Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Kozera, Cyprian" wg kryterium: Autor


Wyświetlanie 1-7 z 7
Tytuł:
White Storks Killings in Lebanon and the Effort to Stop It: The Role of Social Media in Spreading and Counteracting the Phenomenon
Autorzy:
Kozera, Cyprian
Powiązania:
https://bibliotekanauki.pl/articles/903543.pdf
Data publikacji:
2014-06-30
Wydawca:
Akademia Pedagogiki Specjalnej im. Marii Grzegorzewskiej. Wydawnictwo APS
Tematy:
hunting
Lebanon
migratory birds
social media
White Stork
Opis:
Massive White Storks killings in Lebanon and the response to the phenomenon reflect an example of globalized ties that connect and unite European and Middle Eastern societies. Numerous migrant birds, protected in Europe, are being killed solely for entertainment when they cross over the Lebanese sky in flocks of hundreds and thousands, among them the White Stork. The national law concerning hunting has not been enforced properly for many years in Lebanon. In result there are thousands of untrained hunters who shoot everything alive visible on the sky and afterwards proudly publish photos with the pray in the social media. This deteriorating phenomenon forced local environmentalists to seek the attention and help abroad. Hence, the network of Lebanese and Polish NGOs has been established to, via diplomatic channels, put apressure on the Lebanese government to act more consistently. It seems that such unprecedented cooperation between Lebanon and Poland has brought forth desired results and migrating birds are becoming safer – thanks to the globalization and the Internet as well.
Źródło:
Studies in Global Ethics and Global Education; 2014, 1; 80-104
2392-0890
Pojawia się w:
Studies in Global Ethics and Global Education
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Fitness OSINT: Identifying and tracking military and security personnel with fitness applications for intelligence gathering purposes
Autorzy:
Kozera, Cyprian A.
Powiązania:
https://bibliotekanauki.pl/articles/1194394.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
intelligence
OSINT
open source
fitness application
Suunto
Opis:
The objective of this paper is to demonstrate the possibility of tracking and identifying military and other security personnel, operating in secretive or restricted areas. Such exposure might have dire consequences from the perspective of counterintelligence or physical security. Open Source Intelligence (OSINT) and Social Media Intelligence methods and techniques were employed to gather and analyse information on security and military personnel and expose their activities on-line. The case studies presented in the article exemplify utilisation of the new “Suunto” fitness application for open-source-based intelligence research. Despite general Operational Security rules that require all personal data such as names, pictures and habits to be kept discreet, open-source based research with one of the most popular fitness applications allowed the identification of military personnel and government agents operating in Afghanistan, Mali, Syria or working at national military facilities. In a single case, it took the author less than thirty minutes to identify personal details of a US Army soldier in Afghanistan and a Special Forces officer in one of the European countries and obtain their home addresses and pictures of them and their families. The results of the research show how OSINT techniques concerning fitness applications are useful both for intelligence and counterintelligence, specifically for malicious and terrorist purposes, and how necessary it is to make fitness and other, supposedly personal, activity private, especially for those who carry out sensitive missions and work in a restricted or secretive environment.
Źródło:
Security and Defence Quarterly; 2020, 32, 5; 41-52
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Military Use of Unmanned Aerial Vehicles – A Historical Study
Autorzy:
Kozera, Cyprian Aleksander
Powiązania:
https://bibliotekanauki.pl/articles/466176.pdf
Data publikacji:
2018-06-30
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
Unmanned Combat Aerial Vehicles
UCAV
Unmanned Aerial Vehicles
UAV
Drones
Opis:
The following study is devoted to the phenomenon of unmanned aerial vehicles used throughout known history on the battlefield or for military purposes. The purpose of the following text is to familiarise the reader with an overview with the contemporary and historical employment of the unmanned vehicles on the battlefield. The study also aims to show that the concept of unmanned combat vehicles, also unmanned aerial combat vehicles, is far more ancient than is it is widely known. The article is based on theoretical research methods, mostly multinational academic literature. The author starts with an introduction on the role of limiting soldiers’ fatalities and the concept of removing military men from the battleground. Then, the author presents known examples of using unmanned ships in battles from Thucydides’ times to the invention of the Hell-burner of Antwerp. Further, the case of first unmanned combat aerial vehicle is presented, the bombing balloons from the nineteenth century, followed by a more contemporary study of the military use of unmanned aircrafts. The article is concluded with an analysis of the present employment of drones when they tend to substitute manned aircrafts on various occasions, especially when a mission is deemed “dull, dirty or dangerous”.
Źródło:
Safety & Defense; 2018, 4(1), 1; 17-21
2450-551X
Pojawia się w:
Safety & Defense
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
THE WRETCHED OF THE AFRICAN EARTH. AN ATTEMPT AT DECONSTRUCTING THE STEREOTYPE OF AFRICANISED MIGRATION DESTINED FOR EUROPE
Autorzy:
KOZERA, CYPRIAN ALEKSANDER
POPŁAWSKI, BŁAŻEJ
Powiązania:
https://bibliotekanauki.pl/articles/1036274.pdf
Data publikacji:
2019-12-31
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
migration
Africans
discourse
stereotype
Opis:
The aim of the article is to deconstruct the Africanization of migration destined for Europe, to disprove several cognitive scripts on migration from Africa, most frequently quoted in the conservative media discourse. In the introduction, the migration of Africans destined for Europe in relations to the migration of Asians via Africa destined for Europe were characterized inter alia on the basis of the official documents, UNHCR and FRONTEX reports. Then, the dynamics of transcontinental and intra-Africa migrations – in synchronous and diachronic approach, with the reference to the research results of scholars specialized in the demography, social policy, history of migration – were discussed. Finally, the cultural meanings of migration among Africans is presented.
Źródło:
Society Register; 2019, 3, 4; 185-198
2544-5502
Pojawia się w:
Society Register
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Game of Proxies – Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine
Autorzy:
Kozera, Cyprian A.
Bernat, Paweł
Gürer, Cüneyt
Popławski, Błażej
Sözer, Mehmet A.
Powiązania:
https://bibliotekanauki.pl/articles/1194387.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Proxy Forces
Libya
Mali
Syria
Ukraine
Central African Republic
Opis:
The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject, governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently, the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict’s outcome.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 77-97
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies