Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "migration monitoring" wg kryterium: Temat


Wyświetlanie 1-1 z 1
Tytuł:
Poles in Great Britain after 2004. An attempt at analysis of selected security aspects
Autorzy:
Piątek, Jarosław
Powiązania:
https://bibliotekanauki.pl/articles/2031491.pdf
Data publikacji:
2017-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
Security
migration
Great Britain
public security
public space
monitoring
Opis:
The multitude of defining the concept of security is related to the fact that representatives of various fields of science describe and perceive this phenomenon from the point of view of terminology, own knowledge, as well as from the scope of their discipline. For many security is a belief that you are out of the reach of any threat. Based on the Copenhagen school theory, the essence of the objective and subjective understanding of security was emphasized. Against this background, the movement of people was analyzed as a security issue. Poles living in Great Britain are more often in contact with this issue than in their country of origin. The scale of threats is extremely different. For Poles migrating to the UK, the most dangerous threats appear to be in the social sphere. The aim of the article is to analyze the phenomenon of Polish migration to Great Britain after 2004. Additionally, the process of describing security and its transition from the sphere of theory to practice was attempted. Although in the open public space, on city streets, parks and squares, there are personal threats related to crimes, as well as to social threats – attacks and assaults caused by frustrated and aggressive groups or individuals, Poles feel safe. Despite knowing about terrorism or manifestations of social or cultural phobias, Poles migrate to Great Britain. In addition, the article attempts to prove that the technological extension of public space leads to a sense of greater security.
Źródło:
Reality of Politics; 2017, 8; 74-89
2082-3959
Pojawia się w:
Reality of Politics
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-1 z 1

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies