Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "security protection" wg kryterium: Temat


Tytuł:
The Polish Customs Service as a Guardian of Security and Safety of the Cross-Border Freight Traffic
Polska Służba Celna w roli strażnika bezpieczeństwa granicznego ruchu towarowego
Autorzy:
Świerczyńska, Jowita
Powiązania:
https://bibliotekanauki.pl/articles/506728.pdf
Data publikacji:
2016
Wydawca:
Krakowska Akademia im. Andrzeja Frycza Modrzewskiego
Tematy:
security and protection of the market
customs control
protective function
Customs Service
bezpieczeństwo i ochrona rynku
kontrola celna
funkcja ochronna
Służba Celna
Opis:
The fact of customs authorities holding full competence within the supervision and control of all goods transited across the border caused them to become a guardian of security and safety of the cross-border freight traffi c. Securing the lawful transit of goods into and out of the EU customs territory is currently one of the most important tasks of customs authorities. The performance of this task is possible by e.g. carrying out customs control. The aim of the paper is to present the strategic framework of customs control as well as to characterize the directions and analyze the effectiveness of measures taken by customs authorities as to safeguard the cross-border freight traffic. With this regard, the descriptive method comprising analysis of literature sources, analysis of statistical data as well as the business practice has been employed.
Organy celne – mające pełne kompetencje w zakresie nadzoru i kontroli nad wszystkimi towarami przewożonymi przez granice celne – stały się strażnikiem bezpieczeństwa w granicznym ruchu towarowym. Zapewnienie zgodnego z prawem przywozu towarów na unijny obszar celny oraz wywozu towarów z tego obszaru to obecnie jedno najważniejszych zadań organów celnych. Realizacja tego zadania jest możliwa m.in. poprzez wykonywanie kontroli celnej. Celem opracowania jest przedstawienie ram strategicznych kontroli celnej oraz charakterystyka kierunków i analiza skuteczności działań podejmowanych przez organy celne w zapewnianiu bezpieczeństwa w granicznym ruchu towarowym. W tym zakresie wykorzystano metodę opisową obejmująca analizę źródeł literaturowych, analizę danych statystycznych oraz praktykę gospodarczą.
Źródło:
Krakowskie Studia Międzynarodowe; 2016, 3; 39-51
1733-2680
2451-0610
Pojawia się w:
Krakowskie Studia Międzynarodowe
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Classified Information Protection in Poland: Traditions and the Present Day
Autorzy:
Topolewski, Stanisław
Powiązania:
https://bibliotekanauki.pl/articles/108257.pdf
Data publikacji:
2020
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
information protection
secrets
security
Opis:
Acquiring information that has an impact on a country's security, i.e. its independence, sovereignty and international position, by unauthorized persons, whether from another country's intelligence services or criminal groups, may have far-reaching consequences. Therefore, to preserve the stability of the state and give a sense of security to its citizens, the most important task and duty of the government is to protect them. This can be provided by an efficiently functioning system that will guarantee restrictions on access to classified information, its proper processing, as well as the use of appropriate and suffcient physical and ICT security measures. For this reason, this system requires at the state level precisely defined rules and norms based on the law, defining the principles of creating classified information, how to protect it and sanctions that can be applied in the event of non-compliance. The protection of information having a significant impact on the functioning of the Polish state in each period of its existence was an important element of defense and security policy. After regaining independence, the protection of state secrets took on special significance both for the country's existence and the foundations of its existence. It was realized that their disclosure could be fatal to its organization and functioning, as well as defense capabilities. The presented material presents the evolution of the protection of classified information in Poland, and its importance for the security and defense of the state by ensuring the effectiveness(concealing) of actions aimed at their implementation.
Źródło:
Safety & Defense; 2020, 1; 48-62
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cooperation of services with security companies
Autorzy:
Januszkiewicz, Maciej
Krampichowski, Adam
Powiązania:
https://bibliotekanauki.pl/articles/1179754.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
SUFO
Security
cooperation
formations
protection
Opis:
This article deals with issues related to the Polish companies dealing with broadly defined protection. The authors' reflections began with a history of security limited to modern history. It discusses the division of security and the principles of security services cooperation with other state security forms.
Źródło:
World Scientific News; 2017, 72; 387-391
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cooperation of Security Service with Police, Fire Service Units, Civil Defence, Municipal (City) Guard, Border Guard, Railroad Security Service, Forestry Service
Autorzy:
Januszkiewicz, Maciej
Krampichowski, Adam
Powiązania:
https://bibliotekanauki.pl/articles/1181225.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
SUFO
Security
cooperation
formations
protection
Opis:
The concerns related with functioning of the companies providing the security services in Poland is presented in this papers in broad extent. Such companies are called Professional Armed Security Formations (SUFO) (pol. Specjalistyczne Uzbrojone Formacje Ochroniarskie (SUFO)). This article gives insight into basic terms, as well as into the role and tasks of companies handling with provision of security services. The article also presents the forms of cooperation with selected services, such as: Police, State Fire Service and other similarly important ones, statutorily enacted for the performance of functions related with internal security.
Źródło:
World Scientific News; 2017, 72; 517-521
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
States of emergency – selected problems regarding the personal data protection
Autorzy:
Soczyński, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/1179132.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
data protection
general data protection regulation
information security
Opis:
The following elaboration has been produced following the analysis of the problem regarding the protection of privacy and private life as well as the personal data themselves under the circumstances of life-threatening situations or the state of emergency. The solutions stipulated by the domestic and EU legislation have been analysed with emphasis put over accessing processes to personal data , both indispensible and proportional ones, carried out with an intention to secure public safety, including the protection of human life especially as a reaction to natural disasters or catastrophes caused by humans, protection of other important objectives that lie within general public interest, for instance when data processing remains necessary for humanitarian purposes, including the monitoring of epidemics and their dispersion. Personal data are characterised by various degrees of sensitivity and criticality. Some of them may require an additional level of protection and special treatment. GDPR makes it possible for the Member States to clarify their provisions , including such ones regarding the processing of personal data of special categories ( also referred to as sensitive data), they do not exclude an option to specify in the legislation of a Member State the circumstances of precise situations related to data processing , including the precise clarification of conditions which decide whether data processing remains compliant to the law. Personal data processing under extraordinary circumstances may imply, as an exception, the necessity to transfer the data if such action is required by important public interest set forth by the EU legislation or the relevant provisions of a Member State or if such transferring occurs from the register established by law and intended to provide an insight for the general public or persons maintaining legally valid interest, for instance public health units in order to establish infectious contacts in case of infectious diseases outbreak. A subsequent part of the article focuses on the issues related to the course of actions under state of emergency, i.e. it presents the proceedings to be carried out in emergency state and specifies the concerns on emergency call processing, including the personal data.
Źródło:
World Scientific News; 2017, 85; 29-37
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Threats associated with the human factor in the aspect of in-formation security
Autorzy:
Palega, M.
Knapinski, M.
Powiązania:
https://bibliotekanauki.pl/articles/30147153.pdf
Data publikacji:
2018
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
information security
information security management system
information protection
information security threats
Opis:
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages caused by disclosure, modification, destruction or loss of corporate data. Theoretical considerations on the subject matter have been enriched by the results of conducted empirical research. They answer the following question: What categories of information security threats are associated with the human factor.
Źródło:
Scientific Journal of the Military University of Land Forces; 2018, 50, 1(187); 105-118
2544-7122
2545-0719
Pojawia się w:
Scientific Journal of the Military University of Land Forces
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Impact of Securitization and Economization of Security on the Establishment of an International Climate Protection Regime
Autorzy:
Księżopolski, Krzysztof Michał
Powiązania:
https://bibliotekanauki.pl/articles/523085.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Warszawski. Ośrodek Analiz Politologicznych
Tematy:
international climate protection regime
securitization
economization
economic security
energy security
climate protection
RES
green economy
Opis:
Lack of progress has been the impulse to look into the causes of impasse in establishment of the International Climate Protection Regime. The present paper deals with the process of securitization and economization of security that can help to clarify the reasons behind this stagnation. Problems in international regulation does not lie in the aspects of the economy but above all in the different perception of energy and climate issues by citizens, which results in recognizing energy issues by leading emitters as standing higher in the hierarchy of objectives pursued by countries, than climate change. In this situation it will be very difficult to establish limits of CO2 emission. It seems that Green Economy and RES development thanks technological progress is the chance for climate protection rather because of economic reasons than ecologic ones.
Brak postępu był impulsem do zbadania przyczyn impasu w stworzenie międzynarodowego reżimu ochrony klimatu. Niniejszej pracy zajmuje się procesu sekurytyzacji i ekonomizacji bezpieczeństwa, które mogą pomóc wyjaśnić przyczyny tej stagnacji. Problemy w ustanowieniu międzynarodowych regulacji nie leżą w aspekty gospodarki, ale przede wszystkim w różnych postrzegania energii i klimatu problemów przez obywateli, których wyniki w rozpoznawaniu problemów energii przez wiodących emitentów jako stojących wyżej w hierarchii celów realizowanych przez kraje, niż zmiany klimatu. W tej sytuacji będzie bardzo trudne ustalenie limitów emisji CO2. Wydaje się, że zielona gospodarka i OZE rozwoju dzięki postępowi technologicznemu jest szansą dla ochrony klimatu raczej z przyczyn ekonomicznych niż ekologiczne.
Źródło:
Kwartalnik Naukowy OAP UW "e-Politikon"; 2013, 7; 35-53
2084-5294
Pojawia się w:
Kwartalnik Naukowy OAP UW "e-Politikon"
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evaluation of the use of personal and property protection companies for ensuring safety in Poland
Autorzy:
Czop, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/1861756.pdf
Data publikacji:
2014
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
people and properties protection companies
public security
public security system
security worker
Opis:
For many years author of this paper was dealing with the co-operation with people and properties protection companies as he was performing important functions in Police. After the police career of his, he became an auditor of these entities. He was given an important function of the vice-chairman of the Polish Association for Employers „Security” – Department in Małopolska [pol. - Polski Związek Pracodawców „Ochrona”- Oddział Małopolska]. This paper is an effect of the research programme, managed by the author, which was finished this year. The main objective of the conducted researches, which were both theoretical and empirical was establishing wheter it is possible in Poland to increase the level of usage of the private security sector for providing security. To answer this important question, first we had to determine the curent level of usage of these entities. In the paper one will find detailed data, which are an evaluation of the current level of engagement of these companies in the public security. This evaluation serves to indicate specific solutions that can allow for more effective participation of the private security sector within this socially important mission.
Źródło:
Security Dimensions; 2014, 12(12); 19-28
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The officers of Government Protection Bureau competences and abilities in terms of protecting people, facilities and equipment
Autorzy:
Cymerski, Jarosław
Powiązania:
https://bibliotekanauki.pl/articles/1878630.pdf
Data publikacji:
2014
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
Government Protection Bureau
security
powers
training
Opis:
Government Protection Bureau as unitary, uniformed and armed formation was appointed to perform under the Act of 16 March 2001 about the Government Protection Bureau (BOR). BOR Formation performs tasks included in the field of competences of public administration. It carries out statutory tasks such as providing safety and public order and state security. Government Protection Bureau as specialized formation performs tasks in the field of protection of people, facilities and equipment that are of particular importance for the state. Tasks of the formation were indicated in the Art. 2 of the Act of 16 March 2001 about the Government Protection Bureau. Performing statutory tasks imposed by legislator concerning protection of people, facilities and equipment, requires specialist preparation and powers.
Źródło:
Security Dimensions; 2014, 11(11); 23-31
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Risk and threats in protective measures of the units responsible for security of executive states bodies
Autorzy:
Goryca, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/2078106.pdf
Data publikacji:
2022-06-29
Wydawca:
Wyższa Szkoła Biznesu w Dąbrowie Górniczej
Tematy:
security
management
threats
organization
risk
protection
Opis:
The goal of this article was to present the issues connected with threats, identification and assessment of risk to security of people and buildings that are subject to special protection. Risk, just like security, has become one of key components in protective measures of the units responsible for protection and security of executive government bodies of every country. Specialized institutions assigned to protect very important personages in the state can be found both in civil and military structures. Universally accepted and applied principle in protective measures all around the world is the one saying that it is not possible to provide full security to people and buildings that are subject to mandatory protection. Therefore, protective units are focused on minimizing the risk of occurrence of potential events that may affect lowering of required level of security. The goal of this article was to present scientifically substantiated correlation between risk and protective measures executed by the units assigned for such tasks. Theoretical research methods were applied in this article. The deliberations presented in the article show that relations between risk and protective measures of the units responsible for security of executive state bodies require research and conclusions from them may improve the level of security of people and buildings that are subject to special protection.
Źródło:
Security Forum; 2022, 6, 1; 137-147
2544-1809
Pojawia się w:
Security Forum
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A client-based encryption model for secure data storing in publicly available storage systems
Autorzy:
Retinger, Marek
Powiązania:
https://bibliotekanauki.pl/articles/305441.pdf
Data publikacji:
2019
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
data storage
data protection
encryption
security
Opis:
This document presents a conceptual model of a system for protecting thedata stored in publicly available data storage systems. The main idea was toapply encryption on both the client and server sides that would consequentlyhave a significant impact on data security. The compatibility with existingsystems allows us to deploy the solution fast and at a low cost. The testsconducted on a simplified implementation have confirmed the solution’s validity,and they have shown some possible performance issues as compared to theclassical system (which can be easily bypassed).
Źródło:
Computer Science; 2019, 20 (2); 179-194
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protection of persons and property in Poland – historical reflections
Autorzy:
Fołta, Bartłomiej
Powiązania:
https://bibliotekanauki.pl/articles/2078317.pdf
Data publikacji:
2022-06-29
Wydawca:
Wyższa Szkoła Biznesu w Dąbrowie Górniczej
Tematy:
security
public security
license
concession
protection of persons and property
Opis:
This article presents the basics of the security system in Poland after the political transformation in the late 80’s/early 90’s. The development of personal and property security gained momentum in the 90’s. After the political change, the lack of adequate regulations for the operation of security companies required the introduction of legal regulations that systematized the creation and operation of security companies as well as the requirements for people working in organizations. In Poland, the private security services sector emerged at the end of the 1980s. The first concessions for performing services in this area were issued after 1 January 1989 on the basis of the law on economic activity. Until the entry into force of the law on the protection of persons and property, the private security sector operated, inter alia, on the basis of the provisions of the aforementioned law on economic activity and the criminal code.1 Due to the changes occurring both in the law and in terms of changing hazards, the regulations did not correspond to the new socio-economic reality of the 1990s. As a result, on 22 August 1997, the lower house of parliament of the Republic of Poland passed an act on the protection of persons and property. The ‘privatisation of security’ is, one of the means for improving public safety. The private security sector contributes significantly to improving security, but only if appropriate legislative solutions are in place and proper control is exercised over the activities of this sector.
Źródło:
Security Forum; 2022, 6, 1; 149-158
2544-1809
Pojawia się w:
Security Forum
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nuclear and radiation safety and security
Autorzy:
Niewodniczański, J.
Powiązania:
https://bibliotekanauki.pl/articles/146522.pdf
Data publikacji:
2008
Wydawca:
Instytut Chemii i Techniki Jądrowej
Tematy:
nuclear safety
nuclear security
radiation protection
safety
security culture
safeguards
Opis:
All applications of nuclear materials as well as of any sources of ionizing radiation are accompanied by a risk of radioactive contamination of the environment or unnecessary overexposure of workers and the general public. Such an incident may result from malfunctioning of devices (radiation sources, shields, monitoring systems etc.) or a diversion from accepted procedures; it may be also intentional (sabotage or terrorist actions). All such incidents may be harmful for the victims, but they also may ruin the image of a given technology, irrespectively of the country or institution where it has occurred. Safe, secure, peaceful and efficient use of nuclear energy as well as of any source of ionizing radiation requires sustainable tools, including infrastructure that provides legal, regulatory, technological, human and industrial support for that programme. Therefore, the measures assuring radiation and nuclear safety and security, including physical protection of nuclear materials and radioactive sources, originate from internationally established and controlled principles on which obligatory national regulations are based. Evolution of technologies and changes of global or regional political situation may lead to new threats which creates a need to introduce new legal and institutional instruments, both national and international. Poland seems to be well situated in the present nuclear and radiation safety and security system.
Źródło:
Nukleonika; 2008, 53, suppl. 2; 5-10
0029-5922
1508-5791
Pojawia się w:
Nukleonika
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Property and personal security companies as an important element of the national security system
Autorzy:
Czop, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/576159.pdf
Data publikacji:
2017-09-24
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security system
property and personal Security Companies
specialised
armed protection formation
security guard
Opis:
The author presents the results of research carried out in property and personal security companies. The research was carried out both on the basis of a theoretical method based on qualitative analysis of legal acts, critical analysis of scientific literature as well as the empirical method consisting of using research tools such as questionnaires and expert interviews. Th e research came up with a positive answer to the question: Is it possible to increase the participation of property and personal security companies in ensuring public safety in Poland? The author believes that it is necessary to create a symbiotic formal and legal system that determines the use of human resources in broadly considered state security and in the process of implementing the objectives of national security policy by all levels of government either, state, local or private.The author notes that enhancing the efficiency of security entities is possible, inter alia, through continuous technological development and the exchange of knowledge between national security entities and the authorities responsible for managing security through regulation. According to him, the exchange of knowledge, experience and information between the public and private sectors, and the implementation of best practices in the field of security for day-to-day practice, improves the effectiveness of security policy. One such preventive measure is the creation of a formal and legal basis for conducting a security policy based on an integrated system of exploitation of experience, in which all entities responsible for the security of the Republic of Poland participate.This publication indicates the direction of action that the author believes should be taken to make better use of the private security sector in the state security system.
Źródło:
Security and Defence Quarterly; 2017, 16, 3; 20-39
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
Autorzy:
Kosmowski, K. T.
Śliwiński, M.
Piesik, E.
Powiązania:
https://bibliotekanauki.pl/articles/2069111.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
hazardous plants
critical infrastructure
safety and security
protection systems
cyber security
Opis:
This article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology known as the security vulnerability analysis (SVA) developed for hazardous plants of chemical industry. It is based on rings of protection concept to secure widely understood assets. This concept seems to be compatible with layer of protection analysis (LOPA), which is consistent with functional safety concept of the control and protection systems including cyber security aspects. It is outlined how to use these approaches in an integrated way for safety and security analysis of hazardous industrial plants and systems of critical infrastructure.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 2; 31--46
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies