Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 4

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  psychological operations
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
This paper has two purposes. From the personal side, the topic was chosen because I am interested in the history of psychological operations. To benefit the reader, I address psychological operations in selected military conflicts after the Second World War in order to consider this issue. The goal of this study is to depict examples of the psychological operations conducted after World War II as part of military operations and examine the increasing importance of these issues to all involved in the battle. The article describes methods and means of psychological activities carried out by both sides in conflicts against both soldiers and civilians. Most attention in the article is devoted to the potential of the United States, which is without doubt a leader in the development of psychological operations. US PSYOP equipment is the most sophisticated and covers a broad spectrum of diverse technological means of influence. It results especially from the permanent engagement of US troops in military activities in various parts of the world after the end of World War II. Psychological operations have been an essential element of warfare since ancient times. The purpose of psychological operations is to induce or reinforce foreign attitudes and behaviour favourable to the originator’s objectives. It has been used throughout history to influence foreign groups and leaders. Moreover, psychological operations targeted the enemy’s will to fight. In various conflicts after World War II, we can observe more and more attention being paid to psychological operations. Today we can observe arevolution in PSYOP capabilities. This is related to the development of modern technologies, especially the internet, which gives new opportunities for information transfer.
EN
The author of the article pursues several vignettes drafted in the course of the military and academic discussions, related to the social media. Initial section of the publication is dedicated to the social sphere of the human nature. The reasons and motives inspiring people to create networks are investigated. The subsequent part provides a description of currently available social media platforms. The tools, their utility and basic characteristics are examined. Such summary is used as a framework to build few conclusions on the potential risks and opportunities, offered by virtual networks for the security community. Findings are consequently confronted with existing doctrines. Some structural assumptions are drafted within this section, in order to provide a conceptual point of reference for further research. The author than continues with selected case studies of the social media military application. The article is concluded by a few reflections encapsulating the role of non-kinetic, social media embedded warfare in the contemporary conflicts.
EN
This article presented mechanism and instruments of contemporary psychological warfare. Phenomenon of propaganda will be discussed and also the role of its main carrier: mass media. In the further part of the work cyberspace will be presented as other large area of contest for influence on societies. Manipulation of social consciousness, which is conducted by state regimes and other participators of international relations, is permanent element of contemporary international environment. That is the reason why it is so important to know mechanism of it.
EN
Antiterrorist structures should consider opportunities and risks of advanced technologies which can influence the character, forms and efficiency of actions of terrorist organizations, and put forward the corresponding reorganization of counteraction to terrorism at national and international levels. These technologies can be developed on the basis of achievements of different research disciplines and, even more often, turn out to be a product of interdisciplinary efforts. The paper analyzes the ways of using cutting-edge technologies by terroristorganizations in the field of exerting an influence on individual and public consciousness, and also possible reaction to such threats.
PL
Struktury antyterrorystyczne uwzględniają możliwości i ryzyka technologii perspektywicznych, które mogą mieć wpływ, tak na charakter, formy i efektywność działalności organizacji terrorystycznych. Odpowiedniej przebudowy potrzebują również systemy przeciwdziałania terroryzmowi na poziomie narodowym i międzynarodowym. Technologie te mogą być opracowywane na podstawie osiągnięć różnych dyscyplin naukowych i częściej okazują się wytworem wysiłków interdyscyplinarnych. W artykule analizowane są możliwości wykorzystania technologii perspektywicznych przez organizacje terrorystyczne w obrębie wpływu na indywidualną i społeczną świadomość oraz możliwe odpowiedzi na tego typu zagrożenia.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.