Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "system threats" wg kryterium: Temat


Wyświetlanie 1-3 z 3
Tytuł:
Rules of Cooperation Between the State Fire Service and Selected Institutions Under the Conditions of CBRN Threats, Including Biological Ones — Analysis of Polish Solutions
Autorzy:
Kogut, Bogusław
Mika, Janusz
Ratusznyj, Roman
Powiązania:
https://bibliotekanauki.pl/articles/1374931.pdf
Data publikacji:
2019
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
security
threats
collaboration
cooperation
state
law
system
Opis:
The article presents conclusions from the analysis of solutions applied in Poland in the field of implementation of joint projects of the State Fire Service and selected institutions responsible for ensuring the internal security of the state in the field of counteracting CBRN threats, including biological ones. The analysis refers to the binding legal system and the organizational solutions resulting from it. The considered legal order included the provisions of universally binding law and local law. It was assumed that the use of weapons of mass destruction in a terrorist attack might be executed through the contamination of air, water or soil, as well as by disease carriers: infected insects, rodents or people. One of the real methods of performing bioterrorists attacks is to contaminate the air by spraying, for example, biological aerosol. That is since aerosol production equipment is easily accessible, and most biological agents can be easily transported by air. The objects of such an attack will be primarily places with efficient air conditioning systems, public buildings and metro stations, and all places where people gather including railway stations, airports, shopping centers, sports and cultural facilities, government and public buildings, areas of military concentration, and places of public mass events. The considerations presented in this article refer to issues on a macro and micro scale, which allowed for distinguishing the rules of cooperation and its effectiveness. While endeavoring to objectify the conclusions from the analysis, the article was elaborated by a team of Polish, Czech, and Ukrainian experts.
Źródło:
Internal Security; 2019, 11(1); 73-83
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Polish Strategy to Counteract an Immigration Threat
Autorzy:
Lubiewski, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/1374881.pdf
Data publikacji:
2018
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
state security system
state security strategy
immigration threats
Opis:
The article concerns the assessment of the issue of immigration in Poland from a strategic perspective, in the context of the directions of counteracting possible threats generated by this phenomenon. The contemporary state has to deal with many dilemmas, among which undoubtedly is the phenomenon of immigration. It is not a problem if it is coming up against the needs of the state of immigration, such as filling shortages in the domestic labor market. However, as the experience of Western European countries shows, this phenomenon is not easily regulated, and therefore it is not difficult to generate risks instead of the planned benefits. In this context, one should remember about the situation of Western European countries with extensive migration networks on their territories. It concerns not only the problems they are currently facing in trying to regulate the inflow of immigrants, but also far from the expected effects of actions aimed at integrating the immigrant communities with the new state. In the Polish strategic documents for years, immigration has been defined as a phenomenon requiring special attention of the state. Subsequent security strategies in their assessments sustained this direction of perception, however, this did not result in a wider approach to the problem. It seems, however, that the state security system requires continuous improvement of threats monitoring mechanisms, mainly to precisely determine not only the risk of their occurrence and scope, but also to define methods of counteracting them.
Źródło:
Internal Security; 2018, 10(1); 57-68
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Public Security and its Contexts
Autorzy:
Hejduk, Monika
Powiązania:
https://bibliotekanauki.pl/articles/1375043.pdf
Data publikacji:
2020
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
security
system
public security
public order
threats
law
administration
Opis:
The considerations presented in this article are based on several assumptions. First of all, the human environment and the set of its elements are constantly changing. In the early periods of evolution and development of humanity, man lived in conditions given by nature itself, no different than in natural conditions. However, even then, he was also exposed to threats, mainly natural, including disasters. Secondly, with the passage of time and development there was a very large population increase, which caused changes in quite primitive interpersonal and social relations. More and more organized communities, states began to emerge. With this development, new threats also appeared. In addition to the natural threats, which were already natural by their very name, the threats of a social nature began to emerge from the natural world around us, characterized by continuous and dynamic changes. Thirdly, man, who wanted to effectively deal with the problems of the threats he faced, created safety systems. One of them is the public security system. Fourthly, in today’s security environment there is a paradox that in practice these systems function, and in theory there is no commonly accepted definition of public security. The circumstances outlined above determined the shape of this article, the essence of which was to work out a compromise definition of public security based on the interpretation of this concept by recognized authorities in the field of law, administration and security.
Źródło:
Internal Security; 2020, 12(1); 55-68
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-3 z 3

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies