Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 3

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  critical
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
Human Affairs
|
2008
|
vol. 18
|
issue 1
81-91
EN
The paper analyzes the conditions of civic participation that are elucidated by criticism of the deficits of public reason. The interpretation proceeds in three steps. First, the idea of public reason and discourse is analyzed, followed by an explanation of democratic deficit and of the social deficit in the second and third steps, respectively. These deficits are analyzed as an essential limit to political and social conditions of the participation of citizens. The analysis focuses thereby on the theory of public reason by one of the most influential political philosophers of the last decades, John Rawls. The paper identifies two main pitfalls in his theory: first, the deficit following from an inadequate integration of an individual into society, which, in this case, represents democratic deficit, second, the deficit linked with underrating the socio-distributive dimension of justice, which means a social deficit.
EN
One form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the action is subordinated to the antagonistic side of the other. It leads to the achievement of political objectives and is aimed at overthrowing the systems of the state responsible for the state of its security. It is important that this condition is at a high, or at least acceptable, level. To ensure this level, it is important to define cybersecurity fighting models that are adequate for the threats and to determine their impact on the level of national security risk in cyberspace. Literature on the subject contains many models of cyberwarfare information that have been shaped in recent years. However, there is no assessment of the adequacy of these models for the risks and risks associated with national security threats. It should be noted that information security itself, as part of national security, is variable. New threats are emerging and, at a very high rate and with high activity in cyberspace, they are capable of destabilising the security of key state administration bodies, military facilities and other important state– run infrastructures. It should be emphasised that existing cyberspace fighting information models are not universal and cannot be used for any type of threat to national security. They need to find, organise and evaluate those that would be the most appropriate not only for national security threats but also for geopolitical determinants. Assumptions for the research and its results are a noticeable increase in the number of cyberattacks, some of which are important from the point of view of national security – the military system and critical infrastructure elements of the state. The following subject of the research was adopted in the article – models of information fight, related to threats to national security coming from / to cyberspace. The purpose of scientific research is to define models of information combat and to determine the suitability and evaluation of these models for the purpose of evaluating the risks of national security threats. Identifying the subject and objectives of the research led to a general research question: What appropriate models of information fight in cyberspace can be defined and used for the risks of national security threats? The research method applied theoretical methods (analysis, synthesis, generalisation, abstraction, inference, analogy and comparison) as well as the empirical method of dialogue and the method of participant observation.
3
Publication available in full text mode
Content available

Move Beyond the Text

58%
PL
Czytanie jest złożonym procesem, który jest nieodzowny w skutecznym rozwoju kariery naukowej. Podczas czytania tekstów specjalistycznych zachodzi konieczność przejścia przez poziom dosłowny, domyślny oraz twórczo-oceniający. Dla niedoświadczonego czytelnika, który już zapoznał się z podstawową terminologią z danej dziedziny, specjalistyczne teksty mogą stanowić trudność, ponieważ potrzebne jest mu również krytyczne podejście. To oznacza wykorzystanie doświadczenia i wiedzy, które są poza tekstem, oraz umiejętność zadania odpowiednich pytań. Wyjście poza tekst daje czytelnikowi szansę lepszego zrozumienia zagadnienia. Dwa przykłady wykorzystane podczas warsztatów dają przykład, jak nauczyciele mogą przygotować studentów do czytania tekstów specjalistycznych.
EN
Reading is a complex skill which is indispensable in order to be successful in pursuing a scientific career. While reading specialist texts, it is necessary to go through the literal, inferential and creative-evaluative levels of comprehension. For an inexperienced reader, who is already familiar with the basic terminology in a relevant field, specialist texts may pose difficulty since they need critical approach. It means using experience and knowledge beyond the text, and also the ability to ask adequate questions. Moving beyond the text gives the reader an opportunity to have an insight into the problem. Two examples used in the workshop show how teachers may prepare students to read specialist texts.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.