Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Years help
Authors help

Results found: 122

first rewind previous Page / 7 next fast forward last

Search results

Search:
in the keywords:  threat
help Sort By:

help Limit search:
first rewind previous Page / 7 next fast forward last
EN
This article refers to unemployment as a social phenomenon constituting a threat to the development of the labor market in Poland. Professional activity recently was associated with social security and stability in life. Currently, for the ever-growing group of people, labor market participation is associated with a constant threat of poverty, uncertainty about the future or the inability to establishment and maintenance of the family. The reason is not only lack of work, but also the disappearance of the typical forms of employment in favor of flexible forms of employment which are consisted of poor quality. As it turns out, not always any job is always better than no job, which means that the quality of employment is now becoming a social issue whose solution or mitigation its results are beyond the scope of the free market and the modern country. The labor market is a social institution but also the problems associated with the changes of production and employment (labor demand) require a response from the social adjustment. In the interests of society, giving sufficient earnings and enabling development of their own free time ought to be done for an individual to gain market through decent work.
EN
The issue of interrelations between security and threat has a history as long as the history of mankind. Human beings since the beginning of times have always had needs of higher and lower importance, these needs sometimes collide with the needs and interests of others, thus creating a threat. Originally, the meaning of the term ‘security’ was limited only to the armed protection of territories against the enemies from neighboring countries. With time other layers of threat were recognized and determined. Nowadays, protection against external aggression is just one of many threats which must be dealt with to provide security to a state, other threats are related to economic, ecological, social or cultural aspects.
EN
As safe existence and development of the state may be at any time limited or violated, combating the factors destabilizing the national security can generally speaking be described as the defense implemented in all areas of the state functioning. As a consequence of this situation security of the State must be studied as a complex issue affecting political, military, economic, ecological and other spheres. Lack of threat is an important but not the only aspect of securing safety. An equally important factor is public awareness concerning possibilities of the state to secure it. Intuitive understanding of this term leads to the conclusion that it refers to the sphere of awareness of the entity, i.e. human, social group, nation or nations. Both the previous and present generations notice the presented regularity. In order to ensure the effectiveness of preparation in the state to confront threats all possible measures should be taken to ensure that it has been properly prepared in a given sphere. The basis of such preparations is a full identification of threats and determination of interdependencies between them. It also stems from the fact that providing security of the State – defined as a state of security, resulting from an effective protection and defense against the internal and external threats, measured as a proportion of defensive potential to the threat level – as well as stable and continuous advancement of the society have been and will be the primary goal of the authorities and public administration in all areas of their activity.
EN
Radicalization is the process of adopting an extremist value system combined with an expression of approval, support or use of violence and intimidation as a means of achieving changes in society, or encouraging others to do so. The ultimate and the most extreme stage of radicalization taken by an individual or a group are terrorist activities. Identification of sources of extremist threats is therefore an important tool to combat the phenomenon of radicalization, as well as its later phases, which include terrorist violence. To have a thorough knowledge of the threat scale and identify the most extremist groups, it is reasonable to determine economic, psychological, social, political and religious factors fostering the development of radicalization. The key element in this regard is the way an individual perceives his/her own person and the world around as well as his/her specific beliefs pertaining to the phenomenon of extremism. The danger of radicalization not only lies in the fact that it may be associated with violence or the threat of its use, but it may also be a causal factor of other forms of harmful effects on society.
EN
The aim of the article is to present a very important phenomenon affecting human integrity and homeostasis that is Threat Prediction Process. This process can be defined as “experiencing apprehension concerning results of potential/ actual dangers,” (Mamcarz, 2015) oscillating in terminological area of anxiety, fear, stress, restlessness. Moreover, it highlights a cognitive process distinctive for listed phenomenon’s. The process accompanied with technological and organization changes increases number of health problems affecting many populations. Hard work conditions; changing life style; or many social and political threats have influence on people’s quality of life that are even greater and more dangerous than physical and psychological factors, which, in turn, have much more consequences for human normal functioning. The present article is based on chosen case studies of a qualitative analysis of threat prediction process
EN
This paper explores the issue of improving NATO’s operational capabilities. The initial sections overview changes that have already been introduced and are expected in the international security environment in the forthcoming years. This perspective is subsequently adopted to identify the present developments in the strategic concepts of NATO with the view to formulation of appropriate operational capabilities of the North Atlantic Treaty.
EN
Weapons of mass destruction pose a threat that all health care institutions should be prepared for. Every health care centre can be an essential part of the joint system of response when a critical situation occurs. Although, since 1945, no nuclear weapon has been employed in any armed conflict, cases of both chemical and radiological weapon use have been reported. Taking into account the analysts’ opinion that the 21st century has begun a super-terrorism era (Alexander and Hoenig 2001, p. 7) and, hence, the increased interest of terrorist organisations in acquiring mass destruction weapons, it is difficult to point out the location of a possible attack. A terrorist attack with the use of weapons of mass destruction may happen in any place, both urban and rural. According to the strategy adopted in the event of a critical situation resulting from such attack, the heavily injured should be transported to hospitals located in the closest location of the incident at the proper stage of evacuation. The problem is, however, to prepare a sufficient number of places for all victims of an attack and to provide them with professional medical care. In this context, it seems justified to consider the role and capabilities of the basic (primary) health care, as the most popular element of the health care system that has the resources to operate in a critical situation, and as the institution protecting citizens’ lives and health, i.e. the national safety attributes.
8
Publication available in full text mode
Content available

North Atlantic Treaty security

100%
EN
The article discusses security within the North Atlantic Treaty Organisation with respect to threats which may appear in its near and more distant surroundings. The following military threats are discussed: military conflicts, militarization of the Arctic, demonstration of Russian military power, use of weapons of mass destruction, cyber attack, terrorism and militarisation of Space. Other mentioned dangers are: natural and social ones including migration, competition among state and non-state entities as well as the phenomenon of fallen cities and states.
9
100%
EN
The article is concerned with the problems of Security Education in the context of threats to man`s existence. The aim of the article is to present the possibilities of Security Education from processual and technical (educational) aspects to prevent threats. The main research objective adopted by the author is: What are the main threats to mankind and how are they prevented by Security Education? The main focus is on the problems of education and threats to mankind. The article consists of an introduction outlining the significance of the subject. The most typical threats to man`s security and how Security Education could prevent them are described later.
EN
The subject of the work is the issue of analysis and interpretation of non-verbal behavior referenced to the security context and its threats. The fundamental thesis of the work is to prove the crucial role of knowledge and practical skills in the recognition and presentation of nonverbal behavior in crisis situations and emergencies. The author also points out the possibility of preparing and carrying out training in dealing with non-verbal messages for members of dispositional groups. In the analysis, the issue of the difference between the non-verbal and verbal behavior is discussed. Then the environmental issues of communication are analyzed in the form of importance of factors such as perception of situation, perception of time, presence of other people and architectural elements. In the same area dimensions of relations, knowledge on environment and people are located. The scope of non-verbal communication also includes close surroundings of a person and things possessed by him/her. Other important elements of the communication environment analysis are territory and personal space. Distinction is made between types of territory. In connection with the issue of space the author also introduced categorization of distance to the partner. In conclusion the need and usefulness of communication behavior model constructing, and conducting empirical research in this area are pointed out.
EN
The aim of the considerations presented here is to gather and share information and knowledge on contemporary challenges and threats that can help to rationally anticipate the future in the third decade of the 21st century. The article consists of three parts, i.e. the introduction, covering the basic terminological arrangements; then, forecasts of challenges and threats in the macro scale for the next ten years; and, finally, the summary. In the preparation of the article, theoretical methods and research techniques were used. The choice of the research technique was governed by the following criteria: purposefulness, clarity, univocality, effectiveness, reliability, and cost-effectiveness. These criteria determined the use of inductive inference, deductive reasoning, explanation, analysis, and synthesis. In the course of the research, critical analysis of the literature was also carried out, which was divided into groups of studies, i.e.: those devoted to the methodology of research activities, those concerning security theory, and those containing elements of prognostics. The presented considerations indicate that the third decade of the 21st century will be a time in which the existing challenges and threats will persist. However, the scale of the latter will increase, which may create many problems, mainly related to decision-making.
EN
The increasing brutalisation of society results in Polish police officers becoming increasingly exposed to threats to their lives and health. In 2016, 311 assaults on police officers took place. A secure police officer equals a secure state and its citizens. This is why it is so important for Polish police forces to be in possession of proper means of physical coercion which ensure their safety while on duty. The Act on means of physical coercion and firearms of 5 June 2013 specifies the range of the means of physical coercion permissible for use by police officers. However, the most important of these are individual means with which a police officer is equipped. Research conducted among Polish police officers demonstrates which individual means of physical coercion available to them are used most frequently for the purpose of ensuring safety on duty. Undoubtedly, the key measure is the object designated by the said law to incapacitate people using electricity, colloquially referred to as an electric stun gun, a stunner or a taser. This measure of direct coercion, present in the equipment of the Polish Police since 2007, is gaining in importance, as evidenced by the conducted research and the data on the use of electric stunner by police officers.
EN
Background: Hate speech is a very important problem nowadays. One can meet it in one’s immediate surroundings (conversations with friends), the media, the Internet, or in the so-called public space (for example, inscriptions on the walls). One form of hate speech is online hate speech, which, together with certain other phenomena, is referred to as hejt in the Polish language. The authors of the article focus on presenting online hate speech in relation to various age and social groups. Objectives: The aim of the article is to present the phenomenon of hate speech on the web and its impact on the safety of Internet users. Methods: The article uses basic theoretical and empirical methods. Content published on the Internet is analyzed and case studies are described. Interviews with experts (psychologists, police officers, sociologists, media and hate speech specialists) were also conducted and their views are presented. Conclusions: In the discussion about hate speech, prevention is extremely important. According to the authors, broad prevention consisting of professionally prepared content, enriched with film materials, presented by an expert or a trained teacher, should be included in the core curriculum of schools as one of the mandatory issues raised during the lessons.
EN
The increasing brutalisation of society results in Polish police officers becoming increasingly exposed to threats to their lives and health. In 2016, 311 assaults on police officers took place. A secure police officer equals a secure state and its citizens. This is why it is so important for Polish police forces to be in possession of proper means of physical coercion which ensure their safety while on duty. The Act on means of physical coercion and firearms of 5 June 2013 specifies the range of the means of physical coercion permissible for use by police officers. However, the most important of these are individual means with which a police officer is equipped. Research conducted among Polish police officers demonstrates which individual means of physical coercion available to them are used most frequently for the purpose of ensuring safety on duty. Undoubtedly, the key measure is the object designated by the said law to incapacitate people using electricity, colloquially referred to as an electric stun gun, a stunner or a taser. This measure of direct coercion, present in the equipment of the Polish Police since 2007, is gaining in importance, as evidenced by the conducted research and the data on the use of electric stunner by police officers.
EN
Background: Hate speech is a very important problem nowadays. One can meet it in one’s immediate surroundings (conversations with friends), the media, the Internet, or in the so-called public space (for example, inscriptions on the walls). One form of hate speech is online hate speech, which, together with certain other phenomena, is referred to as hejt in the Polish language. The authors of the article focus on presenting online hate speech in relation to various age and social groups. Objectives: The aim of the article is to present the phenomenon of hate speech on the web and its impact on the safety of Internet users. Methods: The article uses basic theoretical and empirical methods. Content published on the Internet is analyzed and case studies are described. Interviews with experts (psychologists, police officers, sociologists, media and hate speech specialists) were also conducted and their views are presented. Conclusions: In the discussion about hate speech, prevention is extremely important. According to the authors, broad prevention consisting of professionally prepared content, enriched with film materials, presented by an expert or a trained teacher, should be included in the core curriculum of schools as one of the mandatory issues raised during the lessons.
16
Publication available in full text mode
Content available

Cyberspace in a risk society

100%
Cybersecurity and Law
|
2022
|
vol. 7
|
issue 1
17-26
EN
The dynamic processes of modernization have affected the quantitative and qualitative dimensions of an unprecedented social transformation. It can be said that man has entered into hitherto unknown realms of abstraction. One of its dimensions is cyberspace with attributes that elude previous identifiers of physical three-dimensional space. The highly dynamized processes of technological progress have situated societies in new dimensions of risk. The likelihood of positive or negative events has been etiologically linked to the effects of „producing”, processing, storing, and transmitting the information. This article aims to analyze the factors justifying the crystallization of a risk society, a key identifier of which is cyberspace, the associated risks, and security measures in the context of shaping cybersecurity
17
Content available remote

Ambiwalencja kryzysów i zagrożeń

100%
EN
The first part of the article presents a general theoretical reflection on the conceptions of crises and threats. A thesis is proposed that differentiation of crises, threats and catastrophes is by no means obvious, and this pertains also to their causes and effects. The second part of the paper lists a few dozen events from the history of European civilization which testify to an almost continual existence or at least recurrence of various crises, conflicts and problems. Moreover, the recurring observations of intellectuals with a critical, at times even catastrophic outlook on European (or in broader terms – western) history are mentioned. The last part of the paper is an attempt to answer the question of the nature and causes of the present crisis of civilization and its potential further implications. The author also reflects on whether we are facing a crisis (or perhaps a threat) of our civilization only, or whether it is a threat that pertains to the entire contemporary civilization on a global scale.
EN
Medical waste can be one of the most serious threats to human life and health, especially due to the risk of infections (bacteria and viruses), the presence of hazardous chemicals, and microbiological cultures. Recycling and disposing of this waste is problematic, and is subject to a separate set of laws. The position and responsibilities of those responsible for the management of medical waste are also unique. The study focuses on the definition of medical waste (excluding veterinary waste). It shows the most important problems in this area and how it should be managed given the current legal regulations. Statistics and issues related to the control of medical waste management in Poland are cited.
EN
A new approach to security issues associated with the use of teleinformatics systems in the decision-making process has been presented. There is a discussion of the relationship between the security of informatics systems and the security of the decision-making process in which they are used, in particular regarding the threats resulting from the use of informatics systems and modern teleinformatics technologies. In addition, an overview of the dangers that could have a significant impact on appropriate decision-making has been performed. The paper points out the possible ways to ensure security depending on the type of threats encountered. In particular, threats particularly linked with the security of informatics systems supporting decision-making have been identified.
EN
Today, terrorism is undoubtedly one of the major threats to international security. This is confirmed by the fact that the United States Department of State classifies more than 50 groups as terrorist organisations (The United States Department of State Website).In the context of the terrorist threat, we can witness an increasing number of women, especially in the organisations that radically interpret the Quran (Koran) on which Islam is based.The aim of the article was to explore the phenomenon of women’s participation in the activities of fundamentalist terrorist groups.The main research problem took the form of a question: To what extent do women in fundamentalist terrorist organisations influence the level of security? The main hypothesis, however, took the form of an assumption that the increase in the scale of women’s participation in terrorist organisations of a fundamentalist nature determines, in the context of the terrorist phenomenon, the growing threat to security on their part. The article presents the determinants of women’s terrorist activity and their main functions performed within the structures of terrorist organisations.As the main research method, the analysis of literature and Internet media with the use of content analysis techniques, as well as statistical data analysis (desk research) were applied.The research was carried out as part of the research project No. 146/WNB/65/DzS called: The Migration Policy of the Republic of Poland as an Indicator of Its Internal Security carried out at the Faculty of Security Studies at the General Tadeusz Kościuszko Military University of Land Forces (Wrocław, Poland).
first rewind previous Page / 7 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.