Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "threat" wg kryterium: Temat


Tytuł:
Selected issues of threat management in cyberspace
Autorzy:
Barczak, Andrzej
Barczak, Michał
Powiązania:
https://bibliotekanauki.pl/articles/27323575.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
cybersecurity
threat management
cyber threat intelligence
Opis:
The paper describes the cyber threat management system. Three essential components of such a system are presented. With reference to such documents as ISO 2700, the NIST Cyber Security Framework, U.S. presidential executive orders, European Union regulations or STIX and TAXIS standards, norms, legal and standards regulations for managing cyber threats are described. The cyber threat management model is presented. Kill Chain and MITRE ATT&CK threat description methods are presented. A toolkit to support various stages of the cyber threat management process is also described.
Źródło:
Studia Informatica : systems and information technology; 2023, 1(28); 5--28
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mass Migration as a Hybrid Threat? – A Legal Perspective
Autorzy:
Dov Bachmann, Sascha-Dominik
Paphiti, Anthony
Powiązania:
https://bibliotekanauki.pl/articles/2019119.pdf
Data publikacji:
2021-03-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
migration
migrants
refugees
threat
hybrid threat
law
Opis:
Migration as a weapon sounds like a policy statement by resurgent nationalistic parties (and governments) in the West. However, politics and the human cost aside, what if an adversary (both state and non-state actor) does exploit the current global crisis of mass migration due to globalization, war, and political unrest? This article will look at the ongoing mass migration to the European Union within the wider security context of the so-called hybrid threats and/or ‘grey zone’ tactics. It looks at the various legal categories of migration as how the law can be weaponized as so-called ‘lawfare’ to undermine the existing legal frameworks distinguishing between legal and illegal migration. The authors recognize the possibility that this article will be used as an argument by the political actors involved for their nationalistic and anti-migration politics and policies. Yet, we believe that the potential of abusing the current vacuum for political gains along ideological party lines makes it necessary to provide a wider legal-security focused perspective on mass migration.
Źródło:
Polish Political Science Yearbook; 2021, 1 (50); 119-145
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Shared Cybersecurity Awareness Platform
Autorzy:
Amanowicz, Marek
Powiązania:
https://bibliotekanauki.pl/articles/1839333.pdf
Data publikacji:
2021
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cybersecurity awareness
risk and threat propagation
threat intelligence
Opis:
Ensuring a good level of cybersecurity of global IT systems requires that specific procedures and cooperation frameworks be adopted for reporting threats and for coordinating the activities undertaken by individual entities. Technical infrastructure enabling safe and reliable online collaboration between all teams responsible for security is an important element of the system as well. With the above taken into consideration, the paper presents a comprehensive distributed solution for continuous monitoring and detection of threats that may affect services that provision is essential to security and broadly understood the state’s economic interests. The said solution allows to collect, process and share distributed knowledge on hazard events. The partnership-based model of cooperation between the system’s users allows the teams to undertake specific activities at the central level, facilitates global cyber threat awareness, and enhances the process of predicting and assessing cyber risks in order to ensure a near-realtime response. The paper presents an overview of the system’s architecture, its main components, features, and threat intelligence tools supporting the safe sharing of information concerning specific events. It also offers a brief overview of the system’s deployment and its testing in an operational environment of NASK’s Computer Security Incident Response Team (CSIRT) and Security Operation Center (SOC) of essential services operators.
Źródło:
Journal of Telecommunications and Information Technology; 2021, 3; 32-41
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
North Atlantic Treaty Security
Autorzy:
Grenda, Bogdan
Powiązania:
https://bibliotekanauki.pl/articles/576137.pdf
Data publikacji:
2017-03-21
Wydawca:
Akademia Sztuki Wojennej
Tematy:
threat
conflict
militarisation
security
Opis:
The article discusses security within the North Atlantic Treaty Organisation with respect to threats which may appear in its near and more distant surroundings. The following military threats are discussed: military conflicts, militarization of the Arctic, demonstration of Russian military power, use of weapons of mass destruction, cyber attack, terrorism and militarisation of Space. Other mentioned dangers are: natural and social ones including migration, competition among state and non-state entities as well as the phenomenon of fallen cities and states.
Źródło:
Security and Defence Quarterly; 2017, 14, 1; 21-34
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Challenges and Hazards of the Third Decade of the 21st Century
Autorzy:
Wiśniewski, Bernard
Powiązania:
https://bibliotekanauki.pl/articles/1807690.pdf
Data publikacji:
2021-03-31
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
challenge
threat
prognosis
Opis:
The aim of the considerations presented here is to gather and share information and knowledge on contemporary challenges and threats that can help to rationally anticipate the future in the third decade of the 21st century. The article consists of three parts, i.e. the introduction, covering the basic terminological arrangements; then, forecasts of challenges and threats in the macro scale for the next ten years; and, finally, the summary. In the preparation of the article, theoretical methods and research techniques were used. The choice of the research technique was governed by the following criteria: purposefulness, clarity, univocality, effectiveness, reliability, and cost-effectiveness. These criteria determined the use of inductive inference, deductive reasoning, explanation, analysis, and synthesis. In the course of the research, critical analysis of the literature was also carried out, which was divided into groups of studies, i.e.: those devoted to the methodology of research activities, those concerning security theory, and those containing elements of prognostics. The presented considerations indicate that the third decade of the 21st century will be a time in which the existing challenges and threats will persist. However, the scale of the latter will increase, which may create many problems, mainly related to decision-making.
Źródło:
Security Dimensions; 2021, 35(35); 179-191
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Political risk on financial markets in developed and developing economies
Autorzy:
Waszkiewicz, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/522248.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Ekonomiczny w Katowicach
Tematy:
International finance
Stability
Threat
Opis:
Aim/purpose – We want to draw academics and market practitioners attention to threats form political risk’s area that affect national financial markets in both developed and developing economies. Design/methodology/approach – We analyzed the wide concept of political risk on the basis of international literature as well as national statistical data and international comparative indicants for selected developed and developing economies around the world. Findings – Growing significance of political risk was signaled, although both types of economies are exposed to different aspects of the threat. We confirmed that developing states are threatened by bigger number of political bothers, whereas advanced countries are susceptible to some forms of violence. Research implications/limitations – Imply that economies with better economic stance have lower level of political risk, although, their highly developed and integrated financial markets are responsible for the transfer of analyzed risk. Unfortunately, the scarcity of reliable time series about political risk hampered a deeper empirical analysis. Originality/value/contribution – Presentation of political threats to financial market stability.
Źródło:
Journal of Economics and Management; 2017, 28; 112-132
1732-1948
Pojawia się w:
Journal of Economics and Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberspace in a risk society
Autorzy:
Drabik, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/2143062.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybersecurity
threat
infosphere
Opis:
The dynamic processes of modernization have affected the quantitative and qualitative dimensions of an unprecedented social transformation. It can be said that man has entered into hitherto unknown realms of abstraction. One of its dimensions is cyberspace with attributes that elude previous identifiers of physical three-dimensional space. The highly dynamized processes of technological progress have situated societies in new dimensions of risk. The likelihood of positive or negative events has been etiologically linked to the effects of „producing”, processing, storing, and transmitting the information. This article aims to analyze the factors justifying the crystallization of a risk society, a key identifier of which is cyberspace, the associated risks, and security measures in the context of shaping cybersecurity
Źródło:
Cybersecurity and Law; 2022, 7, 1; 17-26
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Unlawful Threat as a Statutory Feature of Criminal Offences Under Article 245 of the Polish Criminal Code. Considerations Connected with the Supreme Court and Appellate Courts Jurisprudence
Autorzy:
Górski, Adam
Michalak, Krzysztof
Klonowski, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/618799.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
unlawful threat
punishable threat
creative interpretation
groźba bezprawna
groźba karalna
wykładnia prawotwórcza
Opis:
This article aims to interpret the term “unlawful threat” under Article 245 of the Criminal Code. It can be observed that judicial decisions of the Supreme Court and legal doctrine do not provide a uniform interpretation of the term. The work discusses whether the result in the shape of a justified concern that the threat will be carried out is necessary. Such a criminal result is described in Article 190 of the Criminal Code which penalizes punishable threats. It corresponds with Article 115 § 12 of the Criminal Code which defines an unlawful threat. In the opinion of the authors, causing a justified fear that the threat will be carried out is one of the statutory features in all three cases, i.e. unlawful threats to commit a criminal offence, to institute criminal proceedings and to disseminate defamatory information.
Celem niniejszego artykułu jest dokonanie wykładni znamienia groźby bezprawnej występującego na gruncie art. 245 k.k. We wskazanym zakresie brak jest jednolitości w orzecznictwie Sądu Najwyższego, sądów apelacyjnych oraz w doktrynie. Zasadniczy problem wiąże się z kwestią zawierania się w pojęciu groźby bezprawnej skutku w postaci wzbudzenia uzasadnionej obawy spełnienia groźby. Skutek ten został określony w art. 190 k.k. opisującym przestępstwo tzw. groźby karalnej, do którego odsyła definicja ustawowa groźby bezprawnej określona w art. 115 § 12 k.k. W ocenie autorów skutek polegający na powstaniu uzasadnionej obawy spełnienia groźby należy do elementów groźby bezprawnej we wszystkich trzech przypadkach, tj. w przypadku groźby popełnienia przestępstwa, spowodowania postępowania karnego lub rozgłoszenia infamującej wiadomości.
Źródło:
Studia Iuridica Lublinensia; 2018, 27, 2
1731-6375
Pojawia się w:
Studia Iuridica Lublinensia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
‘Keep Europe for the Europeans’. The Role of Threat Perceptions and Intergroup Contact for Explaining Attitudes towards Immigrants in Hungary
Autorzy:
Bal, Michèlle
Aradi, Eszter
Yerkes, Mara A.
Powiązania:
https://bibliotekanauki.pl/articles/48847278.pdf
Data publikacji:
2024
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
attitudes towards immigrants
Hungary
realistic threat
symbolic threat
intergroup contact
socio-demographic variables
Opis:
In 2015, the inflow of immigrants to Europe increased dramatically. More than 1 million people fled from wars and conflicts in Syria, Iraq and Afghanistan, particularly affecting transit countries along the Western Balkan route. Of all the transit countries, the Hungarian government was particularly vocal in its negative attitude towards immigrants, launching several anti-immigration campaigns which had a detrimental effect on residents’ hostility towards these immigrants. In this study, we focus on the mechanisms behind this increased hostility in a transit-country context by combining insights from integrated-threat theory and contact theory. We find that perceptions of realistic and symbolic threat increased negative attitudes towards immigrants. Importantly, these threat perceptions were shaped by people’s positions in society and personal circumstances, in combination with their contact with immigrants. Specifically, in the harsh and negative Hungarian context, contact negatively influenced threat perceptions, especially amongst people who were at risk of experiencing negative consequences supposedly caused by the influx of immigrants. This in-depth country case study emphasises the importance of contextualising research findings on attitudes towards immigration in a broader social and political context.
Źródło:
Central and Eastern European Migration Review; 2024, 13, 1; 89-107
2300-1682
Pojawia się w:
Central and Eastern European Migration Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security management versus educational practice
Autorzy:
Wawrzusiszyn, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/1879429.pdf
Data publikacji:
2013
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
management
education
threat
awareness
Opis:
Processes that accompany modern man, create a new framework for social life. The turn of the century changed the world, and in the same time the conditions in which man lives. As a result of emerging threats security has taken a global figure. Ensuring human security in case of nonmilitary threats requires an integrated effort of all public administration bodies and other social and economic entities that carry out tasks in the field of security and defence. The main objective of the state is, inter alia, raising awareness of the duties of citizens for security and defence, developing patriotic attitude and the acquisition of knowledge and skills necessary for efficient and effective operation in conditions of peace and states of emergency.
Źródło:
Security Dimensions; 2013, 10(10); 152-158
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of Wood Processing Safety in the Production Organization
Autorzy:
Kotus, M.
Koloman, K.
Hudec, M.
Powiązania:
https://bibliotekanauki.pl/articles/2065027.pdf
Data publikacji:
2018
Wydawca:
STE GROUP
Tematy:
hazard
threat
risk
circular saw
Opis:
Occupational health and safety legislation imposes an obligation on the production organization to regularly and comprehensibly inform employees of the dangers, threats and risks involved. In the paper, we assessed the basic requirements of safety in the wood processing workshop on the forming disc saw. Deficiencies in non-compliance with security regulations were determined from the check list analysis (CLA). The safety assessment was performed using the extended point method, where we determined the value of the risk measure. When working on a saw blade, the risk cannot be accepted and safety precautions have to be proposed. For the production organization, we have proposed remedial measures and a safety card to be considered before working on forming disc saw. All the measures proposed by us were accepted and implemented by the production organization. Applying and observing safety measures can prevent the occurrence of an occupational injury or damage to the health of the worker.
Źródło:
Multidisciplinary Aspects of Production Engineering; 2018, 1, 1; 727--737
2545-2827
Pojawia się w:
Multidisciplinary Aspects of Production Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The installation of the anti-missile shield in Poland –an opportunity, a threat or a challenge?
Autorzy:
Falkowski, M.
Liberek, M.
Powiązania:
https://bibliotekanauki.pl/articles/348013.pdf
Data publikacji:
2016
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
shield
system
security
threat
project
Opis:
The purpose of this article is to present the potential effects of an anti-missile defense shield in Poland. The publication addresses selected political, military, financial and social aspects that affect building of the shield. In addition, the position of Poland in the NATO missile defense system was characterized, as was the concept of air defense in Europe. The authors also discuss the issue of Polish – Russian relationships against the background of creating of the anti-missile shield within the territory of our country.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2016, 3; 20-36
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Radicalization as a Source of Danger to Safety
Autorzy:
Łachacz, Tomasz
Holger, Nitsch
Powiązania:
https://bibliotekanauki.pl/articles/1374828.pdf
Data publikacji:
2019
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
terrorism
radicalization
extremism
threat
communication
Opis:
The article discusses the phenomenon of radicalization, which becomes a source of danger for the individual and the security of the state. At the beginning the article discusses the essence and causes of the phenomenon, and then refers to the Polish and German strategies in the field of security. The documents identify radicalization and extremism as a contemporary threat to national security, which is confirmed by numerous attacks in Europe. Examples of attacks involving radicalized individuals are discussed in this paper in the article. The discussion ends with conclusions emphasizing that in the process of radicalization the information provided to individuals and communication between government institutions and society are extremely important.
Źródło:
Internal Security; 2019, 11(2); 119-127
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Online Hate Speech and the Safety of Internet Users
Autorzy:
Kaczmarczyk, Barbara
Dąbrowska, Marlena
Szczepański, Piotr
Nowicka, Izabela
Powiązania:
https://bibliotekanauki.pl/articles/1807982.pdf
Data publikacji:
2020-03-19
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
hate speech
Internet
crime
threat
Opis:
Background: Hate speech is a very important problem nowadays. One can meet it in one’s immediate surroundings (conversations with friends), the media, the Internet, or in the so-called public space (for example, inscriptions on the walls). One form of hate speech is online hate speech, which, together with certain other phenomena, is referred to as hejt in the Polish language. The authors of the article focus on presenting online hate speech in relation to various age and social groups. Objectives: The aim of the article is to present the phenomenon of hate speech on the web and its impact on the safety of Internet users. Methods: The article uses basic theoretical and empirical methods. Content published on the Internet is analyzed and case studies are described. Interviews with experts (psychologists, police officers, sociologists, media and hate speech specialists) were also conducted and their views are presented. Conclusions: In the discussion about hate speech, prevention is extremely important. According to the authors, broad prevention consisting of professionally prepared content, enriched with film materials, presented by an expert or a trained teacher, should be included in the core curriculum of schools as one of the mandatory issues raised during the lessons.
Źródło:
Security Dimensions; 2019, 31(31); 139-159
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security Threats to Port Critical Infrastructure
Autorzy:
Żywucka-Kozłowska, Elżbieta
Broniecka, Rossana
Powiązania:
https://bibliotekanauki.pl/articles/31342014.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
critical infrastructure
threat
security
seaport
Opis:
Critical infrastructure is a key element of the functional security of any country. Sea ports (but also river ports) are part of the CI system of the country. The security of such sites is particularly important for the continuity of supply and transit of goods transported by vessels. Ports have always been protected from potential threats. Today, these threats have become more real, particularly as a result of the Russian Federation’s attack on Ukraine. Poland, which today has the status of a frontier state, is a target of espionage and sabotage activities. Security is a state of non-threat. This is the state to which we aspire in every area of modern life of every society, every country. Seaports, like other places, which are essential (special) for the unimpeded and secure delivery of goods. They’ve always been under special surveillance and special protection. Destruction of the port makes it impossible to transport by sea, which is obvious. Threats to port security come from different sources, but at a time of ongoing war in Ukraine, terrorist attacks come to the fore. It is also necessary to highlight the hybrid actions on the border with Belarus, which affect the state of security. Poland, as a front-line country, is particularly vulnerable to acts of terror, diversion and espionage, which is confirmed by the actions of the special services. Monitoring of seaports is part of the security strategy of the critical infrastructure of these places. The threat of CI ports is real, especially at the present time. This applies in particular to the LNG terminal in Świnoujście, which is regularly visited by ships (gas carriers) supplying raw materials of strategic importance. Violation of security rules (principles) may lead to a threat that cannot be ruled out, however, the most important and dangerous are those that come from the outside and are of an intentional nature.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 273-281
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies