Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Kozłowska, Elżbieta." wg kryterium: Autor


Wyświetlanie 1-2 z 2
Tytuł:
Bezpieczeństwo osób nietrzeźwych w izbach wytrzeźwień. Technika cyfrowa jako instrument bezpieczeństwa
Autorzy:
Żywucka-Kozłowska, Elżbieta
Broniecka, Rossana
Powiązania:
https://bibliotekanauki.pl/articles/13948739.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
sobering chamber
state of intoxication
digital technology
safety
Opis:
The aim of the elaboration is an attempt to threaten the safety of an alcoholic intoxicated person in sobering chamber. In accordance with the legal regulations adopted in this regard, medical staff is employed in such a facility – a doctor or feldsher and a nurse or paramedic. However, despite the procedures adopted in such facilities, there is a threat to the safety of intoxicated persons, as well as to the safety of the staff working there. The sobering chamber admits people whose intoxication determines the alcohol content above 0.5 per mille and whose influence affects themselves or otherwise, as well as intoxicated persons causing scandal in a public place. Rules have also been adopted that intoxicated people with alcohol equal to or higher than 4 per mille are referred to medical transport for care. The support of the safety of people staying in such facilities is video monitoring, which allows not only constant observation of people staying in sobering stations, but also but also playback of recordings for the purpose of evaluating events and their reconstruction.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 184-193
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security Threats to Port Critical Infrastructure
Autorzy:
Żywucka-Kozłowska, Elżbieta
Broniecka, Rossana
Powiązania:
https://bibliotekanauki.pl/articles/31342014.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
critical infrastructure
threat
security
seaport
Opis:
Critical infrastructure is a key element of the functional security of any country. Sea ports (but also river ports) are part of the CI system of the country. The security of such sites is particularly important for the continuity of supply and transit of goods transported by vessels. Ports have always been protected from potential threats. Today, these threats have become more real, particularly as a result of the Russian Federation’s attack on Ukraine. Poland, which today has the status of a frontier state, is a target of espionage and sabotage activities. Security is a state of non-threat. This is the state to which we aspire in every area of modern life of every society, every country. Seaports, like other places, which are essential (special) for the unimpeded and secure delivery of goods. They’ve always been under special surveillance and special protection. Destruction of the port makes it impossible to transport by sea, which is obvious. Threats to port security come from different sources, but at a time of ongoing war in Ukraine, terrorist attacks come to the fore. It is also necessary to highlight the hybrid actions on the border with Belarus, which affect the state of security. Poland, as a front-line country, is particularly vulnerable to acts of terror, diversion and espionage, which is confirmed by the actions of the special services. Monitoring of seaports is part of the security strategy of the critical infrastructure of these places. The threat of CI ports is real, especially at the present time. This applies in particular to the LNG terminal in Świnoujście, which is regularly visited by ships (gas carriers) supplying raw materials of strategic importance. Violation of security rules (principles) may lead to a threat that cannot be ruled out, however, the most important and dangerous are those that come from the outside and are of an intentional nature.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 273-281
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-2 z 2

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies