Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "threat" wg kryterium: Temat


Tytuł:
Selected issues of threat management in cyberspace
Autorzy:
Barczak, Andrzej
Barczak, Michał
Powiązania:
https://bibliotekanauki.pl/articles/27323575.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
cybersecurity
threat management
cyber threat intelligence
Opis:
The paper describes the cyber threat management system. Three essential components of such a system are presented. With reference to such documents as ISO 2700, the NIST Cyber Security Framework, U.S. presidential executive orders, European Union regulations or STIX and TAXIS standards, norms, legal and standards regulations for managing cyber threats are described. The cyber threat management model is presented. Kill Chain and MITRE ATT&CK threat description methods are presented. A toolkit to support various stages of the cyber threat management process is also described.
Źródło:
Studia Informatica : systems and information technology; 2023, 1(28); 5--28
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mass Migration as a Hybrid Threat? – A Legal Perspective
Autorzy:
Dov Bachmann, Sascha-Dominik
Paphiti, Anthony
Powiązania:
https://bibliotekanauki.pl/articles/2019119.pdf
Data publikacji:
2021-03-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
migration
migrants
refugees
threat
hybrid threat
law
Opis:
Migration as a weapon sounds like a policy statement by resurgent nationalistic parties (and governments) in the West. However, politics and the human cost aside, what if an adversary (both state and non-state actor) does exploit the current global crisis of mass migration due to globalization, war, and political unrest? This article will look at the ongoing mass migration to the European Union within the wider security context of the so-called hybrid threats and/or ‘grey zone’ tactics. It looks at the various legal categories of migration as how the law can be weaponized as so-called ‘lawfare’ to undermine the existing legal frameworks distinguishing between legal and illegal migration. The authors recognize the possibility that this article will be used as an argument by the political actors involved for their nationalistic and anti-migration politics and policies. Yet, we believe that the potential of abusing the current vacuum for political gains along ideological party lines makes it necessary to provide a wider legal-security focused perspective on mass migration.
Źródło:
Polish Political Science Yearbook; 2021, 1 (50); 119-145
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Shared Cybersecurity Awareness Platform
Autorzy:
Amanowicz, Marek
Powiązania:
https://bibliotekanauki.pl/articles/1839333.pdf
Data publikacji:
2021
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cybersecurity awareness
risk and threat propagation
threat intelligence
Opis:
Ensuring a good level of cybersecurity of global IT systems requires that specific procedures and cooperation frameworks be adopted for reporting threats and for coordinating the activities undertaken by individual entities. Technical infrastructure enabling safe and reliable online collaboration between all teams responsible for security is an important element of the system as well. With the above taken into consideration, the paper presents a comprehensive distributed solution for continuous monitoring and detection of threats that may affect services that provision is essential to security and broadly understood the state’s economic interests. The said solution allows to collect, process and share distributed knowledge on hazard events. The partnership-based model of cooperation between the system’s users allows the teams to undertake specific activities at the central level, facilitates global cyber threat awareness, and enhances the process of predicting and assessing cyber risks in order to ensure a near-realtime response. The paper presents an overview of the system’s architecture, its main components, features, and threat intelligence tools supporting the safe sharing of information concerning specific events. It also offers a brief overview of the system’s deployment and its testing in an operational environment of NASK’s Computer Security Incident Response Team (CSIRT) and Security Operation Center (SOC) of essential services operators.
Źródło:
Journal of Telecommunications and Information Technology; 2021, 3; 32-41
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ROLA PROKURATORA W PROCESIE CYWILNYM
Autorzy:
Izabela, Dzierwa-Pabin,
Powiązania:
https://bibliotekanauki.pl/articles/891603.pdf
Data publikacji:
2018-08-22
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
threat
safety
lawyer
Opis:
The author presents the rules of accession of a consumer advocate, labor inspector, and social organization to the already ongoing civil trial. The operation and usefulness of these regulations was rated in terms of care for the safety of citizens and from the point of view of the sustainability of process.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2012, 11; 51-70
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
North Atlantic Treaty Security
Autorzy:
Grenda, Bogdan
Powiązania:
https://bibliotekanauki.pl/articles/576137.pdf
Data publikacji:
2017-03-21
Wydawca:
Akademia Sztuki Wojennej
Tematy:
threat
conflict
militarisation
security
Opis:
The article discusses security within the North Atlantic Treaty Organisation with respect to threats which may appear in its near and more distant surroundings. The following military threats are discussed: military conflicts, militarization of the Arctic, demonstration of Russian military power, use of weapons of mass destruction, cyber attack, terrorism and militarisation of Space. Other mentioned dangers are: natural and social ones including migration, competition among state and non-state entities as well as the phenomenon of fallen cities and states.
Źródło:
Security and Defence Quarterly; 2017, 14, 1; 21-34
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Unlawful Threat as a Statutory Feature of Criminal Offences Under Article 245 of the Polish Criminal Code. Considerations Connected with the Supreme Court and Appellate Courts Jurisprudence
Autorzy:
Górski, Adam
Michalak, Krzysztof
Klonowski, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/618799.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
unlawful threat
punishable threat
creative interpretation
groźba bezprawna
groźba karalna
wykładnia prawotwórcza
Opis:
This article aims to interpret the term “unlawful threat” under Article 245 of the Criminal Code. It can be observed that judicial decisions of the Supreme Court and legal doctrine do not provide a uniform interpretation of the term. The work discusses whether the result in the shape of a justified concern that the threat will be carried out is necessary. Such a criminal result is described in Article 190 of the Criminal Code which penalizes punishable threats. It corresponds with Article 115 § 12 of the Criminal Code which defines an unlawful threat. In the opinion of the authors, causing a justified fear that the threat will be carried out is one of the statutory features in all three cases, i.e. unlawful threats to commit a criminal offence, to institute criminal proceedings and to disseminate defamatory information.
Celem niniejszego artykułu jest dokonanie wykładni znamienia groźby bezprawnej występującego na gruncie art. 245 k.k. We wskazanym zakresie brak jest jednolitości w orzecznictwie Sądu Najwyższego, sądów apelacyjnych oraz w doktrynie. Zasadniczy problem wiąże się z kwestią zawierania się w pojęciu groźby bezprawnej skutku w postaci wzbudzenia uzasadnionej obawy spełnienia groźby. Skutek ten został określony w art. 190 k.k. opisującym przestępstwo tzw. groźby karalnej, do którego odsyła definicja ustawowa groźby bezprawnej określona w art. 115 § 12 k.k. W ocenie autorów skutek polegający na powstaniu uzasadnionej obawy spełnienia groźby należy do elementów groźby bezprawnej we wszystkich trzech przypadkach, tj. w przypadku groźby popełnienia przestępstwa, spowodowania postępowania karnego lub rozgłoszenia infamującej wiadomości.
Źródło:
Studia Iuridica Lublinensia; 2018, 27, 2
1731-6375
Pojawia się w:
Studia Iuridica Lublinensia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Radiofobia w świecie plotki. Katastrofa w Czarnobylu a wybuchy paniki we współczesnej Polsce
Autorzy:
Ewa, Rosiak-Zięba,
Powiązania:
https://bibliotekanauki.pl/articles/897300.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Warszawski. Wydawnictwa Uniwersytetu Warszawskiego
Tematy:
radiophobia
gossip
nuclear threat
Opis:
In this paper I examine traces of radiophobia in gossips as a manifestation of culture in the shadow of an atomic bomb. This study aims to recognize main social functions of this kind of folktales. The field of research is narrowed down mainly to folktales disseminated in Poland. The methods employed during an investigation include an analysis of narratives published in the Internet and newspaper news. The study shows that some of these gossips provide both simplified records of past experience of humanity in the field of nuclear energy, and certain guidelines helping to cope with basic risks involved.
Źródło:
Przegląd Humanistyczny; 2017, 61(1 (456)); 139-146
0033-2194
Pojawia się w:
Przegląd Humanistyczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Challenges and Hazards of the Third Decade of the 21st Century
Autorzy:
Wiśniewski, Bernard
Powiązania:
https://bibliotekanauki.pl/articles/1807690.pdf
Data publikacji:
2021-03-31
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
challenge
threat
prognosis
Opis:
The aim of the considerations presented here is to gather and share information and knowledge on contemporary challenges and threats that can help to rationally anticipate the future in the third decade of the 21st century. The article consists of three parts, i.e. the introduction, covering the basic terminological arrangements; then, forecasts of challenges and threats in the macro scale for the next ten years; and, finally, the summary. In the preparation of the article, theoretical methods and research techniques were used. The choice of the research technique was governed by the following criteria: purposefulness, clarity, univocality, effectiveness, reliability, and cost-effectiveness. These criteria determined the use of inductive inference, deductive reasoning, explanation, analysis, and synthesis. In the course of the research, critical analysis of the literature was also carried out, which was divided into groups of studies, i.e.: those devoted to the methodology of research activities, those concerning security theory, and those containing elements of prognostics. The presented considerations indicate that the third decade of the 21st century will be a time in which the existing challenges and threats will persist. However, the scale of the latter will increase, which may create many problems, mainly related to decision-making.
Źródło:
Security Dimensions; 2021, 35(35); 179-191
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Political risk on financial markets in developed and developing economies
Autorzy:
Waszkiewicz, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/522248.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Ekonomiczny w Katowicach
Tematy:
International finance
Stability
Threat
Opis:
Aim/purpose – We want to draw academics and market practitioners attention to threats form political risk’s area that affect national financial markets in both developed and developing economies. Design/methodology/approach – We analyzed the wide concept of political risk on the basis of international literature as well as national statistical data and international comparative indicants for selected developed and developing economies around the world. Findings – Growing significance of political risk was signaled, although both types of economies are exposed to different aspects of the threat. We confirmed that developing states are threatened by bigger number of political bothers, whereas advanced countries are susceptible to some forms of violence. Research implications/limitations – Imply that economies with better economic stance have lower level of political risk, although, their highly developed and integrated financial markets are responsible for the transfer of analyzed risk. Unfortunately, the scarcity of reliable time series about political risk hampered a deeper empirical analysis. Originality/value/contribution – Presentation of political threats to financial market stability.
Źródło:
Journal of Economics and Management; 2017, 28; 112-132
1732-1948
Pojawia się w:
Journal of Economics and Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberspace in a risk society
Autorzy:
Drabik, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/2143062.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybersecurity
threat
infosphere
Opis:
The dynamic processes of modernization have affected the quantitative and qualitative dimensions of an unprecedented social transformation. It can be said that man has entered into hitherto unknown realms of abstraction. One of its dimensions is cyberspace with attributes that elude previous identifiers of physical three-dimensional space. The highly dynamized processes of technological progress have situated societies in new dimensions of risk. The likelihood of positive or negative events has been etiologically linked to the effects of „producing”, processing, storing, and transmitting the information. This article aims to analyze the factors justifying the crystallization of a risk society, a key identifier of which is cyberspace, the associated risks, and security measures in the context of shaping cybersecurity
Źródło:
Cybersecurity and Law; 2022, 7, 1; 17-26
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
‘Keep Europe for the Europeans’. The Role of Threat Perceptions and Intergroup Contact for Explaining Attitudes towards Immigrants in Hungary
Autorzy:
Bal, Michèlle
Aradi, Eszter
Yerkes, Mara A.
Powiązania:
https://bibliotekanauki.pl/articles/48847278.pdf
Data publikacji:
2024
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
attitudes towards immigrants
Hungary
realistic threat
symbolic threat
intergroup contact
socio-demographic variables
Opis:
In 2015, the inflow of immigrants to Europe increased dramatically. More than 1 million people fled from wars and conflicts in Syria, Iraq and Afghanistan, particularly affecting transit countries along the Western Balkan route. Of all the transit countries, the Hungarian government was particularly vocal in its negative attitude towards immigrants, launching several anti-immigration campaigns which had a detrimental effect on residents’ hostility towards these immigrants. In this study, we focus on the mechanisms behind this increased hostility in a transit-country context by combining insights from integrated-threat theory and contact theory. We find that perceptions of realistic and symbolic threat increased negative attitudes towards immigrants. Importantly, these threat perceptions were shaped by people’s positions in society and personal circumstances, in combination with their contact with immigrants. Specifically, in the harsh and negative Hungarian context, contact negatively influenced threat perceptions, especially amongst people who were at risk of experiencing negative consequences supposedly caused by the influx of immigrants. This in-depth country case study emphasises the importance of contextualising research findings on attitudes towards immigration in a broader social and political context.
Źródło:
Central and Eastern European Migration Review; 2024, 13, 1; 89-107
2300-1682
Pojawia się w:
Central and Eastern European Migration Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security management versus educational practice
Autorzy:
Wawrzusiszyn, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/1879429.pdf
Data publikacji:
2013
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
management
education
threat
awareness
Opis:
Processes that accompany modern man, create a new framework for social life. The turn of the century changed the world, and in the same time the conditions in which man lives. As a result of emerging threats security has taken a global figure. Ensuring human security in case of nonmilitary threats requires an integrated effort of all public administration bodies and other social and economic entities that carry out tasks in the field of security and defence. The main objective of the state is, inter alia, raising awareness of the duties of citizens for security and defence, developing patriotic attitude and the acquisition of knowledge and skills necessary for efficient and effective operation in conditions of peace and states of emergency.
Źródło:
Security Dimensions; 2013, 10(10); 152-158
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bioterroryzm zagrożenie wciąż realne
Autorzy:
Ziuzia-Lipiec, Dorota
Powiązania:
https://bibliotekanauki.pl/articles/121112.pdf
Data publikacji:
2017
Wydawca:
Towarzystwo Wiedzy Obronnej
Tematy:
bioterroryzm
czynniki biologiczne
zagrożenie
monitorowanie zagrożenia
bioterrorism
biological factors
threat
monitoring of threat
Opis:
Zjawisko bioterroryzmu jest tak stare jak stary jest świat. Czynniki biologiczne już od najdawniejszych czasów wykorzystywano do walki z wrogiem. Współczesny świat nie jest wolny od tego typu zagrożenia. Z całą pewnością można stwierdzić, że ten rodzaj terroryzmu jest najokrutniejszą bronią skierowaną przeciwko ludziom.
The bioterrorism phenomenon is as old as the old is world. Biological factors have been used to combat the enemy since ancient times. The modern world is not free from this type of threat. It can certainly be said that this type of terrorism is the cruellest weapon against the humanity.
Źródło:
Wiedza Obronna; 2017, 3-4; 113-120
0209-0031
2658-0829
Pojawia się w:
Wiedza Obronna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Walory przyrodnicze, stan obecny i zagrożenia wybranych alei gminy Lubin
Nature value, present state and threats of chosen alleys from Lubin region
Autorzy:
Tomaszewska, K.
Kopcza, A.
Powiązania:
https://bibliotekanauki.pl/articles/1186917.pdf
Data publikacji:
2008
Wydawca:
Uniwersytet Przyrodniczy we Wrocławiu
Tematy:
Lubin
roślinność
zagrożenie
threat
flora
Opis:
A lot of beautiful lanes can be found in Lubin commune in Lower Silesia. Six of them, selected in the way that enables showing the trees differentiation resulting from localization, species composition and age, were analyzed. Quercus petrea, Populus x canadensis, Quercus rubra, Acer platanoides, Aesculus hippocastaneum, Tilia cordata, Tilia platyphyllos, Salix alba, Prunus avium and Alnus glutinosa were used for planting. Trees were set in one-species alleys, multi-species alleys with mixed individuals of particular species, and also in a more decorative manner, so that each of the species created a separate espalier. The most interesting one in respect of the arrangement and adaptation for performer function was a three-part lane in Liściec, regarding its decorative values - two-species (chestnut-maple) stand densely situated along the road from Chojnów to Karczowiska. Just there Acer platanoides and Aesculus hippocastaneum create separate espaliers on both sides of the road. The preservation state of plants is not the same. Cherry (in Chróstnik) and willow (in Bukowno) lines are slowly disappearing from the agricultural landscape, which is most upsetting. Well-kept lanes, where all gaps caused by falling trees are refilled up-to-date, are met relatively rare; the trees planted along the estate road to a palace in Krzeczyn Mały are such a praiseworthy exception. Not the health status of trees, but the fact that they are growing too close to roadways is the reason for anxiety as to the future of some lanes. Trees were planted along the roads which looked different than nowadays, and fitted for different road traffic. Old trees are especially amazing. For that reason, many trees that reached dimensions qualifying them as nature monuments can be found there. It is worth trying to give them legal protection, and especially care about those species that are more and more seldom found by the roads, such as cherry and willow.
Źródło:
Architektura Krajobrazu; 2008, 1; 26-32
1641-5159
Pojawia się w:
Architektura Krajobrazu
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies