{"id":67528,"date":"2022-08-03T13:51:50","date_gmt":"2022-08-03T11:51:50","guid":{"rendered":"https:\/\/prawo.uwr.edu.pl\/?page_id=67528"},"modified":"2022-08-03T13:51:50","modified_gmt":"2022-08-03T11:51:50","slug":"cybercrimes","status":"publish","type":"page","link":"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/","title":{"rendered":"Cybercrimes"},"content":{"rendered":"\n<div class=\"wp-block-ugb-container ugb-container ugb-8dda971 ugb-container--v2 ugb-container--design-plain ugb-main-block\"><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-container__wrapper ugb-8dda971-wrapper\"><div class=\"ugb-container__side\"><div class=\"ugb-container__content-wrapper ugb-8dda971-content-wrapper\">\n<div class=\"wp-block-columns bs-news-page is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column bs-kontakt-photo is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/prawo.uwr.edu.pl\/wp-content\/uploads\/sites\/210\/2022\/07\/pexels-fauxels-3183150-1024x683.jpg\" alt=\"komspotkanie\" class=\"wp-image-38731\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column bs-contact-right-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-bonasoft-modular-breadcrumbs-block\"><div class=\"bs_add_breadcrumb_trail\"><\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-black-background-color has-black-color is-style-wide bs-border-kontakt\" \/>\n\n\n<h1 style=\"font-style:normal;font-weight:700;\" class=\"bs-naglowek-podstrony wp-block-post-title\">Cybercrimes<\/h1>\n\n\n<p><strong>Program:<\/strong>\u00a0\u00a0<a href=\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/\">Criminal Justice<\/a><\/p>\n\n\n\n<p>Legal aspects of information technology. The role of public databases and information systems in private and public sectors. Types of computer crimes (identity theft, hacking, sniffing, spamming, information destruction, cyberstalking, cracking and phishing).<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-ugb-container ugb-container bs-news-page-under ugb-f8694ce ugb-container--v2 ugb-container--design-plain ugb-main-block\"><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-container__wrapper ugb-f8694ce-wrapper\"><div class=\"ugb-container__side\"><div class=\"ugb-container__content-wrapper ugb-f8694ce-content-wrapper\"><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Program:\u00a0\u00a0Criminal Justice Legal aspects of information technology. The role of public databases and information systems in private and public sectors. Types of computer crimes (identity theft, hacking, sniffing, spamming, information destruction, cyberstalking, cracking and phishing).<\/p>\n","protected":false},"author":20,"featured_media":38731,"parent":66304,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[],"tags":[],"class_list":["post-67528","page","type-page","status-publish","has-post-thumbnail","hentry"],"featured_image_urls_v2":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","menu-24x24":"","menu-36x36":"","menu-48x48":""},"post_excerpt_stackable_v2":"<p>Cybercrimes Program:\u00a0\u00a0Criminal Justice Legal aspects of information technology. The role of public databases and information systems in private and public sectors. Types of computer crimes (identity theft, hacking, sniffing, spamming, information destruction, cyberstalking, cracking and phishing).<\/p>\n","category_list_v2":"Uncategorized","author_info_v2":{"name":"mmatlinski","url":"https:\/\/prawo.uwr.edu.pl\/en\/author\/mmatlinski\/"},"comments_num_v2":"0 comments","acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercrimes - Wydzia\u0142 Prawa, Administracji i Ekonomii<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrimes - Wydzia\u0142 Prawa, Administracji i Ekonomii\" \/>\n<meta property=\"og:description\" content=\"Program:\u00a0\u00a0Criminal Justice Legal aspects of information technology. The role of public databases and information systems in private and public sectors. Types of computer crimes (identity theft, hacking, sniffing, spamming, information destruction, cyberstalking, cracking and phishing).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/\" \/>\n<meta property=\"og:site_name\" content=\"Wydzia\u0142 Prawa, Administracji i Ekonomii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/\",\"url\":\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/\",\"name\":\"Cybercrimes - Wydzia\u0142 Prawa, Administracji i Ekonomii\",\"isPartOf\":{\"@id\":\"https:\/\/prawo.uwr.edu.pl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2022-08-03T11:51:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/prawo.uwr.edu.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Criminal Justice\",\"item\":\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybercrimes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/prawo.uwr.edu.pl\/#website\",\"url\":\"https:\/\/prawo.uwr.edu.pl\/\",\"name\":\"Wydzia\u0142 Prawa, Administracji i Ekonomii\",\"description\":\"Kolejna witryna sieci \u201eUWR Witryny\u201d\",\"publisher\":{\"@id\":\"https:\/\/prawo.uwr.edu.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/prawo.uwr.edu.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/prawo.uwr.edu.pl\/#organization\",\"name\":\"Wydzia\u0142 Prawa, Administracji i Ekonomii\",\"url\":\"https:\/\/prawo.uwr.edu.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/prawo.uwr.edu.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/prawo.uwr.edu.pl\/wp-content\/uploads\/sites\/210\/2025\/10\/UWr-logotyp-2025.png\",\"contentUrl\":\"https:\/\/prawo.uwr.edu.pl\/wp-content\/uploads\/sites\/210\/2025\/10\/UWr-logotyp-2025.png\",\"width\":764,\"height\":269,\"caption\":\"Wydzia\u0142 Prawa, Administracji i Ekonomii\"},\"image\":{\"@id\":\"https:\/\/prawo.uwr.edu.pl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrimes - Wydzia\u0142 Prawa, Administracji i Ekonomii","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrimes - Wydzia\u0142 Prawa, Administracji i Ekonomii","og_description":"Program:\u00a0\u00a0Criminal Justice Legal aspects of information technology. The role of public databases and information systems in private and public sectors. Types of computer crimes (identity theft, hacking, sniffing, spamming, information destruction, cyberstalking, cracking and phishing).","og_url":"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/","og_site_name":"Wydzia\u0142 Prawa, Administracji i Ekonomii","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/","url":"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/","name":"Cybercrimes - Wydzia\u0142 Prawa, Administracji i Ekonomii","isPartOf":{"@id":"https:\/\/prawo.uwr.edu.pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/#primaryimage"},"image":{"@id":"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/#primaryimage"},"thumbnailUrl":"","datePublished":"2022-08-03T11:51:50+00:00","breadcrumb":{"@id":"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/prawo.uwr.edu.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Criminal Justice","item":"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/"},{"@type":"ListItem","position":3,"name":"Cybercrimes"}]},{"@type":"WebSite","@id":"https:\/\/prawo.uwr.edu.pl\/#website","url":"https:\/\/prawo.uwr.edu.pl\/","name":"Wydzia\u0142 Prawa, Administracji i Ekonomii","description":"Kolejna witryna sieci \u201eUWR Witryny\u201d","publisher":{"@id":"https:\/\/prawo.uwr.edu.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/prawo.uwr.edu.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/prawo.uwr.edu.pl\/#organization","name":"Wydzia\u0142 Prawa, Administracji i Ekonomii","url":"https:\/\/prawo.uwr.edu.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/prawo.uwr.edu.pl\/#\/schema\/logo\/image\/","url":"https:\/\/prawo.uwr.edu.pl\/wp-content\/uploads\/sites\/210\/2025\/10\/UWr-logotyp-2025.png","contentUrl":"https:\/\/prawo.uwr.edu.pl\/wp-content\/uploads\/sites\/210\/2025\/10\/UWr-logotyp-2025.png","width":764,"height":269,"caption":"Wydzia\u0142 Prawa, Administracji i Ekonomii"},"image":{"@id":"https:\/\/prawo.uwr.edu.pl\/#\/schema\/logo\/image\/"}}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-26 11:40:26","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/prawo.uwr.edu.pl\/en\/wp-json\/wp\/v2\/pages\/67528\/"}],"collection":[{"href":"https:\/\/prawo.uwr.edu.pl\/en\/wp-json\/wp\/v2\/pages\/"}],"about":[{"href":"https:\/\/prawo.uwr.edu.pl\/en\/wp-json\/wp\/v2\/types\/page\/"}],"author":[{"embeddable":true,"href":"https:\/\/prawo.uwr.edu.pl\/en\/wp-json\/wp\/v2\/users\/20\/"}],"replies":[{"embeddable":true,"href":"https:\/\/prawo.uwr.edu.pl\/en\/wp-json\/wp\/v2\/comments\/?post=67528"}],"version-history":[{"count":0,"href":"https:\/\/prawo.uwr.edu.pl\/en\/wp-json\/wp\/v2\/pages\/67528\/revisions\/"}],"up":[{"embeddable":true,"href":"https:\/\/prawo.uwr.edu.pl\/en\/wp-json\/wp\/v2\/pages\/66304\/"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prawo.uwr.edu.pl\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/prawo.uwr.edu.pl\/en\/wp-json\/wp\/v2\/media\/?parent=67528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prawo.uwr.edu.pl\/en\/wp-json\/wp\/v2\/categories\/?post=67528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prawo.uwr.edu.pl\/en\/wp-json\/wp\/v2\/tags\/?post=67528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}