Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "proxy" wg kryterium: Temat


Tytuł:
Niekonstytucyjność art. 4241 § 1 K.P.C. – Studium przypadku
Unconstitutionality of article 4241 § 1 of civil proceedings law – case study
Autorzy:
Michta, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/1179738.pdf
Data publikacji:
2018
Wydawca:
Państwowa Wyższa Szkoła Zawodowa w Raciborzu
Tematy:
plaint
damage
judgment
litigant
proxy
Opis:
Author considers if Article 4241 § 1 of Civil Proceedings Law is contrary to Basic Law, when it reduces possibility of placing plaint for identifying inconsistency with law of valid court decision in case when ,by its rendering, only one litigant suffered a damage. Law mentioned previously indicates that demanding of identifying inconsistency with law of valid court decision of second instance ending proceedings in process, is possible if by its rendering, litigant suffered a damage and a change or repeal of the judgement by tenable legal means wasn’t and is still not possible. Author shows that mentioned law doesn’t warrant placing a plaint to identify inconsistency with law of valid court decision, in case when by its rendering damage wasn’t done to litigant, but to assigned proxy representing litigant.
Źródło:
Eunomia – Rozwój Zrównoważony – Sustainable Development; 2018, 1(94); 63-68
1897-2349
2657-5760
Pojawia się w:
Eunomia – Rozwój Zrównoważony – Sustainable Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
LAW APPLICABLE FOR THE REPRESENTATIONTO EXERCISE THE CORPORATE RIGHTS OF SHAREHOLDERSIN POLISH COMPANIES
Autorzy:
Tapek, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/915878.pdf
Data publikacji:
2017
Wydawca:
Katolicki Uniwersytet Lubelski Jana Pawła II
Tematy:
representation
proxy
law applilcable
shareholder
Opis:
Shareholders of Polish companies dispose of various rights – property as well as corporate. Majority of corporate rights can be exercised by a representative. Representation, in this regard includes two categories: proxy and statutory rep-resentation. Regulations concerning representation vary, depending on kind of company in which they are used (limited liability companies, joint – stock com-panies or public companies, whose regulation is influenced by European law). In current study representation to exercise corporate rights of shareholders will be examined on the meta-law level. Provisions of international private law shall be observed to determine that which country’s legal regime shall be applied to interpret the institution of representation in cross-border situations. Additionally, it is necessary to distinguish the scopes of laws applicable for different issues connected with representation. The dissertation is aimed to address all abovementioned questions with the reference to European and Polish law.
Źródło:
Review of European and Comparative Law; 2017, 28, 1; 129-160
2545-384X
Pojawia się w:
Review of European and Comparative Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Countering terrorism in the shadows: The role of private security and military companies
Autorzy:
Hlouchova, Iveta
Powiązania:
https://bibliotekanauki.pl/articles/1194366.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
regulations
privatization
counterterrorism
proxy
Opis:
The article identifies the main features of the PSMCs’ involvement in counterterrorism operations and outlines what their future involvement might look like with its implications for international peace and security. The main methods used to gather data and to draw inferences are a content analysis of relevant primary and secondary sources, and a discourse analysis, used as a method of examining the prevailing discourse surrounding the activities of PSMCs, seeking to understand the level of transparency, accountability and attributability of these actors. So far, the PSMCs’ potential for counterterrorism has not been fully exploited. There are many challenges surrounding the existence and operations of PSMCs, mainly lack of transparency and accountability, the continuous significance of the plausible deniability and political expediency PSMCs provide to nation governments, and an insufficient and inadequate international regulatory and control framework with no sanction or enforcement mechanisms. Most recently, the tendency to re-legitimise PSMCs’ activities can be identified. There will most probably be an expansion of PSMCs’ activities in the near future, as climate change consolidates security as a commodity, not a right. Therefore, there is a renewed urgency for adequate and effective international regulatory and control mechanisms on their activities on the international level.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 155-169
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ID-based, Proxy, Threshold Signature Scheme
Autorzy:
Pomykała, Jacek
Kułakowski, Henryk
Sapiecha, Piotr
Grela, Błażej
Powiązania:
https://bibliotekanauki.pl/articles/1844644.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
ID-based
proxy
threshold
signature
scheme
Opis:
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 2; 201-205
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Automatic proxy generation and load-balancing-based dynamic choice of services
Autorzy:
Dąbrowski, J.
Feduniak, S.
Baliś, B.
Bartyński, T.
Funika, W.
Powiązania:
https://bibliotekanauki.pl/articles/305465.pdf
Data publikacji:
2012
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
proxy
load-balancer
load balancing
automatic generation
Opis:
The paper addresses the issues of invoking services from within workflows which are becoming an increasingly popular paradigm of distributed programming.The main idea of our research is to develop a facility which enables load balancing between the available services and their instances. The system consists of three main modules: a proxy generator for a specific service according to its interface type, a proxy that redirects requests to a concrete instance of the service and load-balancer (LB) to choose the least loaded virtual machine (VM) which hosts a single service instance. The proxy generator was implemented as a bean (in compliance to EJB standard) which generates proxy according to the WSDL service interface description using XSLT engine and then deploys it on a GlassFish application server using GlassFish API, the proxy is a BPEL module and load-balancer is a stateful Web Service.
Źródło:
Computer Science; 2012, 13 (3); 45-59
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Outsourcing warfare: Proxy forces in contemporary armed conflicts
Autorzy:
Wither, James K.
Powiązania:
https://bibliotekanauki.pl/articles/1194386.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Iran
United States
Russia
proxy forces
great power competition
Opis:
The aim of this article is to provide a comprehensive examination of the different types of armed non-state proxy groups. It discusses their characteristics and sponsorship and how they are employed by states in pursuit of their security and foreign policy objectives. The article also analyses the reasons for the recent increase in the use of proxy forces, including the benefits and risks for states that employ them, as well as the broader impact of proxy forces on the international security environment, including great power competition. Data was collected and analysed from a wide range of secondary source documents. A descriptive, qualitative research methodology was applied to print and on-line publications available from governmental, institutional and academic sources. This involved literature reviews and case studies to provide an in-depth understanding of current thinking on the topic, while also identifying potential areas for further research. The article provides a comprehensive, qualitative analysis of the existing literature and case studies on the topic of proxy forces, which due to the research methodology applied, also relies on the researcher’s judgement, choices and assumptions. Proxy wars will remain the norm for the foreseeable future. Two strategic developments drive this conclusion. Firstly, there is the renewal of great power competition for influence, resources and security, and secondly, the imperative for states to achieve these objectives without employing their military forces in a manner that could cause a major war.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 17-34
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Game of Proxies – Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine
Autorzy:
Kozera, Cyprian A.
Bernat, Paweł
Gürer, Cüneyt
Popławski, Błażej
Sözer, Mehmet A.
Powiązania:
https://bibliotekanauki.pl/articles/1194387.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Proxy Forces
Libya
Mali
Syria
Ukraine
Central African Republic
Opis:
The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject, governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently, the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict’s outcome.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 77-97
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Differentiated Service Model-Supported Cluster-Based Routing in Wireless Sensor Networks
Autorzy:
Agarkhed, Jayashree
Dattatraya, Patil Yogita
Patil, Siddarama
Powiązania:
https://bibliotekanauki.pl/articles/307674.pdf
Data publikacji:
2020
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
clustering
energy efficiency
proxy server
TDMA
wireless sensor networks
Opis:
Wireless Sensor Network finds its extensive use in healthcare applications for the transfer of time-critical data through wireless connectivity. The primary cause of network failure is the transfer of time-critical multimedia data. The article presents a new dfferentiated service modelsupported (DSM) cluster-based routing in wireless sensor networks (WSNs) that overcomes the above issue. DSM prioritizes the transfer of dfferent flow types based on packet type and packet size. The employment of computational offlading minimizes delay for critical and small-sized data packets and by carrying out data reduction of large-sized packets at proxy server. It outperforms the existing protocols in terms of energy efficiency, throughput, and reliability by prioritizing the transfer of time-critical health application data.
Źródło:
Journal of Telecommunications and Information Technology; 2020, 3; 1-9
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Turkey’s approach to proxy war in the Middle East and North Africa
Autorzy:
Yüksel, Engin
Powiązania:
https://bibliotekanauki.pl/articles/1194375.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Turkey
strategy
proxy war
Middle East and North Africa
Opis:
The last decade has seen a growing trend towards the use of proxies in the Middle East and North Africa following the outbreak of the Arab Spring. In this context, the issue of Turkey’s approach to proxy war in these regions has received considerable attention since 2016. Thereby, the purpose of this article is to investigate the essential characteristics of Turkish proxy war strategy in Syria and Libya. As such, this study intends to trace the development of Turkish proxy war strategy by making use of the conceptual frameworks proposed by Groh (2019), O’Brien (2012) and Art (1998). The most obvious finding to emerge from the analysis is that Turkey changed its indirect intervention strategy from donated assistance to proxy warfare in Syria and Libya when it saw a greater need to influence the result of the conflicts. In the case of Syria, this study has shown that the controlthrough-centralisation approach towards the Armed Syrian Opposition has enabled Turkey to carry out an effective proxy war strategy from 2016 onwards. In Libya, the results of this investigation have shown that theTurkish Army has pursued a proxy war strategy since Ankara and the Government of National Accord (GNA) signed an agreement on security and military cooperation in December 2019. The article concludes that Turkey has centralised many revolutionary groups under an Islamist-nationalistic vision and partnered them with its own military in order to expand its influence in the Middle East and North Africa.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 137-152
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Changing the character of proxy warfare and its consequences for geopolitical relationships
Autorzy:
Ivanov, Zoran
Powiązania:
https://bibliotekanauki.pl/articles/1194383.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
state
Proxy force
technologic empowerment
political relationships
geopolitical environment
Opis:
The main purpose of the article is to examine the causal relationship between key elements of the geostrategic environment (i.e. political, military, and technological) and the changes in the characteristics of proxy force. Qualitative data analysis is used to identify the geopolitical environment conditions, actors, and their relationship. The causal analysis between key elements of the geopolitical environment, such as politics, military, and technological, therefore influences how proxy forces change character. The findings imply that the contemporary geopolitical environment is changing the character of the proxies. They can be used as multipurpose forces depending on the desired strategic outcome. The results advocate that proxies have a global reach beyond the traditional battlefield. These capabilities allow proxies to be used in a wide range of political, economic, and military activities, especially in peacetime, and, therefore, influencing, changing, and damaging the state’s mutual relationships. Despite differences between several theoretical perspectives of security theories, many concur on the low desirability of proxy force. The changing characteristics of proxy war allow state and non-state actors to wage war with a minimal use of force, or none at all, beyond the traditional battlefield. Political violence demonstrated through proxy force to fulfil foreign policy goals has become even more violent. In such action, disregarding the sustainable strategic goal can easily damage the state’s international relations and threaten international and regional stability. The overall findings show the urgency for a more holistic approach in the analysis of proxy warfare as part of security studies and military operations.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 37-51
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Operational control over non-state proxies
Autorzy:
Bryjka, Filip
Powiązania:
https://bibliotekanauki.pl/articles/1194384.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
proxy war
hybrid threats
surrogate forces
modern warfare
special operations
Opis:
The intention of this paper is to clarify how state patrons control non-state proxy forces fighting on their behalf. In order to address the subject matter thoroughly, specific attention was paid to a number of questions including a) the criteria determining patronproxy relations, b) factors influencing the selection process of proxy forces, and c) principles governing the maximisation of potential benefits of using proxies, whilst simultaneously reducing risks and associated costs. The author applied a neo-realistic research paradigm to his work. Patron-proxy relations were presented in the context of the principal-agent theory, as well as through detailed analysis of ongoing scenarios involving Iran and Hezbollah, Russia and the Donbass separatists, Pakistan and Kashmiri militias, the US and Syrian rebels. The essence of war by proxy is to influence the strategic result of an armed conflict without direct, full-scale, military intervention. The use of non-state proxy, external actors is aimed at maximising their political goals and strategic interests whilst maintaining “plausible deniability”. By supporting non-state proxies, indirectly or by providing limited direct assistance, sponsors operate below the threshold of war. Empirical analysis of proxy war cases proves that such models may both guarantee “strategic victory” or become a “double-edged sword”. One of the key challenges for external powers engaged in war by proxy is to avoid unintended consequences (blowback). The author argues that elements such as ideology, ethnicity or religion do not necessarily ensure control over proxies, whilst the range of common goals and interests, and the level of the proxy’s dependency, are crucial.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 191-210
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Enhance performance of web proxy cache cluster using cloud computing
Autorzy:
Alsaiari, N. O.
Fayoumi, A. G.
Powiązania:
https://bibliotekanauki.pl/articles/102085.pdf
Data publikacji:
2013
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
Web proxy cache cluster
resource utilization
load balancing
cloud computing
Opis:
Web caching is a crucial technology in Internet because it represents an effective means for reducing bandwidth demands, improving web server availability and reducing network latencies. However, Web cache cluster, which is a potent solution to enhance web cache system’s capability, still, has limited capacity and cannot handle tremendous high workload. Maximizing resource utilization and system capability is a very important problem in Web cache cluster. This problem cannot be solved efficiently by merely using load balancing strategies. Thus, along with the advent of cloud computing, we can use cloud based proxies to achieve outstanding performance and higher resource efficiency, compared to traditional Web proxy cache clusters. In this paper, we propose an architecture for cloud based Web proxy cache cluster (CBWPCC) and test the effectiveness of the proposed architecture, compared with traditional one in term of response time ,resource utilization using CloudSim tool.
Źródło:
Advances in Science and Technology. Research Journal; 2013, 7, 20; 2-10
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Late Pleistocene and Holocene environmental evolution of the Wkra River Valley near Bielawy Gołuskie (central Poland) recorded in palaeo-oxbow lake deposits
Autorzy:
Niska, M.
Jonczak, J.
Gadziszewska, J.
Powiązania:
https://bibliotekanauki.pl/articles/2060392.pdf
Data publikacji:
2017
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
oxbow lake
Wkra River
Polska
Multi-proxy analysis
Early Holocene
Opis:
This study aimed to reconstruct environmental changes in the Wkra River Valley near Bielawy Gołuskie (central Poland) based on geochemical, palynological and subfossil Cladocera analysis of deposits filling a palaeo-oxbow lake. Two sediment boreholes collected from the palaeochannel bend (BG-1) and neck (BG-2) include full sequences of organic deposits lying on clastic deposits. The lower part of the BG-1 borehole contains gyttja that accumulated during the Younger Dryas and the Preboreal, which is covered by reed peat of Preboreal and Boreal age. On top of this is alder peat that accumulated during the Atlantic. The ages of the gyttja and peat were confirmed by both radiocarbon dating and palynological analysis. The peats are characterized by a significant content of organic matter, which is relatively stable over time. This indicates a low intensity of mechanical denudation in the catchment, which is supported by low concentrations of aluminum and potassium. Calcium values greatly exceed these elements, suggesting that the lake was mainly fed by groundwater. Variation in trophic conditions over time is indicated by a vertical variability in the content of nitrogen, as well as by the Cladocera population. The strong decomposition of peat in the top layer of the mire, and increased concentrations of phosphorus and heavy metals, testify to increasing human activity during the most recent time periods.
Źródło:
Geological Quarterly; 2017, 61, 2; 305--318
1641-7291
Pojawia się w:
Geological Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Climate change and human impact in the southern Baltic during the last millennium reconstructed from an ombrotrophic bog archive
Autorzy:
Lamentowicz, Mariusz
Gałka, Mariusz
Pawlyta, Jacek
Lamentowicz, Łukasz
Goslar, Tomasz
Miotk-Szpiganowicz, Grażyna
Powiązania:
https://bibliotekanauki.pl/articles/2026706.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Baltic bog
last millennium
multi-proxy
Polska
peatlands
raised bog
Opis:
We pres ent the last mil len nium of his tory of a peatland lo cated in north ern Po land. Our re sults are based on two rep li - cate mono liths taken from a Bal tic raised bog. We ap plied a high-res o lu tion ap proach and ra dio car bon dat ing to the peat ma te rial to ob tain a de tailed palaeoenvironmental re con struc tion. To re con struct past peatland mois ture, we used three prox ies: tes tate amoe bae, plant macrofossils and pol len. De spite dif fer ent peat ac cu mu la tion and ex ten sive hi a tus in the for merly stud ied core, both mono liths show a sim i lar pat tern of changes. How ever, the core from this study pro - vides us with more de tailed data on S. fuscum dis ap pear ance which cor re lates well with the data from the other Bal tic bog, S³owiñskie B³oto. Our re search shows that pris tine Bal tic bogs can be dated to AD 1350. S³owiñskie B³oto palaeohydrology con firms AD 1300 as the be gin ning of the hy dro log i cal dis tur bance. In the case of the St¹¿ki and S³owiñskie B³oto bogs, the Lit tle Ice Age (LIA) is re corded be tween AD 1500 and AD 1800. How ever, this cli ma tic change might have been blurred by hu man im pact. In the case of the Bal tic bogs, their ref er ence vir gin state can be dated to AD 1200. Af ter this date, we ob served in creas ing hu man im pact and cli ma tic in sta bil ity con nected with the LIA. How ever, be tween AD 1800 and 1900, bogs were wet, most pos si bly due to cli ma tic forc ing. This fact sug gests that de spite hu man im pact, re cent peat de pos its can still re flect cli mate. Our re search pro vided in for ma tion re lated to the time of ex is tence, lo ca tion and char ac ter is tics of the nat u ral/pris tine state. High-res o lu tion peatland palaeo ec ol ogy is cru cial for res to ra tion ac tiv i ties, e.g., rewetting and en vi ron men tal man age ment. The palaeohydrological con text (sup ported by other prox ies) of the last 1000 years pro vides a re li able an swer to the ques tion: ‘To rewet or not to rewet?’
Źródło:
Studia Quaternaria; 2011, 28; 3-16
1641-5558
2300-0384
Pojawia się w:
Studia Quaternaria
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Design of a rule based monetary policy in a Central Bank Digital Currency System
Autorzy:
Wijngaard, Jacob
Van Hee, Kees
Powiązania:
https://bibliotekanauki.pl/articles/14110259.pdf
Data publikacji:
2021-12-28
Wydawca:
Wyższa Szkoła Bankowa we Wrocławiu
Tematy:
Design
CBDC
Rule-based
Monetary policy
Inflation correction
Domestic product proxy
Opis:
Aim: This paper presupposes a purely Central Bank Digital Currency (CBDC) based system. Its aim is to describe how such a system facilitates complete new possibilities to design a suitable monetary policy. More specifically, the purpose is to show that the available monetary tools can be used to design a rule-based monetary policy that guarantees stability of purchasing power and interest rates. Research methods: The paper is design oriented. It describes how the monetary system could function The important monetary variables are defined and their relationship is described. To illustrate these variables and their relationship, simulation results of their behavior are added. Conclusions: It is shown that it is indeed possible to design a monetary policy that is rule based and guarantees stability of purchasing power and interest rates. Crucial elements in the design are linking the balances of the CBDC-accounts to a proxy of the domestic product and replacing the use of government bonds by allowing the government to borrow from the Central Bank and giving households and businesses the opportunity to open a savings account at the Central Bank. Originality: The approach is completely new. It is the result of rethinking the possibilities of a complete transition of bank money to CBDC. Implications: The paper shows that a more absolute transition to the use of CBDC makes it possible to establish a clearer and more stable monetary practice, and that it is necessary therefore to revise monetary theory.
Źródło:
Central European Review of Economics and Management; 2021, 5, 4; 61-95
2543-9472
Pojawia się w:
Central European Review of Economics and Management
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies