Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Mares, Miroslav" wg kryterium: Autor


Wyświetlanie 1-2 z 2
Tytuł:
Strategies of Islamist Extremism in Europe
Autorzy:
Mares, Miroslav
Powiązania:
https://bibliotekanauki.pl/articles/648420.pdf
Data publikacji:
2015-12-01
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
Islamist Extremist
strategy
Europe
political violence
Insurgency
Opis:
This paper explains various strategies of contemporary Islamists extremism in Europe. The author identifies the most important variants of Islamist extremism and deals with their goals and with strategic approaches how to achieve these goals. Quasi-legalist strategies as well as violent forms of interest-empowerment are described. The author uses sources from various Islamist organizations and analyses these materials within the framework of modern insurgency. A comprehensive outlook and threat assessment of Islamist extremist strategies are included in this article.
Źródło:
International Studies. Interdisciplinary Political and Cultural Journal; 2015, 17; 109-118
1641-4233
2300-8695
Pojawia się w:
International Studies. Interdisciplinary Political and Cultural Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
How Are Czech Individuals Willing to Protect Themselves: A Comparison of Cyber and Physical Realms
Autorzy:
Kleiner, Jan
Drmola, Jakub
Mares, Miroslav
Powiązania:
https://bibliotekanauki.pl/articles/27294854.pdf
Data publikacji:
2022
Wydawca:
NASK - National Research Institute
Tematy:
cyber-physical comparison
cybersecurity
survey
porównanie cyber-fizyczne
cyberbezpieczeństwo
ankieta
Opis:
Endpoint users are usually viewed as the highest-risk element in the field of cybersecurity. At the same time, they need to be protected not just from the individual-level prism but also, from the state’s perspective, to counter threats like botnets that harvest weakly secured endpoints and forge an army of so-called zombies that are often used to attack critical infrastructure or other systems vital to the state. Measures aimed at citizens like the Israeli hotline for cybersecurity incidents or Estonian educational efforts have already started to be implemented. However, little effort is made to understand the recipients of such measures. Our study uses the survey method to partly fill this gap and investigate how endpoint users (citizens) are willing to protect themselves against cyber threats. To make results more valid, a unique comparison was made between cyber threats and physical threats according to the impact which they had. The results show statistically significant differences between comparable cyber-physical pairs indicating that a large portion of the sample was not able to assess the threat environment appropriately and that state intervention with fitting countermeasures is required. The resultant matrix containing frequencies of answers denotes what portion of respondents are willing to invest a certain amount of time and money into countering given threats, this enables the possible identification of weak points where state investment is needed most.
Źródło:
Applied Cybersecurity & Internet Governance; 2022, 1, 1; 1-14
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-2 z 2

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies