Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 5

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  business continuity
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
A sole proprietorship is the most common form of running a business. The number of enterprises operated in Poland has been growing dynamically for over 30 years. At the same time, the population of Poland is the fastest ageing society in the EU. In the light of the above, many enterprises may soon face the problem of maintaining business continuity in the event of death of their owners. The article attempts to evaluate the implementation of the institution of succession management of a natural person’s enterprise into the Polish legal framework one year after new solutions were offered to Polish entrepreneurs. To this ennd, the way how entrepreneurs make use of this institution has been analysed.
EN
The aim of this article is to present the situation of Polish enterprises in terms of the protection of data security,as well as identify and highlight the importance of this criterion affecting the management systems of business organisations,and entrepreneurs’ approaches to taking action in this regard. The authors present a proposal to create a high-quality securitymodel for securing business processes based on company policies and procedures for information security while maintainingthe principle of continuity of operations in respect of business functions. The analyses presented in this article are an independentoverview and are based on the findings of the literature and current research in the IT sector using Polish and internationaldatabases. The proposed quality model concerning the security of business processes is described and explained. Accordingto the authors, in order to reduce the risk of business disruption, achieve the objectives of compliance with regulationsand respond appropriately to complex security breaches, organisations must integrate security structures, constantly monitorthe standards adopted, along with rules and control mechanisms, so as to meet the set parameters and remain withinthe appetite for risk.
EN
A sole proprietorship is the most common form of running a business. The number of enterprises operated in Poland has been growing dynamically for over 30 years. At the same time, the population of Poland is the fastest ageing society in the EU. In the light of the above, many enterprises may soon face the problem of maintain-ing business continuity in the event of death of their owners. The article attempts to evaluate the implementation of the institution of succession management of a natural person’s enterprise into the Polish legal framework one year after new solutions were offered to Polish entrepreneurs. To this end, the way how entrepre-neurs make use of this institution has been analysed.
PL
Jednoosobowa działalność gospodarcza jest najpopularniejszą formą prowadzenia działalności gospodarczej. Od ponad 30 lat obserwowany jest dynamiczny rozwój liczby przedsiębiorstw w Polsce. Jednocześnie Polacy są najszybciej starzejącym się społeczeństwem UE. W związku z powyższym w najbliższym czasie w wielu przedsiębiorstwach może wystąpić problem z zapewnieniem ciągłości funkcjonowania podmiotów gospodarczych w przypadku śmierci przedsiębiorców. W artykule podjęto próbę oceny implementacji instytucji zarządu sukcesyjnego przedsiębiorstwem osoby fizycznej do polskiego prawa w pierwszą rocznicę wprowadzenia nowych rozwiązań dla przedsiębiorców. W tym celu dokonano analizy jej wykorzystania przez przedsiębiorców.
EN
The supply chain formula based on strict close interdependence between all its elements causes the smallest disturbance in one of the links to menace the whole supply chain, which is why it is so important for the participants to identify the weakest links of the supply chain and indicating, through complex analysis, potential situations threatening the realization of the whole process; this is possible by respecting unified criteria of proceeding both on domestic and regional level, and on global scale. Safety management in the supply chain is a process aimed at determining areas menacing its proper functioning. An element of this process is undertaking suitable activities, using proper means to eliminate risk or minimise the consequences of its occurrence. Along with economic development increased risk can be observed, as well as qualitative changes in the character of appearing threats transposed from previous well recognizable, mainly fate kind of risks, to categories pertaining to the conditions of activities and process realization. What is important, in the case of hybrid supply network, the threat bound with conduct of activity exceeds the framework of a single enterprise. As a consequence, the appearance of risk in any link or stage of process realization significantly affects the whole supply chain. The article presents guidelines aimed at ensuring the continuity of the functioning of certain processes, the assumed level by providing the resources and commitment of top management, the critical parameters identified and proposed solutions dealing with crisis situation. It was noted that an appropriate response to this situation depends not only on the availability of information about the incident, but also awareness and competence of employees. Modern hybrid form characterized by high complexity of the organizational, structural and task require all participants in the supply chain of involvement in the process and creating a positive image. Effective management of multi-level logistic network can not be confined only to the traditional and well-knows methods but requires uncommon merger holistic solution.
EN
This paper looks at the issue of IT systems migration as well as problems related to security policy in migration processes. Problem of migration is viewed in a broad context of changes which occur during construction or modernization of an IT system. Migration projects were classified against the background of wide spectrum of informatization strategy issues and sources of threats to information security were pointed out. Also, guidelines for improvement of security in migration process were presented.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.