Prof. Aleksandra Gasztold's Avatar

Prof. Aleksandra Gasztold

@agasztold

University of Warsaw | Editor-in-Chief ACIG | IVLP Alumni | WIIS Poland #terrorism #women #radicalisation #security #counterterrorism

69
Followers
85
Following
23
Posts
26.02.2025
Joined
Posts Following

Latest posts by Prof. Aleksandra Gasztold @agasztold

Post image

Zapraszam na debatę wokół książki „Sztuka wywiadu” prof. Z. Siemiątkowskiego o naturze pracy wywiadowczej, analizie strategicznej i roli służb specjalnych w systemie bezpieczeństwa państwa.

📅 10 marca 2026
#wywiad #bezpieczeństwo #studiastrategiczne #UW

05.03.2026 14:03 👍 0 🔁 0 💬 0 📌 0

A must-read, highly recommended by the editor-in-chief.

27.02.2026 20:35 👍 0 🔁 0 💬 0 📌 0
Cover illustration of ACIG Vol. 4, No. 1; wide band of warm-coloured lines forming a male and a female profiles against a dark blue background, along with the journal’s title and metadata. Below there is a caption “Latest issue now complete,” at the top the logos of ACIG and NASK can be seen.

Cover illustration of ACIG Vol. 4, No. 1; wide band of warm-coloured lines forming a male and a female profiles against a dark blue background, along with the journal’s title and metadata. Below there is a caption “Latest issue now complete,” at the top the logos of ACIG and NASK can be seen.

Dear readers,
We are happy to announce that following the publication of the letter from our Editor-in-Chief, volume 4 of ACIG is now complete. Read the introduction to our latest issue by @agasztold.bsky.social, revisit its contents and stay tuned for this year’s papers! tinyurl.com/36aynbd7

30.01.2026 08:54 👍 1 🔁 1 💬 0 📌 0
Okładka poradnika cyberbezpieczeństwo dla seniorów.

Okładka poradnika cyberbezpieczeństwo dla seniorów.

Polecam lekturę poradnika „Halo! Tu cyberbezpieczny senior. Nie zadzierAI ze mną” przygotowanego przez NASK. Publikacja wyjaśnia mechanizmy działania współczesnych technologii cyfrowych, opisuje typowe metody oszustw internetowych oraz przedstawia praktyczne strategie ochrony danych i prywatności.

21.01.2026 09:16 👍 2 🔁 0 💬 0 📌 0
Call for papers 2026. Submission deadline: September 30, 2026.
In the upper right corner there is a designation “2026 Volume 5, No. 1” on a teal background. At the top of the image the logos of ACIG and NASK can be seen. A human hand holding a loudspeaker emerges from behind the bottom edge of the illustration.

Call for papers 2026. Submission deadline: September 30, 2026. In the upper right corner there is a designation “2026 Volume 5, No. 1” on a teal background. At the top of the image the logos of ACIG and NASK can be seen. A human hand holding a loudspeaker emerges from behind the bottom edge of the illustration.

📢 Call for Papers

Applied Cybersecurity & Internet Governance – an #openAccess, peer-reviewed scholarly journal dedicated to multidisciplinary research on #cybersecurity – is now accepting submissions for the 2026 issue.

Author guidelines are available on the ACIG website: tinyurl.com/277nh5yg

19.01.2026 12:04 👍 1 🔁 1 💬 0 📌 0
Jasper Uyi Egbobamwonyi-Bedaux, “Problematisation Analytics: New Foucauldian Direction in Theory and Method for Cybersecurity and AI Governance Research.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

Jasper Uyi Egbobamwonyi-Bedaux, “Problematisation Analytics: New Foucauldian Direction in Theory and Method for Cybersecurity and AI Governance Research.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

🚨 New article available!
In his new paper aiming at developing a holistic approach to the interplay of various factors contributing to the current #cybersecurity picture Jasper Uyi Egbobamwonyi-Bedaux provides an outline of the Problematisation Analytics framework. Read more: tinyurl.com/4x9dkf8h

20.10.2025 14:39 👍 1 🔁 1 💬 0 📌 0
Inda Kreso, “Cyber Threats and Vulnerability Mapping in the Energy Sector: Laying the Groundwork for Smart Grid Resilience.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

Inda Kreso, “Cyber Threats and Vulnerability Mapping in the Energy Sector: Laying the Groundwork for Smart Grid Resilience.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

Inda Kreso’s new publication identifies the most critical cyber threats and vulnerabilities within the energy sector and provides the first comprehensive mapping between them, providing a practical foundation for aligning #cybersecurity practices with existing frameworks. tinyurl.com/mwy86bxv

22.10.2025 08:06 👍 1 🔁 1 💬 0 📌 0
Irina Aristova, Nataliia Kapitanenko, Andrii Lyseiuk, Ievgenii Kryvolap, Oleksii Kharytonov, “Information Sovereignty under Fire: Legal Challenges for Ukraine.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

Irina Aristova, Nataliia Kapitanenko, Andrii Lyseiuk, Ievgenii Kryvolap, Oleksii Kharytonov, “Information Sovereignty under Fire: Legal Challenges for Ukraine.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

The newly published paper “Information Sovereignty under Fire: Legal Challenges for Ukraine” addresses the sovereignty aspect of regulations pertaining to #cybersecurity in Ukraine, pointing to the necessity of a coherent National Strategy of Information Sovereignty. Read it at tinyurl.com/3ze9hb62

24.10.2025 07:36 👍 2 🔁 1 💬 0 📌 0
Lidong Wang, Reed Mosher, Patti Duett, Terril Falls, “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

Lidong Wang, Reed Mosher, Patti Duett, Terril Falls, “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

The paper “Predictive Modelling of a Honeypot System Based on a Markov Decision Process and a Partially Observable Markov Decision Process” provides a mathematical analysis of interactions with network honeypots under conditions of uncertainty tinyurl.com/5ezuzrvh
#cyberFriday #cybersecurity

07.11.2025 09:43 👍 1 🔁 1 💬 0 📌 0
Emir Muhić, “Transforming the Intelligence Cycle through Adapting to Complex Environments and the Operational Dynamics of Special Warfare.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

Emir Muhić, “Transforming the Intelligence Cycle through Adapting to Complex Environments and the Operational Dynamics of Special Warfare.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

In his new paper Emir Muhić reviews the existing approaches to so called special or hybrid warfare and develops a network model, presenting how intelligence processes can evolve towards real-time adaptability to meet the demands of today’s multi-faceted threats to public safety.
tinyurl.com/4b9k243e

14.11.2025 07:58 👍 1 🔁 1 💬 0 📌 0
Post image

Tomorrow at the CEE Tech Summit in Warsaw 🇵🇱 I’ll join a panel on how AI is transforming social impact and civic innovation.
@irexintl.bsky.social! 🤖✨

#CEETechSummit #AI #Innovation #SocialImpact #CEEProgram

03.11.2025 10:10 👍 1 🔁 0 💬 0 📌 0
Cover of the “ENISA Threat Landscape 2025” report. Publication date is October 2025. At the top the logos of the European Union Agency for Cybersecurity are visible.

Cover of the “ENISA Threat Landscape 2025” report. Publication date is October 2025. At the top the logos of the European Union Agency for Cybersecurity are visible.

This #cyberFriday, to conclude the #EuropeanCybersecurityMonth we recommend you the latest ENISA Threat Landscape report. This year’s edition of the analysis sketches out current trends and highlights the most important threats to the European #cybersecurity. Find it at tinyurl.com/4wezyd66

31.10.2025 07:29 👍 1 🔁 1 💬 0 📌 0
Post image

Spotkajmy się w Łodzi na Igrzyskach Wolności!

22.10.2025 14:47 👍 1 🔁 0 💬 0 📌 0
Andreanne Bergeron, “Tell Me Where You Live and I Will Tell Your P@Ssw0rd: Understanding the Macrosocial Variables Influencing Password’s Strength.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

Andreanne Bergeron, “Tell Me Where You Live and I Will Tell Your P@Ssw0rd: Understanding the Macrosocial Variables Influencing Password’s Strength.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

Do you follow the rules of making a strong password? Do people with similar background? Read the paper “Tell Me Where You Live and I Will Tell Your P@Ssw0rd: Understanding the Macrosocial Variables Influencing Password’s Strength” by Andreanne Bergeron tinyurl.com/29dr9se2
#ACIG #cybersecurity

10.10.2025 08:18 👍 1 🔁 1 💬 0 📌 0
Khutso Lebea, Sherali Zeadally, Aditya Sood, “The Role of Cybersecurity in Addressing Express Kidnappings: Challenges and Innovative Solutions.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

Khutso Lebea, Sherali Zeadally, Aditya Sood, “The Role of Cybersecurity in Addressing Express Kidnappings: Challenges and Innovative Solutions.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

🚨 New article now available online!
In their paper “The Role of Cybersecurity in Addressing Express Kidnappings: Challenges and Innovative Solutions” Khutso Lebea, Sherali Zeadally and Aditya Sood analyse a particular kind of kidnapping for ransom and the ways to counter it.
tinyurl.com/ff5rcwwn

15.10.2025 10:37 👍 1 🔁 1 💬 0 📌 0
Ahmad Sanmorino, Rendra Gustriansyah, Shinta Puspasari, Fauziah Afriyani, “Improving Threat Detection in Information Security with Ensemble Learning.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

Ahmad Sanmorino, Rendra Gustriansyah, Shinta Puspasari, Fauziah Afriyani, “Improving Threat Detection in Information Security with Ensemble Learning.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “New article.”

🚨 New article now available online!
In their new paper Ahmad Sanmorino, Rendra Gustriansyah, Shinta Puspasari, and Fauziah Afriyani demonstrate how combining multiple machine learning algorithms may result in greater precision of cyberattack detection. Read it oline: tinyurl.com/4bbjat3v

17.10.2025 07:35 👍 2 🔁 1 💬 0 📌 0
Text: Prof. Alina Bargaoanu,
Cyber Influence Defence: Applying the DISARM Framework to a Cognitive Hacking Case from the Romanian Digital Space

Text: Prof. Alina Bargaoanu, Cyber Influence Defence: Applying the DISARM Framework to a Cognitive Hacking Case from the Romanian Digital Space

This #CyberFriday we recall an important article by Prof. Alina Bargaoanu and Mihaela Pana. Using the DISARM model, the authors identified key technological factors and emerging threats that challenge the detection and resilience of the Romanian digital space.
➡️ tinyurl.com/26prsggh
ACIG by #NASK

29.08.2025 08:59 👍 1 🔁 1 💬 0 📌 0
Text: Ronil Christian, Durgesh Babu P, Hrishitva Patel, Keyur Modi	
Building Trustworthy Autonomous AI: Essential Principles beyond Traditional Software Design

Text: Ronil Christian, Durgesh Babu P, Hrishitva Patel, Keyur Modi Building Trustworthy Autonomous AI: Essential Principles beyond Traditional Software Design

ACIG is excited to share a new paper:
“Building Trustworthy Autonomous AI: Essential Principles beyond Traditional Software Design ” by R. Christian, D.Babu P, H. Patel, and K. Modi. It explores how to design autonomous AI that is both powerful and trustworthy.
tinyurl.com/2ymxw4qz

05.09.2025 09:14 👍 1 🔁 1 💬 0 📌 0
Text: Giacomo Assenza, Alessandro Ortalda , Roberto Setola
 Redefining Systemic Cybersecurity Risk in Interconnected Environments

Text: Giacomo Assenza, Alessandro Ortalda , Roberto Setola Redefining Systemic Cybersecurity Risk in Interconnected Environments

We feature "Redefining Systemic Cybersecurity Risk in Interconnected Environments" by G. Assenza, A. Ortalda, R. Setola, which reviews key events, assesses risk-management tools, and stresses that systemic risk is shared-requiring collective understanding and coordinated action.
tinyurl.com/22zggkhu

12.09.2025 06:54 👍 2 🔁 1 💬 0 📌 0
Kovid Tiwari, Ajay Kumar Phulre, Devraj Vishnu, Saravanan D “Enhancing Secure Key Management Techniques for Optimised 5G Network Slicing Security.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

Kovid Tiwari, Ajay Kumar Phulre, Devraj Vishnu, Saravanan D “Enhancing Secure Key Management Techniques for Optimised 5G Network Slicing Security.” At the top of the image the logos of ACIG and NASK can be seen. At the bottom there is a tagline “CyberFriday with ACIG.”

This #cyberFriday we would like to remind you about the fantastic article “Enhancing Secure Key Management Techniques for Optimised 5G Network Slicing Security” by Kovid Tiwari, Ajay Kumar Phulre, Devraj Vishnu and Saravanan D. Read it at #ACIG: tinyurl.com/2xmaslv7

19.09.2025 17:14 👍 1 🔁 1 💬 0 📌 0
A photograph of Joanna Kołodziej, a woman looking into the camera with a serious expression, with a white frame and semi-transparent background, alongside with the texts “Congratulations!” and “Joanna Kołodziej once again is among the top 2% of the world’s most cited scientists.” At the top of the image the logos of ACIG and NASK can be seen.

A photograph of Joanna Kołodziej, a woman looking into the camera with a serious expression, with a white frame and semi-transparent background, alongside with the texts “Congratulations!” and “Joanna Kołodziej once again is among the top 2% of the world’s most cited scientists.” At the top of the image the logos of ACIG and NASK can be seen.

We’re proud to share that prof. Joanna Kołodziej, our author, colleague at #NASK and guest editor-to-be, has once again been recognized among the world’s top 2% most cited scientists in the ranking by Stanford University & Elsevier!
Huge congratulations!
#computerScience #scientificPublishing #ACIG

24.09.2025 11:14 👍 2 🔁 1 💬 0 📌 0
A photograph of Anna Felkner, a woman wearing glasses and a bright blouse, looking confidently into the camera, with a white frame and semi-transparent background, alongside with the texts “Welcome on board!” and “Anna Felkner PhD joins the ACIG Editorial Team.” At the top of the image the logos of ACIG and NASK can be seen.

A photograph of Anna Felkner, a woman wearing glasses and a bright blouse, looking confidently into the camera, with a white frame and semi-transparent background, alongside with the texts “Welcome on board!” and “Anna Felkner PhD joins the ACIG Editorial Team.” At the top of the image the logos of ACIG and NASK can be seen.

We have the pleasure to announce that Anna Felkner PhD, the Director of the Cybersecurity Research and Development Division at #NASK, has joined the #ACIG’s team as an Editor. Our warmest welcome!
#scientificPublishing #cyberFriday

26.09.2025 10:32 👍 1 🔁 1 💬 0 📌 0
“October is #CyberSecMonth. #ThinkB4Uclick.” In the upper right corner the logo of ECSM can be seen. Below there is a tagline “Get involved!” in a speech bubble and an address cybersecuritymonth.eu.

“October is #CyberSecMonth. #ThinkB4Uclick.” In the upper right corner the logo of ECSM can be seen. Below there is a tagline “Get involved!” in a speech bubble and an address cybersecuritymonth.eu.

In October the European Cybersecurity Month campaign takes place. In Poland ECSM is coordinated by our publisher, #NASK. Dear readers from Europe and from all over the world – care to share what actions are carried out in your countries to promote cybersecurity for everyone?
#ACIG #CyberFriday #ECSM

03.10.2025 08:23 👍 1 🔁 1 💬 0 📌 0
19th International Conference Keeping Children and Young People Safe Online 19th International Conference ''Keeping Children and Young People Safe Online'' is one of the largest events on online threats and safety in Europe. It is addressed to representatives of the education...

We encourage you to take a closer look at the 19th edition of the Keeping Children and Young People Safe Online International Conference co-organized by our publisher, NASK – National Research Institute. Upon registration, the event can be attended online free of charge.
tinyurl.com/2yeb3dq3

22.08.2025 08:04 👍 1 🔁 1 💬 0 📌 0
Post image

We wrześniu widzimy się na Kongresie Kobiet w Katowicach
Podczas sesji plenarnej będziemy rozmawiać o bezpieczeństwie, także w cyberprzestrzeni.
Zapraszam serdecznie!
#KongresKobiet #CyberSecurity #Bezpieczeństwo

18.08.2025 06:36 👍 3 🔁 0 💬 0 📌 0
Kristan Stoddart “Russia’s Cyber Campaigns and the Ukraine War: From the ‘Gray Zone’ to the ‘Red Zone’”

Kristan Stoddart “Russia’s Cyber Campaigns and the Ukraine War: From the ‘Gray Zone’ to the ‘Red Zone’”

This #cyberFriday our eyes turn towards #Ukraine, where we can see how modern warfare spills into the #cybersecurity area. Learn how Kristan Stoddart’s analysis from our last year’s special issue on the ongoing war systematizes the knowledge on state-on-state cyberattacks at:
tinyurl.com/2cuxba94

30.05.2025 07:28 👍 1 🔁 1 💬 0 📌 0
Logos of the following services connected into a loose web: Crossref, EBSCO, Semantic Scholar, Scopus, Polish Scientific Bibliography, Arianta, Academic Journals, DOAJ, ERIHPlus, BazTech, ROAD, EuroPub, CEEOL. In the upper-left corner the logo of ACIG is visible.

Logos of the following services connected into a loose web: Crossref, EBSCO, Semantic Scholar, Scopus, Polish Scientific Bibliography, Arianta, Academic Journals, DOAJ, ERIHPlus, BazTech, ROAD, EuroPub, CEEOL. In the upper-left corner the logo of ACIG is visible.

Visibility is the key! 🔑
Our journal is well-indexed by numerous scientific databases, both national and worldwide. Thanks to our presence therein, the works of our authors are easily found by other scientists, which means more citations and stronger impact on the scientific discussion.

13.06.2025 08:24 👍 1 🔁 1 💬 0 📌 0
“New book from the members of our Editorial Team is now available” written in bold white letters on the left-hand side of the picture. On the right, the cover of the book “Humans in the Cyber Loop: Perspectives on Social Cybersecurity” by Dorota Domalewska, Aleksandra Gasztold, and Agnieszka Wrońska is visible. At the bottom there are logos of NASK, University of Warsaw, War Studies University and the Ministry of Science and Higher Education of the Republic of Poland.

“New book from the members of our Editorial Team is now available” written in bold white letters on the left-hand side of the picture. On the right, the cover of the book “Humans in the Cyber Loop: Perspectives on Social Cybersecurity” by Dorota Domalewska, Aleksandra Gasztold, and Agnieszka Wrońska is visible. At the bottom there are logos of NASK, University of Warsaw, War Studies University and the Ministry of Science and Higher Education of the Republic of Poland.

The new book by members of our Editorial Team, “Humans in the Cyber Loop: Perspectives on Social Cybersecurity,” maps out the field of social cybersecurity. It introduces a human-focused approach, recognizing people as active agents who both shape and are shaped by the digital ecosystem.

01.07.2025 07:15 👍 4 🔁 1 💬 1 📌 0
text: Aditya K. Sood, Sherali Zeadally:
AI-Powered Pervasive Computing: Discerning Threat Model to Unveil Security and Privacy Challenges

text: Aditya K. Sood, Sherali Zeadally: AI-Powered Pervasive Computing: Discerning Threat Model to Unveil Security and Privacy Challenges

What security and privacy risks arise from integrating artificial intelligence with pervasive computing? New paper by Aditya K. Sood and Sherali Zeadally: “AI-Powered Pervasive Computing: Discerning Threat Model to Unveil Security and Privacy Challenges”
🔍 www.acigjournal.com/AI-Powered-P...

11.07.2025 09:23 👍 1 🔁 1 💬 0 📌 0
Viktor Putrenko, Nataliia Pashynska 2 
Military Situation Awareness: Ukrainian Experience

Viktor Putrenko, Nataliia Pashynska 2 Military Situation Awareness: Ukrainian Experience

As the conflict evolves, explore how the Ukrainian Armed Forces built effective MSA - under pressure, with limited resources, and by adapting civilian tech.
By V. Putrenko & N. Pashynska
🔗 Military Situation Awareness: Ukrainian Experience
#MSA #Ukraine #SituationalAwareness #Geopolitics

18.07.2025 08:20 👍 1 🔁 1 💬 0 📌 0