Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Aleksandrowicz, Tomasz" wg kryterium: Autor


Wyświetlanie 1-6 z 6
Tytuł:
Beijing Convention and Beijing Protocol. Changes in the International and Legal Model for Combatting Aviation Terrorism
Autorzy:
Aleksandrowicz, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/1375172.pdf
Data publikacji:
2020
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
aviation safety
Beijing reform
aviation terrorism
international law
Opis:
The article deals with the issue of the Beijing reform of international criminal aviation law. The author analyses the relevant applicable international law and confronts it with the new legal regulations adopted at the International Civil Aviation Organisation (ICAO) conference in Beijing in 2010. As a result, the author states that the basic change involves the expansion of the catalogue of acts subject to criminalisation as well as the expansion of the circle of persons participating in or supporting actions involving the commission of acts that pose a threat to the safety of civil aviation; the system also specifies the responsibility of collective entities (the so-called ‘Al Qaeda’ clause). The author is deeply convinced that the development of the Tokyo-Hague-Montreal-Beijing system, which is part of the whole international legal system of combatting terrorism, including its financing, is fully justified. The new regulations also make this system more coherent. It is also worth adding that the adoption of the Beijing Convention and the Beijing Protocol is part of the implementation of the Global Counter-Terrorism Strategy adopted by the United Nations.
Źródło:
Internal Security; 2020, 12(2); 177-190
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Act on the National Cybersecurity System as an Implementation of the NIS Directive
Autorzy:
Aleksandrowicz, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/1375029.pdf
Data publikacji:
2020
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
cybersecurity system
implementation
NIS Directive
Opis:
The article is devoted to the issue of the implementation of the Directive of the European Parliament and of the Council (EU) of 6 July 2016 on measures contributing to a high level of security of networks and information systems within the territory of the Union (the so-called NIS Directive) into the Polish legal system. In this context, the author analyses the Act on the National Cybersecurity System, presenting the system and its individual components. The subjects of consideration are the provisions of the Act on National Cybersecurity System of the Republic of Poland and other legal acts concerning the subject matter, which entered into force before the adoption of the analysed act. In conclusion, the author states that in some cases, it is necessary to amend individual legal acts in order to avoid ambiguities which lead to disruption of the system as a whole. The basic method used in this article is legal dogmatics and critical analysis of the scientific literature, documents and opinions of experts—practitioners.
Źródło:
Internal Security; 2020, 12(1); 179-193
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Concept of Information Metabolism by Antoni Kępiński and the Mechanism of Information Manipulation. Conditions for Effectiveness and Ways of Counteraction
Autorzy:
Aleksandrowicz, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/1807892.pdf
Data publikacji:
2020-06-30
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
information warfare
information metabolism
disinformation
reflexive control
Opis:
In the modern security environment, information warfare is an increasingly important threat. The purpose of this article is to determine the conditions for the effective achievement of political objectives through the manipulation of information and disinformation. The conducted research used system analysis, also using case studies, generalizations and synthesis. This allowed to state that the key condition for the effectiveness of conducted information attacks is the mechanism described in the works of Antoni Kępiński as information metabolism. This makes it possible to formulate a postulate on the need to counteract such attacks based on building defensive and offensive capabilities of the state in the sphere of information warfare.
Źródło:
Security Dimensions; 2020, 33(33); 150-165
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
National Security in the 21st Century. A Time of Discontinuation
Autorzy:
Aleksandrowicz, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/1808079.pdf
Data publikacji:
2019-04-11
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
21st century
change
discontinuation
national security
threats
risks
Opis:
The analyses of the security environment of the second decade of the 21st century clearly indicate that the period will be recorded in history as a decade of change, a time of discontinuation. Liberal democracy ceases to be the dominant paradigm, and the challenging of the liberal-democratic ideas is the most profound change since the establishment of the democratic order in the West in 1945. We are facing a growing gap between societal expectations and the abilities of the governments as well as the results that they deliver – the function of the state is changing, and governing is becoming ever more difficult. It is highly likely that the consequences of these changes will be more serious than the end of the Cold War and the collapse of the Soviet Union. The basic principles of the international order created after World War II are becoming increasingly obsolete. It appears obvious that these changes affect not only individual societies in the West, but also global international relations. These changes are accompanied by a scientific and technological revolution, in particular with regard to information. These phenomena can and should be analysed in terms of changes in the security environment understood as a mix of opportunities, challenges, threats and risks. This applies to the European Union in particular, as well as to the entire continent. It is reasonable to assume that risks and threats to Europe gain new depth within this context.
Źródło:
Security Dimensions; 2018, 28(28); 88-121
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Dilemmas of Modern International Law – Between Legal Inhumane Non-Intervention and Illegal Humanitarian
Autorzy:
Aleksandrowicz, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/2056055.pdf
Data publikacji:
2019-10-15
Wydawca:
Collegium Civitas
Tematy:
responsibility for protection
humanitarian intervention
use of force
Opis:
Over the past decades, threats have arisen in the international security environment related to the functioning of weak and countries unable to fulfill their functions in ensuring security and basic human rights for their citizens, referred to in the doctrine as failed/failing states. The international community has responded with humanitarian intervention that is part of the concept of responsibility for protection (Responsibility to Protect). This article is devoted to the issue of placing this concept in positive international law (remarks de lege lata) and the resulting applications (de lege ferenda comments).
Źródło:
Securitologia; 2018, 2 (28); 57-71
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The importance of structural and practical unidentifiability in modeling and testing of agricultural machinery. Identifiability testing of aggregate model parameters tractor baler-wrapper
Znaczenie nieidentyfikowalności strukturalnej i praktycznej w modelowaniu i badaniach maszyn rolniczych. Badanie identyfikowalności parametrów modelu agregatu ciągnik-prasoowijarka
Autorzy:
Kromulski, Jacek
Szczepaniak, Jan
Mac, Jarosław
Wojciechowski, Jacek
Zawada, Michał
Szulc, Tomasz
Rogacki, Roman
Jakubowski, Łukasz
Aleksandrowicz, Roman
Powiązania:
https://bibliotekanauki.pl/articles/1333638.pdf
Data publikacji:
2021-06-30
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Maszyn Rolniczych
Tematy:
dynamic modelling
identifiability
parameter identification
agricultural machine
modelowanie dynamiczne
identyfikowalność
identyfikacja parametrów
maszyna rolnicza
Opis:
New methods of parametric identification are presented in particular tests of identifiability and non-identifiability of model parameters. A definition of the concept of identifiability of model parameters is presented. Methods for testing identifiability using Laplace transform using similarity transformation and using symbolic calculations are described. Available software for testing model identifiability is presented. These are programs for symbolic calculations (MAPLE MATHEMATICA) operating in the form of web applications and in the form of tools for the Matlab environment. The method of introducing the model to the computational environment in the form ordinary differential equations (ODE) is presented. Examples of calculations identifiability of parameters of the complex model of the tractor-single-axle agricultural machine e.g. a baler-wrapper are included.
Przedstawiono nowe metody prowadzenia identyfikacji parametrycznej w szczególności badania identyfikowalności oraz nieidentyfikowalności parametrów modelu. Przedstawiono definicję pojęcia identyfikowalności parametrów modelu. Opisano metody badania identyfikowalności za pomocą transformacji Laplace'a z zastosowaniem transformacji podobieństwa oraz za pomocą obliczeń symbolicznych. Przedstawiono dostępne oprogramowanie do badania identyfikowalności modelu. Są to programy do obliczeń symbolicznych (MAPLE MATHEMATICA) działające w formie aplikacji sieciowych oraz w postaci przyborników do środowiska Matlab. Przedstawiono sposób wprowadzenia modelu do środowiska obliczeniowego w postaci równań różniczkowych zwyczajnych. Zamieszczono przykładowe wyniki obliczeń identyfikowalności parametrów złożonego modelu układu ciągnik-jednoosiowa maszyna rolnicza, np. prasoowijarka.
Źródło:
Journal of Research and Applications in Agricultural Engineering; 2021, 66, 1; 4-9
1642-686X
2719-423X
Pojawia się w:
Journal of Research and Applications in Agricultural Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies