Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 8

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  Threats
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
This article presents the basic theoretical issues related to the use of armed forces to support the actions of institutions responsible for the internal security of the state. The reflections presented are based on an analysis of the literature on security sciences, generally applicable laws and directives of a strategic nature related to national security issues of the Republic of Poland. The basis for the discussion was a presentation of the significance of the effectiveness of the internal security system — the vision and the state security strategy. This served to illustrate the basic areas of support that have been identified on the basis of the common use of the term “internal security”. It is assumed that these are public safety and general security, understood as the components of the internal security of the state. An important issue in this part of the article is an overview of these types of security, which allows the relationships between them to be indicated. This range of considerations has consequently enabled the presentation of the rules of support for institutions responsible for the internal security of the state by the armed forces. Rules that have scientific justification, unmatchable practical value and that are systematically improved in the course of the day-to-day activity of the entities mentioned. In the final part of the work a summary, along with an indication of the specific scope of support, has been made using the conclusions of the provisions of generally applicable law.
EN
Aim/purpose – The aim of this paper is to present a strategy that allows companies to recover from disasters, when creating a supply chain. Furthermore, it also shows the impact on the company’s resources that are used in the implementation of the strategy in case of small and big disasters. Thanks to the proposed solution, it is possible to analyze each company individually, as well as in groups, at any given time. Design/methodology/approach – The results were obtained based on a numerical analysis which was performed with the use of MATLAB software. The tests were carried out separately for five companies, as each of them may expect a disaster on any different day. However, the selection of the day when crises occur is carried out in accordance with the probability determined by scientific research. Findings – The research showed that companies using their resources can continue to fulfill their functions as a link in the Supply Chain despite the fact that they react differently to small disasters compared to big ones. This difference occurs since small disasters in contrast to big ones appear in every company much more often. Consequently, it is more difficult for companies to build their wealth in the case of small disasters. The advantage of the proposed approach is that one can freely test which strategy can cause the least losses for the company as well as for the entire supply chain. Research implications/limitations – The analysis carried out shows that companies wishing to develop in conditions of unexpected disasters, that cannot be predicted, should regularly increase their assets because they are needed to implement a strategy that allows them to maintain an appropriate operational level. This approach provides tools that enable the selection of strategies with variable parameters, freely determined during the scientific research. Originality/value/contribution – The paper presents a graphical analysis of the change in the value of resources of a supply chain company over one year period. Such an analysis may be useful for any company that creates a supply chain during the COVID-19 crisis period, which is an unpredictable disaster. The adoption of a Gaussian Pseudo Random Number Generator turned out to be useful as it creates crises days while simulation studies allow us to generate experiments for different data configurations. This paper provides an analysis of small and large disasters separately, which is an approach not presented in the literature.
EN
This article presents the essential issues in the provisions of the law relating to public security in force in the Republic of Poland which are used in conditions of extraordinary internal threats that cannot be dealt with using ordinary legal tools. The considerations are based on an analysis of the legally regulated obligations of the state as a political organisation to society for securing the conditions for its survival in a changing security environment. This serves to present the basic issues of public security and the rules for the use of the State instruments for states of emergency. The rest of this article presents the relationship between issues of public security and a state of emergency. In this part of the article it is essential to discuss the circumstances that must exist to be able to employ specific legal measures in the conditions of threats to the constitutional order of the State and threats affecting the security of the citizens or of public order (including those caused by terrorist activities). Consequently, it discusses the impact of the rigours of a state of emergency in relation to the potential for limiting the escalation of these threats. The final part of the article also presents other instruments, apart from the state of emergency which, in the Polish legal system, can be used in the fight against threats which endanger public security and that are related to prohibited activities in cyberspace.
EN
The aim of this article is to analyse the opportunities and threats generated by the Chinese investment activity in the EU (including Poland), and also possibilities to counter its potential negative consequences. In recent years, the interest of Chinese companies to invest in the European market has grown significantly. In all likelihood this tendency can be a constant trend in the near future. Apart from economic benefits generated by the Chinese investment, there are also some possible threats and risks related to this activity. Polish policy-makers should also be more aware of these issues. Although the present activity of Chinese enterprises in Poland has been relatively small, China seems to be interested to increase its economic presence in Central and Eastern Europe, and Poland is considered as a leading country in the region.
PL
Celem artykułu jest analiza szans i zagrożeń, które generuje chińskie zaangażowanie inwestycyjne w państwach Unii Europejskiej, a także możliwości przeciwdziałania jego ewentualnym negatywnym konsekwencjom. Ostatnie lata przyniosły ze sobą wyraźny wzrost zainteresowania przedsiębiorstw z Chińskiej Republiki Ludowej podejmowaniem działalności inwestycyjnej w państwach Unii Europejskiej. Można przy tym zakładać utrzymanie się tej tendencji w najbliższym czasie. Poza korzyściami ekonomicznymi, które generuje chińskie zaangażowanie inwestycyjne, wskazuje się także na pewne zagrożenia z tym związane. Problem ten powinien stać się także obiektem zainteresowania polskich decydentów. Mimo relatywnie niewielkiej dotychczas aktywności chińskich przedsiębiorstw w Polsce, Chiny wydają się być zainteresowane zwiększeniem obecności gospodarczej w Europie Środkowo-Wschodniej, Polską traktując jako lidera państw regionu.
XX
The aim of this paper is to present the changes in the area of supply chain security in the years 2001-2016, with the emphasis on the new challenges from the environment of the supply chains, such as the increase of terrorist threat and migration crisis, which had a significant impact on the European countries and thus also on the companies operating in these countries. The analysis is based on statistical data from international databases and reports of international organizations on selected threats to supply chains, as well as on the results of surveys on supply chain security conducted using CATI (computer-aided telephone interviews) method, among Polish exporters and importers in 2013 and 2016. By comparing data and research results from different periods, it is possible to demonstrate the dynamic nature of security.
PL
W artykule omówiono kwestie bezpieczeństwa serwisów społecznościowych, które powinny zostać uwzględnione w formułowaniu strategii rozwoju firmy z wykorzystaniem sieci społecznościowych. Coraz więcej firm dostrzega popularność serwisów społecznościowych wśród ludzi, dlatego starają się one włączać je w swoją strategię rozwoju, aby wzmocnić przewagę konkurencyjną. Jednocześnie coraz więcej ludzi aktywnie korzysta z tego typu serwisów, zamieszczając informacje o sobie i o pracy, często nie zdając sobie sprawy z zagrożeń, jakie taka aktywność za sobą niesie. Celem poznawczym artykułu jest analiza znaczenia serwisów i sieci społecznościowych w biznesie. Część empiryczna ma pomóc zidentyfikować zagrożenia wynikające z komunikacji za pośrednictwem serwisów społecznościowych. Jej celem jest również identyfikacja kluczowych tematów i rekomendacji do dalszych badań.
EN
The paper discusses the security issues of social networking sites, which should be included in the formulation of the company’s development strategy with the use of social networks. More and more companies are recognizing the popularity of social networking sites among people. Therefore, companies try to incorporate them into their development strategy in order to strengthen their competitive advantage. At the same time, more and more people actively use these types of services by posting on them information about themselves and their work, often unaware of the risks that such activity entails. The cognitive goal of the paper is to analyze the importance of social networking sites and social networks in business. The empirical part aims to identify threats arising from communications using social networking sites. Its goal is also to identify key topics and recommendations for further research.
PL
Zasada kontynuacji działalności stanowi fundamentalną zasadę rachunkowości. Zakwestionowanie możliwości prowadzenia działalności gospodarczej w dającej się przewidzieć przyszłości powoduje zmiany w sposobie sporządzania sprawozdań finansowych. Z tego też powodu kierownik jednostki jest zobowiązany do oceny zasadności przyjęcia tego założenia, analizy symptomów i przesłanek zagrożenia kontynuacji działalności.
EN
Going-concern principle is a fundamental principle of accounting. The rejection of this assumption causes changes in the way the preparation of the financial statements. For this reason, the Unit Manager is required to assess the appropriateness of going concern assumptions, analysis of any symptoms and indications concern threat.
PL
Według raportu Cisco zagadnienia takie jak cyfryzacja, bezpieczeństwo IT oraz Internet rzeczy to zjawiska, które wyznaczały kierunek rozwoju poszczególnych branż gospodarki w 2016 r. i będą szczególnie istotne w przyszłości. Wśród nich znajduje się Internet rzeczy, wobec którego oczekuje się, że znajdzie wiele zastosowań w różnych dziedzinach, m.in. w energetyce, transporcie, przemyśle, opiece zdrowotnej. Jego zastosowania usprawniają nasze życie, ale stwarzają też nowe zagrożenia i stanowią wyzwanie dla architektów systemów bezpieczeństwa. Eksperci są zdania, że problemy z bezpieczeństwem IT sprzed lat powracają obecnie w nowych urządzeniach i dają hakerom wiele możliwości do cyberataków. Celem artykułu jest przegląd wybranych przypadków użycia Internetu rzeczy, opis zagrożeń dla cyberbezpieczeństwa wynikających z poszerzania dostępu do sieci nowych urządzeń, a także przegląd istniejących zabezpieczeń.
EN
According to the Cisco report, issues such as digitization, IT security and the Internet of Things are phenomenon, which determined the direction of development of the economy sectors in 2016 and will be particularly important in the coming years. Among them is the IoT which is expected to find many applications in various areas, like energy, transport, industry, construction, health care. Its applications enhance our lives, but also pose new threats and is a challenge for IT security architects. Experts think that the IT security problems from the past return now with new devices and provide many opportunities for hackers to cyberattacks. The aim of the article is a review of selected cases of the usage of the IoT, description of threats to cybersecurity resulting from widening access of new devices to the Internet, and an overview of the existing safeguards.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.