Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Refine search results

Journals help
Authors help
Years help

Results found: 529

first rewind previous Page / 27 next fast forward last

Search results

Search:
in the keywords:  information
help Sort By:

help Limit search:
first rewind previous Page / 27 next fast forward last
1
100%
EN
Luciano Floridi and Nick Srnicek claims that with a decline in manufacturing profitability, capitalism has turned to data as one way to maintain economic growth in the face of a slow production sector. In the twenty-first century data have become central to firms and their relations with workers and customers (Floridi, 2013; Srnicek 2017). The platform has emerged as a new model, capable of extracting and controlling immense amounts of data, and with this shift we have seen the rise of monopolistic firms. We are told that today we are living in an age of massive transformation. Platforms, big data, additive manufacturing, advanced robotics, machine learning, and the internet of things – create our current living environment. In the presented text I am going to ask what is the place of the university in such a new digital constellation? What are universities for in the time of platform capitalism? My main line of reasoning follows to idea of “entrepreneurial state”. An innovative university is understood as an analogue of an “entrepreneurial state”. Mariana Mazzucato has convincingly demonstrated that developments like railways, the internet, computing, supersonic flight, space travel, satellites, pharmaceuticals, voice-recognition software, nanotechnology, touchscreensand clean energy have all been nurtured and guided by states, not corporations. During the golden postwar era of research and development, two-thirds of research and development was publicly funded. High-risk inventions and new technologies are too risky for private capitalists to invest in (Mazzucato, 2014; Srnicek, Williams, 2015). Socializing of the risk and privatization of profits – this is the main climate of “non-innovative capitalism”.
EN
Information protection methods are to ensure the safe operation of data against unauthorized access. The magnitude that characterizes this safe operation of data is called the effectiveness of the applied algorithm. Efficiency is understood as the degree of information protection against infiltration. Unfortunately, all the previous studies and analyzes of individual methods do not take into account the decisive role of man, which has a great influence on the effectiveness of the applied algorithm. The infiltration, or deliberate infiltration of unauthorized persons into the information collection, is divided into accidental and intentional, in turn, we divide into passive and active. For military computer systems one of the ways of infiltration can be described as computer espionage, which is particularly dangerous.
EN
There is a productive and suggestive approach in philosophical logic based on the idea of generalized truth values. This idea, which stems essentially from the pioneering works by J.M. Dunn, N. Belnap, and which has recently been developed further by Y. Shramko and H. Wansing, is closely connected to the power-setting formation on the base of some initial truth values. Having a set of generalized truth values, one can introduce fundamental logical notions, more specifically, the ones of logical operations and logical entailment. This can be done in two different ways. According to the first one, advanced by M. Dunn, N. Belnap, Y. Shramko and H. Wansing, one defines on the given set of generalized truth values a specific ordering relation (or even several such relations) called the logical order(s), and then interprets logical connectives as well as the entailment relation(s) via this ordering(s). In particular, the negation connective is determined then by the inversion of the logical order. But there is also another method grounded on the notion of a quasi-field of sets, considered by Białynicki-Birula and Rasiowa. The key point of this approach consists in defining an operation of quasi-complement via the very specific function g and then interpreting entailment just through the relation of set-inclusion between generalized truth values. In this paper, we will give a constructive proof of the claim that, for any finite set V with cardinality greater or equal 2, there exists a representation of a quasi-field of sets isomorphic to de Morgan lattice. In particular, it means that we offer a special procedure, which allows to make our negation de Morgan and our logic relevant.
EN
Various contact tracing apps tracking the spread of the pandemic were issued in different countries. Mainly based on two technologies, centralised with more control by the governments or decentralised controlled by the Apple or Google Android mobile phone systems. In this paper, we will discuss the advantages and disadvantages of the different systems, as well as their potential dangers.
EN
The Ministry of Foreign Affairs, which in 1993 had 45 diplomatic missions, stated unequivocally that modern technology is so advanced that it is best to assume the existence of eavesdropping in all settings at all times. In 1992 the Ministry of Foreign Affairs assigned 38,000 secret encrypted messages. Secret letters from the same ministry are transported on 160 different routes by couriers, ie specially trained officers for this purpose. In the sixties crashed the plane, which carried very secret messages, then killed bags with secret diplomatic mail, the rest survived. The situation I described above clearly shows that the best and only secure means of transport can be mailed electronically in encrypted form. The cipher used to encrypt such important state information must be unbreakable. This cipher must be based on mathematical models that exclude human (human factor) from the encryption and decryption process. Only such a cipher can give us one hundred percent effective protection of information.
EN
Social engineering is the same concept as the concept of social engineering and related to manipulation and disinformation. Review of Christopher Hadnagy’s book Social engineering – the art of gaining power over minds is, according to the principles of art, a set of subjective assessments by the author. These assessments relate first to the impressions of reading, and are supported by their own critical image of the world in which social engineering is applied in the everyday life of each of us. The author of the review points out that the position has an application value, because a higher level of awareness and knowledge on a given topic translates easily into the individual’s safety.
10
Publication available in full text mode
Content available

Informacje z życia uczelni

71%
PL
Informacje o szkoleniach, seminariach, konferencjach i projektach realizowanych na uczelni
EN
Information about trainings, seminars, conferences and projects carried out at the university
EN
In this paper, I argue that even if the Hard Problem of Content, as identified by Hutto and Myin, is important, it was already solved in naturalized semantics, and satisfactory solutions to the problem do not rely merely on the notion of information as covariance. I point out that Hutto and Myin have double standards for linguistic and mental representation, which leads to a peculiar inconsistency. Were they to apply the same standards to basic and linguistic minds, they would either have to embrace representationalism or turn to semantic nihilism, which is, as I argue, an unstable and unattractive position. Hence, I conclude, their book does not offer an alternative to representationalism. At the same time, it reminds us that representational talk in cognitive science cannot be taken for granted and that information is different from mental representation. Although this claim is not new, Hutto and Myin defend it forcefully and elegantly.
PL
The article presents the results of research regarding the diagnosis of primary and secondary school students’ abilities in respect of two operations identified by Joy P. Guilford: convergent production and divergent production. The research used a set of SOI-Learning Abilities Tests by Mary Meeker and Robert Meeker. The research was conducted on 516 students (323 primary school students and 193 secondary school students; 259 students were boys). In divergent production tests students at all levels of school education (1st and 2nd stage of primary school and secondary school) experienced difficulties with tests requiring the application of non- -standard solutions and new approaches. This tendency grows in the consecutive years of education. Very good results of primary school students as regards convergent production – which involves the ability to combine and synthesize information relevant for the purpose of solving a given problem – do not continue for secondary school students. The age and sex proved to be differentiating factors for the level and properties of learning abilities as regards the abovementioned operations. In all age groups girls scored better than boys. Third grade students achieved the most scores assessed as above average, outstanding and talented.
EN
The article presents the results of research regarding the diagnosis of primary and secondary school students’ abilities in respect of two operations identified by Joy P. Guilford: convergent production and divergent production. The research used a set of SOI-Learning Abilities Tests by Mary Meeker and Robert Meeker. The research was conducted on 516 students (323 primary school students and 193 secondary school students; 259 students were boys). In divergent production tests students at all levels of school education (1st and 2nd stage of primary school and secondary school) experienced difficulties with tests requiring the application of non-standard solutions and new approaches. This tendency grows in the consecutive years of education. Very good results of primary school students as regards convergent production – which involves the ability to combine and synthesize information relevant for the purpose of solving a given problem – do not continue for secondary school students. The age and sex proved to be differentiating factors for the level and properties of learning abilities as regards the abovementioned operations. In all age groups girls scored better than boys. Third grade students achieved the most scores assessed as above average, outstanding and talented.
PL
The phenomen of “fake news” disseminated by the mass media is a relatively new phenomenon, the impact of which has not been extensively studied. The article is devoted to the problem of fake in contemporary mass media, which is understood not only as a modern type of lie, but also a fabricated information designed to manipulate public opinion and creating specific form of an image of the world in the human consciousness.
EN
Strong competitors, high production costs and low demand for goods need from contractors to change management methods. Managers implement innovation management processes in a range of them the most important role plays information management. The right using information has influence on efficiency and quality company management. The aim of this article is to present the role of information in the process of build competitive superiority company on the capital market by the make the maintenance processes more useful. In the article the chose theoretical aspects of the knowledge about information where shown as well as information management in maintenance processes. In the last part of the article the result of the researches concerning influence of cost information on maintenance processes management were presented.
EN
The article evaluates public and private information and consulting services provided to small and medium-sized enterprises in Poland. The author uses methods furnished by new institutional economics and the theory of market inefficiency. Gancarczyk compares an experimental group covered by public assistance against a control group made up of companies with similar features and using commercial information and consulting services. The comparison was made according to criteria such as accuracy, efficiency, usefulness, reliability and effectiveness. The study reveals that public authorities should continue providing free information and consulting services, the author says, because there are continued market inefficiencies, including an insufficient supply of consulting services and a strong asymmetry in access to information. The market inefficiencies in question call for further public assistance in this area, Gancarczyk adds. The analysis of the criteria of accuracy, efficiency, usefulness, reliability and effectiveness from the perspective of alternative costs confirms that free public services are more reliable than comparable services offered by private service providers, while the evaluation of effectiveness and usefulness for both groups was similar. On the other hand, public service providers displayed lower efficiency, Gancarczyk says.
EN
Role of information and Information Systems becomes more and more important for company activity. Their influence on economy of Poland was not researched yet. Usage of Information and Communication technology rapidly increased for the past years. The research goal of the article was evaluation of dependency between development of ICT and economic situation of voivodeships in Poland.
PL
Aesthetic medicine has been developing at a fast pace in recent years. It is necessary and ethical for anyone who undergoes any of these treatments to receive complete information on its implementation methods, as well as its consequences andadverse effects. Only once the person who would be affected by these procedures obtains truthful and impartial information, can he or she provide a legally binding consent to undergo a procedure. Thus, the information received by the patient plays a crucial role since it underlies the subject’s decision concerning the treatment.
EN
The arlicle examines the method of analysis of newspaper s language/ The main factor of this method is a system of genres. The chief change of this system by this time is reducing amount of publicistic mediatext and increase of information torrenl.
EN
Discussions regarding the notion of information have died out several years ago. However an agreement hasn’t been reached on the exact meaning of such a term. Most often the notion of information is understood as: 1) knowledge about structure of an object, 2) third appearance of the substance, 3) perceptible difference between objects. These interpretations are not exclusive, but there is not one theory that combine them. In cognitive psychology notion of information is perceived as a paradigm. At the same time its meaning is often equated with the concept of mental process, or the content of such mental process. Mental activity and in particular intellectual activity generally is recognized and equated with processing of an information. Such interpretation ignores the fact that information cannot be processed directly because it doesn’t exist without a carrier. In fact these carriers undergo processing. The new information based on re-configuration of carrier’s structure could be re-developed. The carriers are mental representations of the carried content and they represent themselves as icons, symbols and concepts. Hence the mental activity is the processing (sometimes creating) representations.
first rewind previous Page / 27 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.