Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "(in)security" wg kryterium: Wszystkie pola


Tytuł:
Cyber(in)security
Autorzy:
Szczypiorski, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/226455.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
cybersecurity
cryptology
conversations
Opis:
The purpose of this article is to present three theses – (1) a cultural one: cyberspace is an advanced technical and cultural creation – it is an embodiment of dreams of numerous creators, inventors and engineers; (2) a technical one: security and cyberspace are inseparable components (hence cybersecurity); (3) and a paranoid one: complete security, if achievable, is not a permanent state (hence cyber(in)security). Cyberspace is conceived as a set of digital techniques used to exchange information but also as a new type of social space, partially virtual, which may constitute a being entirely separated from a physical one. A pivotal date for arising of cyberspace may be considered the year 1968 in which routing in the ARPANET network appeared and so did the first programmable logical controller (PLC). For cyberspace this will be the year 1976 – publishing of the key agreement protocol by Witfield Diffie and Martin Hellman. Development of security is correlated with warfare and armament – the military sector has historically made the most significant investments in this area.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 1; 243-248
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Water (in) security – modern security paradigm
Autorzy:
Prebilič, Vladimir
Powiązania:
https://bibliotekanauki.pl/articles/1199401.pdf
Data publikacji:
2019-06-30
Wydawca:
Uniwersytet Gdański. Instytut Geografii
Tematy:
water security
national security
drinking water
water footprint
water stress
water consumption
Opis:
Water. In the existence and activities of each individual it is water that (un) consciously essentially defines them. Therefore, water is called the source of life, but nowadays we know it under the new concept: blue gold. The reason for such a modern understanding of the role of water lies in the increasing limitations of access to sufficient quantities, which first results in water stress – the situation where needs remain unmet, but water scarcity does not yet interfere with the foundations of the activities of societies. Water stress is thus the first form of threat to water security, especially when deficiency destroys all basic social systems that cannot function without water. The question of the role of water between them is increasingly being raised, as the operation of one system in the area of water consumption or management can mean interfering with the water potential of another system. This confronts us with the effect of the definite quantities of water, although countries with ample water resources and quantity (still) often do not understand or perceive it. Of course, this does not mean that the debate is not necessary; it is, conversely, necessary, and it is only in this way that it is possible to prevent or at least control the situation in which many countries around the world have found themselves and there is a total lack of water resources in the most existential aspects. Under these conditions, water security has become the most essential element of national security of these countries and thus a potential weak link in ensuring security.
Źródło:
Journal of Geography, Politics and Society; 2019, 9, 2; 1-9
2084-0497
2451-2249
Pojawia się w:
Journal of Geography, Politics and Society
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Paradigms of Cognition in Security Sciences
Autorzy:
Glen, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/1375120.pdf
Data publikacji:
2020
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
mono-paradigmativity
multi-paradigmativity
complementarity
ontological realism
Opis:
The article outlines difficulties related to the paradigm of cognition in security sciences, which have been generalised by asking about the paradigm that allows to study security of various entities and to obtain progress of knowledge about this fragment of reality. Then, a set of paradigms typical for the social sciences, disciplines: political and administrative sciences, international relations theory sub-discipline: security studies and management and quality sciences were analysed and evaluated using a system of hypothetical and assertion-deductive methods. The subject, time and spatial context of security of entities, the subject scope of security sciences and the ontological approach to the understanding of beings in the reality of security of entities were outlined. The usefulness of analysed and evaluated paradigms in cognition of security was assessed in this context. Finally, a complementary paradigm of cognition in security sciences was proposed and its usefulness in relation to multi-paradigmatic cognition was demonstrated.
Źródło:
Internal Security; 2020, 12(1); 9-21
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Concealing information in security hologram using interferometry
Autorzy:
Sharma, Amit Kumar
Chauhan, Prashant
Varshney, Anshu D.
Powiązania:
https://bibliotekanauki.pl/articles/2172832.pdf
Data publikacji:
2022
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
hologram
security hologram
encoded hologram
information encoding
concealed phase
Opis:
A new method utilizing holographic interferometry technique is described to conceal information in security holograms for enhancing their anti-counterfeiting ability. This concealed information can only be imitated if security hologram is illuminated through correct decoding wavefront generated through a key hologram. In decoding process, three spatially separated focus spots emerge at predefined positions which upon divergence further generate interferometric fringes modulated with concealed information in them. When security hologram is perfectly aligned, interferometric fringes disappear and concealed information becomes visible. The advantage of encoding through this technique lies in the fact that relative repositioning of key and security hologram becomes much easier and also additionally brings multifold improvement in the security level of the verification systems.
Źródło:
Optica Applicata; 2022, 52, 3; 385--394
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Methodological Basis of Research in Security Studies
Autorzy:
Czop, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/1832107.pdf
Data publikacji:
2015
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
Methodology
survey
Delphi method
heuristics
scientific interview
Opis:
Security studies are formally functioning for less than five years but have a strong methodological basis, presented shortly in this paper. This include several well-known and broadly-recognized ways of providing the research process, including scientific methods used in social sciences. Author briefly analyses a set of them, showing their advantages and disadvantages and the way they should be used during the whole research process. The need for multidisciplinary studies, including the use of several research tool and techniques, is also stressed.
Źródło:
Security Dimensions; 2015, 15(15); 49-67
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Niepewność w systemach bezpieczeństwa
Uncertainty in security systems
Autorzy:
Ibek, Anna
Powiązania:
https://bibliotekanauki.pl/articles/476427.pdf
Data publikacji:
2013
Wydawca:
Krakowska Akademia im. Andrzeja Frycza Modrzewskiego
Opis:
Uncertainty is an existential phenomenon that lies in all human relations, will accompany the analysis and decisions taken in any security system. The most important and typical manifestations of uncertainty in security are: the dilemma of interpretation about motives, intentions and capabilities of other; and the dilemma of response related to the issue of how to respond to threats. The problem of uncertainty in the security systems generally is considered to be unsolvable even talk certainty of uncertainty, however, there are philosophical and empirical approaches and analytical methods for reducing uncertafinty in the course of decision-making. The paper presents the theoretical aspects of uncertainty in security systems, discusses the meaning of these dilemmas, and has potential for reducing extent of the problem
Źródło:
Studia Prawnicze: rozprawy i materiały; 2013, 2(13); 69-82
1689-8052
2451-0807
Pojawia się w:
Studia Prawnicze: rozprawy i materiały
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Common Good and Trust in Security Organisations
Autorzy:
Młodzik, Lilia
Powiązania:
https://bibliotekanauki.pl/articles/2055860.pdf
Data publikacji:
2018-12-21
Wydawca:
Collegium Civitas
Tematy:
common good
public good
trust
leadership
management
Opis:
Modern organisations that are the object of research on security sciences do not remain unchanged over time. However, there are continual categories such as the common good and trust. The security world is not about whether stakeholders are more or less willing to trust other people, but about whether members of the organisation rely on trust, creating interpersonal relationships, in their activities, building a culture of security. Then the common good becomes less exposed to the effect of the "tragedy of the commons". Building the trust can, therefore, mitigate this effect. This fact is facilitated by the use of cooperative leadership style, by shaping values, norms and patterns cultivating the concern for "common good". The development of this issue is the subject of this paper.
Źródło:
Securitologia; 2018, 1 (27); 107-118
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
GUARDIAN OF (IN) SECURITY: THE RUSSIAN ACTION IN SYRIA
Autorzy:
de Andrade Gama, Isabela
Powiązania:
https://bibliotekanauki.pl/articles/484021.pdf
Data publikacji:
2017
Wydawca:
Wyższa Szkoła Biznesu i Przedsiębiorczości w Ostrowcu Świętokrzyskim
Tematy:
Foreign Policy
Russia
Security
Syria
Opis:
Since the beginning of the conflict in Syria, the Russian Federation has had a role of great importance. Even it is considered sometimes controversial, given that the Russian Federation at the beginning of the conflict has blocked some drafts of resolutions to the conflict preventing, especially that Western powers acted in Syria. Later, with the worsening of the conflict added to the migratory crisis and the establishment of the Islamic state in Syria, the Russian government decides to act incisively in Syria to slow down migration and grounded in the narrative of the "war on terror ". Thus, it can be questioned whether this attempt to bring the narrative of "war on terror" seemed an experiment to test a coalition with the US, with a view to approach history of these two actors previously under the umbrella of terrorism, or even a movement of Russian foreign policy to show that the post-Cold War moment no longer exists, and that this is not a time to see Russia as a defeated country anymore, but a US nemesis.
Źródło:
Ante Portas – Studia nad Bezpieczeństwem; 2017, 1(8) Moldova on the geopolitical map of Europe; 237-249
2353-6306
Pojawia się w:
Ante Portas – Studia nad Bezpieczeństwem
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Japans Role in Security of The Asia-Pacific Region
Autorzy:
Matsumoto, Stanisław
Powiązania:
https://bibliotekanauki.pl/articles/531277.pdf
Data publikacji:
2015-06-15
Wydawca:
Fundacja Instytut Nauki o Polityce
Tematy:
Japan, United States, defense, security, international relations.
Opis:
This paper examines Japan's present and future international security role in the light of changes affecting the Asia-Pacific Region. Japan always had a major impact on this region despite of its post-World War II uncomfortable geopolitical position. In this paper the author concludes that Japan is now more favorably disposed to play a “comprehensive international role” in the field of regional security. Tokyo seems to be eager to go on with security co-operation with Washington D.C., however at the same time gradually increasing selfresponsibility for its defense and the security of its surrounding environment. Although Japan with no doubt has its strategic interests in Asia-Pacific, nowadays it is likely to play more than only a supportive role in this region. From the political point of view, the author tries to prove, that Japan is well prepared to play a role of regional stabilizer, but to do this Japan requires to choose carefully its independent path without
Źródło:
Polish Journal of Political Science; 2015, 1, 1; 53-72
2391-3991
Pojawia się w:
Polish Journal of Political Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
THE CYBER THREATS AND THEIR TRENDS IN SECURITY MANAGEMENT
Autorzy:
Josef, Požár,
Milan, Kný,
Powiązania:
https://bibliotekanauki.pl/articles/891466.pdf
Data publikacji:
2018-08-13
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
Security management
cyberspace
cyber threats and trends
critical infrastructure
Opis:
Target processes of institutions management (from the enterprise, through the administration, to the alliances) are dependent on the provision and reliability of information and knowledge. Total digitization and “cybernation” of most of the processes require durability and protection against attacks and incidents of a new type. To anticipate timely the new risks is more difficult than to react flexibly to new socially pathological and criminal attacks. Reactive approach can’t avoid the initial losses, but this approach is pragmatic. The paper deals with some cyber threats and trends of attacks in an environment of the security management of the organization.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2016, 23; 228-239
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Importance of the System Category in Security Studies
Autorzy:
Gierszewski, Janusz
Powiązania:
https://bibliotekanauki.pl/articles/28411121.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Mikołaja Kopernika w Toruniu. Wydawnictwo UMK
Tematy:
security science
security system
Opis:
Using qualitative methods of source analysis and tracing the process of scientific discourse, an attempt was made to answer the research question: What is the relevance of the system category for security sciences? The study provides arguments in favour of confirming the author’s hypothesis that the category of system constitutes one of the universes of security sciences in terms of research object as well as methodology. In addition, the category is important for defining the identity of this scientific discipline.
Źródło:
Historia i Polityka; 2023, 44 (51); 55-72
1899-5160
2391-7652
Pojawia się w:
Historia i Polityka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The destructive nature of mendasious information in security policy
Autorzy:
Adamkiewicz, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2201551.pdf
Data publikacji:
2022
Wydawca:
Towarzystwo Wiedzy Obronnej
Tematy:
manipulation
propaganda
politicostery
untruth
danger
manipulacja
polityka
nieprawda
niebezpieczeństwo
Opis:
The article argues that information in security policy is a function of the prevailing political system and public relations that determine the mode of communication, intentions, expectations and necessities of ruling. If satrapy dominates, information has a manipulative dimension, while when democracy is the warp of the state and the organization of social structures, manipulation of news is subject to control. Thus the quality and reliability of information serving security is determined by the type of organization of social and state life which may take a democratic, despotic, authoritarian or totalitarian form. Depending on the prevailing order information is adapted to its nature. But the pathological and dangerous dimension of information appears only in a satrapy which takes politicosteria (dictatorship’s banditry) as the proper expression of the political system. This in turn is based on privileges and benefits that determine the network of mutual connections and ways of access to wealth. After all, to ensure it, a despotic security policy is needed which is affirmed by conformists who agree to undemocratic governments if they provide a stabilized, albeit captive (apparent) existence. In other words, the satrapy and its politicians include in their strategy both the humiliation of their allies and the suffering of their opponents depicted in persecution, harassment, solitary confinement and, in its extreme form, assassination. But in order to justify repression both outside and inside the anti-democratic system, manipulative information is needed. And its direct cause, however, is access to an existence of prosperity, for which every lie and information bluff is a guarantee for survival. Thus, in order to keep the wealth and privileges, politicians must lie as long as they can and to whom they can. It is because lying serves their security that is equal to the security of the state because the country’s resources are appropriated by politicians. The alternative to politicostery is ethics as the power of conscience safeguards the truth about social relations. The discussion here takes Russia as an example, although the views presented can be applied to any other autarky.
Źródło:
Wiedza Obronna; 2022, 3; 63--85
0209-0031
2658-0829
Pojawia się w:
Wiedza Obronna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Place of Poland in security policies of neigbouring states
Współwytwórcy:
Seydak, Paweł. Redakcja
Helnarski, Stanisław. Redakcja
Jurkowska, Anna. Redakcja
Popławska, Anna. Tłumaczenie
Data publikacji:
1997
Wydawca:
Warszawa ; Toruń : Adam Marszałek
Tematy:
Bezpieczeństwo międzynarodowe polityka Europa Środkowo-Wschodnia
Opis:
Tyt. oryg.: [Miejsce Polski w polityce bezpieczeństwa jej sąsiadów]. - Na 4 s. okł. błędny ISBN.
Dostawca treści:
Bibliografia CBW
Książka
Tytuł:
Utilization of graph theory in security analysis of power grid
Autorzy:
Válek, Dalibor
Powiązania:
https://bibliotekanauki.pl/articles/526987.pdf
Data publikacji:
2014
Wydawca:
Collegium Civitas
Tematy:
Security
matrix
power grid
graph
Opis:
This paper describes way how to use graph theory in security analysis. As an environment is used network of power lines and devices which are included here. Power grid is considered as a system of nodes which make together graph (network). On the simple example is applied Fiedler´s theory which is able to select the most important power lines of whole network. Components related to these lines are logicly ordered and considered by author´s modified analysis. This method has been improved and optimalized for risks related with illegal acts. Each power grid component has been connected with possible kind of attack and every of this device was gradually evaluated by five coefficients which takes values from 1 to 10. On the coefficient basis was assessed the level of risk. In the last phase the most risky power grid components have been selected. On the selected devices have been proposed security measures.
Źródło:
Securitologia; 2014, 2(20); 87-99
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Possibilities for the use of biometric data in security systems
Autorzy:
Kopczewski, M.
Smal, T.
Powiązania:
https://bibliotekanauki.pl/articles/347366.pdf
Data publikacji:
2017
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
biometrics
management
security
services
Opis:
Possibilities for the use of biometric data are growing and hence their practical application is also increasing. Therefore, an important element to be considered in the design, construction and exploitation of systems using biometrics is the question of identifying a specific person and assigning him or her to the relevant data contained in the documents or databases. The ability and, in some cases, the need to use biometric data results from the growing use of information technology in everyday life and the ever increasing attempts to steal the identity of those using these technologies. Modern IT systems often have a high level of security in terms of protection and access to data, and in particular the management of security systems. The article presents an outline of the theory related to the possibility of using and applying biometric data to provide security and have the ability to inspect officers of various departments. The subject of analysis also considered the possibility of using security measures in the form of biometric data identification for the purpose of securing the security services.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2017, 4; 168-179
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Is terrorism perceived in security studies as an effective strategy?
Autorzy:
Piwowarski, Juliusz
Węglarz, Patrycja
Powiązania:
https://bibliotekanauki.pl/articles/1861723.pdf
Data publikacji:
2014
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
Security
terrorism
counterterrorism
coercion
Opis:
The aim of this paper is to present standpoints prevailing among the researchers of terrorism, which refer to the problem of efficiency of terrorism treated as a coercive strategy. Authors basing on the scientific papers, which in their opinion are of key importance for this discussion, indicate the most important arguments in favor of the efficiency of terrorism and opposite ones. according to which not only terrorism is inefficient, but also antiterrorist strategies built upon misinterpreted attacks – must turn out to be defective. Analyzing few important publications in the discussed matter authors recall the notions included in it in order to provide an overview of the most important conceptions.
Źródło:
Security Dimensions; 2014, 12(12); 205-211
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Podejście systemowe w badaniach bezpieczeństwa
Systemic approach in security analyzis
Autorzy:
Drygiel-Bielińska, Marlena
Powiązania:
https://bibliotekanauki.pl/articles/564991.pdf
Data publikacji:
2015-12-01
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
system
analiza
teoria systemów
międzynarodowy system bezpieczeństwa
systemic analyzing
system theory
international security system
Opis:
Nauki o bezpieczeństwie wykorzystują liczne kategorie, które są właściwe innym dyscyplinom, nadając im znaczenie związane z różnymi wymiarami bezpieczeństwa. Celem niniejszego artykułu jest przedstawienie kategorii systemu jako użytecznej w badaniach bez-pieczeństwa. Należy tu zwrócić uwagę nie tylko na teorię systemów czy analizę systemową jako metodę badawczą, ale również na funkcjonującą w literaturze kategorię systemu bezpie-czeństwa. System bezpieczeństwa jest jednym z typów systemów społecznych. Wykorzysty-wanie podejścia systemowego nie jest jednak adekwatne do analizy wszystkich problemów z zakresu nauk o bezpieczeństwie.
Security studies, as one of the social sciences, use a number of categories that are relevant to other disciplines, giving them a meaning related to different dimensions of securi-ty. The purpose of this article is to describe the category of system as useful for research in security studies. It should be noted not only on systems theory and systems analysis as a method of research, but also on the functioning in the literature category of security system. The security system is one of the types of social systems. Using a systemic approach, howev-er, is not adequate to analyze all the problems of the security.
Źródło:
De Securitate et Defensione. O Bezpieczeństwie i Obronności; 2015, 2(1); 6-18
2450-5005
Pojawia się w:
De Securitate et Defensione. O Bezpieczeństwie i Obronności
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Possibilities for the Use of Biometric Data in Security Systems
Autorzy:
Kopczewski, Marian.
Powiązania:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki 2017, nr 4, s. 168-179
Współwytwórcy:
Smal, Tomasz. Autor
Data publikacji:
2017
Tematy:
Bezpieczeństwo publiczne
Bezpieczeństwo informacyjne
Identyfikacja osób
Biometria
Artykuł z czasopisma wojskowego
Artykuł z czasopisma naukowego
Opis:
Bibliografia na stronach 177-178.
Dostawca treści:
Bibliografia CBW
Artykuł
Tytuł:
Human Factors in Security – Cybersecurity Education and Awareness of Business Students
Autorzy:
Wiechetek, Łukasz
Mędrek, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2168351.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
computer security
cybersecurity
cybersecurity awareness
security education
cybersecurity education
business students
Opis:
Theoretical background: The rapid development of Internet interactions and a growing number of information technology users caused by digital society development and accelerated by the COVID-19 pandemic yield the significant growth of cyber-attacks and cybersecurity incidents. Members of Generation Z use information technology as a main tool for broadening their knowledge and skills. For such digital natives, proficiency in ICTs appears as an indispensable element of life. This is even more apparent during the COVID-19 pandemic, when they are forced to use IT tools more often, both for the entertainment, education, and work. Such acceleration generates new possibilities, but also new threats.Purpose of the article: The aim of the paper is to check if members of Generation Z are aware of cybersecurity issues and whether they know basic threats and methods/tools that can improve the safety. We analyse students’ behaviour in the event of cyber incident and examine whether the analysed group is willing to improve cyber knowledge, skills, and attitudes.Research methods: We explored data collected from business students (N = 182). The online questionnaire was prepared in LimeSurvey. Finally, data analysis and visualization were performed in Microsoft Excel and Tableau.Main findings: The analysis indicates that business students have rather poor knowledge in cybersecurity. The results demonstrate the need for targeted educational campaigns and trainings that address the specific cyber weaknesses to build secure ecosystem, combining both technical, organizational, and behavioural aspects.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska, sectio H – Oeconomia; 2022, 56, 1; 119-142
0459-9586
2449-8513
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska, sectio H – Oeconomia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
INNOVATION IN SECURITY AND DEVELOPMENT SERVICE OF THE POLISH MARITIME ECONOMY
Autorzy:
Janusz, Tomaszewski,
Powiązania:
https://bibliotekanauki.pl/articles/891445.pdf
Data publikacji:
2018-08-13
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
Innovation
safety
security
maritime economy
Opis:
The article presents the basic definitions of innovation and safety. The work embraces the author’s critical comments referring to Polish maritime economy (ME) against the background of the developed scientific and technology (S&T) concepts. Simultaneously, the deficits in the field of maritime policy, which have been affecting the overall economic security of the country are demonstrated. Assuming that the Polish Navy is an entity of ME, the author indicates the lack of doctrine and a coherent maritime strategy of the country.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2016, 23; 268-285
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
What Can Psychology Offer in Security Sciences – Cross-Cultural Psychology Approach
Autorzy:
Farnicka, Marzanna
Powiązania:
https://bibliotekanauki.pl/articles/1835819.pdf
Data publikacji:
2018-08-23
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
behavioural patterns
intercultural competence
individual and group security
training
Opis:
Psychology as a field of an applied social science could offer theories, procedures and trainings in solving some basic problems (e.g. fear, injustice) in security studies. This paper was inspired by SALTO report (2012). In the first part of the paper, the report and “working’ definition of intercultural competencies are described. This article is focused on solving problems, such as loosing social skills and challenges or profits connected with future. In this approach the theories of acculturation and emotional-cognitive processes were used. The processes of the development of basic skills such as: coping with insecurity, critical thinking, tolerance of ambiguity, communication were described. The review of the literature and some applications of this subject were presented as a step to use them in everyday practice. Having a framework of intercultural competence such as these presented and discussed above, it can be helpful in ensuring a more comprehensive, integrated approach in everyday work and life.
Źródło:
Security Dimensions; 2018, 25(25); 43-57
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sub-Disciplines in Security Sciences: On the Need to Distinguish Them
Autorzy:
Gierszewski, Janusz
Powiązania:
https://bibliotekanauki.pl/articles/31343156.pdf
Data publikacji:
2023-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
security sciences
subdisciplines
scientific discipline
Opis:
The article attempts to address the issue of the need to distinguish sub-disciplines in security sciences. A scientific discipline is a basic and lowest-order category within the classification system of individual fields of science. Security science in Poland has been classified as one of many disciplines in the field of social sciences. The problem was formulated as a question: based on which criteria can sub-disciplines be distinguished in the security sciences? The aim is to identify the basic sub-disciplines in security sciences and to propose a criterion for their distinction. Critical literature analysis and research design were adopted as the primary methods. There is no established criterion for the division into individual sub-disciplines in Poland. The author proposes to distinguish sub-disciplines based on the following criteria: theoretical, practical, types of institutions, and levels of organization of different security sectors. It is based on the assumption that security sciences require a clarification of the substantive scope within sub-disciplines through which the discipline’s identity can be built up, and research can be carried out as part of further scientific work.
Źródło:
Polish Political Science Yearbook; 2023, 4(52); 191-206
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Myślenie strategiczne w naukach o bezpieczeństwie
Strategic Thinking in Security Studies
Autorzy:
Daniluk, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/2141112.pdf
Data publikacji:
2019-12-25
Wydawca:
Wydawnictwo Naukowe Dolnośląskiej Szkoły Wyższej
Tematy:
myślenie strategiczne
nauki o bezpieczeństwie
ocena poziomu bezpieczeństwa
Opis:
Tezą niniejszego artykułu jest stwierdzenie, że tzw. myślenie strategiczne stanowi podstawowe instrumentarium pozwalające na ocenę poziomu bezpieczeństwa, jego zagrożeń oraz znaczenia poszczególnych procesów kreujących wyzwania dla bezpieczeństwa. W myśl tego artykułu umiejętność myślenia strategicznego jest, obok podejmowania decyzji oraz kierowania (zarządzania, dowodzenia i rządzenia), jedną z kluczowych wartości i umiejętności, jakie powinni posiadać specjaliści zajmujący się tą problematyką. Z tego względu, opierając się na dorobku naukowym i osiągnięciach badaczy z dziedziny zarządzania, należy przede wszystkim określić, co to jest myślenie strategiczne w sferze bezpieczeństwa i jakimi cechami powinno się charakteryzować.
The thesis of this article is a statement that the socalled strategic thinking consti-tutes a basic instrumentarium that allows to evaluate the security level, its threats and the importance of all particular processes that create challenges to security. The article says that the ability of strategic thinking is, next to decision making and leading (managing, commanding and ruling), one of the key values and skills, which should be owned by specialists that deal with this issue. Therefore, based on the scientific successes and achievements of management researchers, it is necessary, first of all, to specify what the security strategic thinking is and which features it should possess.
Źródło:
Rocznik Bezpieczeństwa Międzynarodowego; 2012, 6; 83-98
1896-8848
2450-3436
Pojawia się w:
Rocznik Bezpieczeństwa Międzynarodowego
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies