Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 7

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  asymmetric threats
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
1
Publication available in full text mode
Content available

On Terrorism and its Typologies

100%
EN
The article refers to selected aspects of knowledge about terrorism and its typology. The introduction explains the etymology of this concept and highlights the problem of diversity in the definition of terrorism. The next part cites several definitions of terrorism, which, in the author’s opinion, reflect the essence of this phenomenon. The difference between terrorism and terror, which are two terms that should not be used interchangeably, is also explained. The next part of the article illustrates the source of the problem which makes it impossible to agree on a commonly accepted definition of terrorism by giving an example of the wording of the Arab Convention for the Suppression of Terrorism. Then, the inherent feature of terrorism is explained, which is its asymmetry. The last part of the article concerns a typology of terrorism. It presents in a synthetic way various categories of terrorism, distinguished according to such criteria as: actors, motives, strategic (final) goals, close (closer) goals, type of actions, nature of the object of attacks, international implications, and means and methods used by terrorists. The article ends with a concise summary of the considerations on the theoretical aspects of terrorism undertaken in it.
EN
Globalisation is a phenomenon which influences every aspect of contemporary life. Neo- liberal ideas lead to the multifunctional interdependence of geopolitics, the political economy, international relations, security, and defence issues. In the globalised world, many issues can be raised: Where are the roots of modern conflict? Who are the stakeholders in international relations? What are the dominant forms of contemporary conflicts? Do the forms of collective security fulfill the legitimacy of objectivity? What are the new challenges for modern defence science? Through the multidisciplinary approach, based on academic literature, as well scholars research papers, this work aims to contribute to the clarifying a rational approach to modern defence science in the contemporary, global security environment.
EN
The article presents the most important issues related to fighting with asymmetric threats. The issues are introduced in the context of undertaken counter-subversive activities. A crucial element of the discussion is that the actions and their properties are presented in the form of an open set, which might be used for training purposes by forces using subversion. Such an assumption led the author to introduce the problem followed by methods and characteristics of fighting with subversion. These were the bases for presenting basic problems related to the description of counter-subversive activities and protective and defensive measures. In the further part of the article the author describes kinds and manners of counter-subversion highlighting the indicators of their effectiveness and interrelations between them. The article finishes with conclusions which synthesize the assumptions and particular parts of the article.
EN
The author presents current asymmetric threats that affect global security. The aim of this article is to analyze asymmetrical sources and threats in the context of new technologies. The goal will be achieved both by analyzing the conditions of security in cyberspace against challenges and asymmetric threats for the state, as well as by analyzing the state of security. The thesis presented in this article is: the new technologies in the hands of unauthorized entities cause asymmetric threats in the field of national security in the local and global dimension. The author will analyze data on asymmetrical sources and threats in cyberspace in the context of new technologies that are important for national and international security. Based on the analysis of literature in the field of asymmetrical threats, the author presents important conclusions for the security of the state.
PL
Autor przedstawia aktualnie asymetryczne zagrożenia, które wpływają na globalne bezpieczeństwo. Celem artykułu jest analiza źródeł i zagrożeń asymetrycznych w kontekście nowych technologii. Cel zostanie osiągnięty zarówno poprzez analizę uwarunkowań bezpieczeństwa w cyberprzestrzeni wobec wyzwań i zagrożeń asymetrycznych dla państwa, jak również poprzez analizę stanu bezpieczeństwa. Teza przedstawiona w artykule brzmi następująco: nowe technologie w rękach nieuprawnionych podmiotów powodują asymetryczne zagrożenia w zakresie bezpieczeństwa państwa w wymiarze lokalnym i globalnym. Autor dokona analizy danych w zakresie źródeł i zagrożeń asymetrycznych w cyberprzestrzeni w kontekście nowych technologii, które są istotne dla bezpieczeństwa narodowego i międzynarodowego. Na podstawie analizy literatury w zakresie asymetrycznych zagrożeń autor przedstawia istotne wnioski dla bezpieczeństwa państwa.
EN
The article presents the theoretical approach to the democratic political system together with the presentation of selected threats that may weaken its ability to resist asymmetric and symmetrical security threats. In the following, the hybrid war phenomenon was explained along with recommendations in the last fragment summarizing the whole of the considerations. The thesis of the article is the belief that asymmetric threats are a transitional stage leading to the weakening of the state and the last phase in the form of a symmetrical military response. In the author’s opinion, the goal of the state should be to develop an effective strategy and shape civilian and armed forces characterized by high quality and precision of action.
PL
Artykuł prezentuje teoretyczne ujęcie demokratycznego systemu politycznego wraz z przedstawieniem wybranych zagrożeń, które mogą osłabić jego zdolności do przeciwstawienia się asymetrycznym i symetrycznym zagrożeniom bezpieczeństwa. W dalszej części wyjaśnione zostało zjawisko wojny hybrydowej wraz zaleceniami i ostatnim fragmencie podsumowującym całość rozważań. Tezą artykułu jest przekonanie, że zagrożenia asymetryczne są etapem przejściowym, prowadzącym do osłabienia państwa i ostatniej fazy w postaci symetrycznej odpowiedzi militarnej. Zdaniem autora celem państwa powinno być opracowanie skutecznej strategii oraz ukształtowanie sił cywilnych i zbrojnych cechujących się wysoką jakością i precyzją działania.
EN
In the article presents problems resulting from many constitutional, political or legislative constraints, showing, for example, that it is difficult to quickly adapt the legal system to the dynamically developing and growing new threats – especially migration and terrorism.
PL
W artykule przedstawiono problemy wynikające z wielu ograniczeń konstytucyjnych, politycznych czy legislacyjnych pokazując na przykładach, że trudno tak szybko dostosować system prawny do rozwijających się bardzo dynamicznie i rosnących w siłę nowych zagrożeń – zwłaszcza migracji oraz terroryzmowi.
PL
In connection with the progressive revolution that is changing the face of contemporary conflicts. This arena is becoming cyberspace, which is accessible to different actors: armed forces, criminal and terrorist organizations and hackers. In the article, the author deals with the analysis of cyberwar as an asymmetric conflict. He explains the essence of today’s asymmetric threats, analyzes the concept of cyberspace and also explains the concept and characteristics of cyberwar.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.