Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Threats" wg kryterium: Temat


Tytuł:
Threats to people with disabilities in virtual and environmental spaces – a comparison of behaviors
Autorzy:
Pieczywok, Andrzej
Wasielewska, Paulina
Wasielewski, Sławomir
Powiązania:
https://bibliotekanauki.pl/articles/2143015.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
threats
security
environmental threats
cyberspace threats
Opis:
This paper will outline the major mental and physical health risks associated with the Internet and environmental risks affecting people with physical disabilities. Modern humans strongly emphasize their need for security. A clean environment is important for human health and well-being. Human security in cyberspace is also important. The importance of security for citizens using information and communication technology systems is increasing every day. The article compares key environmental and cyberspace threats.
Źródło:
Cybersecurity and Law; 2022, 7, 1; 309-319
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Threats for public safety in the 21ST Century
Autorzy:
Biszko, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1179336.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
cyber threats
disasters
natural disasters
primary threats
safety
secondary threats
terrorism
Opis:
The aim of the following paper is to present the threats that have a direct impact on social development. The article adopts the distinction of threats into primary and secondary ones. The former entails natural phenomena such as the movement of tectonic plates, various forms of precipitation, or ambient temperature, both high and low. They result in floods, fires, earthquakes and massive water movements, e.g. tsunami, responsible for the damage of industrial and public infrastructure as well as private properties. Secondary threats are results of human activity. Industrial growth and technological advance lead to unsustainable exploitation of natural resources and change the demand for workforce in terms of both quality and quantity. Such threats to safety can be identified, resolved and prevented as opposed to those targeted directly at a given country, e.g. terrorism or cyber attacks. Often unexpected, they become increasingly common. It is essential for public administrations to detect and recognise both kinds of threats in order to react in time and minimise their negative effects.
Źródło:
World Scientific News; 2017, 78; 81-92
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberspace as a source of dehumanization of the human being
Autorzy:
Pieczywok, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/13946801.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybersecurity
institutional threats
personal threats
risk
Opis:
The paper points to an important sphere of human safety, as it refers to cyberspace as an environment where information is exchanged via the net and computer systems. In addition to positive accents, cyberspace also creates various threats that lead to the dehumanization of life. The negative effects of being in cyberspace cause threats to mental, social and healthy lives. Very often they pose a danger not only to human health but also to human life. In addition to the introduction, the article includes characteristics of the loss of a sense of reality among people who use cyberspace excessively and the risks of medical hazards.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 40-47
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected security threats in cyberspace
Autorzy:
Chronowska, Emilia
Powiązania:
https://bibliotekanauki.pl/articles/2143013.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
threats
cyberspace
cyber threats
international law
Opis:
This article presents selected cybersecurity threats, identifies them, and points out their evolving nature. Cyberspace is a realm without defined geographic or political boundaries and is highly interactive. This article indicates the important role of cybersecurity in the context of building the information society and presents the most important legal regulations, both international and national, along with the indication of the proposed directions of changes at the national level, which would help to increase cybersecurity. The article emphasizes the importance of legislative and organizational regulations in the field of the addressed issues.
Źródło:
Cybersecurity and Law; 2022, 7, 1; 7-16
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Multidisciplinary approach to the analysis of the process of perceiving warning signals
Autorzy:
Ćwik, Bogdan
Powiązania:
https://bibliotekanauki.pl/articles/576171.pdf
Data publikacji:
2017-06-23
Wydawca:
Akademia Sztuki Wojennej
Tematy:
perception of threats
threats
warning
early warning system
Opis:
The article presents the results of research and literature studies in terms of the perception of threats. The author presents the main factors affecting the quality and efficiency of the perception of threats. The paper firstly looks at an integrated model of the perception of the warning signal and, secondly, the complexity and multidiscipline of the approach required by this model, arguing and advocating broadening the field of interest in security sciences to other fields and disciplines.
Źródło:
Security and Defence Quarterly; 2017, 15, 2; 21-37
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
International conditions of the internal security of state
Autorzy:
Wawrzusiszyn, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/526997.pdf
Data publikacji:
2015-12-01
Wydawca:
Collegium Civitas
Tematy:
security
threats
state
Opis:
Ensuring a high level of internal security is an important element of the internal policy of the state. Internal security policy cannot be an individual and independent action, because it has to take into account the international environment. The emerging international order has a significant impact on the internal security of the state. Today's internal security and external security are closely linked. Threats from outside can be easily transformed into internal threats. Therefore, measures to ensure internal security have to be interdisciplinary.
Źródło:
Securitologia; 2015, 1(21); 143-162
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Perception of safety of urban residents
Autorzy:
Czuba, B.
Krawczynska, K.
Powiązania:
https://bibliotekanauki.pl/articles/30147029.pdf
Data publikacji:
2018
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
safety
city
threats
Opis:
Modern cities generate many threats. Based on the conducted pilot studies and analysis of available statistical data, the authors of the article try to answer the following questions of what determines the sense of safety of urban residents and how residents assess their own safety.
Źródło:
Scientific Journal of the Military University of Land Forces; 2018, 50, 4(190); 5-16
2544-7122
2545-0719
Pojawia się w:
Scientific Journal of the Military University of Land Forces
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Dilemmas of security perception
Autorzy:
Banasik, M.
Powiązania:
https://bibliotekanauki.pl/articles/30147048.pdf
Data publikacji:
2018
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
security
threats
values
Opis:
The concept of security has undergone transformations along with the development of civilization. The rapid changes in the international security environment that have occurred over the past few decades have had a particularly significant impact on its character and significance. In this aspect, the aim of the article is to present the essence of security and dilemmas related to the interpretation of this concept. The article explains etymology and the importance of security. It characterizes how security evolved, how it was understood and interpreted. The traditional and non-traditional perception of security is explained.
Źródło:
Scientific Journal of the Military University of Land Forces; 2018, 50, 3(189); 5-15
2544-7122
2545-0719
Pojawia się w:
Scientific Journal of the Military University of Land Forces
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zagrożenia globalne: próba identyfikacji
Global Threats: an Attempt of Identification
Autorzy:
Kleer, Jerzy
Powiązania:
https://bibliotekanauki.pl/articles/465227.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Komitet Prognoz Polska 2000 Plus PAN
Tematy:
zagrożenia globalne
zagrożenia światowe
kryzys kapitalizmu
zagrożenia przetrwania
global threats
worldwide threats
crisis of capitalism
survival threats
Opis:
Treścią artykułu jest próba identyfikacji zagrożeń globalnych, które charakteryzują się powszechnością, wzrostem intensywności, procesami kumulacyjnymi, oraz wizualizacją. Zagrożenia globalne zostały podzielone na trzy grupy: zagrożenia światowe (brak ładu światowego, sprzeczność między globalizacją a interesami państw narodowych, niezdolność czasowa dostosowania się człowieka do tempa zachodzących zmian); zagrożenia podstawowe (kryzys kapitalizmu w sferach: polityczno-ustrojowych, ekonomicznych i społecznych oraz zmiany demograficzne); zagrożenia przetrwania (podaż surowców, niszczenie środowiska, rynek pracy, postęp techniczny, powstawanie megamiast). Wnioski koncentrują się na przyczynach nieefektywności dotychczasowych rozwiązań oraz wizji możliwych zmian systemowych.
This paper presents an attempt to identify global threats characterized by universality, increase of intensity, cumulating processes and visualization. Global threats are subdivided into three groups: worldwide threats (lack of global governance, conflict between globalization and the interests of national states, difficulty of fast adaptation of people to the speed of contemporary changes); fundamental threats (a crisis of capitalism in the political and institutional, economic and social spheres, and demographic changes), survival threats (supply of raw materials, pollution of environment, labour market, technological progress, emergence of megacities). Conclusions concern the reasons of inefficiency of previous solutions and a vision of possible systemic changes.
Źródło:
Przyszłość. Świat-Europa-Polska; 2012, 2; 14-29
1895-0949
Pojawia się w:
Przyszłość. Świat-Europa-Polska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Susceptibility of the GPS navigation system to various types of interferences and threats
Autorzy:
Sulkowski, J.
Kowaleczko, P.
Powiązania:
https://bibliotekanauki.pl/articles/241538.pdf
Data publikacji:
2014
Wydawca:
Instytut Techniczny Wojsk Lotniczych
Tematy:
navigation systems
interferences
threats
Opis:
This paper is devoted to the problem of the GPS navigation system’s susceptibility to various types of interferences and indicates in what way they may influence on navigation parameters. Basic principles of working of GPS receivers and possibilities of the influence on navigation parameters are discussed. Main advantages and disadvantages of using the navigation systems are indicated. In particular, moments of reception of satellites’ signals in relation to the distance of a satellite, diagram presenting the generation process of a signal emitted by a satellite, spectrum of the interfering electromagnetic wave with constant frequency and amplitude, failure to identify location in the GPS receiver, results of the studies concerning the influence of interference with the wave having constant frequency and amplitude, results of the studies concerning the influence of interference with the wave having constant frequency and changing amplitude, spectrum of the interfering signal – constant narrow-band sweeping wave, GPS receiver’s application after input of a real signal with correct identification of the location, GPS receiver’s application after input of the simulated signal of the satellite are presented in the paper.
Źródło:
Journal of KONES; 2014, 21, 4; 461-469
1231-4005
2354-0133
Pojawia się w:
Journal of KONES
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Polskie analizy strategiczne – przegląd 2015 roku
Autorzy:
Wiśniewski, Rafał
Powiązania:
https://bibliotekanauki.pl/articles/642083.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
strategic analysis
security threats
Opis:
The article constitutes a review o f selected articles published in 2015 by leading Polish scientific journals dealing with international security („Bellona”, „Bezpieczeństwo Narodowe” [„National Security”], „Rocznik Strategiczny” [„Strategic Yearbook”] and „Stosunki Międzynarodowe” [„International Relations”]). It aims to highlight main directions o f research conducted in the previous year by the Polish strategic studies community. The author presents the most important and interesting arguments in main debates undertaken on the pages o f reviewed publications adding his own analytical commentary.
Źródło:
Przegląd Strategiczny; 2016, 9; 395-410
2084-6991
Pojawia się w:
Przegląd Strategiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nowe i stare zagrożenia Sojuszu Północnoatlantyckiego
The new and old threats to North Atlantic Treaty Organization
Autorzy:
Wrzosek, M.
Powiązania:
https://bibliotekanauki.pl/articles/120676.pdf
Data publikacji:
2013
Wydawca:
Akademia Sztuki Wojennej
Tematy:
NATO
threats
terrorism
terroryzm
Opis:
The article presents the complex issue of threats faced by NATO. Changes in the international security environment result in many dangers NATO cannot ignore, including conventional threats. In the globalized world, non-state organizations and structures pose a potential threat to transportation, energy supply networks and critical infrastructure. In this situation, one should not exclude the potential threat of conventional armed conflict. NATO continues to see growth in the proliferation of weapons and their means of delivery as asource of threat. Terrorism and cyberattacks pose the specific type of modern asymmetric threats to NATO. The development of new technologies and the use of space for military purposes is also very important for the security of NATO. Multi-faceted issue of threat is presented from the perspective of a number of examples illustrating the complexity of the problem.
Źródło:
Zeszyty Naukowe AON; 2013, 2(91); 31-46
0867-2245
Pojawia się w:
Zeszyty Naukowe AON
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Risk in systems with virtualization : test case analysis
Autorzy:
Stanclik, M.
Walkowiak, T.
Powiązania:
https://bibliotekanauki.pl/articles/2069148.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
virtualization
risk analysis
threats
Opis:
The paper presents an approach to risk analysis of exemplar test case information systems. Authors point out the common practice to implement virtualization and put away security considerations for future[5]. The overview of virtualization techniques, focusing on server virtualization is given. Next, authors present risk analysis of exemplar GIS system. First of all identification of threats is taken out focusing on virtualization aspects, but it also includes common threats for both that could have a significant impact on safety when using a virtualization. The risk assessment for the test case system was performed using qualitative method. Assessment of the likelihood and magnitude of impact of identified risks was performed on the basis of the expert’s knowledge and experience. The obtained results were used to develop risk rankings, which indicate the risks that need special attention when designing and managing a virtual system.
Źródło:
Journal of Polish Safety and Reliability Association; 2013, 4, 2; 249--258
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Identification of National Critical Infrastructures : DSO comply with European Council Directive 2008/114/EC
Autorzy:
Pestana, M.
Messias, R.
Powiązania:
https://bibliotekanauki.pl/articles/2069325.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure
threats
vulnerabilities
Opis:
The subject addressed in the paper is about the identification of National Critical Infrastructures (NCI). The focus is the result of the responsibilities of EDP Distribuição, the Portuguese mainland Electrical Distribution System Operator (DSO) serving over 6 million customers in a regulated business with clearly defined tasks, to comply with the transposition to the Portuguese legislation of the European Council Directive 2008/114/EC. Having EDP Distribuição under their responsibility several assets and systems which are essential for the maintenance of vital societal functions, health, safety, security, economic and social well-being of people, the ones considered national critical were selected, from a set of more than 400 main premises. Has been identified their major threats and vulnerabilities, which resulted in emergency response procedures named “Operator Security Plan”.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 3; 109--114
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zagrożenia związane z postępem techniki na przykładzie Facebooka
Threats related to technological progress in the example of Facebook
Autorzy:
Stecuła, K.
Powiązania:
https://bibliotekanauki.pl/articles/113121.pdf
Data publikacji:
2017
Wydawca:
STE GROUP
Tematy:
Facebook
zagrożenia postępu techniki
cyberprzemoc
zagrożenia
threats of technological progress
cyberbullying
threats
Opis:
W artykule przedstawiono wybrany wycinek wyników badań ankietowych dotyczących Facebooka. Badania poruszały tematykę aktywności i postawy użytkowników wspomnianego medium społecznościowego. Ze względu na obszerność przeprowadzonych badań w niniejszym artykule zaprezentowano i mówiono jedynie fragment ankiety dotyczący zagrożeń Facebooka. Wyniki badań dostarczyły nowej wiedzy na obszarze zagrożeń, niebezpieczeństw i negatywnych skutków postępu technicznego na przykładzie badanego medium społecznościowego.
The article presents a chosen part of the survey research on Facebook. The research focused on activities and attitudes of the mentioned social medium users. Due to the breadth of the conducted research, the article shows and discusses only an extract of the survey concerning threats of Facebook. The results have provided new knowledge in the area of threats, dangers and negative effects of the technological progress in the example of the studied social medium.
Źródło:
Systemy Wspomagania w Inżynierii Produkcji; 2017, 6, 7; 223-232
2391-9361
Pojawia się w:
Systemy Wspomagania w Inżynierii Produkcji
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies