Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2019 | 10 | 134-148

Article title

Some Methodological Reflections on the Efficiency of “Political and Military Decision Making” in a Hybrid Reality

Content

Title variants

Languages of publication

Abstracts

EN
The aim of this paper is to present some methodological reflections on hybrid activities (spaces, knowledge about spaces, comparison of spaces, dynamic spaces, coordination of hybrid activities, efficiency of “hybrid activities”).

Year

Issue

10

Pages

134-148

Physical description

Dates

published
2019

Contributors

  • University of Szczecin

References

  • Arquilla, J., Ronfeldt, D. (1993). Cyberwar is coming!, International Policy Department, RAND Corporation.
  • Benoit, K., Lauer ,M. (2012). The Dimensionality of Political Space: Epistemological and Methodological Considerations, European Union Politics, 13(2), 194-218.
  • Bernays E. (1928). Propaganda. New York: Routledge.
  • Bower-Bir J. S., D’Amico N. J. (2013). A Tool for All People, but Not All Occasions: How Voting Heuristics Interact with Political Knowledge and Environment, Indiana University Bloomington. Downloaded from: https://ostromworkshop.indiana.edu/pdf/seriespapers/2013f_c/Bower-Bir_paper.pdf
  • Biermann, J. (2003). A Knowledge-Based Approach to Information Fusion for the Support of Military Intelligence, RTO-MP-IST-040, RTO IST Symposium on Military Data and Information Fusion, Prague, 20-22 October. Downloaded from: https://apps.dtic.mil/dtic/tr/fulltext/u2/a428708.pdf
  • Cebrowski, A. C., Garstka, J. J. (1998). Network Centric Warfare: Its Origin and Future. Proceedings of the Naval Institute. Downloaded from: https://www.academia.edu/10508908/Network-Centric_Warfare_Its_Origin_and_Future
  • Cherry, K. (2019). Heuristics and Cognitive Biases. Downloaded from: https://www.verywellmind.com/what-is-a-heuristic-2795235
  • Clarke, R., Knake, R. (2010). Cyber War: The Next Threat to National Security and What to Do About It. New York: Ecco.
  • von Clausewitz, C. (1958). O wojnie. Warsaw: MON.
  • Collins Chinese Dictionary (2005). New York: Harper Collins Publishers Inc.
  • De Bono, E. (1977). Lateral Thinking: A Textbook for Creativity. London: Penguin.
  • De Bono, (1994). Parallel Thinking, McQuaig Group Inc.
  • Doktryna cyberbezpieczeństwa RP (2015). Warsaw: Biuro Bezpieczeństwa Narodowego.
  • Doubravski, K., Dohnal, M. (2015). Reconciliation of Decision-Making Heuristics Based on Decision Trees Topologies and Incomplete Fuzzy Probabilities Sets, PLOS ONE, 10(7).
  • Fortunato, D., Stevenson, R.T., Vonnahme, G. (2016). Context and Political Knowledge: Explaining Cross-National Variation in Partisan Left-Right Knowledge, Southern Political Science Association, Vol. 78, 4, August 23.
  • Friedman, G. (2009). The Next 100 years. A Forecast for the 21st century. New York: Doubleday.
  • Friedman, G. (2011). Next decade. New York: Doubleday.
  • Gigerenzer, G., Gaissmaier, W. (2011). Heuristic Decision Making. Annual Review of Psychology. Vol. 62, pp. 451-482.
  • Gilens, M., Murakawa, N. (2002). Elite cues and political decision making. Political Decision Making, Deliberation and Participation, Vol. 6, pp. 15-49.
  • Goldstein, D., Gigerenze,r G. (2002). Models of Ecological Rationality: the Recognition Heuristic. Psychological Review, 109, pp. 75-90.
  • Gordon, W. (1961). Synectics. The Development of Creative Capacity. New York: Harper & Row.
  • Haliżak E. (2007). Bezpieczeństwo narodowe Polski. Geopolityczne i geoekonomiczne uwarunkowania. Toruń: Wydawnictwo Adam Marszałek.
  • Jacobsen, J.T. (2014). Clausewitz and the Utility of Cyberattacks in War. International Journal of Cyber Warfare and Terrorism. Vol. 4, issue 4, pp. 1-16.
  • Jurewicz, O. (2000, 2001). Słownik grecko-polski. Warsaw: Wydawnictwo Szkolne PWN.
  • Kahneman, D., Slovic, P., Tversky, A. (1982). Judgment Under Uncertainty: Heuristics and Biases. New York: Cambridge University Press.
  • Kautilya, (1992). The Arthashastra, ed. L.N. Rangarajan. New Delhi.
  • Kinni, Th., Kinni, D. (2005). No Substitute for Victory: Lessons in Strategy and Leadership from General Douglas MacArthur. Gliwice: Helion.
  • Kościelny, R. (2019a). Scenariusz Sacharowa. Warszawska Gazeta, 609, pp. 24-25.
  • Kościelny, R. (2019b). Dwa światy: nasz i ich. Warszawska Gazeta. 12, p. 22-23.
  • Lau, R.R., Redlawsk D.P. (2001). Advantages and disadvantages of cognitive heuristics in political decision making. American Journal of Political Science, 45, pp. 951-971.
  • Lorenz, F.P., Biermann, J. (2003). A Man-in-the-Loop Support Concept for Military Ambush Threat Analysis Based on Reconnaissance Reports. NATO RTO Symposium on Military Data and Information Fusion, Prague.
  • Łuczuk, P. (2017). Cyberwojna. Wojna bez amunicji? Kraków: Biały Kruk.
  • Mousavi, S., Gigerenzer, G. (2014). Risk, uncertainty, and heuristics. Journal of Business Research, 67, pp. 1671-1678.
  • Mroziewicz, K. (2017). Indie. Sztuka władzy. Poznań: Zysk i S-ka.
  • Nolan, V. (1990). The Innovators Handbook. London.
  • North Atlantic Treaty (1949).Washington: NATO.
  • Osborn, A. (1957). Applied Imagination. New York: Scribner.
  • Piątek, J. (2019). NIE. Państwo, wojna, bezpieczeństwo. Toruń: Wydawnictwo Adam Marszałek.
  • Prince, G. (1970). The Practice of creativity. New York: Collier Books.
  • Sienkiewicz, P. (2009). Terroryzm w cybernetycznej przestrzeni, In: T. Jemioła, J. Kisielnicki, K. Rajchel (eds.), Cyberterroryzm - nowe wyzwania XXI w. Warsaw: Wyższa Szkoła Informatyki, Zarządzania i Administracji.
  • Song Hongbing (2012). Wojna o pieniądz. Kobierzyce: Wydawnictwo Wektory.
  • Staten, C. L. (1998). Asymmetric Warfare, the Evolution and Devolution of Terrorism; The Coming Challenge for Emergency and National Security Forces. Energy Response & Research Institute. Downloaded from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.372.61&rep=rep1&type=pdf.
  • Steenbergen, M.R., Hangartner, D., De Vries, C. E. (2011). Choice under Complexity: A Heuristc - Systematic Model of Electoral Behaviour. Annual Meeting of the Midwest political Science Association, Chicago, March 31-April 3, pp. 1-28.
  • Strasburger, D. (1996). Zasady sztuki wojennej, Warsaw: Wydawnictwo Bellona.
  • Sundar, S., Singh, A. (2013). New heuristic approaches for the dominating tree problem. Appl SoftComput, 13, p. 4695-4703.
  • Sun Pin (1998). Military Methods of the Art of War. New York: Barnes & Noble Books.
  • Sun Zi. (2011). The Art of War. Amber Books Ltd.
  • Sun Tzu (1963). The Art of War. Oxford, At the Clarendon Press.
  • Sun Tzu & G. Gagliardi. (1999). The Art of War Plus the Art of Marketing. Onepress.
  • Sun Tzu. Sun Pin (1996). The Complete Art of War. Westview Press.
  • Szałek, B.Z. (2012). The so-called “political heuristics” in the light of praxiology. Reality of Politics, 3, pp. 237-251.
  • Szałek, B.Z. (2013). Some praxiological reflections on the so-called “Overton Window of Political Possibilities”, “framing”, and related problems, Reality of Politics, 4, pp. 237-257.
  • Szałek, B. Z. (2013). Problem wielopoziomowego zarządzania (Multi-level Governance) w Unii Europejskiej w świetle prakseologii i heurystyki. In: J. Ruszkowski, L. Wojnicz (eds.), Multi-level Governance w Unii Europejskiej (pp. 61-68). Szczecin-Warsaw.
  • Szałek, B. Z. (2015a). Geopolitics, Political Topology and Hybrid Warfare. Reality of Politics, 6, pp. 86-97.
  • Szałek, B. Z. (2015b). Kilka prakseologicznych refleksji na temat geopolityki i myśli politycznej. Od geopolityki do topologii politycznej. In: A. Wojtaszak (ed.), Myśl polityczna w XX i XXI wieku (pp. 127-149). Szczecin: WNWHUS Minerwa.
  • Szałek, B. Z. (2015c). Kilka prakseologicznych uwag na temat globalnych wyzwań w kontekście Polski. In: R. Podgórzańska, J. Ruszkowski (eds.), Teoria i praktyka polityki. Perspektywa szczecińskich politologów (pp. 97-114). Szczecin: WNWHUS Minerwa.
  • Szałek, B. Z. (2016). The Blurred Problem of Foreign Funding of Civil Society Organizations in the Light of Political Marketing, Praxiology and Hybrid Warfare. Reality of Politics, 7, pp. 195-211.
  • Szałek, B. Z. (2017). The Common Security and Defence Policy of the European Union - in the context of ‘hybrid warfare’, ‘networks’, ‘swarming’ and ‘consolidated hybrid defence’. Reality of Politics, 8, pp. 125-140.
  • Szałek, B. Z. (2018). Prakseologiczne aspekty socjotechniki w hybrydowej rzeczywistości. Zakład Prakseologii, Heurystyki i Marketingu Politycznego, Szczecin: IPiE WH US.
  • Thom, R. (1972, 1975). Structural stability and morphogenesis. An outline of a general theory of models. Reading: Benjamin W.A.
  • Vis, B. (2018). Heuristics and political Elites’ Judgement and decision-making, Political Studies Review, Feb.1, p. 1-17.
  • Wajzer, M., Staniucha, T. (2014). Simon’s puzzle: heuristics in the process of making political choices. Interdiscyplinary Description of Complex Systems, 3, pp. 210-224.
  • Webster’s Third New International Dictionary (1993). Cologne: Könemann.
  • Wrzosek, M. (2018). Wojny przyszłości. Doktryna, technika, operacje militarne, Warsaw: Fronda.
  • Vitali, S., Glattfelder, J.B., Battista, S. (2015).The network of global corporate control. Downloaded from: http://arxiv.org/abs./1107.5278.
  • Young Mie Kim (2013). Heuristics. Oxford University Press.
  • Zwicky, F. (1969). Discovery, Invention, Research Through Morphological Approach. Toronto: The Macmillan Company.

Document Type

Publication order reference

Identifiers

Biblioteka Nauki
1963343

YADDA identifier

bwmeta1.element.ojs-doi-10_15804_rop201909
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.