Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 5

first rewind previous Page / 1 next fast forward last

Search results

help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
This study investigates the contents of key documents of international rank regulating the transfer of weapons and military technologies in order to mark the principles that rule this kind of state activity. The following principles have been pointed out: the principle of minimizing the consumption of the world’s human and economic resources for armaments; the principle of respect in the transfers of weapons and the principles of the Charter of the United Nations; the principle of transparency in the transfer of weapons and military technology; the principle of limitation of armaments as a factor constituting a threat to peace and national, regional and international security; the principle of the regulation of transfer of weapons in the domestic law of states; and the principle of respect for humanitarian law and human rights in international military transfers.
Cybersecurity and Law
|
2019
|
vol. 1
|
issue 1
115-141
EN
The article compares and analyses the acts of international law on the cybercrime. Firstly, the analysis of multilateral international agreements was made. Next, bilateral international agreements and legislative resolutions of international organizations were analysed. On that basis, conclusions concerning the range and forms of international cooperation in the field of cyber-security were formulated.
Cybersecurity and Law
|
2024
|
vol. 11
|
issue 1
105-119
EN
The article analyses important and current issues concerning the use of modern information technologies in hostile actions against the state in the international environment. First, the concept of lawfare was defined as a method of conducting information warfare. Then, the focus was on the potential manifestations of lawfare in cyberspace, indicating possible gaps in the state’s information security system and sensitive areas susceptible to methods of hostile shaping of the state’s legal system.
EN
The article describes the issue of the public activity of professional soldiers in the light of the provisions of the Constitution of the Republic of Poland of 1997 and the Act of September 11, 2003 on the military service of professional soldiers. The author analyzes in detail the political freedoms and rights of citizens, defined in the Constitution of the Republic of Poland and the possibility of their implementation by professional soldiers in the light of the restrictions imposed on them in the Act on the military service of professional soldiers. The aim of the analyzes carried out is to indicate the scope of civil rights in the sphere of public activity that professional soldiers are entitled to, whose special service relationship imposes certain restrictions on the exercise of these rights.
PL
Artykuł porusza zagadnienie publicznej działalności żołnierzy zawodowych w świetle postanowień Konstytucji RP z 1997 r. i ustawy z dnia 11 września 2003 r. o służbie wojskowej żołnierzy zawodowych. Autor szczegółowo analizuje wolności i prawa polityczne przysługujące obywatelom, zdefiniowane w Konstytucji RP i możliwość ich realizacji przez żołnierzy zawodowych w świetle ograniczeń nałożonych na nich w pragmatyce służbowej jaką jest ustawa o służbie wojskowej żołnierzy zawodowych. Celem przeprowadzonych analiz jest wskazanie zakresu praw obywatelskich w sferze aktywności publicznej przysługujących żołnierzom zawodowym, których szczególny stosunek służby wymusza określone ograniczenia w korzystaniu z tych praw.
EN
The article discusses the matter of contemporary cyberattack techniques aimed at the financial security of banks and their clients and presents the relationship of banks with their clients in the light of the applicable provisions of the European Union (Directive of the European Parliament and the EU Council 2015/2366 of November 25, 2015 on payment services in internal market) and the Polish Act of 19 August 2011 on payment services. The authors also analyze the practical side of the relationship between banks and their customers who have fallen victim to computer fraud, pointing out that the common practice of banks refusing to return funds stolen from their customers in the electronic banking system is inconsistent with the applicable standards of Polish and European law.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.