Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2018 | 9 | 59-70

Article title

Technology “democratization”. Peacetech – new quality of security management

Content

Title variants

Languages of publication

Abstracts

EN
Contemporary time, interpreted by the prism of security, is no longer dominated by easy to describe inter-state conflicts or regional threats. Experts every now and then define new types of threats such as cybercrime, cyberterrorism or cyberwar. The intense and multi-level uncertainty affects the understanding of the present and the predicted future, and thus the search for security by all of us. The answer depends in part on whether we are able to understand contemporary security environment. These issues are, to my mind, independent of the place in which we are. Using tools for diagnosing and monitoring security remains an open question. At the moment we are searching for a solution to this problem by means of modern technologies. The paper stresses the importance and application of e.g. Internet technology and global telecommunication. Interpersonal relations are being replaced with technological solutions. Nowadays, a phone or a computer connected to the web is sufficient to make contact with another person or check what information official sources are bringing us today. Actions for security as a result of incorrect reception of a message may be associated with erroneous perception of the content and propaganda. As a result, the recipient is consciously manipulated. New technologies take the form of nonconventional, organized activities for security. Any number of people can cooperate through the web for security management without actual superior authority. Members of such groups, established ad hoc, may use their knowledge to express objections or dissatisfaction. The paper also presents another aspect of using technology. According to the author, there are situations in which technologies acting for reinforcing security often cause objection, motivated by restricting civil freedoms and by the threat of an attack on a free and open society.

Year

Issue

9

Pages

59-70

Physical description

Dates

published
2018

Contributors

  • University of Szczecin

References

  • Donohue, B. (2015). Systemy kamer miejskiego monitoringu są dziurawe. (10.06.2015). Downloaded from: https://plblog.kaspersky.com/systemy-kamer-miejskiego-monitoringu-sa-dziurawe/3047.
  • Dorn, A. W. (2011). Keeping Watch: Monitoring Technology and Innovation in UN Peace Operations, Tokyo: United Nations University Press.
  • Dyczewski, L. (2008). Terroryzm w mediach: sensacja i spektakl, odpowiedzialność i informacja. Downloaded from: https://www.bbn.gov.pl/download/1/1979/zeszyt9dyczewski.pdf.
  • Henzler, M. (2011). Kamery w miastach – wszędzie nas widzą, (5.11. 2011). Downloaded from: https://www.polityka.pl/tygodnikpolityka/kraj/1518972,1,kamery-w-miastach---wszedzie-nas-widza.read.
  • Hoffman, F.(2007). Conflict in the 21st Century: The Rise of Hybrid Wars. Arlington: Potomac Institute for Policy Studies.
  • Kapuściński, R.(2002). Lapidarium V. Warszawa: Spółdzielnia Wydawnicza “Czytelnik”.
  • Latiff, R. H.(2018). Przyszła wojna. W obliczu nowego globalnego pola walki. Warszawa: Wydawnictwo Naukowe PWN.
  • Minton, A. (2012). CCTV increases people’s sense of anxiety, (30.11.2012). Downloaded from: www.theguardian.com/society/2012/oct/30/cctv-increases-peo¬ples-sense-anxiety.
  • Nagel, T. (2002). Concealment and exposure: and other essays. New York: Oxford University Press.
  • Piątek, J. (2017). Poles in Great Britain. Dimensions of security after 2004. Reality of Politics. Estimates-Comments-Forecasts, 8.
  • Projekt ochronny kosztował miliony funtów. Wciąż nie działa (9.10. 2013). Downloaded from: http://www.polishexpress.co.uk/projekt-ochronny-kosztowal-miliony-funtow-wciaz-nie-dziala.
  • Puig Larrauri, H., Kahl, A. (2013). Technology for Peacebuilding. Stability: International Journal of Security & Development, 3.
  • Rybarczyk, M. (2014). Londyn czeka na zamach, (25.11.2014). Downloaded from: http://swiat.newsweek.pl/zagrozenie-terrorystyczne-w-londynie-i-na-wyspach-brytyjskich-newsweek,artykuly,352437,1.html.
  • Sachs, J. D. (2015). The Age of Sustainable Development, New York: Columbia University Press.
  • Siergiej, P. (2010). Wielki brat na Manhattanie, (6.01.2010). Downloaded from: http://wyborcza.pl/1,75476,7424790,Wielki_Brat_na_Manhattanie.html.
  • Tansey, S. D. (1997). Nauki polityczne, Poznań: Zysk i S-ka.
  • The CEWARN ICT 4 Peace Project: Use of Information Communication Technologies (ICTs) for Conflict Prevention, (1.04.2016), . Downloaded from: http://www.cewarn.org/index.php/the-cewarn-ict-4-peace-project-use-of-information-communication-technologies-icts-for-conflict-prevention.
  • The Impact of New Technologies on Peace, Security (2016). Development Independent Commission on Multilateralism (April 2016), Downloaded from: https://www.icm2016.org/IMG/pdf/new_tech_paper.pdf.
  • Yáñez, F. (2017). The Goal is Industry 4.0: Technologies and Trends of the Fourth Industrial Revolution, independently published.

Document Type

Publication order reference

Identifiers

Biblioteka Nauki
1963329

YADDA identifier

bwmeta1.element.ojs-doi-10_15804_rop201804
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.