Information and modern technologies as an asymmetric threat to state security. Philosophical perspective.

Arnold Warchał, K. Piotrkowski
{"title":"Information and modern technologies as an asymmetric threat to state security. Philosophical perspective.","authors":"Arnold Warchał, K. Piotrkowski","doi":"10.13166/jms/175514","DOIUrl":null,"url":null,"abstract":"Rapid evolution and progress in computer sciences present new determinants for informational technologies. The universal knowledge based on Mathematics and Computer science exploring processes in information dissemination, should be persistently analyzed. Its focus on practical applicability presents various problems and new possibilities for the field of Security Studies, adding new categories to its research interests, that should be constantly defined and redefined. And what is the objective of the article.The descriptive methodology used in the article is limited to a presentation of philosophical categories, as it allows for defining of chosen problems that correspond, upon analysis, to asymmetric threats mounting from IT evolution.The predicaments of technological evolution in view o the categories arising through philosophical focus, presented here by authors and as applied in Security studies, point to definitions and associated categories of potential dangers that IT progress may entail. Hence, the presentation of three categories analyzed – information, communication, asymmetric threat, and the following analysis of categories of threats with asymmetric values, as a potential nuisance and danger to state security, related to those categories.And as is concluded, the new developments, as discussed in the article, present challenges for state security and are presently evolving. Hence, those should be constantly categorized and associated with security predicaments – active and potential.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of modern science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.13166/jms/175514","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Rapid evolution and progress in computer sciences present new determinants for informational technologies. The universal knowledge based on Mathematics and Computer science exploring processes in information dissemination, should be persistently analyzed. Its focus on practical applicability presents various problems and new possibilities for the field of Security Studies, adding new categories to its research interests, that should be constantly defined and redefined. And what is the objective of the article.The descriptive methodology used in the article is limited to a presentation of philosophical categories, as it allows for defining of chosen problems that correspond, upon analysis, to asymmetric threats mounting from IT evolution.The predicaments of technological evolution in view o the categories arising through philosophical focus, presented here by authors and as applied in Security studies, point to definitions and associated categories of potential dangers that IT progress may entail. Hence, the presentation of three categories analyzed – information, communication, asymmetric threat, and the following analysis of categories of threats with asymmetric values, as a potential nuisance and danger to state security, related to those categories.And as is concluded, the new developments, as discussed in the article, present challenges for state security and are presently evolving. Hence, those should be constantly categorized and associated with security predicaments – active and potential.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
信息和现代技术是对国家安全的不对称威胁。哲学视角。
计算机科学的迅速发展和进步为信息技术提供了新的决定因素。应坚持不懈地分析以数学和计算机科学为基础的、探索信息传播过程的普遍知识。对实际应用的关注为安全研究领域带来了各种问题和新的可能性,为其研究兴趣增添了新的类别,应不断对其进行定义和重新定义。本文所使用的描述性方法仅限于对哲学范畴的介绍,因为它允许对所选问题进行定义,这些问题经分析后与信息技术发展所带来的非对称威胁相对应。作者在本文中介绍了哲学焦点所产生的技术发展困境,并将其应用于安全研究中,指出了信息技术发展可能带来的潜在危险的定义和相关类别。因此,本文分析了三个类别--信息、通信和非对称威胁,并分析了与这些类别相关的具有非对称价值的威胁类别,它们是对国家安全的潜在滋扰和危险。因此,应不断对这些挑战进行分类,并将其与安全困境--积极的和潜在的安全困境--联系起来。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
28
审稿时长
5 weeks
期刊最新文献
Evolution of Secret Services in Poland. Legal and Social Dimension Special negotiations team as a temporary participating entity in the Act on companies established as a result of cross-border transformation, merger or division Is this already violence? Defining violence and domestic violence and its impact on awareness of the problem Labour incomes and economic activity in Poland Conceptualising securitisation in the field of cyber security policy
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1