Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Terrorism" wg kryterium: Wszystkie pola


Tytuł:
The Phenomenon of Terrorism as a Threat to International Security
Autorzy:
Szkurłat, Izabela
Powiązania:
https://bibliotekanauki.pl/articles/1807987.pdf
Data publikacji:
2020-03-17
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
terrorist attacks
Islamic terrorism
terrorism and media
international security
Opis:
The article presents terrorism as a threat to international security in the 21st century. The problem with defining terrorism has been present for many years and the available definitions are developed based on the main features of terrorism. The article emphasises that terrorism has evolved through the 20th and 21st centuries. Terrorist incidents have become more unpredictable in terms of place and time, and so did methods of carrying out the attacks. The further section describes the impact of terrorist attacks on public opinion and the perception of terrorism. The consequence of presenting terrorist incidents in the media is the widespread sense of threat of terrorism. Terrorists use the mass media to convey their ideologies and the medium that is most used by them is the Internet. Based on examples, the author demonstrates that terrorism has an influence on policies adapted by countries and is an economic threat. Finally, the article states that despite the lower frequency of incidents in Europe, terrorism is still a problem and subsequent terrorist incidents are only a matter of time. Fewer terrorist attacks in Europe do not mean that terrorist organisations are weaker.
Źródło:
Security Dimensions; 2019, 31(31); 32-45
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Combating terrorism. Classification of terrorist acts
Autorzy:
Fedotov, Оleksandr
Powiązania:
https://bibliotekanauki.pl/articles/1861719.pdf
Data publikacji:
2014
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
anti-terrorist coalition
international terrorism
Opis:
This paper examines the fight against terrorism and the classification of terrorist attacks. Mass and geographic prevalence of terrorist acts and their output in most cases beyond one particular country, as well as the availability of sustainable and carefully conspiratorial network connection between different terrorist groups that operate even in different regions of the world to characterize contemporary terrorism as a phenomenon having an international character.
Źródło:
Security Dimensions; 2014, 12(12); 29-33
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
SUICIDE TERRORISM AND SACRED VALUES. SCOTT ATRAN ON GENESIS AND FIGHT WITH TERRORISM
Autorzy:
Konrad, Szocik,
Powiązania:
https://bibliotekanauki.pl/articles/891691.pdf
Data publikacji:
2018-08-20
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism; suicide terrorism; sacred values; inter-group dynamics; symbolic reconciliation
Opis:
Current terrorism is one of the most important problems. It appears that Poland is less threatened by terroristic attacks than Great Britain, France or Germany. However, recent calls to global jihad and terroristic attacks show that it is not possibile to exclude any risk of attack. There are many different intepretations and explanations of terrorism and much less practical solutions. Many theories seem uneffective. This paper shows some significant features of current terrorism, especially suicide terrorism, and potential solutions for anti-terroristic prevention. The author refers to approach of Scott Atran who underlines the role played by the concept of „sacred value” in genesis of terrorism, as well as a significance of symbolic reconciliation for anti-terroristic prevention.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2015, 18; 185-205
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Terrorism and its Typologies
Autorzy:
Chojnowski, Lech
Powiązania:
https://bibliotekanauki.pl/articles/1807878.pdf
Data publikacji:
2020-06-30
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
terror
violence
asymmetric threats
typology
Opis:
The article refers to selected aspects of knowledge about terrorism and its typology. The introduction explains the etymology of this concept and highlights the problem of diversity in the definition of terrorism. The next part cites several definitions of terrorism, which, in the author’s opinion, reflect the essence of this phenomenon. The difference between terrorism and terror, which are two terms that should not be used interchangeably, is also explained. The next part of the article illustrates the source of the problem which makes it impossible to agree on a commonly accepted definition of terrorism by giving an example of the wording of the Arab Convention for the Suppression of Terrorism. Then, the inherent feature of terrorism is explained, which is its asymmetry. The last part of the article concerns a typology of terrorism. It presents in a synthetic way various categories of terrorism, distinguished according to such criteria as: actors, motives, strategic (final) goals, close (closer) goals, type of actions, nature of the object of attacks, international implications, and means and methods used by terrorists. The article ends with a concise summary of the considerations on the theoretical aspects of terrorism undertaken in it.
Źródło:
Security Dimensions; 2020, 33(33); 22-39
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
THREATS OF MODERN TERRORIST ORGANIZATIONS AND STATE SPONSORED TERRORISM - THE CASE OF ISLAMIC STATE
Autorzy:
SHERIF, SHEHATA,
Powiązania:
https://bibliotekanauki.pl/articles/891326.pdf
Data publikacji:
2018-08-20
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
Jihadist
Islamic State
state-sponsored terrorism
threat
security
Opis:
Since the appearance of the so-called Islamic State, the world is encountering a terrorist organization with an outreach and operational model never before witnessed. With its unprecedented financial power, the theme of state-sponsored terrorism is resurfacing taking into consideration its possible correlation to the inexplicable domination of IS to the theatre of modern terrorism. In light of the existing threat posed by IS, and its expected proliferation in the foreseeable future, discussions on means to combat this phenomenon should attract more attention on academic, political, and social levels, with the hope of finding a comprehensive long-lasting remedy for this highly contagious plague.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2015, 19; 216-233
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Utøya – Christchurch – Halle. Right-wing Extremists’ Terrorism
Autorzy:
Wojtasik, Karolina
Powiązania:
https://bibliotekanauki.pl/articles/1807870.pdf
Data publikacji:
2020-06-30
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
radicalism
right-wing extremists
far-right
Opis:
The article deals with three terrorist attacks of right-wing extremists: in Norway (2011), New Zealand (2019) and Germany (2019). First, the modus operandi of perpetrators was shown and the course of each attack was analyzed. It was indicated what tactics the attackers used and why it was or was not effective. Secondly, the ideological background and motivations of the perpetrators were shown. It was possible to analyze the manifestos that the perpetrators left, and thus their way of thinking, their ideologies, and the purposes of organizing the attacks. Thirdly, issues related to the publicizing of the attacks by the perpetrators were shown. The goal of the article is to show that radical ideology of right-wing extremists (expressed in manifestos) leads to tragedies. In analyzed cases radical appointment of the perpetrators caused three deadly attacks. The article shows that the radical actions are preceded by radical speech, expressions, manifestos. The second goal is to pay attention to hate speech (also expressed in manifestos), which is just as dangerous as bullets or improvised explosive devices. The third goal is to show how the attackers used acts of terror to spread the ideologies to which they were devoted.
Źródło:
Security Dimensions; 2020, 33(33); 84-97
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
From Terrorism to Cyberterrorism
Autorzy:
Smejkal, Vladimír
Powiązania:
https://bibliotekanauki.pl/articles/1835827.pdf
Data publikacji:
2018-08-23
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
cyberterrorism
information war
cyberwar
Czech Cyber Security Act
cybercrime
Opis:
The paper deals with a new phenomenon of crime – the terrorism in cyberspace. Terrorism, cyberterrorism and cyberwar are defined here. The paper focuses on the systemic integration of cyberterrorism into the structure of terrorist attacks, describes various types of attacks in cyberspace, and deals with the legal definition of cyberterrorism. Since the 1990´s, war and armed conflict have been moving increasingly from the interstate to the intrastate area. In the postmodern conflict, besides government troops, various irregular paramilitary groups, most commonly defined tribally, ethnically, or religiously, keep on fighting. However, their military activities are usually linked to a largescale criminal activity. Whereas, in standard wars, we expect states and their armed forces to be parties to the conflict, in the case of the postmodern conflict, hybrid wars, and the so-called asymmetric threats, war is not separated from the life of the civil society, as it used to be in standard wars of the 20th century. It is also increasingly difficult to separate war and terrorist attacks. Cyberattacks are becoming a part of terrorist attacks. Modern information technologies are becoming more and more important in spreading ideologies which provide a fertile ground for terrorism, as they are increasingly important for training and teaching terrorist practices. Terrorists use the Internet as a means of spreading propaganda aimed at recruiting sympathizers as well as instructions and manuals for training or attack planning. Cryptocurrencies such as bitcoins are used to transfer finances. In this context, cyberterrorism could be defined as the use of the means of modern information and communication technologies to implement an act of violence, in order to provoke a certain reaction (from the point of view of terrorists, in ideal case, the by them required psychological reaction) of the audience of the terrorist act. In the case of cyberterrorism, it would be a politically motivated attack on instruments and / or the process of obtaining and / or processing electronic data which, as a result, means violence against non-military targets and the purpose of which is to influence, in a certain way, a wider circle of recipients rather than the direct victims of such an attack. While mostly natural persons are the target of typical terrorism, in the case of cyberterrorism, on the contrary, the attacks are aimed at state authorities, corporations, and the critical infrastructure. It is a question whether in these cases we are able to correctly assess whether it is a terrorist attack or an (unreported) information or cyberwar conducted by a foreign state. In some cases, we cannot even be sure whether it is a criminal act which is masked as a terrorist one or vice versa, which is easier to do in cyberspace rather than in the material world.
Źródło:
Security Dimensions; 2018, 25(25); 118-130
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Terrorism and Organised Crime Networks – Different or Similar?
Autorzy:
Doroszczyk, Justyna
Powiązania:
https://bibliotekanauki.pl/articles/1832602.pdf
Data publikacji:
2017
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
terrorism
organized crime
criminal activities
Opis:
The article is devoted to the examination of similarities and differences in the functioning and structures, applied measures of transnational organized crime and terrorist groups. The main point of view is the thesis that after the end of the Cold War the possibility of effective cooperation between organized crime and terrorist groups highly increased. Both organized crime and terrorism use similar modes of operation as well as means of achieving goals. Paper expose the primary difference between the activity of terrorists and criminals, which is motivation. Nevertheless both organization realize two different forms of criminal activity.
Źródło:
Security Dimensions; 2017, 23(23); 87-97
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
PRAWNE ASPEKTY WALKI Z TERRORYZMEM
LEGAL ASPECTS OF FIGHTING TERRORISM
Autorzy:
Bartosz, Krystian
Powiązania:
https://bibliotekanauki.pl/articles/508684.pdf
Data publikacji:
2018
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
law
safety
international
Opis:
In this article author discusses issues connected with legal aspects of fighting against international terrorism. First section includes the discussion concerning steps taken by the European Union that is treaty resolutions, institutions and strategies which are components of a general notion of anti-terrorist system. Author indicates the most significant treaty regulations and institutions, furthermore their development and influence on the EU system of fighting against terrorism. In the following section the author aims to present activities proposed by the United Nations. 19 of the most important conventions and protocols accepted by the United Nations in order to eliminate terrorism threat are discussed. Author also describes the most important units created in terms of resolution, functioning for the purpose of fighting and preventing terroristic attacks. The very last section aims to illustrate Polish penal legal system in confrontation with terrorism. Author marks and specifies the most crucial aspects of Polish penal legal system which is one of the components of national anti-terrorist system.
Źródło:
Security, Economy & Law; 2018, 1/2018 (XVIII)
2353-0669
Pojawia się w:
Security, Economy & Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Is terrorism perceived in security studies as an effective strategy?
Autorzy:
Piwowarski, Juliusz
Węglarz, Patrycja
Powiązania:
https://bibliotekanauki.pl/articles/1861723.pdf
Data publikacji:
2014
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
Security
terrorism
counterterrorism
coercion
Opis:
The aim of this paper is to present standpoints prevailing among the researchers of terrorism, which refer to the problem of efficiency of terrorism treated as a coercive strategy. Authors basing on the scientific papers, which in their opinion are of key importance for this discussion, indicate the most important arguments in favor of the efficiency of terrorism and opposite ones. according to which not only terrorism is inefficient, but also antiterrorist strategies built upon misinterpreted attacks – must turn out to be defective. Analyzing few important publications in the discussed matter authors recall the notions included in it in order to provide an overview of the most important conceptions.
Źródło:
Security Dimensions; 2014, 12(12); 205-211
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Manifestation of Terrorism and Extremism in Prisons
Autorzy:
Brunová, Markéta
Vegrichtová, Barbora
Powiązania:
https://bibliotekanauki.pl/articles/1807989.pdf
Data publikacji:
2020-03-18
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
prison service
radicalization
terrorism
security
prevention
Opis:
The paper deals with prison facilities from the perspective of the security threats of radicalization and terrorism. Prisons are continuously assessed as an ideal recruitment pool for extremist and terrorist organizations. Prison environment concentrates various persons with criminal past and with the tendencies to accept different ideological doctrines or radical interpretations of religions. Many of prisoners suffer from stress, lack of social and family support, uncertain future, depressions and frustration. Such factors could initiate or accelerate radicalization process in correctional facilities. This security problem is in contemporary days discussed in many European countries. All security experts and academic institutions came to the fact, that the crucial attribute of this issue is prevention and appropriate identification of the indicators of radicalization. The paper gives an overview of the most significant findings in this field, summarizes the experiences of Czech Republic and gives examples of good practices.
Źródło:
Security Dimensions; 2019, 31(31); 110-116
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Violence Resembling Terrorism: Adaptive Challenges and Technical Problems in First Responder Collaboration
Autorzy:
Ihatsu, Tero
Powiązania:
https://bibliotekanauki.pl/articles/1807612.pdf
Data publikacji:
2021-09-30
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
first responders
terrorism
active shooter
Opis:
In situations that involve violence resembling terrorism (VRT), flexible management and collaboration between authorities are the keys to successful operations. As previous researches have stated, poor communication and poor procedures are the main challenges. All challenges should be divided into adaptive challenges and technical problems, in order to gradually help the first responders to conquer them. If their differences are not recognised, first responders tend to try and solve adaptive challenges wrongly by using technical measures. In this paper, the selected incidents are examined through a multiple-case study. The findings are tied to Heifetz, Grashow, and Linsky’s model of adaptive challenges and technical problems. It is concluded that without adequate training and guidelines, first responders tend to maintain old practices, which can compromise the efficiency and safety of rescue operations.
Źródło:
Security Dimensions; 2021, 37(37); 94-122
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Propozycje nowych metod dla teorii i praktyki walki z terroryzmem
Proposals of new methods for theory and practice of the fight against terrorism
Autorzy:
Kwiatkowski, Adam
Powiązania:
https://bibliotekanauki.pl/articles/890940.pdf
Data publikacji:
2019-01-17
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
international security
terrorism
fight against terrorism
Opis:
The study is an attempt to show the vision of solving complex international problems and threats related to terrorism. This attempt, although controversial, is a search for unconventional, not always acceptable methods of minimizing the terrorist threat.
Opracowanie jest próbą pokazania wizji rozwiązywania złożonych problemów i zagrożeń międzynarodowych związanych z terroryzmem. Próba ta, choć kontrowersyjna, jest poszukiwaniem niekonwencjonalnych, nie zawsze akceptowanych metod minimalizowania zagrożenia terrorystycznego.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2018, 31; 119-134
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
WYBRANE ROZWIĄZANIA PRAWNOMIĘDZYNARODOWE W OBSZARZE PRZECIWDZIAŁANIA I ZWALCZANIA TERRORYZMU
Autorzy:
Jarosław, Cymerski,
Powiązania:
https://bibliotekanauki.pl/articles/891063.pdf
Data publikacji:
2018-08-22
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
terrorism
a security system
counteraction
the fight against terrorism
Opis:
The rapid growth of international terrorism in recent years has caused the need to develop and use effective methods to combat it on many levels. In addition, preventative measures against terrorists can not wait for the next attack on their part. But puts the responsibility for the proper functioning of the safety system required skillful drawing conclusions from experience, and consequently stimulate the adoption of effective solutions to fight against this menacing phenomenon. Terrorism is undoubtedly one of the most important security challenges most of countries.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2013, 14; 5-30
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
LOCAL ENVIRONMENT FACING THE MODERN TERRORISM THREATS
Autorzy:
Tomasz, Łachacz,
Jarosław, Kamiński,
Powiązania:
https://bibliotekanauki.pl/articles/891781.pdf
Data publikacji:
2018-08-20
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
local government
local community
terrorism
crisis management
training courses
Opis:
Terrorism is one of the most crucial state security threat. This phenomenon with global form is more and more popular in local community. In the face of danger necessary is well prepared military and local crisis management structures to overcome this phenomenon.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2015, 19; 124-138
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies