<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.journaldot.pl/Propaganda-Mission-Command-a-comparative-social-media-analysis-between-the-Badri,189269,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-189269-117275?filename=117275.pdf</loc></url><url><loc>https://www.journaldot.pl/Tackling-disinformation-in-the-UE-with-truthster-technological-design-and-DLT,189285,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-189285-117277?filename=117277.pdf</loc></url><url><loc>https://www.journaldot.pl/Ukryte-zasoby-Internetu-a-terroryzm,189286,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-189286-117287?filename=117287.pdf</loc></url><url><loc>https://www.journaldot.pl/HOMO-GEPETENS-Czlowiek-i-sztuczna-inteligencja-karzel-na-ramionach-olbrzyma-,189310,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-189310-117284?filename=117284.pdf</loc></url><url><loc>https://www.journaldot.pl/New-challenges-of-local-and-regional-public-service-provision-platforms-and-their,189319,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-189319-117280?filename=117280.pdf</loc></url><url><loc>https://www.journaldot.pl/Konteneryzacja-nowoczesna-metoda-utrzymywania-uslug,189321,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-189321-117285?filename=117285.pdf</loc></url><url><loc>https://www.journaldot.pl/Freedom-of-Expression-on-the-Internet-and-National-Security-in-Europe-Liberty-and,192648,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-192648-117281?filename=117281.pdf</loc></url><url><loc>https://www.journaldot.pl/Affordability-of-quality-case-of-Slovenian-online-shopping,194388,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-194388-117283?filename=117283.pdf</loc></url><url><loc>https://www.journaldot.pl/Dezinformacja-jako-narzedzie-manipulacji-w-sieci,196011,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-196011-117278?filename=117278.pdf</loc></url><url><loc>https://www.journaldot.pl/The-Iranian-Cyberattacks-in-Albania-Actors-Tactics-Targets,196772,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-196772-117282?filename=117282.pdf</loc></url><url><loc>https://www.journaldot.pl/Tozsamosc-cyfrowa-jako-prawo-do-dostepu-do-technologii-produktow-i-uslug-cyfrowych,196891,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-196891-117276?filename=117276.pdf</loc></url><url><loc>https://www.journaldot.pl/Wstep,196917,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-196917-117274?filename=117274.pdf</loc></url><url><loc>https://www.journaldot.pl/Wstep,196917,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-196917-117333?filename=117333.pdf</loc></url><url><loc>https://www.journaldot.pl/Sprawozdanie-z-corocznego-spotkania-Partnerow-Rejestru-domeny-pl,196926,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-196926-117286?filename=117286.pdf</loc></url><url><loc>https://www.journaldot.pl/Sprawozdanie-z-corocznego-spotkania-Partnerow-Rejestru-domeny-pl,196926,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-196926-117332?filename=117332.pdf</loc></url><url><loc>https://www.journaldot.pl/Sztuczna-inteligencja-od-hakowania-czlowieka-do-hakowania-natury-,200061,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-200061-120368?filename=120368.pdf</loc></url><url><loc>https://www.journaldot.pl/Online-Conspiracy-Theories-and-the-Role-of-Conspiracy-Influencers,205575,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-205575-125554?filename=125554.pdf</loc></url><url><loc>https://www.journaldot.pl/From-Online-Media-World-Socialization-to-the-AI-Connected-Society-nAn-Introduction,207840,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-207840-126706?filename=126706.pdf</loc></url><url><loc>https://www.journaldot.pl/Using-Critical-Realism-to-analyse-Big-Data-ontic-epistemic-and-ethical-assumptions,209115,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-209115-128332?filename=128332.pdf</loc></url><url><loc>https://www.journaldot.pl/Latvia-s-Drone-Diplomacy,212561,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-212561-130842?filename=130842.pdf</loc></url><url><loc>https://www.journaldot.pl/Sharp-power-w-strukturze-sieci-polsko-bialoruskiego-konfliktu-hybrydowego,214040,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-214040-132031?filename=132031.pdf</loc></url><url><loc>https://www.journaldot.pl/State-Surveillance-in-Serbia-Examining-the-Role-of-Chinese-Supplied-Surveillance,214711,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-214711-132517?filename=132517.pdf</loc></url><url><loc>https://www.journaldot.pl/Dyrektywa-NIS-2-jako-narzedzie-wzmacniania-bezpieczenstwa-lokalnego-i-narodowego,215365,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-215365-132995?filename=132995.pdf</loc></url><url><loc>https://www.journaldot.pl/Cyberbezpieczenstwo-w-cyberprzestrzeni-nZagrozenia-i-aspekty-ochrony-w-dobie-sztucznej,215385,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-215385-133005?filename=133005.pdf</loc></url><url><loc>https://www.journaldot.pl/Piractwo-w-sieci-w-kontekscie-utworow-muzycznych-wspolczesne-zagrozenia-i-konsekwencje,215788,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-215788-133393?filename=133393.pdf</loc></url><url><loc>https://www.journaldot.pl/Criminal-liability-for-the-offence-of-disrupting-the-functioning-of-an-IT-network,215838,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-215838-133417?filename=133417.pdf</loc></url><url><loc>https://www.journaldot.pl/Governing-Digital-Ecosystems-in-the-EU-A-Coordinated-Regulatory-Approach,215839,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-215839-133973?filename=133973.pdf</loc></url><url><loc>https://www.journaldot.pl/Wstep,215864,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-215864-133975?filename=133975.pdf</loc></url><url><loc>https://www.journaldot.pl/Wstep,215864,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-215864-133976?filename=133976.pdf</loc></url><url><loc>https://www.journaldot.pl/Sport-w-epoce-cyfrowej-Zroznicowane-wymiary-rywalizacji,215871,0,2.html</loc></url><url><loc>https://www.journaldot.pl/pdf-215871-133974?filename=133974.pdf</loc></url></urlset>