- Tytuł:
- Planning a Research Process in Security Sciences Through Methods of Operational Research
- Autorzy:
- Gikiewicz, Magdalena
- Powiązania:
- https://bibliotekanauki.pl/articles/1374841.pdf
- Data publikacji:
- 2019
- Wydawca:
- Wyższa Szkoła Policji w Szczytnie
- Tematy:
-
civil security
crisis management
social engagement
citizen empowerment - Opis:
- This article presents fundamental issues related to the process of planning scientific research in security sciences based on methods belonging to operational research. Operational research is one of the areas that are intensively developed and implemented towards security and performance improvement in areas such as planning, organizing, implementing or controlling various types of projects. Therefore, issues related to operational research, its methodological foundations, and the use of network programming methods in the field of planning research process required a broader explanation in the context of security sciences. As a consequence, a reference to the decision model was made. It was stated that each decision related to security research increases the demand for methods of analysis and objective assessment. Each undertaking, in particular this related to security research, is associated with specific goals, the achievement of which requires possession of appropriate forces and resources. This study refers to the essence of project implementation time, which is very often limited and can be used in a variety of ways, which is determined by the specific conditions in which the technical, organizational or other activities are carried out. As a consequence of the above, it is stated that the research process is characterized by conducting a sequence of activities aimed at achieving research goal, solving research problem or verifying hypothesis within a specified time frame. It is also stated that each research process has a specific duration and one can be tempted to state that it is usually unique.
- Źródło:
-
Internal Security; 2019, 11(2); 9-20
2080-5268 - Pojawia się w:
- Internal Security
- Dostawca treści:
- Biblioteka Nauki