optimised 5G Network Slicing Security” by Kovid Tiwari, Ajay Kumar Phulre, Devraj Vishnu and Saravanan D. Read it at #ACIG: tinyurl.com/2xmaslv7
A photograph of Joanna Kołodziej, a woman looking into the camera with a serious expression, with a white frame and semi-transparent background, alongside with the texts “Congratulations!” and “Joanna Kołodziej once again is among the top 2% of the world’s most cited scientists.” At the top of the image the logos of ACIG and NASK can be seen.
We’re proud to share that prof. Joanna Kołodziej, our author, colleague at #NASK and guest editor-to-be, has once again been recognized among the world’s top 2% most cited scientists in the ranking by Stanford University & Elsevier!
Huge congratulations!
#computerScience #scientificPublishing #ACIG
A photograph of Anna Felkner, a woman wearing glasses and a bright blouse, looking confidently into the camera, with a white frame and semi-transparent background, alongside with the texts “Welcome on board!” and “Anna Felkner PhD joins the ACIG Editorial Team.” At the top of the image the logos of ACIG and NASK can be seen.
We have the pleasure to announce that Anna Felkner PhD, the Director of the Cybersecurity Research and Development Division at #NASK, has joined the #ACIG’s team as an Editor. Our warmest welcome!
#scientificPublishing #cyberFriday
“October is #CyberSecMonth. #ThinkB4Uclick.” In the upper right corner the logo of ECSM can be seen. Below there is a tagline “Get involved!” in a speech bubble and an address cybersecuritymonth.eu.
In October the European Cybersecurity Month campaign takes place. In Poland ECSM is coordinated by our publisher, #NASK. Dear readers from Europe and from all over the world – care to share what actions are carried out in your countries to promote cybersecurity for everyone?
#ACIG #CyberFriday #ECSM
We encourage you to take a closer look at the 19th edition of the Keeping Children and Young People Safe Online International Conference co-organized by our publisher, NASK – National Research Institute. Upon registration, the event can be attended online free of charge.
tinyurl.com/2yeb3dq3
We wrześniu widzimy się na Kongresie Kobiet w Katowicach
Podczas sesji plenarnej będziemy rozmawiać o bezpieczeństwie, także w cyberprzestrzeni.
Zapraszam serdecznie!
#KongresKobiet #CyberSecurity #Bezpieczeństwo
Kristan Stoddart “Russia’s Cyber Campaigns and the Ukraine War: From the ‘Gray Zone’ to the ‘Red Zone’”
This #cyberFriday our eyes turn towards #Ukraine, where we can see how modern warfare spills into the #cybersecurity area. Learn how Kristan Stoddart’s analysis from our last year’s special issue on the ongoing war systematizes the knowledge on state-on-state cyberattacks at:
tinyurl.com/2cuxba94
Logos of the following services connected into a loose web: Crossref, EBSCO, Semantic Scholar, Scopus, Polish Scientific Bibliography, Arianta, Academic Journals, DOAJ, ERIHPlus, BazTech, ROAD, EuroPub, CEEOL. In the upper-left corner the logo of ACIG is visible.
Visibility is the key! 🔑
Our journal is well-indexed by numerous scientific databases, both national and worldwide. Thanks to our presence therein, the works of our authors are easily found by other scientists, which means more citations and stronger impact on the scientific discussion.
“New book from the members of our Editorial Team is now available” written in bold white letters on the left-hand side of the picture. On the right, the cover of the book “Humans in the Cyber Loop: Perspectives on Social Cybersecurity” by Dorota Domalewska, Aleksandra Gasztold, and Agnieszka Wrońska is visible. At the bottom there are logos of NASK, University of Warsaw, War Studies University and the Ministry of Science and Higher Education of the Republic of Poland.
The new book by members of our Editorial Team, “Humans in the Cyber Loop: Perspectives on Social Cybersecurity,” maps out the field of social cybersecurity. It introduces a human-focused approach, recognizing people as active agents who both shape and are shaped by the digital ecosystem.
text: Aditya K. Sood, Sherali Zeadally: AI-Powered Pervasive Computing: Discerning Threat Model to Unveil Security and Privacy Challenges
What security and privacy risks arise from integrating artificial intelligence with pervasive computing? New paper by Aditya K. Sood and Sherali Zeadally: “AI-Powered Pervasive Computing: Discerning Threat Model to Unveil Security and Privacy Challenges”
🔍 www.acigjournal.com/AI-Powered-P...
Viktor Putrenko, Nataliia Pashynska 2 Military Situation Awareness: Ukrainian Experience
As the conflict evolves, explore how the Ukrainian Armed Forces built effective MSA - under pressure, with limited resources, and by adapting civilian tech.
By V. Putrenko & N. Pashynska
🔗 Military Situation Awareness: Ukrainian Experience
#MSA #Ukraine #SituationalAwareness #Geopolitics