Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Years help
Authors help

Results found: 30

first rewind previous Page / 2 next fast forward last

Search results

Search:
in the keywords:  social engineering
help Sort By:

help Limit search:
first rewind previous Page / 2 next fast forward last
EN
The main topic of the paper is political consulting and the significance of politicalconsultants in political organizations. For obvious reasons the paper also addresses the issues of academic knowledge being implemented in practice. The author undertakes to analyze how the notion of political consulting is nderstood by indicating its relation to such notions as social engineering, communication consulting, personal consulting, thematic consulting and election campaigns.
PL
Artykuł traktuje przede wszystkim o doradztwie (konsultingu) politycznym i znaczeniu konsultantów politycznych w organizacji politycznej. Z oczywistych względów dotyka też zagadnień związanych z praktycznym zastosowaniem wiedzy naukowej. Autor dokonuje w nim próby analizy rozumienia pojęcia doradztwa politycznego poprzez wskazanie jego zależności z takimi terminami jak socjotechnika, doradztwo komunikacyjne, doradztwo osobiste, doradztwo merytoryczne i kampania wyborcza.
EN
The main objective of this paper is to present a reinterpretation of Karl Popper’s position on the methodological and sociopolitical views of Karl Marx. In spite of the weaknesses of the Popper’s critique of the achievements of Marx, special attention will be focused on the explanation of contradictions within the epistemological position of the former. This will be of great importance in the context of the analysis of Marx’s historicism, and will also help undermine the coherence view of the founder of falsifi cationism. Additionally, this newly developed perspective will serve as a starting point for evaluation of Marx’s intellectual output, as well as conceptions that refer to him.
EN
The main contention of this article is the following: sociology, like all the modern sciences, was born out of philosophy. But, ungratefully enough and perhaps because of a deepseated inferiority complex vis-à-vis the older well established sciences, sociology tends to forget or at least to blurr its philosophical foundation. Thus it turns out to be “social engineering”. The sociologist becomes a technical expert, rather indifferent to a synoptic or global view of society, and ready to offer his or her services to the best offer in the open market. Social theory is reduced to “model building” according to the changing needs of the economic agencies, from government bodies to private entrepreneurs. Contrary to social theory, a model is a purely intellectual arbitrary construct and, although conditioned by a basic congruity among its different parts, it is not historically rooted but essentially a “fictio mentis”. In this way sociology loses inevitably its problem awareness and it runs the risk of “quantifying the qualitative”, that is to say to accumulate bits of knowledge without knowing for what purpose.
EN
The article focuses on structural changes in the Bratislava population in the first half of the 20th century. Particularly in the decade of 1939–1948, there was an intense social engineering, i.e. a targeted effort to adjust both the ethnic and social city structures to the contemporary regime needs. The Czechs were the first target of these efforts (1939), followed by the Jewish minority (deportations in 1942); after the liberation, both Hungarian and German inhabitants fell victims to such activities, and after February 1948, this process also affected some social strata of the population. (A mass emigration after August 1968 was due to different reasons.) When analyzing the social engineering, the author has used particularly memories of the contemporary witnesses supported by the archive and other sources.
EN
An issue of interest is the process of personalization of politics. I am going to examine it from the point of view of social engineering. There is no doubt that we can find many things in common between social engineering and personalization. Personalization is a broader syndrome of traits that can be reduced to a change in the nature of leadership in democracy, especially in campaign. As one might expect cause of this state of affairs, on the one hand it is still a growing number of those who serve as prime minister on the basis of “presidential style of administration”, on the other hand – the actual (institutional) changes in parliamentary systems.
EN
The objective of this article is to present a critical analysis of selected elements of Nazi legacy in the Federal Republic of Germany (Deutsche Bundesrepublik, BRD). The remnants of the Nazi system have been tolerated, and even sheltered by the authorities of West Germany in almost all aspects of life. A question arises, then, about the effectiveness of the denazification after the Second World War and about a change in mentality in German society, as it should be noted that some elements of Nazi legacy were abandoned only in the 21st century, and therefore the Federal Republic of Germany has not managed to fully make reparations to the victims of Nazism. This article also discusses the fact that in a post-totalitarian state it is extremely difficult to find ‘pristine’ biographies, considering the number of former members of NSDAP who filled important offices in the BRD.
EN
The target of the analysis of this thesis is the social engineering’ techniques and methods used by politicians during the local election campaign in the Malopolska voi-vodeship in 2014. The article includes selected examples of various election activities, which could be observed in different cities throughout the region. The examination of the thesis embodied those practices, the main purpose of which is to gain trust and support from the electorate, as well as those activities which have unethical and unfair character. Moreover, the media’s participation in the campaign and their influence on the electorate has been analyzed. The article includes the answer to the question: what influence had involvement of social engineering techniques during the election campaign on local communities and candidates?
8
Content available remote

Socjotechnika lęku – zastosowanie w XXI wieku

84%
EN
Human control the masses by means of shaping the level of anxiety is known for thousands of years. The change over the last anxiety promoters decades does not mean a departure from the fundamental principle of social engineering speaking, that controlled system maintained in the state boost general anxiety is more susceptible to influence. Today, the mass media, which function in the conditions of globalization is part of the media logic, that the mechanism of use more efficiently than ever before. At the same time contribute one – probably only partly consciously – characteristic for social engineering the process of the reproduction of the social order, which targets are determined by the interests of the social system. The main objective of the considerations presented in the article is to indicate the timeliness of the application of the intensifying anxiety as a mechanism to subjugate the people. The author tries to answer two questions. First, why in spite of the development of democratic forms of governance be an effective way to influence and, second, why the modern mass media so eager to participate in these activities? The conclusions from the analysis indicate that the social engineering principle, according to which the system controlled maintained able to stimulate general anxiety is more vulnerable to the impact of the gains today, a new dimension because of the inconsistencies of the purpose of the reproduction of social order. This increases even more the role of the mass media, that the mechanism of intensifying anxiety use driven by their own interests. The article has a theoretical nature, is based on a critical analysis of social engineering and praxeology publications and illustrations cases of the application of the social engineering tactics of fear in the 21st century.
PL
Sterowanie ludzkimi masami za pomocą kształtowania poziomu lęku znane jest od tysięcy lat. Zmiana stymulatorów lęku w ciągu ostatnich dekad nie oznacza odejścia od podstawowej zasady socjotechnicznej mówiącej, iż system sterowany utrzymywany w stanie pobudzenia lękowego jest bardziej podatny na wpływ. Współcześnie, środki masowego przekazu, których funkcjonowanie w warunkach globalizacji wpisuje się w tzw. logikę medialną, potrafią ów mechanizm wykorzystywać sprawniej, niż kiedykolwiek. Jednocześnie współtworzą one – zapewne tylko po części świadomie – charakterystyczny dla socjotechniki proces reprodukcji porządku społecznego, którego cele zdeterminowane są interesami systemu społecznego.
EN
The withdrawal of US troops from Afghanistan is a direct consequence of structural changes in the polarity of the international system. Following the end of the Cold War, the US emerged as the dominant country in the system, making it relatively easy to pursue a foreign policy based on liberal principles, where state-building and social engineering were among the main principles. While some scholars consider the US withdrawal from Afghanistan a strategic failure of its foreign policy, this paper argues that such action was necessary due to fundamental changes in the constellation of forces in the international system. The main reason for this withdrawal is the economic growth of China and its power projection in Asia and other regions of the world. Therefore, similar US actions can be anticipated in the future. This paper adopts a structural realist approach as its primary theoretical framework and Afghanistan is used as the case study.
EN
Looming crisis, public discontent with privatization, and widening inequalities are factors which have historically set the electorate in favour of social democratic welfare policies. Today, however, these concerns rather appear to support new right-wing populist countermovements, even in the traditionally progressive Nordic countries. This article asks why there is not more explicit support of progressive policies, despite the presence of socio-economic factors which would normally favour such a policy shift, at least not just yet. In response to this query, the article first analyses the comparisons between the present crisis and the crisis of the 1930s with regard to alleged political inertia. It then reinterprets the contemporary political consequences of crisis by revisiting three classical social theorists who took pains at analysing the political responses to the economic crisis of the 1930s: Karl Popper, Gunnar Myrdal, and Karl Polanyi. On the basis of this revisitation of these three classics, the article argues that the combined effects of distrust in politics and the persistence of admittedly rolled-back welfare systems mutes the progressive reform potential of the present crisis.
|
2011
|
vol. 176
|
issue 4
469-492
EN
We propose new articulation of the differences between the natural sciences and the social sciences. Drawing on science and technology studies (STS) we reconstruct the organizational and cognitive mechanisms of a certain type of natural sciences, one which is referred as laboratory science or highconsensus, rapid discovery sciences. The key features of those sciences crucial for their cognitive and engineering success include: • experimental reproduction of the studied phenomena in the laboratory; • laboratory interventions and modifications of the phenomena thus evoked and broadly understood scientific ‘tinkering’; • attempts to transfer the artificial arrangements developed in laboratory to non-laboratory settings. The STS perspective not only helps us to explain the differences in status and effectiveness between the social sciences and the natural sciences. It also allows us to formulate certain general recommendations for the development of the social sciences. We attempt to show that sociologists are able to implement engineering projects in certain domains of social reality, projects involving the creation of closed sociotechnical systems-analogous to the ones which are generated by natural laboratory sciences. We refer to those systems as ‘social machines’ and the proposed research methodology is called ‘syntheticmethodology
EN
Humiliating situations can occur both at the macro level (when dealing with specific social groups) and the micro level (when they appear in the relations of the individual with social environment). Humiliation always brings negative consequences, and is a source of suffering and shame. It also robs a man of dignity and violates his internal integrity. Ruthlessness of dehumanization mechanisms is present in thinking and action of a person who uses humiliation as a tool of influence and the way of achieving his own benefits. The victim of dependency and social inequality may take different strategies to cope with humiliation. This text is an attempt to search for the answers to the question about the causes and consequences of humiliation in interpersonal relations, both in a social ad individual context.
EN
This article presented mechanism and instruments of contemporary psychological warfare. Phenomenon of propaganda will be discussed and also the role of its main carrier: mass media. In the further part of the work cyberspace will be presented as other large area of contest for influence on societies. Manipulation of social consciousness, which is conducted by state regimes and other participators of international relations, is permanent element of contemporary international environment. That is the reason why it is so important to know mechanism of it.
EN
The article analyses the objectives formulated by Boleslaw Bierut in selected speeches delivered in 1952. The speeches, released on vinyl records by Muza, were a form of political training. Their main aim was to preserve and strengthen various dependency relationships and the main principles of socialist ideology. Through those speeches, the authorities hoped to instil the conviction that the party was a powerful and omnipotent organization and that the 6-year plan was a civic duty. The speeches also aimed to smooth out the contradictions of the political system. Vinyl recordings of Bierut's speeches promoted the use of vague language and debating style in public life. As a result, the public sphere became distinctly separate from the listeners' private reality. The article relies on selected theories of social influence and verbal communication characteristic of a totalitarian regime.
15
60%
PL
W ramach wprowadzanego Systemu Zaufania Społecznego blisko półtora miliarda Chińczyków ma stać się przedmiotem bieżącej oceny mechanizmów algorytmicznych. Skala, totalność i dynamika planowanego przedsięwzięcia jest nieporównywalna z jakimkolwiek projektem socjotechnicznym w historii ludzkości. W tym kontekście, za podstawowy cel niniejszego opracowania postawiono scharakteryzowanie socjotechnicznych możliwości, jakie dla władz chińskich niosą wprowadzane mechanizmy nadzoru opartego na technologiach big data. Ich opis i dogłębna analiza pod względem użyteczności socjotechnicznej pozwolą w końcowej części artykułu udzielić odpowiedzi na pytanie: czy dla szeroko rozumianego chińskiego Systemu Zaufania Społecznego możemy dołączyć – współcześnie coraz bardziej modną – etykietkę smart?
EN
Nearly 1.5 billion Chinese people are going to become the object of current voting mechanism, offered by algorithmic engine within the Social Credit System. The scale, as well as level of totality and dynamism of planned project outweigh anything we've come across the history of humankind. In that context the main goal of this paper is to characterise socio-technical possibilities offered to Chinese authorities by the Social Credit System’s big data and surveillance mechanisms. Their in-depth decription and analysis will provide the answer to the following question: whether it is possible for broadly defined Chinese Social Credit System to bound it with – eventually gaining popularity – label „smart”?
PL
Celem niniejszego artykułu jest przedstawienie krytycznej analizy wybranych pozostałości nazizmu w Republice Federalnej Niemiec (RFN). Pozostałości nazistowskiego systemu przez lata były tolerowane, a nawet chronione przez aparat państwowy RFN w niemal wszystkich dziedzinach życia. Zachodzi zatem pytanie o skuteczność przeprowadzonej po II wojnie światowej denazyfikacji i zmiany mentalności znacznej części niemieckiego społeczeństwa. Należy bowiem zauważyć, że z niektórymi pozostałościami hitlerowskiego systemu Republika Federalna Niemiec pożegnała się dopiero w XXI wieku i tym samym nie zdołała do chwili obecnej zadośćuczynić wszystkim jego ofiarom. Autorzy ukażą również fakt, że w posttotalitarnym państwie bardzo trudno jest znaleźć tak zwane „nieskazitelne życiorysy” biorąc pod uwagę ilość byłych członków NSDAP, którzy przez lata sprawowali wysokie urzędy w RFN.
EN
The aim of this article is to present a critical analysis of selected remnants of Nazism in the Federal Republic of Germany (FRG). For years, the remains of the Nazi system have been tolerated and even protected by the German state apparatus in almost all areas of life. This raises the question of the effectiveness of the post-World War II denazification and mentality of a large part of German society. It should be noted that with certain residues The Federal Republic of Germany did not bid farewell to the Nazi system until the 21st century and thus has not been able to compensate all its victims to this day. The authors will also show the fact that it is very difficult to find so-called “impeccable CVs” in a post-totalitarian country, taking into account the number of former NSDAP members who have held high offices in Germany for years.
EN
The article describes the key issues regarding phishing and related social engineering attacks. Based on a theoretical introduction and practical examples from around the world, the most important information about this cyber threat is summarized. The aim of the study is to depict phishing as a serious threat to non-governmental organizations and to suggest possible preventive measures to protect against attacks. The information about specific characteristics of such attacks, presented in the text, may be helpful in identifying them. Apart from that, the key elements of defense against these types of attacks, as well as good practices that help to increase the cyber security of the individual are described. The presented models take into consideration both organizational and systemic solutions that can stop the attack or limit its effects.
PL
W artykule opisano kluczowe zagadnienia dotyczące phishingu i pokrewnych ataków socjotechnicznych. Na podstawie teoretycznego wprowadzenia i praktycznych przykładów ze świata zestawiono najważniejsze informacje na temat tego zagrożenia cybernetycznego. Celem opracowania jest przedstawienie phishingu jako poważnego zagrożenia dla organizacji pozarządowych i zasugerowanie możliwych środków zapobiegawczych pozwalających uchronić się przed atakami. Zawarte w tekście informacje mają także ułatwić rozpoznawanie takich ataków na podstawie określonych charakterystyk. Ujęto również kluczowe elementy obrony przed tego typu atakami i dobre praktyki pomagające zwiększyć cyberbezpieczeństwo jednostki. Zaprezentowane modele uwzględniają rozwiązania zarówno organizacyjne, jak i systemowe, które mogą pozwolić na zatrzymanie ataku lub ograniczenie jego skutków.
PL
Opracowanie dotyczy genezy, teorii oraz zastosowania koncepcji zarządzania refleksyjnego. Określenie to oznacza proces polegający na przekazaniu przeciwnikowi w sposób dla niego niedostrzegalny przesłanek służących jako logiczne podstawy do podejmowania decyzji skutkujących zachowaniem korzystnym dla inicjatora. Według autora artykułu rosyjskie operacje informacyjno-psychologiczne w znacznej części bazują na paradygmacie zarządzania refleksyjnego przez pośrednie sterowanie przeciwnikiem wywierane działaniem na jego świadomość i wolę, którego twórcą był rosyjski uczony Władimir Lefewr. Termin z a r z ą d z a n i e r e f l e k s y j n e (sterowanie obrazami świata, człowieka itd.) odniósł do szeroko rozumianych podstępnych i iluzorycznych działań: prowokacji, intrygi, kamuflażu itp. W ciągu 40 lat teoria Władimira Lefewra była ciągle doskonalona, stając się obiektem badań teoretyków walki informacyjnej wywodzących się z armii lub cywilnych służb specjalnych. We współczesnej Rosji teoria zarządzania refleksyjnego znajduje także szerokie zastosowanie nie tylko w kwestiach związanych z konfliktami i bezpieczeństwem informacyjnym, lecz także w wielu naukach społecznych.
EN
The article concerns the origins, theory and application of the concept of the reflective management. This term means the process of transferring to an enemy on the imperceptible way premises which should serve as a logical basis for making decisions resulting in the behavior favorable to the originator. According to the article’s author, the information and psychological operations are largely based upon the reflexive management paradigm founded by the Russian scientist, Vladimir Lefewr, consisting in influencing the opponent’s consciousness and will. The term reflexive management (affecting world images etc.) refers to broadly defined insidious and deceptive activities: provocation, intrigue, camouflage, etc. For over 40 years, Lefewr’s theory has been continuously improved, becoming the object of research of information warfare theorists from the army or special services. In contemporary Russia the reflective management theory is widely used not only in issues related to conflicts and information security, but also in many social sciences.
EN
Manipulation is perceived as a strategy to direct human behavior or as a method of influencing people by hiddenly shaping their consciousness without their explicit will or knowledge. This study aims to present subtle differences in meaning between the concepts of manipulation, persuasion and social engineering. The author’s task is to demonstrate that a wide spectrum of influence tools is perceived and defined differently by individual scientific disciplines. They are interpreted differently by linguists, differently by sociologists, and still differently by psychologists. In the article, the author also presents selected techniques and types of manipulation and proves that there are those that harm the recipients, but there are also those in which the manipulator has no bad intentions. The presented analyzes show that influencing others has many forms and differs in terms of techniques, goals, intentions and effects in shaping attitudes and behaviors. As a rule, the manipulator seeks to gain benefits at the expense of the manipulated person. This approach refers to the phenomenon of psychomanipulation, popular in the field of psychology, while omitting its legal aspect. Meanwhile, we should not forget about an equally important issue, i.e. criminal liability for manipulation, understood as an action harmful to the victim and highly unethical. The presentation of legal aspects therefore seems significant for all issues related to the presented phenomena.
PL
Manipulację postrzega się jako strategię kierowania ludzkimi zachowaniami lub też jako metodę wpływania na ludzi przez ukryte kształtowanie świadomości bez ich wyraźnej woli i wiedzy. Niniejsze opracowanie ma na celu zaprezentowanie subtelnych różnic znaczeniowych między pojęciami manipulacji, perswazji i socjotechniki. Zadaniem podjętym przez autora jest wykazanie, że szerokie spektrum narzędzi wpływu jest różnie postrzegane i definiowane przez poszczególne dyscypliny naukowe. Inaczej interpretowane są przez językoznawców, inaczej przez socjologów, a jeszcze inaczej przez psychologów. W artykule autor przedstawia również wybrane techniki i rodzaje manipulacji oraz dowodzi, że są wśród nich takie, które szkodzą odbiorcom, ale są również takie, w przypadku których manipulujący nie ma złych intencji. Z przedstawionych analiz wynika, że wywieranie wpływu na innych ma wiele form i różni się pod względem technik, celów, intencji oraz skutków w sferze kształtowania postaw i zachowań. Co do zasady, manipulator dąży do osiągnięcia korzyści kosztem osoby manipulowanej. Takie ujęcie nawiązuje do popularnego w dziedzinie psychologii zjawiska psychomanipulacji, z jednoczesnym pominięciem jego aspektu prawnego. Tymczasem nie należy zapominać o kwestii równie ważnej, czyli odpowiedzialności karnej za manipulację, pojmowaną jako działanie szkodliwe dla ofiary i wysoce nieetyczne. Przedstawienie aspektów prawnych wydaje się zatem znaczące dla całości zagadnień związanych z przedstawianymi zjawiskami.
Annales Canonici
|
2020
|
vol. 16
|
issue 1
25-37
EN
The development of new technologies has caused the situation that the significant part of the daily operation of an individual has moved to cyberspace. The Internet with its easy and common access has become an effective tool both at work and education process for the whole society. What is more people use the Internet to pursue a hobby and for their social life. Unfortunately, the society still has low awareness of the online threats and there can be observed a lack of proper caution, which is efficiently exploited by cybercriminals. Basing on social engineering and the tendency of users to place a lot of information about themselves on the web, the cybercriminals are able to easily break a simple security and gain access to the information they are interested in. Therefore cybercriminals activity is one of the biggest challenges for data protection officers. The article aims to describe cyber criminal mechanisms and methods of their operation and at the same time trying to answer the question how to successfully fight this phenomenon.
PL
Rozwój nowych technologii spowodował, że znaczna część codziennego funkcjonowania jednostki przeniosła się do cyberprzestrzeni. Powszechność i łatwy dostęp do Internetu sprawiły, że społeczeństwo sprawnie używa Internetu zarówno w pracy i nauce, jak i realizując swoje hobby oraz życie towarzyskie. Niestety, w społeczeństwie nadal występuje niska świadomość zagrożeń w sieci i brak odpowiedniej ostrożności, co bezwzględnie wykorzystują cyberprzestępcy. Bazując na socjotechnice i tendencji użytkowników do umieszczania wielu informacji o sobie w sieci, w łatwy sposób przełamują oni proste zabezpieczenia i uzyskują dostęp do interesujących ich obszarów. Działalność cyberprzestępców to obecnie jedno z największych wyzwań, przed jakimi stają w swojej pracy inspektorzy ochrony danych. Artykuł ma na celu opisanie cyberprzestępczych mechanizmów i metod działania. Stanowi również próbę odpowiedzi na pytanie, jak skutecznie walczyć z tym zjawiskiem.
first rewind previous Page / 2 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.