Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Terrorism" wg kryterium: Wszystkie pola


Tytuł:
The Phenomenon of Terrorism as a Threat to International Security
Autorzy:
Szkurłat, Izabela
Powiązania:
https://bibliotekanauki.pl/articles/1807987.pdf
Data publikacji:
2020-03-17
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
terrorist attacks
Islamic terrorism
terrorism and media
international security
Opis:
The article presents terrorism as a threat to international security in the 21st century. The problem with defining terrorism has been present for many years and the available definitions are developed based on the main features of terrorism. The article emphasises that terrorism has evolved through the 20th and 21st centuries. Terrorist incidents have become more unpredictable in terms of place and time, and so did methods of carrying out the attacks. The further section describes the impact of terrorist attacks on public opinion and the perception of terrorism. The consequence of presenting terrorist incidents in the media is the widespread sense of threat of terrorism. Terrorists use the mass media to convey their ideologies and the medium that is most used by them is the Internet. Based on examples, the author demonstrates that terrorism has an influence on policies adapted by countries and is an economic threat. Finally, the article states that despite the lower frequency of incidents in Europe, terrorism is still a problem and subsequent terrorist incidents are only a matter of time. Fewer terrorist attacks in Europe do not mean that terrorist organisations are weaker.
Źródło:
Security Dimensions; 2019, 31(31); 32-45
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Combating terrorism. Classification of terrorist acts
Autorzy:
Fedotov, Оleksandr
Powiązania:
https://bibliotekanauki.pl/articles/1861719.pdf
Data publikacji:
2014
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
anti-terrorist coalition
international terrorism
Opis:
This paper examines the fight against terrorism and the classification of terrorist attacks. Mass and geographic prevalence of terrorist acts and their output in most cases beyond one particular country, as well as the availability of sustainable and carefully conspiratorial network connection between different terrorist groups that operate even in different regions of the world to characterize contemporary terrorism as a phenomenon having an international character.
Źródło:
Security Dimensions; 2014, 12(12); 29-33
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Terrorism and its Typologies
Autorzy:
Chojnowski, Lech
Powiązania:
https://bibliotekanauki.pl/articles/1807878.pdf
Data publikacji:
2020-06-30
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
terror
violence
asymmetric threats
typology
Opis:
The article refers to selected aspects of knowledge about terrorism and its typology. The introduction explains the etymology of this concept and highlights the problem of diversity in the definition of terrorism. The next part cites several definitions of terrorism, which, in the author’s opinion, reflect the essence of this phenomenon. The difference between terrorism and terror, which are two terms that should not be used interchangeably, is also explained. The next part of the article illustrates the source of the problem which makes it impossible to agree on a commonly accepted definition of terrorism by giving an example of the wording of the Arab Convention for the Suppression of Terrorism. Then, the inherent feature of terrorism is explained, which is its asymmetry. The last part of the article concerns a typology of terrorism. It presents in a synthetic way various categories of terrorism, distinguished according to such criteria as: actors, motives, strategic (final) goals, close (closer) goals, type of actions, nature of the object of attacks, international implications, and means and methods used by terrorists. The article ends with a concise summary of the considerations on the theoretical aspects of terrorism undertaken in it.
Źródło:
Security Dimensions; 2020, 33(33); 22-39
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Utøya – Christchurch – Halle. Right-wing Extremists’ Terrorism
Autorzy:
Wojtasik, Karolina
Powiązania:
https://bibliotekanauki.pl/articles/1807870.pdf
Data publikacji:
2020-06-30
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
radicalism
right-wing extremists
far-right
Opis:
The article deals with three terrorist attacks of right-wing extremists: in Norway (2011), New Zealand (2019) and Germany (2019). First, the modus operandi of perpetrators was shown and the course of each attack was analyzed. It was indicated what tactics the attackers used and why it was or was not effective. Secondly, the ideological background and motivations of the perpetrators were shown. It was possible to analyze the manifestos that the perpetrators left, and thus their way of thinking, their ideologies, and the purposes of organizing the attacks. Thirdly, issues related to the publicizing of the attacks by the perpetrators were shown. The goal of the article is to show that radical ideology of right-wing extremists (expressed in manifestos) leads to tragedies. In analyzed cases radical appointment of the perpetrators caused three deadly attacks. The article shows that the radical actions are preceded by radical speech, expressions, manifestos. The second goal is to pay attention to hate speech (also expressed in manifestos), which is just as dangerous as bullets or improvised explosive devices. The third goal is to show how the attackers used acts of terror to spread the ideologies to which they were devoted.
Źródło:
Security Dimensions; 2020, 33(33); 84-97
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
From Terrorism to Cyberterrorism
Autorzy:
Smejkal, Vladimír
Powiązania:
https://bibliotekanauki.pl/articles/1835827.pdf
Data publikacji:
2018-08-23
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
cyberterrorism
information war
cyberwar
Czech Cyber Security Act
cybercrime
Opis:
The paper deals with a new phenomenon of crime – the terrorism in cyberspace. Terrorism, cyberterrorism and cyberwar are defined here. The paper focuses on the systemic integration of cyberterrorism into the structure of terrorist attacks, describes various types of attacks in cyberspace, and deals with the legal definition of cyberterrorism. Since the 1990´s, war and armed conflict have been moving increasingly from the interstate to the intrastate area. In the postmodern conflict, besides government troops, various irregular paramilitary groups, most commonly defined tribally, ethnically, or religiously, keep on fighting. However, their military activities are usually linked to a largescale criminal activity. Whereas, in standard wars, we expect states and their armed forces to be parties to the conflict, in the case of the postmodern conflict, hybrid wars, and the so-called asymmetric threats, war is not separated from the life of the civil society, as it used to be in standard wars of the 20th century. It is also increasingly difficult to separate war and terrorist attacks. Cyberattacks are becoming a part of terrorist attacks. Modern information technologies are becoming more and more important in spreading ideologies which provide a fertile ground for terrorism, as they are increasingly important for training and teaching terrorist practices. Terrorists use the Internet as a means of spreading propaganda aimed at recruiting sympathizers as well as instructions and manuals for training or attack planning. Cryptocurrencies such as bitcoins are used to transfer finances. In this context, cyberterrorism could be defined as the use of the means of modern information and communication technologies to implement an act of violence, in order to provoke a certain reaction (from the point of view of terrorists, in ideal case, the by them required psychological reaction) of the audience of the terrorist act. In the case of cyberterrorism, it would be a politically motivated attack on instruments and / or the process of obtaining and / or processing electronic data which, as a result, means violence against non-military targets and the purpose of which is to influence, in a certain way, a wider circle of recipients rather than the direct victims of such an attack. While mostly natural persons are the target of typical terrorism, in the case of cyberterrorism, on the contrary, the attacks are aimed at state authorities, corporations, and the critical infrastructure. It is a question whether in these cases we are able to correctly assess whether it is a terrorist attack or an (unreported) information or cyberwar conducted by a foreign state. In some cases, we cannot even be sure whether it is a criminal act which is masked as a terrorist one or vice versa, which is easier to do in cyberspace rather than in the material world.
Źródło:
Security Dimensions; 2018, 25(25); 118-130
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Terrorism and Organised Crime Networks – Different or Similar?
Autorzy:
Doroszczyk, Justyna
Powiązania:
https://bibliotekanauki.pl/articles/1832602.pdf
Data publikacji:
2017
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
terrorism
organized crime
criminal activities
Opis:
The article is devoted to the examination of similarities and differences in the functioning and structures, applied measures of transnational organized crime and terrorist groups. The main point of view is the thesis that after the end of the Cold War the possibility of effective cooperation between organized crime and terrorist groups highly increased. Both organized crime and terrorism use similar modes of operation as well as means of achieving goals. Paper expose the primary difference between the activity of terrorists and criminals, which is motivation. Nevertheless both organization realize two different forms of criminal activity.
Źródło:
Security Dimensions; 2017, 23(23); 87-97
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Is terrorism perceived in security studies as an effective strategy?
Autorzy:
Piwowarski, Juliusz
Węglarz, Patrycja
Powiązania:
https://bibliotekanauki.pl/articles/1861723.pdf
Data publikacji:
2014
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
Security
terrorism
counterterrorism
coercion
Opis:
The aim of this paper is to present standpoints prevailing among the researchers of terrorism, which refer to the problem of efficiency of terrorism treated as a coercive strategy. Authors basing on the scientific papers, which in their opinion are of key importance for this discussion, indicate the most important arguments in favor of the efficiency of terrorism and opposite ones. according to which not only terrorism is inefficient, but also antiterrorist strategies built upon misinterpreted attacks – must turn out to be defective. Analyzing few important publications in the discussed matter authors recall the notions included in it in order to provide an overview of the most important conceptions.
Źródło:
Security Dimensions; 2014, 12(12); 205-211
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Manifestation of Terrorism and Extremism in Prisons
Autorzy:
Brunová, Markéta
Vegrichtová, Barbora
Powiązania:
https://bibliotekanauki.pl/articles/1807989.pdf
Data publikacji:
2020-03-18
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
prison service
radicalization
terrorism
security
prevention
Opis:
The paper deals with prison facilities from the perspective of the security threats of radicalization and terrorism. Prisons are continuously assessed as an ideal recruitment pool for extremist and terrorist organizations. Prison environment concentrates various persons with criminal past and with the tendencies to accept different ideological doctrines or radical interpretations of religions. Many of prisoners suffer from stress, lack of social and family support, uncertain future, depressions and frustration. Such factors could initiate or accelerate radicalization process in correctional facilities. This security problem is in contemporary days discussed in many European countries. All security experts and academic institutions came to the fact, that the crucial attribute of this issue is prevention and appropriate identification of the indicators of radicalization. The paper gives an overview of the most significant findings in this field, summarizes the experiences of Czech Republic and gives examples of good practices.
Źródło:
Security Dimensions; 2019, 31(31); 110-116
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Violence Resembling Terrorism: Adaptive Challenges and Technical Problems in First Responder Collaboration
Autorzy:
Ihatsu, Tero
Powiązania:
https://bibliotekanauki.pl/articles/1807612.pdf
Data publikacji:
2021-09-30
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
first responders
terrorism
active shooter
Opis:
In situations that involve violence resembling terrorism (VRT), flexible management and collaboration between authorities are the keys to successful operations. As previous researches have stated, poor communication and poor procedures are the main challenges. All challenges should be divided into adaptive challenges and technical problems, in order to gradually help the first responders to conquer them. If their differences are not recognised, first responders tend to try and solve adaptive challenges wrongly by using technical measures. In this paper, the selected incidents are examined through a multiple-case study. The findings are tied to Heifetz, Grashow, and Linsky’s model of adaptive challenges and technical problems. It is concluded that without adequate training and guidelines, first responders tend to maintain old practices, which can compromise the efficiency and safety of rescue operations.
Źródło:
Security Dimensions; 2021, 37(37); 94-122
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Maritime and port terrorism – a phenomenon analysis
Autorzy:
Osmólska, Iwona
Smolarczyk, Rajmund
Powiązania:
https://bibliotekanauki.pl/articles/54723869.pdf
Data publikacji:
2023-12-14
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
threats
maritime
port terrorism
Opis:
Background: In the era of the global threat of terrorist attacks, seaports implement a number of measures to eliminate them. As part of these activities, in addition to threat definition and risk analysis, they also take into account applicable normative documents, both international and national. However, many of these documents equate port terrorist threats with maritime terrorism, which until now has not been clearly defined. It would therefore seem desirable to define terrorist acts threatening seaports as a separate form of terrorism. Consequently, the research problem closed with the question: Is maritime terrorism the same as port terrorism and what factors distinguish them from each other? Objectives: The aim of this paper is not only to present the theoretical issues of the subject, but above all to articulate the factors that distinguish threats of maritime terrorism from threats of port terrorism and to prove that these are two different issues (problems). Methods: Theoretical research methods were used in this study, i.e. analysis of the literature, analysis of the acts of maritime terrorism that have occurred so far, and inference, which is a cognitive factor of the subject under analysis. Results: The results of the research indicate that there are significant differences between a terrorist attack on the high seas and a terrorist attack on a seaport regarding not only the consequences but also the scale of the threat.
Źródło:
Security Dimensions; 2022, 43(43); 76-91
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Policemen of Anti-Terrorist Subunits in Scientific Research
Autorzy:
Zubrzycki, Waldemar
Powiązania:
https://bibliotekanauki.pl/articles/1861556.pdf
Data publikacji:
2016
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
The Police
anti-terrorism
fighting terrorism
anti-terrorist subunit
police special commando
Opis:
Service in a special unit of the Police is extremely tedious, both in physical and mental terms, with very high expectations for their policemen. It cannot arise only from official duties, but – above all – specific lifestyle, which should be the primary stimulus for taking them. It is confirmed by research conducted among policemen-antiterrorists, relating to their motivation in taking service in anti-terrorist subunit of the Police. Studies have also shown that such service is not fully in line with the expectations of the officers, and their priorities change over its course. A lot of factors have impact on it, negatively affecting the attitude of policemen, which were revealed in the study. The results can be used to create such conditions of service, which will reduce or eliminate loss of idealistic motives for taking service in the special unit of the Police.
Źródło:
Security Dimensions; 2016, 17(17); 30-41
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Legal and Policing Model to Counter Organised Crime and Terrorism in Slovakia
Autorzy:
Lošonczi, Peter
Reitšpís, Josef
Mašľan, Martin
Powiązania:
https://bibliotekanauki.pl/articles/1808016.pdf
Data publikacji:
2019-09-09
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
organized crime
terrorism
police corps and units
legal system
criminal offenses
efficiency of activities
Opis:
Organized crime and terrorist networks belong to the most important threats in Europe, including Slovakia. The number of assets confiscated from organized crime is still increasing, which indicates its rise, especially in the areas of carousel tax fraud, unlawful financial operations, VAT collection, and the distribution of drugs. These activities are often accompanied with corruption. Europe, including Slovakia, is now facing the growing migration wave that increases the risk of foreign fighters entering its territory, who could be recruited for terrorists attacks. The efficiency of the fight against organized crime and terrorism depends on the coordination of activities, the cooperation of the involved authorities, as well as their independence, and a permanent effort to minimize unprofessional and illegal interventions into the work of police, courts and prosecution. This is an area in which permanent improvement is necessary.
Źródło:
Security Dimensions; 2019, 29(29); 127-139
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
„French Bombay” – Terrorist Attacks in Paris 13 November, 2015
Autorzy:
Jałoszyński, Kuba
Powiązania:
https://bibliotekanauki.pl/articles/1832459.pdf
Data publikacji:
2015
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
Stade de France
Bataclan
shahid belt
ISIS
Opis:
Author analyses the terrorist attacks in Bombay, 2008 and in Paris, November 2015 – several targets in Paris. In both attacks the same strategy was adopted – named here as a sequential terrorist attack. They were made by well prepared and equipped groups of terrorist attacking different targets once by once in short periods of time – like a city guerrillas. Some comparison to the attack on “Charlie Hebdo” editorial’s office, January 2015 is made – the attacks of November are not a separated act of terror but should be seen as a part and a consequence of war with Islamic State (ISIS). In this context, also including war in Eastern Ukraine, Polish security is analysed and crucial issues are outlined.
Źródło:
Security Dimensions; 2015, 16(16); 30-47
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Caliphate Calls to Arms. European ISIS Fighters in the Light of Sociological Analysis
Autorzy:
Wojtasik, Karolina
Szczepański, Marek S.
Powiązania:
https://bibliotekanauki.pl/articles/1836609.pdf
Data publikacji:
2017
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
migration
terrorism
propaganda
ISIS
Islamic State
Opis:
The article concerns European volunteers travelling to Iraq and Syria to participate in armed jihad. It includes an analysis of propaganda materials prepared for potential ISIS fighters from Europe and the broadly understood West and the characterisation of the type of motives leading to the decision to travel to the territories occupied by the so-called Islamic State (the Caliphate). The theoretical system of reference was based on push-pull model combined with the cost-benefit theory which allowed to analyse this phenomenon in the context of the most popular theories of migration.
Źródło:
Security Dimensions; 2017, 21(21); 118-129
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Current Migration as a Factor of the Terrorist Threat in Europe and Poland
Autorzy:
Piwowarski, Juliusz
Czop, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/1832475.pdf
Data publikacji:
2015
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
Migration
terrorism
Madrid
London
Paris
European Commission
Opis:
Authors analyse the structure of immigration processes in the present Europe, showing a qualitative difference between incomers to the Western countries and to Poland. The previous are reached by Muslim immigrants, finding it hard to assimilate with the host societies and therefore are keen to follow radical Islam and turn into terrorists. As examples of such situations the terrorists attacks at Madrid, London, and Paris are pointed. The latter is the destination mostly for the immigrants from neighboring countries, especially form Ukraine – they do not pose threat to Polish security and easily accommodate to Polish culture. The other analysed aspect is the influence of the immigration crisis on functioning of the European Union – both particular countries (especially Italy) and her institutions. The controversies over European Commission’s propositions for dealing with the immigration crisis are shown, with a stress put on Central European countries.
Źródło:
Security Dimensions; 2015, 16(16); 48-73
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies