Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "threat" wg kryterium: Temat


Tytuł:
Selected issues of threat management in cyberspace
Autorzy:
Barczak, Andrzej
Barczak, Michał
Powiązania:
https://bibliotekanauki.pl/articles/27323575.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
cybersecurity
threat management
cyber threat intelligence
Opis:
The paper describes the cyber threat management system. Three essential components of such a system are presented. With reference to such documents as ISO 2700, the NIST Cyber Security Framework, U.S. presidential executive orders, European Union regulations or STIX and TAXIS standards, norms, legal and standards regulations for managing cyber threats are described. The cyber threat management model is presented. Kill Chain and MITRE ATT&CK threat description methods are presented. A toolkit to support various stages of the cyber threat management process is also described.
Źródło:
Studia Informatica : systems and information technology; 2023, 1(28); 5--28
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mass Migration as a Hybrid Threat? – A Legal Perspective
Autorzy:
Dov Bachmann, Sascha-Dominik
Paphiti, Anthony
Powiązania:
https://bibliotekanauki.pl/articles/2019119.pdf
Data publikacji:
2021-03-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
migration
migrants
refugees
threat
hybrid threat
law
Opis:
Migration as a weapon sounds like a policy statement by resurgent nationalistic parties (and governments) in the West. However, politics and the human cost aside, what if an adversary (both state and non-state actor) does exploit the current global crisis of mass migration due to globalization, war, and political unrest? This article will look at the ongoing mass migration to the European Union within the wider security context of the so-called hybrid threats and/or ‘grey zone’ tactics. It looks at the various legal categories of migration as how the law can be weaponized as so-called ‘lawfare’ to undermine the existing legal frameworks distinguishing between legal and illegal migration. The authors recognize the possibility that this article will be used as an argument by the political actors involved for their nationalistic and anti-migration politics and policies. Yet, we believe that the potential of abusing the current vacuum for political gains along ideological party lines makes it necessary to provide a wider legal-security focused perspective on mass migration.
Źródło:
Polish Political Science Yearbook; 2021, 1 (50); 119-145
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Shared Cybersecurity Awareness Platform
Autorzy:
Amanowicz, Marek
Powiązania:
https://bibliotekanauki.pl/articles/1839333.pdf
Data publikacji:
2021
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cybersecurity awareness
risk and threat propagation
threat intelligence
Opis:
Ensuring a good level of cybersecurity of global IT systems requires that specific procedures and cooperation frameworks be adopted for reporting threats and for coordinating the activities undertaken by individual entities. Technical infrastructure enabling safe and reliable online collaboration between all teams responsible for security is an important element of the system as well. With the above taken into consideration, the paper presents a comprehensive distributed solution for continuous monitoring and detection of threats that may affect services that provision is essential to security and broadly understood the state’s economic interests. The said solution allows to collect, process and share distributed knowledge on hazard events. The partnership-based model of cooperation between the system’s users allows the teams to undertake specific activities at the central level, facilitates global cyber threat awareness, and enhances the process of predicting and assessing cyber risks in order to ensure a near-realtime response. The paper presents an overview of the system’s architecture, its main components, features, and threat intelligence tools supporting the safe sharing of information concerning specific events. It also offers a brief overview of the system’s deployment and its testing in an operational environment of NASK’s Computer Security Incident Response Team (CSIRT) and Security Operation Center (SOC) of essential services operators.
Źródło:
Journal of Telecommunications and Information Technology; 2021, 3; 32-41
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ROLA PROKURATORA W PROCESIE CYWILNYM
Autorzy:
Izabela, Dzierwa-Pabin,
Powiązania:
https://bibliotekanauki.pl/articles/891603.pdf
Data publikacji:
2018-08-22
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
threat
safety
lawyer
Opis:
The author presents the rules of accession of a consumer advocate, labor inspector, and social organization to the already ongoing civil trial. The operation and usefulness of these regulations was rated in terms of care for the safety of citizens and from the point of view of the sustainability of process.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2012, 11; 51-70
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
North Atlantic Treaty Security
Autorzy:
Grenda, Bogdan
Powiązania:
https://bibliotekanauki.pl/articles/576137.pdf
Data publikacji:
2017-03-21
Wydawca:
Akademia Sztuki Wojennej
Tematy:
threat
conflict
militarisation
security
Opis:
The article discusses security within the North Atlantic Treaty Organisation with respect to threats which may appear in its near and more distant surroundings. The following military threats are discussed: military conflicts, militarization of the Arctic, demonstration of Russian military power, use of weapons of mass destruction, cyber attack, terrorism and militarisation of Space. Other mentioned dangers are: natural and social ones including migration, competition among state and non-state entities as well as the phenomenon of fallen cities and states.
Źródło:
Security and Defence Quarterly; 2017, 14, 1; 21-34
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Unlawful Threat as a Statutory Feature of Criminal Offences Under Article 245 of the Polish Criminal Code. Considerations Connected with the Supreme Court and Appellate Courts Jurisprudence
Autorzy:
Górski, Adam
Michalak, Krzysztof
Klonowski, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/618799.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
unlawful threat
punishable threat
creative interpretation
groźba bezprawna
groźba karalna
wykładnia prawotwórcza
Opis:
This article aims to interpret the term “unlawful threat” under Article 245 of the Criminal Code. It can be observed that judicial decisions of the Supreme Court and legal doctrine do not provide a uniform interpretation of the term. The work discusses whether the result in the shape of a justified concern that the threat will be carried out is necessary. Such a criminal result is described in Article 190 of the Criminal Code which penalizes punishable threats. It corresponds with Article 115 § 12 of the Criminal Code which defines an unlawful threat. In the opinion of the authors, causing a justified fear that the threat will be carried out is one of the statutory features in all three cases, i.e. unlawful threats to commit a criminal offence, to institute criminal proceedings and to disseminate defamatory information.
Celem niniejszego artykułu jest dokonanie wykładni znamienia groźby bezprawnej występującego na gruncie art. 245 k.k. We wskazanym zakresie brak jest jednolitości w orzecznictwie Sądu Najwyższego, sądów apelacyjnych oraz w doktrynie. Zasadniczy problem wiąże się z kwestią zawierania się w pojęciu groźby bezprawnej skutku w postaci wzbudzenia uzasadnionej obawy spełnienia groźby. Skutek ten został określony w art. 190 k.k. opisującym przestępstwo tzw. groźby karalnej, do którego odsyła definicja ustawowa groźby bezprawnej określona w art. 115 § 12 k.k. W ocenie autorów skutek polegający na powstaniu uzasadnionej obawy spełnienia groźby należy do elementów groźby bezprawnej we wszystkich trzech przypadkach, tj. w przypadku groźby popełnienia przestępstwa, spowodowania postępowania karnego lub rozgłoszenia infamującej wiadomości.
Źródło:
Studia Iuridica Lublinensia; 2018, 27, 2
1731-6375
Pojawia się w:
Studia Iuridica Lublinensia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Radiofobia w świecie plotki. Katastrofa w Czarnobylu a wybuchy paniki we współczesnej Polsce
Autorzy:
Ewa, Rosiak-Zięba,
Powiązania:
https://bibliotekanauki.pl/articles/897300.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Warszawski. Wydawnictwa Uniwersytetu Warszawskiego
Tematy:
radiophobia
gossip
nuclear threat
Opis:
In this paper I examine traces of radiophobia in gossips as a manifestation of culture in the shadow of an atomic bomb. This study aims to recognize main social functions of this kind of folktales. The field of research is narrowed down mainly to folktales disseminated in Poland. The methods employed during an investigation include an analysis of narratives published in the Internet and newspaper news. The study shows that some of these gossips provide both simplified records of past experience of humanity in the field of nuclear energy, and certain guidelines helping to cope with basic risks involved.
Źródło:
Przegląd Humanistyczny; 2017, 61(1 (456)); 139-146
0033-2194
Pojawia się w:
Przegląd Humanistyczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Challenges and Hazards of the Third Decade of the 21st Century
Autorzy:
Wiśniewski, Bernard
Powiązania:
https://bibliotekanauki.pl/articles/1807690.pdf
Data publikacji:
2021-03-31
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
challenge
threat
prognosis
Opis:
The aim of the considerations presented here is to gather and share information and knowledge on contemporary challenges and threats that can help to rationally anticipate the future in the third decade of the 21st century. The article consists of three parts, i.e. the introduction, covering the basic terminological arrangements; then, forecasts of challenges and threats in the macro scale for the next ten years; and, finally, the summary. In the preparation of the article, theoretical methods and research techniques were used. The choice of the research technique was governed by the following criteria: purposefulness, clarity, univocality, effectiveness, reliability, and cost-effectiveness. These criteria determined the use of inductive inference, deductive reasoning, explanation, analysis, and synthesis. In the course of the research, critical analysis of the literature was also carried out, which was divided into groups of studies, i.e.: those devoted to the methodology of research activities, those concerning security theory, and those containing elements of prognostics. The presented considerations indicate that the third decade of the 21st century will be a time in which the existing challenges and threats will persist. However, the scale of the latter will increase, which may create many problems, mainly related to decision-making.
Źródło:
Security Dimensions; 2021, 35(35); 179-191
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Political risk on financial markets in developed and developing economies
Autorzy:
Waszkiewicz, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/522248.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Ekonomiczny w Katowicach
Tematy:
International finance
Stability
Threat
Opis:
Aim/purpose – We want to draw academics and market practitioners attention to threats form political risk’s area that affect national financial markets in both developed and developing economies. Design/methodology/approach – We analyzed the wide concept of political risk on the basis of international literature as well as national statistical data and international comparative indicants for selected developed and developing economies around the world. Findings – Growing significance of political risk was signaled, although both types of economies are exposed to different aspects of the threat. We confirmed that developing states are threatened by bigger number of political bothers, whereas advanced countries are susceptible to some forms of violence. Research implications/limitations – Imply that economies with better economic stance have lower level of political risk, although, their highly developed and integrated financial markets are responsible for the transfer of analyzed risk. Unfortunately, the scarcity of reliable time series about political risk hampered a deeper empirical analysis. Originality/value/contribution – Presentation of political threats to financial market stability.
Źródło:
Journal of Economics and Management; 2017, 28; 112-132
1732-1948
Pojawia się w:
Journal of Economics and Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberspace in a risk society
Autorzy:
Drabik, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/2143062.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
cybersecurity
threat
infosphere
Opis:
The dynamic processes of modernization have affected the quantitative and qualitative dimensions of an unprecedented social transformation. It can be said that man has entered into hitherto unknown realms of abstraction. One of its dimensions is cyberspace with attributes that elude previous identifiers of physical three-dimensional space. The highly dynamized processes of technological progress have situated societies in new dimensions of risk. The likelihood of positive or negative events has been etiologically linked to the effects of „producing”, processing, storing, and transmitting the information. This article aims to analyze the factors justifying the crystallization of a risk society, a key identifier of which is cyberspace, the associated risks, and security measures in the context of shaping cybersecurity
Źródło:
Cybersecurity and Law; 2022, 7, 1; 17-26
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
‘Keep Europe for the Europeans’. The Role of Threat Perceptions and Intergroup Contact for Explaining Attitudes towards Immigrants in Hungary
Autorzy:
Bal, Michèlle
Aradi, Eszter
Yerkes, Mara A.
Powiązania:
https://bibliotekanauki.pl/articles/48847278.pdf
Data publikacji:
2024
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
attitudes towards immigrants
Hungary
realistic threat
symbolic threat
intergroup contact
socio-demographic variables
Opis:
In 2015, the inflow of immigrants to Europe increased dramatically. More than 1 million people fled from wars and conflicts in Syria, Iraq and Afghanistan, particularly affecting transit countries along the Western Balkan route. Of all the transit countries, the Hungarian government was particularly vocal in its negative attitude towards immigrants, launching several anti-immigration campaigns which had a detrimental effect on residents’ hostility towards these immigrants. In this study, we focus on the mechanisms behind this increased hostility in a transit-country context by combining insights from integrated-threat theory and contact theory. We find that perceptions of realistic and symbolic threat increased negative attitudes towards immigrants. Importantly, these threat perceptions were shaped by people’s positions in society and personal circumstances, in combination with their contact with immigrants. Specifically, in the harsh and negative Hungarian context, contact negatively influenced threat perceptions, especially amongst people who were at risk of experiencing negative consequences supposedly caused by the influx of immigrants. This in-depth country case study emphasises the importance of contextualising research findings on attitudes towards immigration in a broader social and political context.
Źródło:
Central and Eastern European Migration Review; 2024, 13, 1; 89-107
2300-1682
Pojawia się w:
Central and Eastern European Migration Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security management versus educational practice
Autorzy:
Wawrzusiszyn, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/1879429.pdf
Data publikacji:
2013
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
management
education
threat
awareness
Opis:
Processes that accompany modern man, create a new framework for social life. The turn of the century changed the world, and in the same time the conditions in which man lives. As a result of emerging threats security has taken a global figure. Ensuring human security in case of nonmilitary threats requires an integrated effort of all public administration bodies and other social and economic entities that carry out tasks in the field of security and defence. The main objective of the state is, inter alia, raising awareness of the duties of citizens for security and defence, developing patriotic attitude and the acquisition of knowledge and skills necessary for efficient and effective operation in conditions of peace and states of emergency.
Źródło:
Security Dimensions; 2013, 10(10); 152-158
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bioterroryzm zagrożenie wciąż realne
Autorzy:
Ziuzia-Lipiec, Dorota
Powiązania:
https://bibliotekanauki.pl/articles/121112.pdf
Data publikacji:
2017
Wydawca:
Towarzystwo Wiedzy Obronnej
Tematy:
bioterroryzm
czynniki biologiczne
zagrożenie
monitorowanie zagrożenia
bioterrorism
biological factors
threat
monitoring of threat
Opis:
Zjawisko bioterroryzmu jest tak stare jak stary jest świat. Czynniki biologiczne już od najdawniejszych czasów wykorzystywano do walki z wrogiem. Współczesny świat nie jest wolny od tego typu zagrożenia. Z całą pewnością można stwierdzić, że ten rodzaj terroryzmu jest najokrutniejszą bronią skierowaną przeciwko ludziom.
The bioterrorism phenomenon is as old as the old is world. Biological factors have been used to combat the enemy since ancient times. The modern world is not free from this type of threat. It can certainly be said that this type of terrorism is the cruellest weapon against the humanity.
Źródło:
Wiedza Obronna; 2017, 3-4; 113-120
0209-0031
2658-0829
Pojawia się w:
Wiedza Obronna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Walory przyrodnicze, stan obecny i zagrożenia wybranych alei gminy Lubin
Nature value, present state and threats of chosen alleys from Lubin region
Autorzy:
Tomaszewska, K.
Kopcza, A.
Powiązania:
https://bibliotekanauki.pl/articles/1186917.pdf
Data publikacji:
2008
Wydawca:
Uniwersytet Przyrodniczy we Wrocławiu
Tematy:
Lubin
roślinność
zagrożenie
threat
flora
Opis:
A lot of beautiful lanes can be found in Lubin commune in Lower Silesia. Six of them, selected in the way that enables showing the trees differentiation resulting from localization, species composition and age, were analyzed. Quercus petrea, Populus x canadensis, Quercus rubra, Acer platanoides, Aesculus hippocastaneum, Tilia cordata, Tilia platyphyllos, Salix alba, Prunus avium and Alnus glutinosa were used for planting. Trees were set in one-species alleys, multi-species alleys with mixed individuals of particular species, and also in a more decorative manner, so that each of the species created a separate espalier. The most interesting one in respect of the arrangement and adaptation for performer function was a three-part lane in Liściec, regarding its decorative values - two-species (chestnut-maple) stand densely situated along the road from Chojnów to Karczowiska. Just there Acer platanoides and Aesculus hippocastaneum create separate espaliers on both sides of the road. The preservation state of plants is not the same. Cherry (in Chróstnik) and willow (in Bukowno) lines are slowly disappearing from the agricultural landscape, which is most upsetting. Well-kept lanes, where all gaps caused by falling trees are refilled up-to-date, are met relatively rare; the trees planted along the estate road to a palace in Krzeczyn Mały are such a praiseworthy exception. Not the health status of trees, but the fact that they are growing too close to roadways is the reason for anxiety as to the future of some lanes. Trees were planted along the roads which looked different than nowadays, and fitted for different road traffic. Old trees are especially amazing. For that reason, many trees that reached dimensions qualifying them as nature monuments can be found there. It is worth trying to give them legal protection, and especially care about those species that are more and more seldom found by the roads, such as cherry and willow.
Źródło:
Architektura Krajobrazu; 2008, 1; 26-32
1641-5159
Pojawia się w:
Architektura Krajobrazu
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zagrożenia współczesnego Polaka — perspektywa socjopsychologiczna
CHALLENGES OF THE CONTEMPORARY POLE — SOCIOPSYCHOLOGICAL PERSPECTIVE
Autorzy:
Laskowska, Beata
Powiązania:
https://bibliotekanauki.pl/articles/418602.pdf
Data publikacji:
2013
Wydawca:
Akademia Marynarki Wojennej. Wydział Nauk Humanistycznych i Społecznych
Tematy:
THREAT
SAFETY
SENSE OF SECURITY
Opis:
The world, as well as Poland, can pride itself on its numerous achievements in the aspect of development of science, culture and widely perceived civilization. We use many of these ‘achievements’ on a regular basis, mostly without even a single after-thought that they would not have been available to us if we had been born 2–3 generations earlier. At the same time, the contemporary human-beings seem to be unaware of the high prize that they need to pay for the progress of the civilization as — except for its undisputed benefits — it involves certain degree of inevitable dangers. We cannot pretend that they do not exist or that they do not concern us. We all have to face them to different extents. The dangers that are more or less real for the contemporary Poles can be categorized as ecological, climatic (including the floods or catastrophic hurricanes affecting our country, increasing pollution of the natural environment, lack of room for storing waste or burying the dead), social (including the unemployment — especially the long term one; increasing poverty of the society; on the other hand growing bipolarity of the material statuses, increasing secularization of the society that declares itself as the catholic, one which results in depreciation of many values, norms or ideals; eventually discrimination of every kind of difference), civilisational dangers connected with the progress of technology (diseases such as cancer or allergies, information about the armaments or epidemics in the neighbouring countries, increasing number of the transport accidents; preparations for the construction of the nuclear power plants or the fear of the terrorism present in the world); finally the individual dangers which can be described as deviations. The aim of the author was not only to categorize the present dangers, but to define their real and potential consequences both in the social and individual aspect.
Źródło:
Colloquium; 2013, 5, 3; 87-96
2081-3813
2658-0365
Pojawia się w:
Colloquium
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of Wood Processing Safety in the Production Organization
Autorzy:
Kotus, M.
Koloman, K.
Hudec, M.
Powiązania:
https://bibliotekanauki.pl/articles/2065027.pdf
Data publikacji:
2018
Wydawca:
STE GROUP
Tematy:
hazard
threat
risk
circular saw
Opis:
Occupational health and safety legislation imposes an obligation on the production organization to regularly and comprehensibly inform employees of the dangers, threats and risks involved. In the paper, we assessed the basic requirements of safety in the wood processing workshop on the forming disc saw. Deficiencies in non-compliance with security regulations were determined from the check list analysis (CLA). The safety assessment was performed using the extended point method, where we determined the value of the risk measure. When working on a saw blade, the risk cannot be accepted and safety precautions have to be proposed. For the production organization, we have proposed remedial measures and a safety card to be considered before working on forming disc saw. All the measures proposed by us were accepted and implemented by the production organization. Applying and observing safety measures can prevent the occurrence of an occupational injury or damage to the health of the worker.
Źródło:
Multidisciplinary Aspects of Production Engineering; 2018, 1, 1; 727--737
2545-2827
Pojawia się w:
Multidisciplinary Aspects of Production Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The installation of the anti-missile shield in Poland –an opportunity, a threat or a challenge?
Autorzy:
Falkowski, M.
Liberek, M.
Powiązania:
https://bibliotekanauki.pl/articles/348013.pdf
Data publikacji:
2016
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
shield
system
security
threat
project
Opis:
The purpose of this article is to present the potential effects of an anti-missile defense shield in Poland. The publication addresses selected political, military, financial and social aspects that affect building of the shield. In addition, the position of Poland in the NATO missile defense system was characterized, as was the concept of air defense in Europe. The authors also discuss the issue of Polish – Russian relationships against the background of creating of the anti-missile shield within the territory of our country.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2016, 3; 20-36
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Radicalization as a Source of Danger to Safety
Autorzy:
Łachacz, Tomasz
Holger, Nitsch
Powiązania:
https://bibliotekanauki.pl/articles/1374828.pdf
Data publikacji:
2019
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
terrorism
radicalization
extremism
threat
communication
Opis:
The article discusses the phenomenon of radicalization, which becomes a source of danger for the individual and the security of the state. At the beginning the article discusses the essence and causes of the phenomenon, and then refers to the Polish and German strategies in the field of security. The documents identify radicalization and extremism as a contemporary threat to national security, which is confirmed by numerous attacks in Europe. Examples of attacks involving radicalized individuals are discussed in this paper in the article. The discussion ends with conclusions emphasizing that in the process of radicalization the information provided to individuals and communication between government institutions and society are extremely important.
Źródło:
Internal Security; 2019, 11(2); 119-127
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Online Hate Speech and the Safety of Internet Users
Autorzy:
Kaczmarczyk, Barbara
Dąbrowska, Marlena
Szczepański, Piotr
Nowicka, Izabela
Powiązania:
https://bibliotekanauki.pl/articles/1807982.pdf
Data publikacji:
2020-03-19
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
hate speech
Internet
crime
threat
Opis:
Background: Hate speech is a very important problem nowadays. One can meet it in one’s immediate surroundings (conversations with friends), the media, the Internet, or in the so-called public space (for example, inscriptions on the walls). One form of hate speech is online hate speech, which, together with certain other phenomena, is referred to as hejt in the Polish language. The authors of the article focus on presenting online hate speech in relation to various age and social groups. Objectives: The aim of the article is to present the phenomenon of hate speech on the web and its impact on the safety of Internet users. Methods: The article uses basic theoretical and empirical methods. Content published on the Internet is analyzed and case studies are described. Interviews with experts (psychologists, police officers, sociologists, media and hate speech specialists) were also conducted and their views are presented. Conclusions: In the discussion about hate speech, prevention is extremely important. According to the authors, broad prevention consisting of professionally prepared content, enriched with film materials, presented by an expert or a trained teacher, should be included in the core curriculum of schools as one of the mandatory issues raised during the lessons.
Źródło:
Security Dimensions; 2019, 31(31); 139-159
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Identyfikacja przez ekspertów ubezpieczeniowych zagrożeń casco związanych z użytkowaniem roweru
The identification of the using bikes related casco threats by the insurance experts
Autorzy:
Jakubowski, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/581345.pdf
Data publikacji:
2018
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
casco
zagrożenie
rowerzysta
threat
cyclist
Opis:
W ostatnich latach w Polsce zaobserwować można zwiększenie liczby rowerzystów na drogach, co skutkuje większą liczbą wypadków i kolizji drogowych z ich udziałem. Jedną z istotniejszych kwestii ochrony ubezpieczeniowej rowerzysty jest ubezpieczenie casco roweru. Celem naukowym opracowania było wskazanie, jakie zagrożenia z grupy casco są identyfikowane przez ekspertów ubezpieczeniowych. W artykule zaprezentowano więc ofertę produktową ubezpieczeń mieszkaniowych i dedykowanych, wskazując, jakie zagrożenia z grupy casco wymieniają eksperci ubezpieczeniowi. Porównano również ubezpieczenie casco roweru z ubezpieczeniem autocasco pod względem zakresu ubezpieczenia. Niniejszy artykuł jest kontynuacją i jednocześnie uszczegółowieniem wcześniej przeprowadzonych badań nad identyfikacją przez ekspertów ubezpieczeniowych zagrożeń związanych z użytkowaniem roweru.
In recent years, an increase in the number of cyclists on roads in Poland has been observed, which causes a greater number of road accidents and collisions with their participation. One of the most important issues related to insurance protection for a cyclist is bicycle casco insurance. The aim of the research was to indicate what threats from the casco group have been identified by insurance experts. The article presents the product offer of insurance housing products and the ones dedicated to cyclists, indicating which casco threats are listed by insurance experts. The casco inurance of the bike and the autocasco insurance have also been compared in the field of insurance protection scope. This article is a continuation, and simultaneously a more detailed analysis of previously conducted research on identification of the using bikes − related casco threats by the insurance experts.
Źródło:
Prace Naukowe Uniwersytetu Ekonomicznego we Wrocławiu; 2018, 541; 85-93
1899-3192
Pojawia się w:
Prace Naukowe Uniwersytetu Ekonomicznego we Wrocławiu
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security Threats to Port Critical Infrastructure
Autorzy:
Żywucka-Kozłowska, Elżbieta
Broniecka, Rossana
Powiązania:
https://bibliotekanauki.pl/articles/31342014.pdf
Data publikacji:
2024-05-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
critical infrastructure
threat
security
seaport
Opis:
Critical infrastructure is a key element of the functional security of any country. Sea ports (but also river ports) are part of the CI system of the country. The security of such sites is particularly important for the continuity of supply and transit of goods transported by vessels. Ports have always been protected from potential threats. Today, these threats have become more real, particularly as a result of the Russian Federation’s attack on Ukraine. Poland, which today has the status of a frontier state, is a target of espionage and sabotage activities. Security is a state of non-threat. This is the state to which we aspire in every area of modern life of every society, every country. Seaports, like other places, which are essential (special) for the unimpeded and secure delivery of goods. They’ve always been under special surveillance and special protection. Destruction of the port makes it impossible to transport by sea, which is obvious. Threats to port security come from different sources, but at a time of ongoing war in Ukraine, terrorist attacks come to the fore. It is also necessary to highlight the hybrid actions on the border with Belarus, which affect the state of security. Poland, as a front-line country, is particularly vulnerable to acts of terror, diversion and espionage, which is confirmed by the actions of the special services. Monitoring of seaports is part of the security strategy of the critical infrastructure of these places. The threat of CI ports is real, especially at the present time. This applies in particular to the LNG terminal in Świnoujście, which is regularly visited by ships (gas carriers) supplying raw materials of strategic importance. Violation of security rules (principles) may lead to a threat that cannot be ruled out, however, the most important and dangerous are those that come from the outside and are of an intentional nature.
Źródło:
Cybersecurity and Law; 2024, 12, 2; 273-281
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Typologia zagrożeń
Classification of Threats
Autorzy:
Kaczmarczyk, B.
Powiązania:
https://bibliotekanauki.pl/articles/373313.pdf
Data publikacji:
2014
Wydawca:
Centrum Naukowo-Badawcze Ochrony Przeciwpożarowej im. Józefa Tuliszkowskiego
Tematy:
bezpieczeństwo
zagrożenie
typologia
safety
threat
classification
Opis:
Cel: Zaprezentowanie podziału zagrożeń według kryteriów w szczególności podmiotowego, przedmiotowego, przestrzennego. Metody: W celu realizacji zadania wyodrębniono kryteria podziału i zastosowano metody teoretyczne służące wyodrębnieniu grup zagrożeń. Wyniki: Rozważania na temat zagrożeń są złożone. Zagrożenia towarzyszą człowiekowi w różnym wymiarze i formie od lat i będą pojawiać się zawsze. Zmienia się jedynie ich nasilenie i rodzaj. Powyższa sytuacja jest wynikiem zmieniającej się między innymi sytuacji na arenie międzynarodowej, jak również krajowej. Przeciwdziałanie zagrożeniom wymaga prowadzenia ciągłych badań. Skuteczność badań możliwa jest poprzez m.in. skuteczne klasyfikowanie tychże zagrożeń. Zmienność środowiska bezpieczeństwa powodować będzie zmianę kryteriów typologicznych zagrożeń. Zmieniać się będzie charakter a zatem zmieniać się będą kryteria podziału zagrożeń. Tylko część z obecnie wyodrębnianych nie będzie podlegać tym zmianom. Należeć do nich będą najprawdopodobniej podmiot, przedmiot i czas. Zmienność ta wymaga monitorowania tychże zagrożeń a na tej podstawie prowadzenia procesów poznawczych. Prowadząc rozważania na temat typologii zagrożeń, wciąż poszukuje się kryteriów, których suma umożliwi pełnie jej przedstawienie. Do kryteriów tych zaliczyć należy: źródło pochodzenia zagrożenia, miejsce pochodzenia źródła zagrożenia, obecność czynnika militarnego, aktualność zagrożeń, wiedzę o zagrożeniu, czas, częstotliwość, intensywność, zasięg, symptomy, liczbę czynników zagrażających oraz stopień i zakres destrukcji. Katalog kryteriów stale podlega weryfikacji i jest uzupełniany w zależności od zmieniającego się środowiska. Proces poznawczy w tym zakresie wciąż trwa. Wnioski: Prowadząc badania zagrożeń, dokonuje się ich podziałów przy uwzględnieniu wyodrębnionych kryteriów. Powyższe stosowane jest w celu dokładniejszego zbadania obszaru zagrożeń. Jest to proces trudny i złożony, jednak nie niemożliwy. Dyskusje w powyższym zakresie mieszczą się w wielu dziedzinach i dyscyplinach naukowych. Wskazuje to na interdyscyplinarny charakter tej problematyki. Naukowa eksploracja problematyki związanej z zagrożeniami nie pozwala dziś wyodrębnić wspólnych kryteriów w wielu dziedzinach i dyscyplinach naukowych, które w sposób jednoznaczny pozwoliłyby na wprowadzenie do nauki wspólnej typologii zagrożeń. Powyższe nie zwalnia jednak z obowiązku poszukiwania takich rozwiązań. Niniejszy artykuł jest próbą takiej przeglądowej eksploracji. U podstaw tego stanowiska znajdują się rozwiązania wykorzystane w artykule będące wnioskami z badań prowadzonych przez ekspertów różnych dziedzin i dyscyplin naukowych. Uwidacznia się wyraźna potrzeba konsolidacji wysiłków ekspertów w wielu zakresach bezpieczeństwa. Przedstawione w artykule treści to jedynie głos w dyskusji, który może stanowić inspirację do dalszych rozważań w przedmiotowym zakresie.
Aim: To categorise threats according to given criteria, in particular: subjective, objective and time related. Method: In order to achieve the desired purpose, categories were exposed and theoretical approaches harnessed to differentiate threat groups. Results: The discourse concerning threats is complex. Threats emerged in the past, occur now and will prevail in the future. They accompanied humans in different forms and scale for many years. One element which is changing concerns the intensity of threats. The aforementioned scenario is the consequence of the changing environment, at national and international level. A pre-requisite to the eradication of threats is the conduct of research. The changing state of security in the environment will contribute towards a change in classification of threat criteria. There will be changes in the nature of threats and, correspondingly, threat categorisation criteria will also vary. Only a part of today’s model will be unaffected by such variations. Most probably subjective, objective and time related threats will prevail as they are. Any variability will require monitoring and, on that basis, will call for the conduct of cognitive processes. The processes involving classification of risks requires constant updating to the extent where the aggregate of classes will represents the whole. The criteria list should incorporate the following: source of threat, location of the source of threat, presence of a military factor, verity of threat, knowledge of threat, time, frequency, intensity, range, symptoms, number of threat elements as well as the degree and range of destruction. The criteria list is constantly exposed to validation and updating, in tandem with the changing environment. This identification process is continuous. Conclusions: Research of threats is accompanied by identification and classification of discrete criteria. This is necessary so that the extent of a threat can be examined further. The process is complex and difficult, but not impossible. Discourse concerning this issue is found in a range of scientific research disciplines. Consequently, this indicates an interdisciplinary character of the problem. Scientific exploitation of problems associated with threats, does not allow for fragmentation of criteria which, are common to many fields of science and which, could benefit from a common approach to the classification of threats. Encountered difficulties, do not relieve researches from an obligation to search for solutions. The review contained in this article, provides an attempt at such an exploitation. The basis for such a view is contained in solutions exposed by the article which, reproduces research conclusions determined by experts from a range of science disciplines. This article highlights a clear need for a joint expert approach in many areas dealing with safety. Presented material is simply a voice in a discussion which, may provide a springboard for further research of the topic.
Źródło:
Bezpieczeństwo i Technika Pożarnicza; 2014, 3; 31-38
1895-8443
Pojawia się w:
Bezpieczeństwo i Technika Pożarnicza
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bezrobocie jako zjawisko społeczne stanowiące zagrożenie dla kształtowania się rynku pracy w Polsce
Autorzy:
Kłos, Alicja
Tomaszewska, Katarzyna
Powiązania:
https://bibliotekanauki.pl/articles/540833.pdf
Data publikacji:
2014
Wydawca:
Mazowiecka Uczelnia Publiczna w Płocku
Tematy:
unemployment
labor market
social security
threat
Opis:
This article refers to unemployment as a social phenomenon constituting a threat to the development of the labor market in Poland. Professional activity recently was associated with social security and stability in life. Currently, for the ever-growing group of people, labor market participation is associated with a constant threat of poverty, uncertainty about the future or the inability to establishment and maintenance of the family. The reason is not only lack of work, but also the disappearance of the typical forms of employment in favor of flexible forms of employment which are consisted of poor quality. As it turns out, not always any job is always better than no job, which means that the quality of employment is now becoming a social issue whose solution or mitigation its results are beyond the scope of the free market and the modern country. The labor market is a social institution but also the problems associated with the changes of production and employment (labor demand) require a response from the social adjustment. In the interests of society, giving sufficient earnings and enabling development of their own free time ought to be done for an individual to gain market through decent work.
Źródło:
Społeczeństwo. Edukacja. Język; 2014, 2; 187-198
2353-1266
2449-7983
Pojawia się w:
Społeczeństwo. Edukacja. Język
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Budowa odporności na obecne i przyszłe zagrożenia o charakterze hybrydowym. Rekomendacje dla Polski
Building Resilience to Current and Future Hybrid Threats. Recommendations for Poland
Autorzy:
Nowak, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/30146924.pdf
Data publikacji:
2022
Wydawca:
Katolicki Uniwersytet Lubelski Jana Pawła II. Towarzystwo Naukowe KUL
Tematy:
bezpieczeństwo Polski
odporność
zagrożenie
zagrożenie hybrydowe
Rosja
Poland’s security
resilience
threat
hybrid threat
Russian Federation
Opis:
Treści artykułu koncentrują się wokół problemu budowy odporności, która jest istotnym elementem bezpieczeństwa państwa. Stanowi fundament odstraszania i obrony, przez co pozwala na skuteczne przeciwstawienie się zagrożeniom. Celem artykułu była identyfikacja obecnych i przyszłych zagrożeń hybrydowych kreowanych przez Rosję i Białoruś, a także przedstawienie zaleceń i rekomendacji dla Polski w zakresie wzmacniania odporności na te zagrożenia. W świetle zmiany architektury bezpieczeństwa w sąsiedztwie Polski wynikającej z neoimperialnej polityki Rosji i będącej pod jej wpływem Białorusi, podjęta problematyka stanowi wartość dodaną. W procesie badawczym zastosowano ogólne metody poznania naukowego, które opierały się głównie na analizie i krytyce literatury, wnioskowaniu i własnej ocenie faktów.
The contents of the article focuses on the problem of building resilience, which is a key element of state security. It is the basis of deterrence and defense, and therefore allows you to effectively counter threats. The aim of the article was to identify the current and future hybrid threats created by Russia and Belarus, as well as to present guidance and recommendations for Poland in the field of strengthening resilience to these threats. In view of the changes in the security architecture in Poland’s neighborhood resulting from Russia’s neo-imperial policy and Belarus, which is under its influence, the issues raised constitute an added value. In the research process, general methods of scientific cognition were used, which were based mainly on the analysis and criticism of literature, inference and own assessment of facts.
Źródło:
Roczniki Nauk Społecznych; 2022, 50, 4; 29-50
0137-4176
Pojawia się w:
Roczniki Nauk Społecznych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Use of the method FMEA for hazard identification and risk assessment in a coal mine
Autorzy:
Duda, Adam
Juzek, Tymoteusz
Powiązania:
https://bibliotekanauki.pl/articles/27315565.pdf
Data publikacji:
2023
Wydawca:
STE GROUP
Tematy:
development work
risk assessment
process
threat
Opis:
One of the basic stages of mining operations is development work. During them there can occur the events that affect the process of development work as well as the safety of workers. This article conducts a process risk assessment using the Failure Modes and Effects Analysis (FMEA) method to identify events that disrupt the development work process, along with the causes of the occurrence of these events. The study covered the process of development work i.e. the execution of the M-2 roadway in seam 502/1 realized at a depth of about 550 m with an assumed length of about 500 m. As a result of the study, those risks for which countermeasures should be applied were identified, and measures were proposed to minimize the risks involved. As part of the research, an FMEA evaluation form was created to assess process risks in the execution of similar work. The highest process risk was identified for the drivage of the excavation with a road header, and is related to the possibility of frequent failure of hydraulic systems. Similar process risk results were obtained for the risk associated with improper execution of mining with explosives and the need to perform additional blasting work in the excavated roadway. The results can contribute to reducing the time of coal face stoppage during development work, and thus improve the process of them and reduce the costs incurred during this process.
Źródło:
Management Systems in Production Engineering; 2023, 3 (31); 332--342
2299-0461
Pojawia się w:
Management Systems in Production Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Anti-Immigrant Feeling in Spain
Autorzy:
Checa Olmos, Juan Carlos
Arjona Garrido, Ángeles
Powiązania:
https://bibliotekanauki.pl/articles/1929921.pdf
Data publikacji:
2012-03-21
Wydawca:
Polskie Towarzystwo Socjologiczne
Tematy:
xenophobia
competition
threat
insecurity
national identity
Opis:
In just a few decades, with the arrival of immigrants from many different places, Spain has become a multi-ethnic society. Facing these increased streams has been a huge challenge to Spanish society. This article examines the evolution of feelings toward immigration in Spain (2000–2007) with data from a country-wide survey. The results show increasing hostility toward immigrants. The variables that contribute most to explaining this phenomenon are competition and threat, both individual (salaries, jobs or welfare resources) and group (national identity).
Źródło:
Polish Sociological Review; 2012, 177, 1; 39-54
1231-1413
2657-4276
Pojawia się w:
Polish Sociological Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of the Threat Intelligence platformto increase the security of governmentinformation resources
Zastosowanie platform Threat Intelligence do zwiększenia ochrony zasobów informacji publicznej
Autorzy:
Nikolaienko, Bohdan
Vasylenko, Serhii
Powiązania:
https://bibliotekanauki.pl/articles/2070216.pdf
Data publikacji:
2021
Wydawca:
Politechnika Lubelska. Wydawnictwo Politechniki Lubelskiej
Tematy:
Threat Intelligence
cybersecurity
cyberdefense
cyberbezpieczeństwo
cyberochrona
Opis:
With the development of information technology, the need to solve the problem of information security has increased, as it has become the most important strategic resource. At the same time, the vulnerability of the modern information society to unreliable information, untimely receipt of information, industrial espionage, computer crime, etc. is increasing. In this case, the speed of threat detection, in the context of obtaining systemic information about attackers and possible techniques and tools for cyberattacks in order to describe them and respond to them quickly is one of the urgent tasks. In particular, there is a challenge in the application of new systems for collecting information about cyberevents, responding to them, storing and exchanging this information, as well as on its basis methods and means of finding attackers using integrated systems or platforms. To solve this type of problem, the promising direction of Threat Intelligence as a new mechanism for acquiring knowledge about cyberattacks is studied. Threat Intelligence in cybersecurity tasks is defined. The analysis of cyberattack indicators and tools for obtaining them is carried out. The standards of description of compromise indicators and platforms of their processing are compared. The technique of Threat Intelligence in tasks of operative detection and blocking of cyberthreats to the state information resources is developed. This technique makes it possible to improve the productivity of cybersecurity analysts and increase the security of resources and information systems.
Wraz z rozwojem technologii informacyjnych wzrosła potrzeba rozwiązania problemu bezpieczeństwa informacji, gdyż stała się ona najważniejszym zasobem strategicznym. Jednocześnie wzrasta podatność współczesnego społeczeństwa informacyjnego na nierzetelną informację, nieterminowe otrzymywanie informacji, szpiegostwo przemysłowe, przestępczość komputerową itp. W związku z tym, jednym z ważniejszych zadań jest szybkie wykrywania zagrożeń, w kontekście pozyskiwania informacji o napastnikach, możliwych technikach i narzędziach cyberataków, wraz z metodami ich opisu i szybkiego reagowania na nie. W szczególności wyzwaniem jest zastosowanie nowych systemów zbierania informacji o cyberzagrożeniach, reagowania na nie, przechowywanie i wymiana tych informacji, a także, na ich podstawie, metod i środków znajdowanie napastników z wykorzystaniem zintegrowanych systemów lub platform. W celu rozwiązania tego typu problemów badany jest obiecujący kierunek Threat Intelligence jako nowy mechanizm pozyskiwania wiedzy o cyberatakach. Zdefiniowano Threat Intelligence w problemach cyberbezpieczeństwa. Dokonano analizy wskaźników cyberataków i narzędzi ich pozyskiwania. Porównywano standardy opisu wskaźników kompromisów oraz platformy ich przetwarzania. Opracowano technikę Threat Intelligence w zadaniach operacyjnego wykrywania i blokowania cyberzagrożeń dla zasobów informacyjnych państwa. Technika ta pozwala na zwiększenie produktywności analityków cyberbezpieczeństwa oraz zwiększenie bezpieczeństwa zasobów i systemów informatycznych.
Źródło:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska; 2021, 11, 4; 9--13
2083-0157
2391-6761
Pojawia się w:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Environment of Non-Verbal Communication – Security and Threats
Autorzy:
Czajkowski, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/1832487.pdf
Data publikacji:
2015
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
threat
non-verbal communication environment
Opis:
The subject of the work is the issue of analysis and interpretation of non-verbal behavior referenced to the security context and its threats. The fundamental thesis of the work is to prove the crucial role of knowledge and practical skills in the recognition and presentation of nonverbal behavior in crisis situations and emergencies. The author also points out the possibility of preparing and carrying out training in dealing with non-verbal messages for members of dispositional groups. In the analysis, the issue of the difference between the non-verbal and verbal behavior is discussed. Then the environmental issues of communication are analyzed in the form of importance of factors such as perception of situation, perception of time, presence of other people and architectural elements. In the same area dimensions of relations, knowledge on environment and people are located. The scope of non-verbal communication also includes close surroundings of a person and things possessed by him/her. Other important elements of the communication environment analysis are territory and personal space. Distinction is made between types of territory. In connection with the issue of space the author also introduced categorization of distance to the partner. In conclusion the need and usefulness of communication behavior model constructing, and conducting empirical research in this area are pointed out.
Źródło:
Security Dimensions; 2015, 16(16); 200-219
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Societal Security in the Context of Migration
Autorzy:
Kouhossounon, Bernadin
Powiązania:
https://bibliotekanauki.pl/articles/1832620.pdf
Data publikacji:
2017
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
Societal security
migration
threat
integration
identity
Opis:
Globanization nowadays seems to intensify the movement of people on the planet. As a result, making a living today is no longer just limited to the assets that people’s home country offers. That being said, providing for oneself has also become a question of opportunity and adventure. This reality, taken in the European context, reveals the coexistence of different social groups of different horizons, raising both issues of identity and security in host countries. Based on Barry Buzan’s concept of societal security, let us draw an observation that puts Francophone migrants in the context of the European territory in perspective.
Źródło:
Security Dimensions; 2017, 23(23); 213-230
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Safety of investment process parties in the aspect of construction work contract
Autorzy:
Grzyl, B.
Miszewska-Urbańska, E.
Siemaszko, A.
Powiązania:
https://bibliotekanauki.pl/articles/348533.pdf
Data publikacji:
2017
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
risk
construction works contract
threat
safety
Opis:
The essential characteristics of a construction investment project include, but are not limited to: individual, comprehensive, specialized, complex and multi-step nature of activities, significant time constraints, demand for different qualifications and resources (material, financial). The above characteristics are a potential source of risk, which makes it necessary to accurately describe the mutual relations of entities involved in the project – primarily in the scope of the content of a construction work contract. Its task is to settle the commitments of the parties, their rights and obligations, and the responsibility for actions taken at the stage of preparation and implementation of the investment, in order to ensure its safe and non-conflicting realization. Signing a construction work contract results in the assumption of specific responsibilities by each party. In practice there are numerous examples of contractual clauses, which constitute a gross violation of the safety and balance of the parties in the area of fair and even distribution of potential risk. Most often two groups of contractual provisions are observed in the content of works contracts. The first one contains an unreasonable limitation of the contractor's entitlements, the other includes the irrational extension of the contractor's obligations and the transfer of numerous consequences of potential risks. The incorrect, i.e. unequal division of risk and its consequences is the most common cause of disputes between parties to a construction work contract. The paper presents the issue of asymmetry in the allocation of risks and limitations in shaping the contents of the public procurement contract, in terms of the safety of parties to construction work contracts.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2017, 4; 208-216
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
DUALIZM EGZEKUTYWY JAKO ZAGROŻENIE DLA PROCESU DEMOKRATYZACJI – RZECZYWISTOŚĆ CZY IMAGINACJA?
DUAL EXEUCTIVE AS A THREAT TO THE PROCESS OF DEMOCRATIZATION – REALITY OR IMAGINATION?
Autorzy:
Banaś, Michał
Powiązania:
https://bibliotekanauki.pl/articles/512898.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Rzeszowski. Wydawnictwo Uniwersytetu Rzeszowskiego
Tematy:
dual executive
threat, transformation
transition
democratization
Opis:
The aim of this article is to analyse the impact of dual executive with the president elected by popular vote on the democratic transformation of post-communist countries of Europe and Eurasia. For this purpose following hypothesis was investigated: the system of government based on dual executive is a threat to democratization. Accepting that this process consists of three parallel transitions (political, economic and social), the author examined the impact of dual executive on the results of post-communist countries of Europe and Eurasia in two indexes: Revised Polity Score and Economic Freedom of the World. Thanks to this study some conclusions could be drawn pertaining to the impact of the system based on dual executive on the effects of the democratization of selected countries in political and economic areas. This allowed following question to be an-swered: is it a fact that a system of government based on dual executive with a president elected by popular vote is a threat to democratization?
Źródło:
Polityka i Społeczeństwo; 2014, 12, 2; 25-36 (12)
1732-9639
Pojawia się w:
Polityka i Społeczeństwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
„PAŃSTWO ISLAMSKIE” I JEGO WPŁYW NA AKTUALNE BEZPIECZEŃSTWO MIĘDZYNARODOWE
THE ISLAMIC STATE AND ITS INFLUENCE ON INTERNATIONAL SECURITY
Autorzy:
MACHNIAK, ARKADIUSZ
Powiązania:
https://bibliotekanauki.pl/articles/513026.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Rzeszowski. Wydawnictwo Uniwersytetu Rzeszowskiego
Tematy:
terrorism
coalition
international security
global threat
Opis:
The Islamic State was established as a result of many political, social and economic factors. It is currently the strongest terrorist structure in the world, which has support among the Islamic community across the globe. IS is a creation, which destabilizes the situation in the Middle East and threatens international security. Only the creation of a single international coalition sharing a common military and political policy against the IS can lead to the neutralization of this threat.
Źródło:
Polityka i Społeczeństwo; 2016, 14, 4; 127-140 (15)
1732-9639
Pojawia się w:
Polityka i Społeczeństwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Increasing operational capabilities of NATO in the face of modern challenges and threats
Autorzy:
Grenda, Bogdan
Powiązania:
https://bibliotekanauki.pl/articles/576361.pdf
Data publikacji:
2018-09-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
threat
operational capabilities
strategic security environment
Opis:
This paper explores the issue of improving NATO’s operational capabilities. The initial sections overview changes that have already been introduced and are expected in the international security environment in the forthcoming years. This perspective is subsequently adopted to identify the present developments in the strategic concepts of NATO with the view to formulation of appropriate operational capabilities of the North Atlantic Treaty.
Źródło:
Security and Defence Quarterly; 2018, 20, 3; 3-17
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Exploring the Theories of Radicalization
Autorzy:
Maskaliūnaitė, Asta
Powiązania:
https://bibliotekanauki.pl/articles/648446.pdf
Data publikacji:
2015-12-01
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
radicalization
theories
terrorism
ideology
grievance
threat
Opis:
After the London bombings in July 2005, the concern of terrorism scholars and policy makers has turned to “home-grown” terrorism and potential for political violence from within the states. “Radicalization” became a new buzz word. This article follows a number of reviews of the literature on radicalization and offers another angle for looking at this research. First, it discusses the term “radicalization” and suggests the use of the following definition of radicalization as a process by which a person adopts belief systems which justify the use of violence to effect social change and comes to actively support as well as employ violent means for political purposes. Next, it proposes to see the theories of radicalization focusing on the individual and the two dimensions of his/her motivation: whether that motivation is internal or external and whether it is due to personal choice or either internal (due to some psychological traits) or external compulsion. Though not all theories fall neatly within these categories, they make it possible to make comparisons of contributions from a variety of different areas thus reflecting on the interdisciplinary nature of the study of terrorism in general and radicalization as a part of it.
Źródło:
International Studies. Interdisciplinary Political and Cultural Journal; 2015, 17; 9-26
1641-4233
2300-8695
Pojawia się w:
International Studies. Interdisciplinary Political and Cultural Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Gloss on the Supreme Court ruling of 14 September 2017, I KZP 7/17’
Autorzy:
Nazar-Gutowska, Katarzyna
Powiązania:
https://bibliotekanauki.pl/articles/1364332.pdf
Data publikacji:
2018-09-30
Wydawca:
Uczelnia Łazarskiego. Oficyna Wydawnicza
Tematy:
groźba bezprawna
groźba karalna
uzasadniona obawa
wzbudzenie obawy
: unlawful threat
punishable threat
justified fear
eliciting fear
Opis:
The gloss presents comments on the ruling (issued by the Supreme Court on 14 September 2017, I KZP 7/17, LEX No. 2352165) concerning the issue of interpretation of the phrase “threat referred to in Article 190” contained in Article 115 §12 CC. The author tries to prove that eliciting a threatened person’s justified fear that the threat will be carried out constitutes an element of a punishable threat as a from of an unlawful one. Presenting her critical attitude to the thesis of the discussed ruling, she expresses her opinion that the phrase “threat referred to in Article 190” covers a perpetrator’s conduct as well as a result in the form of eliciting justified fear that the threat will be carried out. The effect, in accordance with the purpose-related interpretation, should be also referred to other types of threats (a threat of causing criminal proceedings and a threat of publicising a message insulting a threatened person or his/her close relation), which may constitute an efficient method of influencing another person’s motivational processes only in case they can really influence a threatened person’s psyche and persuade him/her to give in to the perpetrator’s will. In the face of different opinions of the representatives of the doctrine and case law concerning the issue, the author formulates respective de lege ferenda proposals.
Przedmiotem glosowanego postanowienia (wydanego przez Sąd Najwyższy 14 września 2017 r., sygn. I KZP 7/17, LEX nr 2352165) jest problematyka dotycząca rozumienia zwrotu „groźba, o której mowa w art. 190”, zawartego w art. 115 §12 k.k. Autorka podjęła próbę wykazania, że wzbudzenie w zagrożonym uzasadnionej obawy spełnienia groźby stanowi element groźby karalnej jako postaci groźby bezprawnej. Krytycznie odnosząc się do tezy glosowanego postanowienia, wyraziła pogląd, że zwrot „groźba, o której mowa w art. 190”, obejmuje zarówno zachowanie sprawcy, jak i skutek w postaci wzbudzenia uzasadnionej obawy spełnienia groźby. Skutek ten, zgodnie z wykładnią celowościową, należy odnosić także do pozostałych postaci gróźb (groźby spowodowania postępowania karnego i groźby rozgłoszenia wiadomości uwłaczającej czci zagrożonego lub jego osoby najbliższej), które mogą stanowić skuteczny sposób oddziaływania na procesy motywacyjne drugiej osoby tylko wtedy, gdy są w stanie realnie wpłynąć na psychikę zagrożonego i skłonić go do poddania się woli sprawcy. Wobec niejednolitości poglądów przedstawicieli doktryny i orzecznictwa sądowego, dotyczących przedmiotowego zagadnienia, sformułowano stosowne postulaty de lege ferenda.
Źródło:
Ius Novum; 2018, 12, 3; 194-204
1897-5577
Pojawia się w:
Ius Novum
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wybrane problemy związane z definicją groźby bezprawnej (art. 115 § 12 Kodeksu karnego)
Selected problems related to the definition of unlawful threat (Article 115 § 12 of the Criminal Code)
Autorzy:
Kmąk, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/2171601.pdf
Data publikacji:
2022
Wydawca:
Instytut Wymiaru Sprawiedliwości
Tematy:
prawo karne
groźba bezprawna
groźba karalna
usiłowanie
skutek
penal law
unlawful threat
punishable threat
attempting
consequence
Opis:
Celem artykułu jest krytyczna analiza art. 115 § 12 k.k., który definiuje groźbę bezprawną. Odesłanie do art. 190 k.k. powoduje, że zakres pojęcia „groźby bezprawnej” jest za wąski, ponieważ nie obejmuje groźby popełnienia wykroczenia na szkodę zagrożonego lub jego osób najbliższych, a także groźby popełnienia przestępstwa na szkodę innych podmiotów. Obecna regulacja wywołuje wątpliwości w zakresie pojęcia „postępowania karnego”, co wymaga doprecyzowania. De lege lata tylko groźba bezprawna w formie groźby z art. 190 k.k. wymaga wystąpienia obawy spełnienia groźby, ale w przypadku niewystąpienia tej obawy możliwa jest odpowiedzialność za usiłowanie przestępstwa. Powyższe wnioski nakazują postulować zmianę legislacyjną art. 115 § 12 k.k., ponieważ jest on w wielu przypadkach dysfunkcjonalny.
The purpose of this paper is a critical analysis of Article 115 § 12 of the Penal Code, which defines an unlawful threat. Reference to Article 190 of the Penal Code causes that the formula of unlawful threat is too narrow, because it does not include the threat of committing a contravention against person or against this person’s immediate family member and the threat of committing a crime against other entities. The current regulation raises doubt about concept of “criminal proceeding”, which requires clarification. De lege lata only an unlawful threat in the form of a threat under Article 190 of the Penal Code requires the fear of threat. If the fear does not arise, responsibility for attempting a crime is possible. The above conclusions require a legislative change of Article 115 § 12 of the Penal Code, because this provision is dysfunctional in many cases.
Źródło:
Prawo w Działaniu; 2022, 51; 107-124
2084-1906
2657-4691
Pojawia się w:
Prawo w Działaniu
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Stereotype threat and stereotype lift: the case of 10 year old girls and boys
Autorzy:
Kwiatkowska, Anna
Mróz, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/546566.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Warmińsko-Mazurski w Olsztynie
Tematy:
stereotype threat
sterotype lift
schoolchildren
self-esteem
Opis:
The aim of this study was to examine the effects of stereotypical and counter - stereotypical information on the self - esteem and congnitive performance of 10-year-old children. Our sample consisted of 37 girls and 37 boys. Children were presented with 10 "mathematical" puzzles in three experimental conditions: stereotypical (boy are better), counter-stereotypical (girls are better), and the control condition (no particular information). Self - esteem was measured usin a non - verbal task. The results showed a significant differences between control and experimental conditions, while boys showed a significant drop in self-esteem and performance in the counter-stereotypical condition as compared to the control condition and significant lift in self-esteem and performance in the stereotypical condition as compared to the control condition.
Źródło:
Civitas et Lex; 2016, 4(12); 21 - 32
2392-0300
Pojawia się w:
Civitas et Lex
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The essence and notion of terrorism in the aspect of the asymmeriacal threat
Autorzy:
Falkowski, Mariusz
Pytel, Marek
Powiązania:
https://bibliotekanauki.pl/articles/540288.pdf
Data publikacji:
2014
Wydawca:
Polskie Towarzystwo Geopolityczne
Tematy:
characteristics terrorism
war of terrorism
asymmetrical threat
Opis:
Authors in their article suggest, it that was can divide on two main kinds of activity with terrorism fight: the fight with terrorists as well as the terroristic organizations as well as the liquidating of stepping out causes of terrorism. The joint with international co-operation of states working and the organization in range fightingthe terrorism, it can in future contribute to considerable set - back of expansion this dangerous phenomenon even if after this, to the terrorism did not stand the most dangerous “plague XXI in.”
Źródło:
Przegląd Geopolityczny; 2014, 10; 23-31
2080-8836
2392-067X
Pojawia się w:
Przegląd Geopolityczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Is globalization a cause of asymmetric conflicts? Is it part of the solution or a problem?
Autorzy:
Prosic, Ale
Powiązania:
https://bibliotekanauki.pl/articles/534375.pdf
Data publikacji:
2017
Wydawca:
Wyższa Szkoła Biznesu w Dąbrowie Górniczej
Tematy:
Globalisation
Asymmetric threat
International relations
Middle East
Opis:
There is no place on the Earth which is not influenced by globalisation processes as for now with differing results and outcomes. It is especially influencing the Middle East and North Africa as they live with own values and those are determined by outside world influences. The paper is to research the interaction between globalisation and asymmetric conflicts that shape world politics economy, culture and security of the modern world. It covers globalistion effects on asymmetrical warfare and the way that globalisationhas greatly increased the ability of terrorists using asymmetric means and violence, in order to achieve a political, religious or ideological goal The paper is structured in three sections. It definesthe concepts of globalisation and asymmetric conflicts presens an interaction between globalisation, cultures and religion and finally describes asymmetric opposition of 'weaker' toward 'strong' in the modern form of 'asymmetric warfare', namely terrorism.
Źródło:
Security Forum; 2017, 1, Volume 1 No. 1/2017; 29-38
2544-1809
Pojawia się w:
Security Forum
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Poczucie braku bezpieczeństwa w tekstach polskich zespołów punkrockowych i postpunkowych napisanych po 1989 roku
The Feeling of Insecurity in the Texts Written by Polish Punk-Rock and Post-Punk bands after 1989
Autorzy:
Kasprzycki, Remigiusz
Powiązania:
https://bibliotekanauki.pl/articles/489295.pdf
Data publikacji:
2016
Wydawca:
Polskie Towarzystwo Naukowe w Żytomierzu
Tematy:
punk
rock
threat
security
music
text
author
Opis:
Representatives of the Polish punk-rock scene were careful observers of political, social and economic unrest in the world since the late 1970s and in the 1980s. A large part of the texts, written at that time, aptly commented on the tragic events in the world. Unfortunately, some of them haven’t lost their validity, like the song by KSU entitled ‘Liban’ [‘Lebanon’], or by the band ‘Brak’ [‘The Lack’] entitled ‘Na Bliskim Wschodzie wszystko w porządku’ [‘In the Middle East Everything’s All Right’]. After 1989, more songs, referring to various old or new threats in the world, were written. Songs, produced within the punk scene, describe the problems of political, economic and social nature, which remain unresolved. Authors, such as Maciej Augustyn, Krzysztof Grabowski, Kazik Staszewski not only point to the genesis of security problems in the world, but sometimes predict the consequences of such events in a broader perspective. Surprisingly, anticipations of some authors who are not political scientists or sociologists, come true more frequently than scientific analyses made by security experts. Suffice it to say that almost at the same time when Fukuyma guaranteed that happiness of humanity would be manifested in liberal democracy, Staszewski and Grabowski warned people of imminent wars, crises, a new division of the world and exploitation.
Źródło:
Studia Politologica Ucraino-Polona; 2016, 6; 267-279
2312-8933
Pojawia się w:
Studia Politologica Ucraino-Polona
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security education in dangerous times
Autorzy:
Pieczywok, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/576205.pdf
Data publikacji:
2018-10-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
threat
security
Security Education
feeling of security
Opis:
The article is concerned with the problems of Security Education in the context of threats to man`s existence. The aim of the article is to present the possibilities of Security Education from processual and technical (educational) aspects to prevent threats. The main research objective adopted by the author is: What are the main threats to mankind and how are they prevented by Security Education? The main focus is on the problems of education and threats to mankind. The article consists of an introduction outlining the significance of the subject. The most typical threats to man`s security and how Security Education could prevent them are described later.
Źródło:
Security and Defence Quarterly; 2018, 21, 4; 7-22
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ewolucja zagrożenia dżihadystycznego w Europie
The Evolution of the Jihadist Threat in Europe
Autorzy:
Wejkszner, Artur
Powiązania:
https://bibliotekanauki.pl/articles/642077.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
The Jihadist threat
Europe
Zagrożenie dżihadystyczne
Europa
Opis:
The purpose of this article is to analyze the most important sources and manifestations of Islamic radicalism in Europe. In order to achieve this aim the historical and the ideological determinants of the development of this phenomenon have been presented, followed by identification of the main stages of the evolution of jihadist threats and actors affecting its evolution. In that respect main argument of this article is that the jihadist threat to the security of selected European countries has relatively increased in the last few years and is dependent of the following issues: the process of radicalization of Muslim communities in Europe, changes in tactics and organization of jihadi groups, the success of the recruitment process and anti-terrorist activity of Western countries.
W niniejszej publikacji skupiono się na przedstawieniu źródeł i najważniejszych przejawów radykalizmu islamskiego w Europie. Zwrócono w szczególności uwagę na historyczne i ideologiczne determinanty rozwoju tego zjawiska. Wskazano najważniejsze etapy ewolucji zagrożenia dżihadystycznego oraz aktorów mających wpływ na jego ewolucję. Uwzględniając powyższe przesłanki w artykule zawarto ponadto najważniejsze wnioski dotyczące wzrastającego poziomu powyższego zagrożenia dla wybranych państw europejskich, w okresie ostatnich kilkunastu lat wraz ze wskazaniem zmiennych wpływających na ów poziom w postaci: procesu radykalizacji społeczności muzułmańskich w Europie, zmian w taktyce i organizacji grup dżihadystycznych, sukcesu akcji rekrutacyjnych i antyterrorystycznej aktywności państw Zachodu.
Źródło:
Przegląd Strategiczny; 2014, 7; 225-236
2084-6991
Pojawia się w:
Przegląd Strategiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Project of a special demographic zone as a response to a threat of depopulation in the Opole province
Autorzy:
Goleński, W.
Powiązania:
https://bibliotekanauki.pl/articles/347850.pdf
Data publikacji:
2015
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
depopulation
threat
Opole Province
Special Demographic Zone
Opis:
Depopulation in the Opole Province is a real threat, the effects of which, although spread over time can be seen today. They arise from many complex factors such as negative birth rate, population aging or unfavourable migration balance. The threat of depopulation brings certain results in the sphere of socio-economic policy in the region, which when appropriately targeted (despite their potentially negative nature) can contribute to pro-development solutions. In the situation of the demographic crisis the regional authorities created their original project of the Special Demographic Zone (SDZ), which has no counterpart in the whole country. SDZ combines, in a complementary manner, spheres of different sectoral policies, thus addressing the main challenge facing the Opole Province - preventing depopulation.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2015, 4; 48-63
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zieleń Żoliborza Historycznego zróżnicowanie oraz potencjalne zagrożenia
Urban greenery of Żoliborz Historyczny - variety and potential threats
Autorzy:
Kiełsznia, D.
Powiązania:
https://bibliotekanauki.pl/articles/1186915.pdf
Data publikacji:
2008
Wydawca:
Uniwersytet Przyrodniczy we Wrocławiu
Tematy:
zieleń
Żoliborz
zagrożenie
zróżnicowanie
greenery
threat
variety
Opis:
Warsaw's Żoliborz Historyczny comprises the area around Warsaw Citadel, where during the twentyyear Polish independence interwar period a new town-planning establishment was created; a residential district shaped on a completely new basis, different from the compact and narrow downtown. Greenery was of great importance there. Nowadays, after nearly 80 years, this greenery, as much as the building and infrastructure, creates the subtle tissue of the district, deciding about its specific character, vitalizing its area, stressing and completing the existing structures. The territory of Żoliborz Historyczny is subject to the conservator's preservation; not only the layout of the buildings, but also the greenery arrangement are protected. On the basis of the research, the following arrangements and elements creating the greenery of Żoliborz Historyczny have been distinguished: city parks, squares, small homestead gardens, superficial forestation, alleys, groups of trees, hedges and single trees.
Źródło:
Architektura Krajobrazu; 2008, 1; 4-10
1641-5159
Pojawia się w:
Architektura Krajobrazu
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Level of Risk and Decision-making in Managing Industrial Activity with the Elimination of Negative Environmental Impacts
Autorzy:
Végsöová, Oľga
Straka, Martin
Kyšeľa, Kamil
Powiązania:
https://bibliotekanauki.pl/articles/1811590.pdf
Data publikacji:
2020
Wydawca:
Politechnika Koszalińska. Wydawnictwo Uczelniane
Tematy:
risk
danger
threat
risk analysis
risk assessment
Opis:
This paper focuses on the assessment of the degree of risk in all phases of extraction activities in a selected quarry in the Slovak Republic. The research part of the paper assesses the degree of risk resulting from the assessment of the threat, the probability of the threat and the consequence of an adverse event in extraction activities. The paper offers an important basis for decision-making in quarry management in order to eliminate the negative consequences of andesite mining on the environment, equipment and people. The extraction activity in the Kecerovský Lipovec quarry is assessed by this paper as low risk for two phases of extraction, specifically the preparation phase, and the extraction itself. The paper also highlights the importance of taking measures. Regarding the safety criteria in the Kecerovský Lipovec quarry, it is possible, based on the results of the analysis and evaluation, to consider the quarry to be safe. However, a condition for this is the necessary expert training of workers in all activities performed while working in the quarry. Here, the need for personnel to strictly adhere to the set standards for extraction activities is of prime importance. This finding confirms the above that the aim of diagnosing and naming the potential for adverse events in the extraction process must be to minimize risks, as their absolute exclusion is not possible due to the human factor and unforeseeable circumstances.
Źródło:
Rocznik Ochrona Środowiska; 2020, Tom 22, cz. 1; 130-143
1506-218X
Pojawia się w:
Rocznik Ochrona Środowiska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Child protection in cyberspace
Autorzy:
Badźmirowska-Masłowska, Katarzyna
Powiązania:
https://bibliotekanauki.pl/articles/1996047.pdf
Data publikacji:
2021-03-01
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
protection
child
underage
threat
the media
Opis:
The aim of this article is to review main issues connected with the protection of a child in the cyberspace. It indicates the issue of the scientific discourse within the key terms: cyberspace and security of an underage in the online and offline environment. In the context of his position as mass media recipient and an user of cyberspace, several threats have been indicated and allocated to two basic categories: of macro-social and individual character. Premises shaping the systems of child’s security in the cyberspace have been indicated and the use of legal instruments and alternative methods in terms of specific security threats has been noted. Ultimately, current challenges to increase the effectiveness of providing security in the cyberspace for an underage were formulated.
Źródło:
Cybersecurity and Law; 2019, 1, 1; 213-224
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
National security challenges and threats
Autorzy:
Wyrębek, Henryk
Powiązania:
https://bibliotekanauki.pl/articles/2201523.pdf
Data publikacji:
2022
Wydawca:
Towarzystwo Wiedzy Obronnej
Tematy:
strategy
system
process
threat source
internal security
Opis:
The catalogue of threats which currently exist in the national security environment and may occur in the future is constantly growing. These phenomena are characterized by diversity, intensity, as well as unpredictability of the scale and consequences of their occurrence. The diversity of threats results from the fact that they are a consequence of mutually interacting political, military, economic and social, demographic and environmental processes and phenomena. Their character causes that they increasingly often lead to the occurrence of a crisis situation, and thus to the disruption of the normal functioning of the state. The article attempts to analyze the specific determinants of national security.
Źródło:
Wiedza Obronna; 2022, 2; 109--123
0209-0031
2658-0829
Pojawia się w:
Wiedza Obronna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Międzynarodowa organizacja policji kryminalnych : Interpol w zwalczaniu wybranych zagrożeń XXI w.
International organization of criminal police : Interpol in fighting selected threats of the 21st century
Autorzy:
Fałdowski, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2206360.pdf
Data publikacji:
2023
Wydawca:
Towarzystwo Wiedzy Obronnej
Tematy:
Interpol
bezpieczeństwo
strategia
zagrożenia
security
strategy
threat
Opis:
Współczesne zapewnienie bezpieczeństwa coraz częściej koncentruje się na zwalczaniu nowych wielopłaszczyznowych, powiązanych ze sobą i transnarodowych zagrożeń. Aby chronić takie wartości jak: wolność, sprawiedliwość i bezpieczeństwo konieczna jest skuteczna międzynarodowa reakcja z wykorzystaniem kompleksowego i nowatorskiego zestawu instrumentów o chrakterze prawnym, organizacyjnym i technologicznym. Bezpieczeństwo stanowi bowiem priorytetowe wyzwanie, które można osiągnąć przede wszystkim za pomocą specyficznych metod wymagających coraz bardziej ambitnego, skoordynowanego i holistycznego podejścia. Szczególną rolę w tym obszarze wypełnia Międzynarodowa Organizacja Policji Kryminalnej - Interpol będąca istotnym wspierciem dla organów ścigania oraz wymiaru sprawiedliwości w kontekście bezprecedensowych, narastających globalnych zagrożeń.
Contemporary security assurance is more and more common on combating new multi-faceted, interconnected and transnational threats. To protect such values as: control, safety and security is effective in the operation of the reaction using a comprehensive and special set of instruments with detailed, organizational and detailed characteristics. Safety is a standard priority that can be addressed primarily with the help of additional methods that are of an increasingly ambitious, coordinated and holistic standard. In this respect, they are part of the International Criminal Police Organization - Interpol, which is engaged in cooperation with law enforcement and the judiciary in the context of unprecedented, growing global criteria.
Źródło:
Wiedza Obronna; 2023, 1; 193--210
0209-0031
2658-0829
Pojawia się w:
Wiedza Obronna
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies