Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 5

first rewind previous Page / 1 next fast forward last

Search results

help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
Background: The article presents a method of estimating the security level which indicates how probable it is for a phenomenon to occur. Objectives: The author attempts to answer the question: How do we estimate security? Decision makers usually need percentage showing the probability of an incident taking place in the future. This information is needed in the first place, later decision makers can use more descriptive information. Methods: The research problem concerns the assessment of security using the estimation method. Depicting security in numbers is difficult, thus the descriptive method is also usually applied. The estimation method facilitates the assessment. It is helpful since it is partly done by calculation and partly by guessing or approximation. Based on a case study analysing whether a terrorist attack may occur, the author also used tools such as averaging expert predictions, scenario analysis and risk analysis. Results: This article provides a view on forecasting security, which results in a method of estimating the level of security. Conclusions: The author presents an approach which allows to initially estimate the security level of the analyzed phenomenon in a relatively short period of time.
EN
The fact that NATO has acknowledged cyberspace as the fifth dimension of combat operations indicates that this problem issue is really topical and is pointing at the direction from which the possible threat can be expected. However, the issues of information communication technology (ICT) security on the national level have been tackled in numerous countries for many years. Technological advancement has resulted in making communication, and at the same time services rendered in cyberspace, an international domain. Thus, the aspects of cyberspace threats should be considered through the international prism. The above-presented approach has become an incentive for the author to take up research on international activities in terms of cyberspace defence and reaction to the already identified as well as future threats.
EN
In the literature on the subject, the terms steering, management and control are often used interchangeably. However, in the course of the terminological analysis, the author indicated the dependencies between these concepts and defined the area of their application. The conducted research allowed for the identification of the concept of command and the area of its influence. The system of command, as a special (specific) form of management, allowed for the presentation of the entirety of the commander's purposeful activity as part of the command system. As a result of the terminological analysis, the author drew attention to the diversity of the analysed concepts, which will allow for their purposeful and proper use in research in the field of social sciences in the disciplines of safety science as well as management and quality science.
EN
The article discusses the matter of contemporary cyberattack techniques aimed at the financial security of banks and their clients and presents the relationship of banks with their clients in the light of the applicable provisions of the European Union (Directive of the European Parliament and the EU Council 2015/2366 of November 25, 2015 on payment services in internal market) and the Polish Act of 19 August 2011 on payment services. The authors also analyze the practical side of the relationship between banks and their customers who have fallen victim to computer fraud, pointing out that the common practice of banks refusing to return funds stolen from their customers in the electronic banking system is inconsistent with the applicable standards of Polish and European law.
EN
The events related to the armed conflict in Ukraine undoubtedly have an impact on the image of the modern world economy. As a consequence, it forces the enterprise to implement specific actions related to change management, which should be a response to the changing environment, in this case based on changes in the security environment. On the basis of the conducted research, the authors emphasize that due to the interruption of the supply chain, forced changes in the TFL sector, the social impact and the social role of enterprises, the preparation of change management plans is a complicated and difficult task facing modern enterprises. In this article, the authors draw attention to the multifaceted nature of this phenomenon.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.