This week’s #cyberFriday we would like to encourage you to read an article from our archive. It provides an analysis of the way in which modern communication technologies have enabled the proliferation of disinformation, both organically arising and intentionally manufactured.
“One of the core changes at the heart of the formation of today’s information environment has been the shift in emphasis from a supposed ‘information age’ towards a ‘post-truth era’. … Indeed, while previously the Internet was itself seen as a ‘liberation technology’, enabling networked individuals to self-organise in a struggle for democracy and freedom, currently the attention has shifted to the opposite end of the spectrum, namely manipulation, disinformation, and information warfare.”

“Post-Truth and Information Warfare in their Technological Context” by Ignas Kalpokas – now even more relevant, available in open access on our website: https://www.acigjournal.com/Post-Truth-and-Information-Warfare-in-their-Technological-Context,190407,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute

#postTruth #disinformation #informationWarfare #generativeAI

Increasing dependence of our daily lives on new communication technologies on the one hand, and the ever-increasing prevalence of attacks against digital infrastructure on the other translate to a growing demand for #cybersecurity services. But to what extent has the global financial market been reacting to this reality?
This #cyberFriday we bring you back the paper by Grzegorz Przekota, “Investment in Cybersecurity Companies in Times of Political and Economic Instability.” Read the analysis of how a war and a global health crisis did impact the financial standing of cybersecurity companies.
Available on our website: https://www.acigjournal.com/Investment-in-Cybersecurity-Companies-in-Times-of-Political-and-Economic-Instability,190342,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#stock #investments

🚨 New article now available online!

One of the negative consequences of recent rapid development in the field of #LLM technology is that every component of automated troll farms can now be run on consumer-grade hardware. As @LukaszOlejnik notes in the newly published paper “Artificial Intelligence Propaganda Factories with Language Models,” this puts conducting AI-driven influence operations within the reach of multiple actors. #AI propaganda enables numerous smaller perpetrators to run their own campaigns and multiplies the capacities of state-level and corporate entities.
However, the presented analysis suggests that the very consistency of AI propaganda bots might yield itself to statistical detection. Such a marker could serve as a signal for platforms and institutions to disrupt those campaigns.
Read the whole paper: https://www.acigjournal.com/Artificial-Intelligence-Propaganda-Factories-with-Language-Models,215416,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#propaganda #disinformation

On December 29th of the previous year Polish energy infrastructure suffered a coordinated cyberattack. According to the recently published report by CERT Polska (English version available at: https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf), the perpetuators had been preparing the security breach for months and had one single objective of causing as much damage as possible. The attackers’ communication patterns were found to be characteristic of a malicious activity cluster known as “Static Tundra,” “Berserk Bear,” “Ghost Blizzard,” and “Dragonfly.” As the report notes, “this is the first publicly described destructive activity attributed to this cluster.”

We find this #cyberFriday to be an appropriate moment to remind you of a paper from our 2023 special issue on the Russian-Ukrainian war, “Cyberwarfare against Critical Infrastructures: Russia and Iran in the Gray Zone” by Guillermo Lopez-Rodriguez, Irais Moreno-Lopez, and José-Carlos Hernández-Gutiérrez. Read it online on our website: https://www.acigjournal.com/Cyberwarfare-against-Critical-Infrastructures-Russia-and-Iran-in-the-Gray-Zone,184301,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute.

#cybersecurity #cyberWarfare #cert #infrastructure

🚨 New article now available online!

Moderately-sized businesses might be as much at risk of cyberattacks as their bigger competitors, but they often lack founding, expertise, and procedures needed to protect themselves efficiently. In their paper “A Grounded Theory of SME Resilience in Network Information Security” Kennedy Njenga and Yitong He present results of their qualitative research conducted among South African network security practitioners and offer strategies to improve cybersecurity in resource-limited small and medium-sized enterprises.
https://www.acigjournal.com/A-Grounded-Theory-of-SME-Resilience-in-Network-Information-Security,215056,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#cybersecurity #enterprise #resilience

Dear readers,
We are happy to announce that following the publication of the letter from our Editor-in-Chief, volume 4 of ACIG is now complete. Read the introduction to our latest issue by @agasztold, revisit its contents and stay tuned for this year’s upcoming papers! https://www.acigjournal.com/Letter-from-Editor-in-Chief,217227,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute.

#cybersecurity #journal #scientificPublishing #openAccess

A few figures showing where ACIG is right now, as we are looking forward to face this year’s challenges.

Our 2025 issue consisted of 15 articles written by 34 authors from 12 countries.
Including the work of previous years, so far ACIG has cooperated with:
👉 136 authors
👉 183 reviewers
👉 representing scientific community of 45 countries on 5 continents.

We are proud to platform so many voices representing various perspectives and fields. Thank you to all researchers who have trusted us with their work, and to all reviewers, whose careful assessment of the submitted manuscripts enables us to uphold the highest standards of scientific publishing.

The first article to be included in the next volume is already online and further papers are on their way, currently undergoing final revisions. We are determined to keep communication with authors effective and to facilitate scientific discussion in the face of rapid changes in the world of #cybersecurity.

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute.

📢 Call for Papers

Applied Cybersecurity & Internet Governance – an #openAccess, peer-reviewed scholarly journal dedicated to multidisciplinary research on #cybersecurity – is now accepting submissions for the 2026 issue.

Cybersecurity is undergoing rapid transformation.
Autonomous AI systems are evolving.
Generative models are scaling.
Attack techniques are adapting.
Post-quantum threats are emerging.
Researchers must respond.

Join a high-impact platform shaping security studies in the age of intelligent systems.
We welcome manuscripts addressing technical, legal, political, and social aspects of digitalisation, #networkSecurity, #privacy, #AI, and #cyberWarfare. Author guidelines are available at: https://www.acigjournal.com/For-Authors,4555.html.
All submissions undergo double-blind peer review, revision, and resubmission. Accepted articles are published open access, free of charge, and without delay. ACIG is indexed in leading scientific databases and citation lists, including Scopus.

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute.

🚨 New article now available online!

As new attack strategies emerge, network intrusion detection systems are subject to increasing pressure. Accurate classification of potential threats requires both adequate analysis of complex data sets and effective utilisation of computational resources available.
Researchers Akanksha Pamena and Manohar Naik Sugali propose an approach combining deep learning for dimensionality reduction with attention modules: SAE-AM. Their solution proves highly effective, reaching 99% accuracy on benchmark datasets. Read the latest article on our website, “SAE-AM: Enhancing Network Intrusion Detection Using Sparse Autoencoders with Attention Modules” and learn more about their method.
https://www.acigjournal.com/SAE-AM-Enhancing-Network-Intrusion-Detection-Using-Sparse-Autoencoders-with-Attention,213872,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#cybersecurity #machineLearning #networkSecurity #intrusionDetection #machineLearning #deepLearning

🚨 New article now available online!

Managing large quantities of information is a challenge that has to be addressed in many areas of modern economy, including those relatively removed from the IT field. As the research shows, the construction industry often lags behind the other sectors in terms of data protection and organisation.
Ornella Tanga Tambwe, Clinton Ohis Aigbavboa, Opeoluwa Israel Akinradewo, and Seyi Segun Stephen offer a case study in the current state of the field. In their paper “The Impact of Data Governance on Data Management in the South African Construction Industry,” they present results of a survey conducted among professionals from the South African capital province of Gauteng along with their implications for further decision making.
Learn more about their findings and analysis: https://www.acigjournal.com/The-Impact-of-Data-Governance-on-Data-Management-in-the-South-African-Construction,213473,0,2.html

🌐 Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK – National Research Institute
#construction #constructionIndustry #dataProtection #dataManagement #dataGovernance