Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 24

first rewind previous Page / 2 next fast forward last

Search results

Search:
in the keywords:  security system
help Sort By:

help Limit search:
first rewind previous Page / 2 next fast forward last
EN
Using qualitative methods of source analysis and tracing the process of scientific discourse, an attempt was made to answer the research question: What is the relevance of the system category for security sciences? The study provides arguments in favour of confirming the author’s hypothesis that the category of system constitutes one of the universes of security sciences in terms of research object as well as methodology. In addition, the category is important for defining the identity of this scientific discipline.
EN
The aim of the article is to characterize the safety system as a set of complementary elements that form a coherent whole, capable of functioning in such a way as to be able to provide a sufficiently high level of security of citizens and the state. The author of the publication presents and analyzes the current security system in the municipality of Krynica-Zdroj. The publication aims to characterize a coherent whole of system components and describe its advantages and disadvantages.
EN
The publication was devoted to issues of safety systems of Poland and Slovakia. Article aims to discuss and description of the major elements, principles of operation of safety systems and identify the differences and similarities between the various systems. Article summary are the conclusions and observations about prescriptions for common actions in the field to ensure a high level of security.
EN
The contemporary man should recognize the safe being of states and the international peace (as well as one’s freedom) for axiological values, and at the same time he should have a sense of direction about ethnic and religious possible conflicts, which constitute the real danger of safe existence of residents of the European Union (and world’s). Peculiarly today the area of the Western Balkans worries because it is the most serious conflictual territory in Europe. Relatively numerous are also conflicts with the participation of the countries which belong to the Commonwealths of Independent States. therefore one should notice meaning of the European Union in taking many responsible initiatives for safe existence of her citizens.
EN
Objectives This paper sets out to identify the key elements of Polish social structure that are critical to the manpower of the Polish Armed Forces. So far, there has been little discussion, in either the literature or ongoing public polemics, regarding the dependence of the Armed Forces on the shape of the social structure in the context of ensuring state security. Methods This work is predominantly based on the analysis of available literature: scientific articles, legal acts and the results from the survey research conducted by specialised institutions, in particular, Polish Central Statistical Office. Results On the basis of the presented analysis, it appears that it is the current Polish social structure that constitutes the major problem in the context of the insufficient personnel numbers in the Polish Armed Forces. The present state is below the expectations and needs of the Polish Army, mainly due to the lack of young people with special technical education. The earnings in the private sector by far outweigh the remuneration levels offered in the military, which effectively deters young people from undertaking service for the benefit of state security.On the basis of the presented analysis, it appears that it is the current Polish social structure that constitutes the major problem in the context of the insufficient personnel numbers in the Polish Armed Forces. The present state is below the expectations and needs of the Polish Army, mainly due to the lack of young people with special technical education. The earnings in the private sector by far outweigh the remuneration levels offered in the military, which effectively deters young people from undertaking service for the benefit of state security. Conclusions The research material presented in this work reflects on the current state and the aggravation of the important social problem – deficiency of manpower in the Polish Armed Forces. It has been shown that apart from the financial background and the quantities of the personnel appointed to military service, it is its quality – in the aspect of special technical education – that is yet another crucial condition.The research material presented in this work reflects on the current state and the aggravation of the important social problem – deficiency of manpower in the Polish Armed Forces. It has been shown that apart from the financial background and the quantities of the personnel appointed to military service, it is its quality – in the aspect of special technical education – that is yet another crucial condition.
EN
Th e author presents the results of research carried out in property and personal security companies. Th e research was carried out both on the basis of a theoretical method based on qualitative analysis of legal acts, critical analysis of scientifi c literature as well as the empirical method consisting of using research tools such as questionnaires and expert interviews. Th e research came up with a positive answer to the question: Is it possible to increase the participation of property and personal security companies in ensuring public safety in Poland? Th e author believes that it is necessary to create a symbiotic formal and legal system that determines the use of human resources in broadly considered state security and in the process of implementing the objectives of national security policy by all levels of government either, state, local or private. Th e author notes that enhancing the effi ciency of security entities is possible, inter alia, through continuous technological development and the exchange of knowledge between national security entities and the authorities responsible for managing security through regulation. According to him, the exchange of knowledge, experience and information between the public and private sectors, and the implementation of best practices in the fi eld of security for day-to-day practice, improves the eff ectiveness of security policy. One such preventive measure is the creation of a formal and legal basis for conducting a security policy based on an integrated system of exploitation of experience, in which all entities responsible for the security of the Republic of Poland participate. Th is publication indicates the direction of action that the author believes should be taken to make better use of the private security sector in the state security system.
EN
The increasing integrity of the European Union member states is more and more regarding the security and civil protection aspects. On the other hand the priority in responsibility for the safety and security is still in the domain of the sovereign states. It means that the individual states of the EU are responsible for designing and managing their own security and civil protection systems. However, the integration processes within the EU trigger a significant need for an increase of common understanding of the individual member states’ philosophies, approaches and systems utilized in the domain of security and civil protection. Only then if we understand how the others work, we are able to assist them in a crisis or disaster. Therefore, it is highly important to share and understand each other’s systems between member states. The article presents the Dutch approach to national risk assessment as well as organizational aspects of internal security system applied in the Netherlands. It also suggest the future challenges which are at the near horizon of the system development.
EN
In the article, the author describes the driving force behind deliberate informational activities. He pays particular attention to the current security situation in the information dimension. Existing systems in the area of security management should be resistant to disinformation and informational operations. There is no room for the freedom of interpretation of the information acquired since every decision results in the actions of people, therefore it requires accuracy and caution. This issue takes on a special dimension when it concerns the state, because this environment contains specific features such as a changing environment, time scarcity and often verified information. Only efficient management of information processes can have a positive impact on the development and elimination of state threats. Actions involving psychological or informational influence may also be carried out by other entities, state-owned, non-state and private, including those located on their own territory. First and foremost, our security depends on ourselves and by taking it into special consideration we also increase the state’s resilience to internal and external threats.
EN
Objectives The authors determined the following aim of this article: identifying threats generated by air terrorism as well as characterizing the forms, methods, and manners. Methods Authors used theoretical methods of research. The article presents research findings with regard to the organization and operation of security systems in civil air transport. At the article, the authors focused on air terrorism and security system in the airport. Results The presented results of the study are not limited only to the theoretical aspects of terrorism. Authors also characterize organizational and technical undertakings that have already been implemented into security systems in aviation by national and intergovernmental institutions, responsible for its protection. Conclusions Regardless of the form of air terrorism and applied means, an important issue is a fact that every attempt to intercept an aerial asset is attractive for terrorists, due to the fact that each time it causes not only damage or destruction of the machine itself and the death of passengers, but it is also a real threat to airport infrastructure, installations and urban residents. In addition, the events are accompanied by high-profile media coverage.
10
Publication available in full text mode
Content available

Bezpieczeństwo socjalne

70%
EN
The aim of the article is to present the importance of social security and to show the role it plays in shaping the national security of the Republic of Poland. The publication also shows the social and psychosocial risks posed by modern pathologies. This also addresses the threat posed by demographic problems. The data of the Central Statistical Office and materials published in this matter were analyzed. Social threats and their impact on state security have been shown. In addition, the most important challenges facing Poland are discussed in order to ensure the safe existence of citizens. The author points out the possible consequences and risk of the threats presented here for the country
PL
Celem artykułu jest przedstawienie znaczenia bezpieczeństwa społecznego oraz pokazanie roli, jaką odgrywa ono w kształtowaniu bezpieczeństwa narodowego Rzeczypospolitej Polskiej. Publikacja pokazuje również zagrożenia społeczne i psychospołeczne wywoływane przez współczesne patologie. Omówiono tu także zagrożenie powstałe w wyniku problemów demograficznych. Przeanalizowano dane Głównego Urzędu Statystycznego i materiały opublikowane w tej sprawie. Ukazano zagrożenia społeczne i ich wpływ na bezpieczeństwo państwa. Ponadto omówiono najważ- niejsze wyzwania stojące przed Polską w celu zapewnienia bezpiecznej egzystencji obywateli. Autor wskazuje na możliwe konsekwencje i ryzyko przedstawionych tu zagrożeń dla kraju.
EN
Currently, the security problem has a broader meaning than ever. There is a social demand for development of an independent multi-disciplinary scientific field – the theory of security. This thesis presents the essence of multi-disciplinary approach to understanding problems and factors basic to modern philosophy of security theory: basic theory of security; theory of dualism in security management; theory of social systems security; ideology of security centrism; security control. Security Control is viewed as a dual process of security provision to social systems: protection system and counteraction system (purposeful benefit management) against adverse factors; and hazards build up – risk, challenge, threat – to the existence and favorable development of security of objects: individuals, society, state, international community and human civilization.
EN
The public sector across Europe and elsewhere was affected by the economic crisis which fully unfolded in 2008. Considerable attention has been paid in the literature to the impacts of related budgetary cuts on social welfare, while some other areas remain largely under-researched. One of such areas is the so-called civil security, where no such endeavour has been attempted so far. In order to fill this gap, the paper examines the civil security systems of Central European countries (Czech Republic, Slovakia, Poland and Hungary), employing a qualitative comparative analysis. Taking on the systems perspective, the article inquires how the stress posed by the economic crisis affected the civil security systems - their structure and financing. The paper builds on the findings from a 7th FP project, “ANVIL”, within which data on civil protection and disaster management systems were collected.
PL
W artykule została podjęta próba przedstawienia i przeanalizowania podstaw praw-nych systemu bezpieczeństwa w Bośni i Hercegowinie. Ukazane zostały zarówno jego geneza, jak i późniejsza ewolucja, przeważnie dokonująca się pod bezpośrednią presją przedstawicieli wspólnoty międzynarodowej. W treści można zapoznać się z rolą, jaką odgrywają poszczególne organy władzy państwowej, ze szczególnym uwzględnieniem 3-osobowego Prezydium Bośni i Hercegowiny, Rady Ministrów oraz parlamentu. Ponadto opisane zostały podstawy prawne funkcjonowania wojska oraz wybranych służb policyjnych.
EN
The article is an attempt to present and analyze the legal basis of the security system in Bosnia and Herzegovina. There are presented both its origin and subsequent evolution, which was mostly shaped by a direct pressure from the representatives of the interna-tional community. The article describes the roles played by the various organs of state power, with particular emphasis on the three-person Presidency of Bosnia and Herzegovina, the Council of Ministers and the Parliament. Moreover, there is a description of the legal framework for functioning of the military and selected police forces
PL
Artykuł ten opisuje sposób działania, zastosowanie oraz elementy konfiguracji programu Logcheck, który będzie pomocny administratorowi sieci w bieżącym monitorowaniu logów systemowych
EN
This article describes a program Logcheck. Briefly presented the use, installation and the configuration elements. It is a helpful tool for network administrators to assist in the monitoring system logs
UK
Поява нових видів злочинів у сфері використання електронно-обчислювальних машин (комп’ютерів), систем та комп’ютерних мереж і мереж електрозв’язку робить проблему захисту критично важливої інформаційної інфраструктури актуальною, а розвиток інформаційних технологій і систем та удосконалення комунікаційних технологій переносить ці проблеми з площини технічної у площину юридичну. Критично важлива інформаційна інфраструктура виступає як сукупність територіально розподілених державних і корпоративних інформаційних систем, мереж зв’язку, засобів комутації та управління інформаційними потоками, організаційних структур, має нормативно-правовий механізм регулювання, що забезпечує їх ефективне функціонування. Особливе місце критично важливої інформаційної інфраструктури зумовлює їх ключову роль в забезпеченні нормального функціонування практично всіх сфер життєдіяльності суспільства і держави – політичної, економічної, соціальної, екологічної, військової та інформаційної. Зміст функціонування системи забезпечення безпеки критично важливої інформаційної інфраструктури включає формування системи забезпечення безпеки і управління системою забезпечення безпеки. Метою системи забезпечення безпеки об’єктів критично важливої інформаційної інфраструктури є забезпечення належного функціонування відповідних об’єктів, в тому числі, в разі реалізації загроз безпеці. При забезпеченні безпеки об’єктів критично важливої інформаційної інфраструктури повинен досягатися баланс інтересів держави та суспільства і інтересів власників об’єктів. У статті з позиції методології системного аналізу розглянуто правові аспекти формування системи безпеки об’єктів критично важливої інформаційної інфраструктури. На основі аналізу охарактеризовано зміст функціонування системи забезпечення безпеки критично важливої інформаційної інфраструктури, складові системи забезпечення безпеки, необхідність розробки проекту Закону України «Про об’єкти критично важливої інформаційної інфраструктури» та відомчих нормативних актів щодо адміністративних процедур у сфері інформаційної безпеки.
EN
The emergence of the new types of crimes in the field of using electronic counting machines (computers), computer systems and networks and telecommunication networks makes the problem of protecting critically important information in-frastructure relevant, and the development of information technologies and systems and the improvement of communication technologies, transfers these problems from the technical plane to the legal one. Critical information infrastructure acts as a set of territorially distributed state and corporate information systems, communication networks, switching facilities and information flow management, organizational structures and has a regulatory and legal regulation mechanism that ensures their effective functioning. A special place of critically important information infrastructure determines their key role in ensuring the normal functioning of practically all spheres of life of society and the state - political, economic, social, environmental, military and informational. The content of the security system operation for a critical information infrastructure includes the formation and management of the security system. The purpose of the security system for objects of critical information infrastructure is to ensure the proper functioning of the relevant facilities, including the cases of real threats to security system. When ensuring the security of objects of critical information infrastructure, the balance of interests of the state and society and the interests of the owners of objects must be achieved. In the article from the point of methodology of system analysis, the legal aspects of forming the security system of objects of critical information infrastructure are considered. On the basis of the analysis, the content of the security system of critical information infrastructure, the content of the security system, the necessity of elaboration of the draft law of Ukraine “On the objects of critical information infrastructure” and departmental normative acts on administrative procedures in the field of information security have been characterized.
EN
In 2008 civil aviation was used by over 2 271 m. passengers. This huge number of travelers reflects the need for fast, safe and comfortable 21st-century transport systems at the beginning of the 21st century. In the paper the author discusses the turning points in the history of civil aviation security. He shows terrorist acts which influenced changes in security regulations and briefly discusses the introduction of bills which were a response to this terrorist activity. The author attempts to show the direction of evolution of those regulations and precautions in civil aviation. He focuses particularly on the European Union legislation, which after the year 2001 has become the leading force in the civil aviation security regulatory environment. It is European legislation that has defined the new standards for the organization of the civil aviation system.
PL
W roku 2008 lotnictwo cywilne na świecie obsłużyło ponad 2 271 mln pasażerów. Ta ogromna liczba podróżnych odzwierciedla, jaką wagę przywiązujemy do tego, by na początku XXI przemieszczać się szybko, bezpiecznie i komfortowo. W artykule tym autor postara się przybliżyć punkty zwrotne w historii bezpieczeństwa lotnictwa cywilnego. Ukazane zostaną akty terrorystyczne, które wpłynęły za zmianę przepisów bezpieczeństwa, oraz, w wielkim skrócie, regulacje wprowadzane do dokumentów, będące swoistą odpowiedzią na działania terrorystów. W celu zachowania chronologii, bezpieczeństwo lotnictwa cywilnego rozpatrywane jest w dwóch przedziałach czasowych. Okres pierwszy, rozpoczęty w roku 1968 działaniami terrorystów palestyńskich, trwający do zamachu agentów libijskich na samolot Pan Am nad Lockerbie w 1988. Okres drugi, który symbolicznie otwierają ataki z 11 września 2001 roku, trwa do dnia dzisiejszego. Autor stara się wykazać w tekście kierunki ewolucji przepisów oraz zabezpieczeń w lotnictwie cywilnym w tym okresie. We fragmencie artykułu dotyczącym drugiego z omawianych okresów, szczególna waga została przyłożona do osiągnięć ustawodawstwa Unii Europejskiej, która po 2001 roku przejęła światowe przewodnictwo w dziedzinie przepisów bezpieczeństwa lotnictwa cywilnego. To ustawodawstwo europejskie wyznacza, w ostatnim czasie, nowe standardy organizacji tego systemu. Niewielka objętość tekstu uniemożliwia pełne i kompleksowe omówienie podjętej tematyki, dlatego autor skupił się na aspekcie problemu terroryzmu lotniczego, czy też szerzej terroryzmu wobec lotnictwa cywilnego. Autor podjął także próbę ukazania wpływu rozwoju systemu bezpieczeństwa lotnictwa cywilnego na zwykłego pasażera, który w porcie lotniczym i na pokładzie samolotu musi dostosować swoje postępowanie do wielu drobiazgowych przepisów
PL
The article is devoted to planning and organizing critical infrastructure protection. The planning method was indicated there, and the layout of the critical infrastructure protection plan was presented. The most important thing is to protect critical infrastructure components that citizens use on a daily basis. So I am talking in the article about energy supply systems, energy resources and fuels, food and water supply system. And above all about financial systems, healthcare and ICT.
EN
Artykuł poświęcony jest planowaniu i organizacji ochrony infrastruktury krytycznej. Wskazano w nim sposób planowania oraz przedstawiono układ planu ochrony infrastruktury krytycznej. Najważniejszą rzeczą jest ochrona krytycznych elementów infrastruktury, z których obywatele korzystają na co dzień. Mowa więc w artykule o systemach zaopatrzenia w energię, zasobach energetycznych i paliwach, systemie zaopatrzenia w żywność i wodę. A przede wszystkim o systemach finansowych, opiece zdrowotnej i ICT.
EN
Main prerequisite for any state to maintain its sovereignty and territorial integrity is defined by its ability to maintain its security and defense. By doing so, states define through their strategic security documents their security environment, security interests, security and in the end their security and defense policies. Same applies for Slovak Republic (SVK). Within its security system, developed in order to implement security and defense policies, Armed forces of the Slovak Republic (AF SVK) play crucial role. AF SVK significantly contributes to the process of maintaining peace, security, sovereignty, territorial integrity and fulfillment of international obligations by which Slovak republic is committed. Within the need to maintain auto reproductive function of the AF SVK, Ministry of Defense of the Slovak Republic prepared strategic document assessing development of capabilities of AF SVK and requirements for future development – The White Book. Government of SVK approved this document on 26 of June 2013 under number 326/2013. As such it created basic environment for future development of AS SVK in order to boost their capabilities within security system of SVK. Nowadays actualization of the White Book is considered, which will adjust requirements for development within AF SVK after changes to security environment of SVK established in 2013.
PL
W niniejszym artykule chciałabym zwrócić uwagę na tradycję przysposobienia obronnego ja-ko przedmiotu w edukacji szkolnej oraz rolę, jaką może ono odegrać w budowaniu współczesnego systemu bezpieczeństwa w Polsce w przypadku, gdyby powrócił do siatki przedmiotów w szko-łach średnich.
EN
In this article, I would like to draw the attention to the tradition of defensive development as a subject in school education and the role that it can play in building a modern security system in Poland in the event that it returns to the subject network in upper secondary schools.
EN
Given the fact that major sporting events such as the Olympic Games attract attention all over the world, the aspect of their security has become even more important, especially after the terrorist attacks of September 11, 2001. Organizers of this type of mass sports event treat the issue of safety as top priority. The paper examines the empirical data from scientific publications, press releases and formal government documents that pertain to Russia's preparation to properly secure the 2014 Sochi Winter Olympics in terms of security. The aim of this article was to identify the threats to the Winter Olympics in Sochi and to characterize the security system organized by Russia against this background. The conducted research confirmed that the greatest threat in Russia was the high activity of national liberation groups, fighters and terrorists from the Sochi area, which clearly intensified in the period preceding the Olympics. In addition, the security system created by Russia involved many different state bodies, including agencies, police and law enforcement services, and the army. Based on the research, it can be concluded that the security system created in Sochi may be a good example for other countries that will try to organize the Olympic Games in the future.
first rewind previous Page / 2 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.