Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Pilarski, Grzegorz" wg kryterium: Autor


Tytuł:
How to Estimate Security – Problem Analysis
Autorzy:
Pilarski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1807890.pdf
Data publikacji:
2020-06-30
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
estimation
risk analysis
political risk
forecasting
Opis:
Background: The article presents a method of estimating the security level which indicates how probable it is for a phenomenon to occur. Objectives: The author attempts to answer the question: How do we estimate security? Decision makers usually need percentage showing the probability of an incident taking place in the future. This information is needed in the first place, later decision makers can use more descriptive information. Methods: The research problem concerns the assessment of security using the estimation method. Depicting security in numbers is difficult, thus the descriptive method is also usually applied. The estimation method facilitates the assessment. It is helpful since it is partly done by calculation and partly by guessing or approximation. Based on a case study analysing whether a terrorist attack may occur, the author also used tools such as averaging expert predictions, scenario analysis and risk analysis. Results: This article provides a view on forecasting security, which results in a method of estimating the level of security. Conclusions: The author presents an approach which allows to initially estimate the security level of the analyzed phenomenon in a relatively short period of time.
Źródło:
Security Dimensions; 2020, 33(33); 217-240
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Conceptual Analysis in the Field of Management
Autorzy:
Pilarski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1961876.pdf
Data publikacji:
2021-12-30
Wydawca:
Międzynarodowa Wyższa Szkoła Logistyki i Transportu
Tematy:
management
command
directing
steering
Opis:
In the literature on the subject, the terms steering, management and control are often used interchangeably. However, in the course of the terminological analysis, the author indicated the dependencies between these concepts and defined the area of their application. The conducted research allowed for the identification of the concept of command and the area of its influence. The system of command, as a special (specific) form of management, allowed for the presentation of the entirety of the commander's purposeful activity as part of the command system. As a result of the terminological analysis, the author drew attention to the diversity of the analysed concepts, which will allow for their purposeful and proper use in research in the field of social sciences in the disciplines of safety science as well as management and quality science.
Źródło:
Logistics and Transport; 2021, 51-52, 3-4; 79-92
1734-2015
Pojawia się w:
Logistics and Transport
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cybersecurity : choosen aspects
Autorzy:
Pilarski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/2201527.pdf
Data publikacji:
2022
Wydawca:
Towarzystwo Wiedzy Obronnej
Tematy:
cyberspace
cybersecurity
national security
Computer Emergency Response Team
CERT
information communication technology
ICT
Opis:
In the era of contemporary cyber threats, there is an urgent need to provide cybersecurity in almost every public institution as well as in business. Particular emphasis should be put on institutions which are responsible for ensuring national security. A specific case is a military organization where cybersecurity should be provided during peace, crisis and war. In this article the author presented selected problems related to providing cyber security in a military organization and proposed appropriate solutions to the indicated aspects.
Źródło:
Wiedza Obronna; 2022, 2; 175--193
0209-0031
2658-0829
Pojawia się w:
Wiedza Obronna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Tackling cyberspace threats – the international approach
Autorzy:
Pilarski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/576463.pdf
Data publikacji:
2016-09-23
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cyber defence
cybercrime
information communication
technology (ICT)
Opis:
The fact that NATO has acknowledged cyberspace as the fifth dimension of combat operations indicates that this problem issue is really topical and is pointing at the direction from which the possible threat can be expected. However, the issues of information communication technology (ICT) security on the national level have been tackled in numerous countries for many years. Technological advancement has resulted in making communication, and at the same time services rendered in cyberspace, an international domain. Thus, the aspects of cyberspace threats should be considered through the international prism. The above-presented approach has become an incentive for the author to take up research on international activities in terms of cyberspace defence and reaction to the already identified as well as future threats.
Źródło:
Security and Defence Quarterly; 2016, 12, 3; 100-117
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberattacks and the bank’s liability for unauthorized payment transactions in the online banking system – theory and practice
Autorzy:
Milik, Piotr
Pilarski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/13947278.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberattack
financial security
electronic banking system
computer fraud
European Union
Opis:
The article discusses the matter of contemporary cyberattack techniques aimed at the financial security of banks and their clients and presents the relationship of banks with their clients in the light of the applicable provisions of the European Union (Directive of the European Parliament and the EU Council 2015/2366 of November 25, 2015 on payment services in internal market) and the Polish Act of 19 August 2011 on payment services. The authors also analyze the practical side of the relationship between banks and their customers who have fallen victim to computer fraud, pointing out that the common practice of banks refusing to return funds stolen from their customers in the electronic banking system is inconsistent with the applicable standards of Polish and European law.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 108-126
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies