Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Years help
Authors help

Results found: 996

first rewind previous Page / 50 next fast forward last

Search results

Search:
in the keywords:  security
help Sort By:

help Limit search:
first rewind previous Page / 50 next fast forward last
EN
The vast array of responsibilities assigned to local self-government include also public security. This is all the more important as it must be ensured at every tier of administration, including in the regions. The local self-government, as the basic form of decentralised public administration, is situated closest to citizens and is therefore most responsive to their needs, with security needs being fundamental needs that must be addressed on a continuous basis. The jurisdiction of local and regional government bodies in the field of public security concerns many areas, but it is the local government which holds most of these responsibilities while the regional government is entrusted with less responsibility in this matter. This characteristic covers the institution of emergency states, crisis management, or issuing public order regulations.
EN
For many years South Asia has been perceived as an unstable area, albeit with great potential for economic development. It is the region where two nuclear powers, India and Pakistan, coexisting in an uneasy and often tense relationship, may start another conflict with deadly consequences for the whole continent. It has also become a playground for the Asian superpowers, India and China, which will exert a powerful influence over regional affairs and contribute to some extent to reshaping global affairs only if they continue their balanced economic growth and develop their respective military capabilities. There is no efficient multilateral security mechanism in South Asia. The challenges of energy security, nuclear proliferation, failing states and piracy should compel nations in South Asia to look for additional frameworks, allowing them not only to talk, but also to work together, including militarily. NATO is one such a framework, and the only one with more than six decades of experience in multinational military planning and cooperation.
EN
The way cyberspace is conceptualized in security discourses shapes strategies, tools and possible solutions developed within the ICT security debate. Putting forward processual ontology of cyberspace helps in apprehending the unique dynamics of this new domain arising from the intersection of ICT with social and political phenomena. Cyberspace is presented as a process of data transmission and information cognition/processing in the digital domain. It contains time as an inherent dimension and includes all subjects and objects of this process: data (codes, packets, files, texts), information (structured or operationalized data), human and computer agents (people, software) and communication environment (hardware, protocols). Processual ontology is based on the fact that ICT is a man-made realm with almost unlimited potential to expand, where physical distance is lapsed and bits are the primary matter. This theoretical stance blurs the line between human and non-human agents, dehumanizing the idea of actorness by categorizing both humans and computers as actors. Finally, processual ontology of cyberspace promotes resilience strategies both in the private sector as well as on national and international level.
XX
At present great emphasis is continually being placed on security in local government units. One of possibilities for providing security for local communities is municipality police. Municipality police fulfils tasks while ensuring order in a city and protecting its residents. The paper presents a comparison of investments into security in the largest Polish, Czech and Slovak cities of the Euroregion Beskidy. The paper also offers numerical data of the amounts of financial resources given allocated from the security budget to the city police forces.
EN
Water resources are basic condition for survival and development of mankind on certain territory. The quantity of water resources in community depends on geographical location and certain hydro-geological, hydro-logic and hydro-biologic conditions on certain area. It means, that water resources are measurable and strictly defined. Due to consumption of water to different purposes (municipal entrepreneurship, industry, agriculture), the quantity of water resources may be depleted both quantitatively and qualitatively. The local self-government, according to provisions of law has possibility and obligation to pursue a policy of providing ecological security for its citizens. Creation of civic consciousness among the citizens of communities is also an important factor for providing the ecological security.
EN
The Police perform one of the most important roles within the modern society from the view­point of providing and maintaining peace, order and security. In the Slovak Republic the Police have been in existence for a relatively short time, but legislation regulating their activities and structure has already undergone several reforms. This treatise contains information regarding the structure and tasks of the Police of the Slovak Republic, discusses the development of criminality within the Slovak Republic, and analyses the current social status of the Police.
EN
The aim of the article is to determine the strategic conditions of use of the armed forces of West Germany (the Bundeswehr) since its inception in 1955 until its unification with the National People’s Army (1989/1990). In the first part the features of the security environment in Germany have been shown and the main political, military and economic threats identified. As the result of the presented strategic analysis of the state environment as well as the parallel description of the set of values, interests and political goals in the security field, the conceptions of using the Bundeswehr as the army of the national state and a member of the NATO have been characterized.
EN
The police forces are an indispensable element in upholding security and public order in a state, both on daily bases and in states of emergency. The evolution of the Polish police forces begins in 1918 with restoration of the country’s sovereignty after 123 years of partitions. Since that time the organisational structure, functioning and the scope of tasks performed by the Police have evolved and developed due to social, political and economical changes in order to keep up with constantly changing reality and to improve efficiency of operations performed with respect to maintaining security and public order.
EN
Terrorism is, undoubtedly, a threat to Poland’s security, which is why the state needs to un­dertake actions with regard to many aspects of its anti-terrorist policy, beginning with legislation and ending with information and education. An important step in the strengthening of Poland’s anti-terrorist security was the adoption of the Anti-Terrorism Act of 10 June 2016. When applied in a responsible manner by the relevant agencies, the Act can be an effective tool in the fight against terrorism. Importantly, it can be used to launch pre-emptive actions effectively preventing terrorist activities within the territory of the Republic of Poland. However, it should be noted that this piece of legislation is to be used only to protect the citizens against terrorist attacks. It cannot, therefore, be used for purposes other than anti-terrorist actions.
EN
Security can be defined as the process of support of a satisfactory control by the sub-ject over harmful effects of the environment. In this aspect it is a political and social value of the same type as justice, democracy and freedom. Following the analysis of the existing conflicts in the world today, we conclude that the notion of security in its ne-oliberal interpretation has collapsed and it could be rejected and defended successfully only as a communitarian value.
EN
In the face of technological advances and, as a result, the increasing threat of the loss of growing amount of data collected by financial institutions, it seems necessary to employ effective security measures in the process of information management. The necessity to implement information security management systems (ISMS) by all institutions processing personal data is reflected in national legislation. The requirements resulting from contemporary hazards and legal provisions are concurrent with the requirements of the international standard ISO/IEC 27001, concerning the designing of the information security management system. This standard is most widely used by IT companies, however, the financial sector that collects and a processes huge amount of personal data, constitutes its significant recipient. Most of the companies certified by this standard come from the Eastern Asia and Pacific region, dominated by Japan, and from Europe, where the United Kingdom is the leader. In Poland the use of ISO/IEC 27001 is growing, yet the financial institutions that fulfill its requirements are still in a minority. It seems that from May 2018 on, national regulations imposing greater responsibility for the security of personal data on the institutions processing it, will bring the above-mentioned standard into focus.
EN
The reality of the end of the 20th century and the beginning of the 21st century, which on the one hand has eradicated the notion of violence from the ideational sphere, the sphere of constructing social-political entities, on the other hand, by eradicating violence as a tool of building new social orders, has kept and appropriated its modus, or the ways of organizing of the world, its time and space, associated with the conditions of violence. In the modern and postmodern world, violence turns out to be, not seldom, the basis of sanctioning and reinforcing the mechanisms of power. Symbolic violence – as Bourdieu wanted – the tool of influence by the dominant classes, or the violence resulting from communicative oppression – legitimization of common agreement, consensus, which, transformed into an idea – the basis of the construction of the modern world, are becoming a form of oppression, a form of imposing the only one, worked out as (seemingly) common, vision of this what is and can be a question of a conflict. The sources of such understood visions should be looked for, according to Jean-Luck Nancy, in a particular desire of man, desire, which, when started to be embodied, acquired total forms, and, finally, totalitarian ones: in the desire of transformation of the society into a “masterpiece”. The thing, which was supposed to be cemented by the realized desire (society as a masterpiece), was community, communion [communio], and, finally (as the embodiment of the postulated unity in its total form) communism.
EN
The article presents the characteristics of Prometheism as a political and ideological concept in the first few years after the end of World War II. The analysis was based on archival material gathered in the Archives of the Józef Piłsudski Institute in London (hereinafter: AIJP in London) in Team No. 148: Prometheus, main contents contained in the correspondence (documents) of the Polish Promethean Group in London, and also in the literature. The thesis was put forward that in the first years after the end of World War II in the Polish emigration environment, Prometheism still appeared as a political and ideological assumption and also a measure whose implementation could contribute to the internal weakening of the USSR. It can be said that the implementation of the Promethean idea was continued by the Polish emigration environment also after the end of World War II. The Polish Promethean Group in London was the center of the Promethean affairs, inspiring the work of other centers, as well as analyzing the signifi cance of various initiatives inscribed in the vision of post-war Prometeism.
EN
The events in Ukraine from the turn of 2014 and 2015 showed the complexity of contemporary armed conflicts. For this reason, the war in Donbas is the subject of many scientific studies. Gradually, however, little space was devoted to the analysis focusing on the activities of special formations in the framework of the aforementioned Eastern Ukrainian conflict, hence the authors’ insights focused on the anti-terrorist dimension of the Donbas war. The aim of the article was to assess the legitimacy of ATO recognition as an anti-terrorist operation. Particularly important in this dimension is the expatriation of the participation of Ukrainian special forces in the conducted combat operations.
EN
The civil war in Syria lasts over two years and its progressing escalation indicates that its quick solution is far from being feasible. It causes numerous repercussions not only for Syria itself – by war damage and erosion of the social fabric, but also for the Middle East, especially due to direct involvement of regional actors in the conflict. Particularly vulnerable is the Hashemite Kingdom of Jordan to which Syrian war constitutes a major security threat, probably the biggest one Jordan has to face in more than 40 years. The article presents the monarchy’s reaction towards the Syrian crisis and accordingly analyzes the security system of Jordan by indicating complexity and multidimensionality of threats inflicted by the war in Syria by applying the comprehensive security approach. Intensification of the military activity on ground, deteriorating humanitarian situation of the civilians and their massive influx into Jordan, a direct military threat and several dangers related to uncertain future of Syria and overload of Jordanian socio-economic system are indicated as key factors endangering the very existence and stability of the monarchy.
EN
Pakistan’s security policy is defined, articulated and implemented by the country’s army. This is a problem at many levels, mostly because the security policy history is full of shortsighted mistakes, delusional adventurism, and a narrowly defined concept of national interest. Pakistan’s reputation as an exporter and facilitator of terrorism is mostly in line with the Pakistani state’s historical actions. In order for Pakistan to function as a stable, democratic and constitutional state, it would have to change the way it imagines itself and its role in the world at large. But the Pakistani military is not going to hand its monopoly over security policy to anyone in the foreseeable future, because the military mind has proven itself to be largely incapable of doing this. This has serious implications for India.
EN
Security Sector Reform (SSR) is a concept and activity of the democratic transformation of defence, justice and rule of law systems. In accordance with the United Nations approach, SSR is critical to the consolidation of peace and stability, promoting poverty reduction, rule of law and good governance, extending legitimate state authority and preventing countries from relapsing into conflict. Over the last few decades, with many countries evolving and developing democratic processes, the concept has gained interest and popularity in international organisations and states heading towards a positive change. In the past, full SSR activities had been successfully conducted in central and east European post-communist countries. Nowadays, the process is carried out among African and Middle East countries, in some of them this being extremely challenging. A considerable degree of complexity characterizes the SSR processes. For this reason, a great deal of effort has been exerted with the aim of normalising rules and conditions for conducting SSR. The purpose of these activities is to ensure the widest possible effect of the use of scarce expert resources. SSR is a relatively new area of expertise suffering from a scarcity of literature presenting theory in conjunction with practice. During the research conducted it was assumed that, in spite of a wide array of actions to be executed within SSR in different states, they should be interconnected by a general model which would ensure the greatest effect. The aim of this essay is to present selected theoretical aspects of SSR, essential for increasing the effectiveness of the reforms conducted, illustrated with a practical example of the SSR process in Egypt.
EN
This article reviews the security issues for members of criminal process. The authors believe that the fight against organized crime increases the role of security threats, complicates the state of protection of rights of the individual in criminal proceedings. The article emphasizes that in recent years criminal procedure and criminological literature has paid some attention to problems of securing members of the criminal process. In particular, they considered issues related to the concept and types of security measures, procedural order of making decisions about providing such security, its guarantees, etc. In addition, some attention was also given to consideration of key terms associated with these problems such as: “security”, “danger”, “ensure”, “safety of carriers of evidentiary information”, “object of protection”, “subject of protection”, etc. However, the problem of tactics of ensuring safety of participants of the criminal procedure requires further development and implementation in practice of criminal justice bodies. The authors believe that ensuring security can go beyond the stages of criminal proceedings, protection of certain persons may not be limited to the period of a criminal investigation or trial of criminal cases.The authors present a legislative solution introduced in Ukraine at present. The article presents the results of the survey of investigators and prosecutors of MIA of Ukraine on certain tactics in choosing and applying measures ensuring the safety of participants in criminal proceedings. Tactical originality of elected safety measures was proven.In addition, attention was paid to the specifics of security measures to the participants of the process in the investigation of crimes committed by organized criminal groups.
EN
Security is a very important human need, which is addressed at all levels of local governance both by the central and local government bodies. As regards local government, the scope of tasks involving the provision of security on the local and regional levels has been adjusted to the capabilities (including financial) of individual local government units. Basic tasks are carried out at the municipal district level, supra-municipal tasks — at the county level, and regional tasks — at the provincial level, except that in the province there is a dualism of administration, meaning that administrative authority is shared between a central government-appointed governor, called the provincial governor, and an elected assembly called the regional council. In the case of the county, security-related tasks, as well as the competences relevant to this area, must be clearly defined in the act. At this level of public administration there is no presumption of competence for the benefit of the county authority. The county council performs the public tasks of a supra-municipal character set out by statute rather than the tasks not reserved for other entities. In order to ensure public order and safety of citizens, as well as fire and flood protection, the legislator authorises the county council to use technical means to record what is happening (CCTV cameras) in the area of public space, with the consent of the area manager or an entity holding a legal title to this area, or on the property and in civil structures constituting the property of the county or organisational units of the county, as well as in the area around such premises and structures, if it is necessary to ensure public order and the safety of citizens or provide fire and flood protection.
EN
The protection of Hungary’s external Schengen border is a priority which affects both the security of our country and the whole Schengen Area. Border surveillance is considered safe if it can prevent unlawful acts and proceed against offenders. The implementation of the tasks requires special staff and technical readiness. In the framework of the border protection of our country, it is the Police’s basic task, but in case a state of crisis resulting from mass migration is declared, the Hungarian Defence Forces take part in it. Border surveillance is a constant activity which aims to prevent illegal state border crossings; due to this, its efficiency cannot be measured exclusively based on numerical data. Border surveillance is also effective if it ensures the apprehension of people illegally crossing state borders and if it prevents them from accomplishing that; thus, the ‘physical’ presence itself contributes to the task execution in a manner meeting the requirements. Continuity plays a decisive role from the point of view of border surveillance. Border surveillance shall be considered a component. Thus, the border surveillance system consists of successive system elements which do not go without each other. The border surveillance system is built on border policing strategies, it can be operated based on leadership decisions which shall be in accordance with the border surveillance principles as well. Similarly to the border surveillance system elements, border surveillance principles are those rules which have constant influence/effect on border surveillance/in the field of border surveillance, the practical implementation of which ensures state border surveillance which meets the requirements/is reliable; moreover, it enables the targeted application of the forces and tools available. The operability of the system can only be granted if the principles apply jointly.
first rewind previous Page / 50 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.