Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 13

first rewind previous Page / 1 next fast forward last

Search results

help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
This article presents fundamental issues concerning the description of the security system of an organization understood as an entirety composed of people equipped with tools, machines and materials, which are connected with one another by a specific bond and between which there are relations connected to ensuring an undisturbed existence and creating opportunities for development. The description of security systems is a complex undertaking. It is a consequence of its complexity, which is primarily a result of the set of relations between organizational elements. They include: accumulation (expressed in the number of hierarchical levels, range (related to the number of subordinations and dependencies), spread (associated with the number of elements subordinate to a single superior at each organizational level), organizational cohesiveness (connected to the mutual structural and functional dependencies between organizational elements due to performed tasks), information links (reflecting the channels and network of information flow), as well as the division of powers (associated with the right to make decisions), and division of duties (related to the relationship between organizational elements). The complexity of the description of security systems is also determined by the activity of the organization’s security systems, which can be divided into: material (concerning the types of activities), temporal (related to the order of its conduct in a specific time), and spatial (connected to conducting activities in specific places). The description of security systems is only possible through the use of: appropriate methodological procedures and a systemic approach, as characterized within the constraints resulting from the expression formula. This paper also indirectly addresses the determinants of the description of security systems. These are: up-to-date knowledge, concreteness and reliability of the description and sufficient detail.
EN
The article presents the most important issues related to fighting with asymmetric threats. The issues are introduced in the context of undertaken counter-subversive activities. A crucial element of the discussion is that the actions and their properties are presented in the form of an open set, which might be used for training purposes by forces using subversion. Such an assumption led the author to introduce the problem followed by methods and characteristics of fighting with subversion. These were the bases for presenting basic problems related to the description of counter-subversive activities and protective and defensive measures. In the further part of the article the author describes kinds and manners of counter-subversion highlighting the indicators of their effectiveness and interrelations between them. The article finishes with conclusions which synthesize the assumptions and particular parts of the article.
EN
This article presents the essential issues in the provisions of the law relating to public security in force in the Republic of Poland which are used in conditions of extraordinary internal threats that cannot be dealt with using ordinary legal tools. The considerations are based on an analysis of the legally regulated obligations of the state as a political organisation to society for securing the conditions for its survival in a changing security environment. This serves to present the basic issues of public security and the rules for the use of the State instruments for states of emergency. The rest of this article presents the relationship between issues of public security and a state of emergency. In this part of the article it is essential to discuss the circumstances that must exist to be able to employ specific legal measures in the conditions of threats to the constitutional order of the State and threats affecting the security of the citizens or of public order (including those caused by terrorist activities). Consequently, it discusses the impact of the rigours of a state of emergency in relation to the potential for limiting the escalation of these threats. The final part of the article also presents other instruments, apart from the state of emergency which, in the Polish legal system, can be used in the fight against threats which endanger public security and that are related to prohibited activities in cyberspace.
EN
As safe existence and development of the state may be at any time limited or violated, combating the factors destabilizing the national security can generally speaking be described as the defense implemented in all areas of the state functioning. As a consequence of this situation security of the State must be studied as a complex issue affecting political, military, economic, ecological and other spheres. Lack of threat is an important but not the only aspect of securing safety. An equally important factor is public awareness concerning possibilities of the state to secure it. Intuitive understanding of this term leads to the conclusion that it refers to the sphere of awareness of the entity, i.e. human, social group, nation or nations. Both the previous and present generations notice the presented regularity. In order to ensure the effectiveness of preparation in the state to confront threats all possible measures should be taken to ensure that it has been properly prepared in a given sphere. The basis of such preparations is a full identification of threats and determination of interdependencies between them. It also stems from the fact that providing security of the State – defined as a state of security, resulting from an effective protection and defense against the internal and external threats, measured as a proportion of defensive potential to the threat level – as well as stable and continuous advancement of the society have been and will be the primary goal of the authorities and public administration in all areas of their activity.
EN
Legal solutions adopted over the past few years in Poland indicate that attempts are being systematically made to improve the mechanism for counteracting terrorism. Terrorism in Poland has been opposed for a long time. The commencement of such systematic solutions took place on the 25th of October 2006 through the appointment by the Prime Minister of the Inter-ministerial Team for Terrorist Threats and ended ten years later, on the 10th of June 2016, by the adoption of the law on anti-terrorist activities. For the above-mentioned reasons, the two main parts are devoted to the issues of the commencement of legal and organisational undertakings in the fight against terrorism and the characteristics of systemic statutory solutions are preceded by considerations with conclusions. The article discusses the issues of initiatives undertaken by the government administration and presents the circumstances in which it tried to face up to the problem of developing draft laws of the law now in force. In consequence, this serves to present the areas of responsibility and tasks of government administration bodies specified in the said Act. The considerations presented in this study indicate that global and national experience gained in recent years has shaped the“Polish model of combating terrorism”, which has recently found its confirmation in the relevant legal provisions. The basis for the development of this article is the interest in improving the effectiveness of combating terrorism which, for obvious reasons, is not reducing and remains very substantial. This applies to both theoreticians and practitioners. This results first of all from the needs of the challenges and threats that are subject to dynamic changes. Secondly, through the adaptation of the tools used by the state, including those mainly legal of a legal nature. These must be improved from the moment of their implementation.
EN
This article presents the basic theoretical issues related to the use of armed forces to support the actions of institutions responsible for the internal security of the state. The reflections presented are based on an analysis of the literature on security sciences, generally applicable laws and directives of a strategic nature related to national security issues of the Republic of Poland. The basis for the discussion was a presentation of the significance of the effectiveness of the internal security system — the vision and the state security strategy. This served to illustrate the basic areas of support that have been identified on the basis of the common use of the term “internal security”. It is assumed that these are public safety and general security, understood as the components of the internal security of the state. An important issue in this part of the article is an overview of these types of security, which allows the relationships between them to be indicated. This range of considerations has consequently enabled the presentation of the rules of support for institutions responsible for the internal security of the state by the armed forces. Rules that have scientific justification, unmatchable practical value and that are systematically improved in the course of the day-to-day activity of the entities mentioned. In the final part of the work a summary, along with an indication of the specific scope of support, has been made using the conclusions of the provisions of generally applicable law.
EN
Internal security is today an intensively explored area of national security. This is hardly surprising. It is this area that is mainly concerned with emerging threats. Hence, new scientifically justified solutions are being sought to counteract them and minimise the effects of their occurrence. Given the above, the research has been conducted, and its results are presented in this paper. It addresses the main problems relating to internal security through the prism of identification criteria, essence, and systemic approach. That has made it possible to present the assumptions of the project in question. The research aimed to diagnose the functioning of the state’s internal security system, and the participation of academic centres dealing with security issues. One of such centres is the Police Academy, which is implementing a project entitled “Vacuum chamber for revealing fingerprints with organic compounds in the gas phase’, No DOB-BIO9/03/01/2018. It was financed by the National Centre for Research and Development under call for proposals No 9/2018 for the execution and financing of projects in the field of scientific research or development work for the benefit of national defence and security. After they were implemented, it was stated that the constant changes in the internal security environment, and the limited potential of state institutions designated to care for this security entail the need to continually search for practical solutions to ensure the undisturbed existence and development opportunities of each entity. These searches are conducted by scientific institutions, which with their knowledge and experience serve to improve the tools used in the practice of institutions responsible for internal security.
EN
This article presents basic issues concerning security research in the past, called reaching the origins of security. Reaching the origins is not a concept that finds its rightful place in security research. It has been used and thus fixed permanently in other areas, therefore, the issues discussed in this article concern problems from many fields of knowledge. Security testing covers a number of processes, including retrospective ones, the essence of which is a scientific look into the past. Reaching the origins, all in all, makes it possible to identify the sources of danger and the requirements to be met for safety to reach an acceptable level. It allows, on the one hand, to prevent the recurrence of these sources and, on the other hand, to apply the solutions of the past to today's and tomorrow's security efforts. It can also be said that reaching the origins of safety is connected with determining the methods of eliminating and minimizing threats, and thus indicating the procedures providing an appropraite level of security. It's a utilitarian effect. In the cognitive context, it should be emphasized that the results of reaching the origins may serve to enrich the contemporary knowledge in the field of security. In both cases the procedures of avoiding mistakes made in the past are going to be worked out, especially that their sources are usually human mistakes having their origins in the lack of knowledge of past times. The considerations presented in the article allowed to determine the meaning of reaching the origins, its types and mutual relations between it and the diagnosis, monitoring and forecasting of security. In conclusion, the presented deliberations are summarized.
PL
Książka „Bezpieczeństwo obywateli — prawa człowieka — zrównoważony rozwój: polskie kierunki interdyscyplinarnych badań kryminologicznych nad bezpieczeństwem obywateli oraz w zakresie przeciwdziałania wykluczeniu społecznemu” jest kompletnym dziełem naukowym zawierającym na 652 stronach zbiór wartościowych treści z zakresu bezpieczeństwa wewnętrznego w skali mikro i makro, ze szczególnym uwzględnieniem zagadnień prawa, kryminologii oraz bezpieczeństwa i porządku publicznego. Książka wypełnia lukę na krajowym rynku wydawniczym, gdzie brakowało wyczerpującego opracowania w zakresie odzwierciedlonym tytułem. Ma ona uniwersalny charakter interdyscyplinarny, pozwalający zrozumieć istotę i zakres troski o bezpieczeństwo obywateli przedstawicielom wielu dziedzin i dyscyplin naukowych, dla których problematyka bezpieczeństwa obywateli stanowi istotę badań naukowych bądź związana jest z procesem dydaktycznym.
PL
Istnieją różne rozwiązania dotyczące problematyki przygotowań obronnych. Poszczególne państwa realizując zadania, obejmujące zakres przygotowań obronnych. Ich regulacje prawne zachowują jednostkowy charakter, który wynika z historii, tradycji, położenia geopolitycznego, podziału administracyjnego państwa. Artykuł przedstawia komparatystyczny opis różnych form prawnych w zakresie obronności takich państw jak Niemcy, Finlandia, Wielka Brytania i Szwecja.
EN
The aim of the article is to present the major issues related to the protection of the Polish border from the perspective of the tasks and functions of the Border Guard and border checkpoints. The present analysis is a result of research conducted with use of theoretical research methods used in the social sciences. The aforementioned research was carried out with the purpose of diagnosing the functioning of the state border protection and traffic control system. The result of the research leads to the conclusion that the Polish border protection and traffic control system is being gradually improved, which is a result of changes in the security environment, primarily related to the emergence of new threats and increasing levels of existing threats. This leads to the expansion of the range of functions performed not by the Border Guard in general, but specifically by border checkpoints, which are closely related to field government and local authority administration bodies. These bodies have a definitive influence on local security, and thus on the security of areas controlled by the Border Guard.
EN
There are different solutions to the problems of defense preparations. Individual countries fulfilling the tasks, covering a range of defensive preparations. The regulations retain the individual character, which results from the history, tradition, geopolitical situation, administrative divisions of the state. This paper presents a comparative description of the different legal forms in the defense of such countries as Germany, Finland, the UK and Sweden.
EN
The article presents fundamental issues related to vital problems with a view to research on internal security, namely — opportunities, challenges, risks and threats. The reason for treating these phenomena in such a way is the fact that they most often occur together. It also seems important that today there is a substantial perception and awareness of opportunities, challenges, risks and threats. This can be achieved by making information and knowledge widely available. A significant source of the latter is scientific research which provides systematically improved and highly objective collections of reliable information about reality together with the methods for their skilful and effective use. The considerations presented are based on a review of the Polish and foreign literature used in security research conducted within the framework of  security sciences. It  has been used to  present basic identification problems and mutual relationships among opportunities, challenges, risks and threats. The analysis presented indicates a lack of uniformity in the perception of the concept of risk. Completely different is the situation with regard to  identifying opportunities, challenges, risks and threats. There are here many common areas referring mainly to sources and effects. The considerations presented have made it possible to identify mutual cognitive and utilitarian relations between the subject phenomena. The conclusions of the article include a summary of the above-mentioned considerations.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.