Janusz Gierszewski, P. Tomaszewski, P. Siemiątkowski
The aim of the article is to determine the directions of research conducted in the field of security, and realized by the most frequently cited (according to popular bibliometric databases) scholars. On this basis, the frequency of selection of research areas of Polish scientists dealing with issues in the field of security was determined.The text presents the author's conclusions from a cross-sectional analysis of Scopus and Google Scholar databases of the most frequently cited authors. The selection of sources was based on several citation indices. Foreign publications were selected in the field of social science on the basis of citations from the internationally recognized and prestigious Scopus database . The analysis refers to the years 2015-2020, as this is the period in which the scientific discipline took shape.Polish research, despite raising often important from the point of view of world security problems, is not very noticed in the world. There are several reasons for this. First of all, until recently, it was published mainly in Polish. Secondly, local scientific periodicals or multi-author monographs were usually chosen as the place of publication.The Polish literature is dominated by topics related to internal security, such as: public and general security (crisis management), social security, cultural security, etc. Another theme is terrorism (along with its varieties), which is replaced by other problems, such as: the aging of society, the relationship between security and development, or the problems of migration. They mostly refer to regional or even local problems.
本文旨在确定安全领域的研究方向,以及最常被引用(根据流行的文献计量数据库)的学者的研究方向。在此基础上,确定了波兰科学家在处理安全领域问题时选择研究领域的频率。文中介绍了作者对 Scopus 和 Google Scholar 数据库中被引用次数最多的作者进行横向分析后得出的结论。资料来源的选择以若干引用指数为依据。根据国际公认的著名 Scopus 数据库的引用情况,选择了社会科学领域的国外出版物。波兰的研究尽管从世界安全问题的角度来看往往具有重要意义,但在世界上却并不引人注意。这有几个原因。首先,直到最近,研究成果主要以波兰文发表。其次,通常选择当地的科学期刊或多作者专著作为出版地。波兰的文献主要是与国内安全有关的主题,如:公共和一般安全(危机管理)、社会安全、文化安全等。另一个主题是恐怖主义(及其各种形式),取而代之的是其他问题,如:社会老龄化、安全与发展之间的关系或移民问题。它们大多涉及地区甚至地方问题。
{"title":"Eastern European perspective on Security Studies. Lessons from Poland","authors":"Janusz Gierszewski, P. Tomaszewski, P. Siemiątkowski","doi":"10.13166/jms/175509","DOIUrl":"https://doi.org/10.13166/jms/175509","url":null,"abstract":"The aim of the article is to determine the directions of research conducted in the field of security, and realized by the most frequently cited (according to popular bibliometric databases) scholars. On this basis, the frequency of selection of research areas of Polish scientists dealing with issues in the field of security was determined.The text presents the author's conclusions from a cross-sectional analysis of Scopus and Google Scholar databases of the most frequently cited authors. The selection of sources was based on several citation indices. Foreign publications were selected in the field of social science on the basis of citations from the internationally recognized and prestigious Scopus database . The analysis refers to the years 2015-2020, as this is the period in which the scientific discipline took shape.Polish research, despite raising often important from the point of view of world security problems, is not very noticed in the world. There are several reasons for this. First of all, until recently, it was published mainly in Polish. Secondly, local scientific periodicals or multi-author monographs were usually chosen as the place of publication.The Polish literature is dominated by topics related to internal security, such as: public and general security (crisis management), social security, cultural security, etc. Another theme is terrorism (along with its varieties), which is replaced by other problems, such as: the aging of society, the relationship between security and development, or the problems of migration. They mostly refer to regional or even local problems.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":" 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139137563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The author of the article is trying to solve the research problem posed in the form of a question: in what way can the simulators be used in training sessions for the sake of safety and what is the level of effectiveness of such training sessions? The author uses theoretical and empirical methods in order to address the research problem. Simulators taken advantage of in the Police Academy as well as their capabilities and ways of usage, during the training or drilling sessions, have been described in the article. In the last part of the article, the results of the evaluation of the training sessions, using the simulators, have been indicated. he author of the article is trying to solve the research problem posed in the form of a question: in what way can the simulators be used in training sessions for the sake of safety and what is the level of effectiveness of such training sessions? The author uses theoretical and empirical methods in order to address the research problem. Simulators taken advantage of in the Police Academy as well as their capabilities and ways of usage, during the training or drilling sessions, have been described in the article. In the last part of the article, the results of the evaluation of the training sessions, using the simulators, have been indicated.
{"title":"Simulators used in training for internal safety purposes","authors":"Andrzej Czesław Urban","doi":"10.13166/jms/175156","DOIUrl":"https://doi.org/10.13166/jms/175156","url":null,"abstract":"The author of the article is trying to solve the research problem posed in the form of a question: in what way can the simulators be used in training sessions for the sake of safety and what is the level of effectiveness of such training sessions? The author uses theoretical and empirical methods in order to address the research problem. Simulators taken advantage of in the Police Academy as well as their capabilities and ways of usage, during the training or drilling sessions, have been described in the article. In the last part of the article, the results of the evaluation of the training sessions, using the simulators, have been indicated. he author of the article is trying to solve the research problem posed in the form of a question: in what way can the simulators be used in training sessions for the sake of safety and what is the level of effectiveness of such training sessions? The author uses theoretical and empirical methods in order to address the research problem. Simulators taken advantage of in the Police Academy as well as their capabilities and ways of usage, during the training or drilling sessions, have been described in the article. In the last part of the article, the results of the evaluation of the training sessions, using the simulators, have been indicated.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":" 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139138164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dariusz Prokopowicz, Anna Gołębiowska, Małgorzata Such-Pyrgiel
In the area of the fastest growing fields of ICT technology which determine the successive stages of progress in the field of online electronic banking, it is necessary to disseminate standards for conducting financial operations carried out in the so-called cloud as well as using the large data sets located in the so-called Big Data platforms.For the purposes of this article, research has been carried out on the broad issue of Big Data Analytics applications in the context of social, normative, economic, environmental, climate aspects. A questionnaire survey was conducted. The method of analysis of literature sources concerning the subject of the article was applied.Currently emerging trends in the development of technology based on Big Data dataset platforms usually allow to perform multidimensional calculations and reported results of analyzes in real time. The analyzes conducted on huge data sets allow for comprehensive, multi-aspect risk assessments at the level of the whole entity. During the SARS-CoV-2 (Covid-19) coronavirus pandemic, there was an increase in the importance of analytics based on Big Data Analytics. During the pandemic, there was also an increase in the digitisation and internetisation of business processes. This also resulted in an increase in the scale of cybercrime development.The technological revolution currently taking place, defined as Industry 4.0, is motivated by the development of the following factors: Big Data database technologies, cloud computing, machine learning, Internet of Things, artificial intelligence, Business Intelligence and other technologies of advanced data processing Data Mining. On the basis of the development new technological solutions, in recent years there has been a dynamic development of Big Data Analytics.
{"title":"The role of Big Data and Data Science in the context of information security and cybersecurity","authors":"Dariusz Prokopowicz, Anna Gołębiowska, Małgorzata Such-Pyrgiel","doi":"10.13166/jms/177036","DOIUrl":"https://doi.org/10.13166/jms/177036","url":null,"abstract":"In the area of the fastest growing fields of ICT technology which determine the successive stages of progress in the field of online electronic banking, it is necessary to disseminate standards for conducting financial operations carried out in the so-called cloud as well as using the large data sets located in the so-called Big Data platforms.For the purposes of this article, research has been carried out on the broad issue of Big Data Analytics applications in the context of social, normative, economic, environmental, climate aspects. A questionnaire survey was conducted. The method of analysis of literature sources concerning the subject of the article was applied.Currently emerging trends in the development of technology based on Big Data dataset platforms usually allow to perform multidimensional calculations and reported results of analyzes in real time. The analyzes conducted on huge data sets allow for comprehensive, multi-aspect risk assessments at the level of the whole entity. During the SARS-CoV-2 (Covid-19) coronavirus pandemic, there was an increase in the importance of analytics based on Big Data Analytics. During the pandemic, there was also an increase in the digitisation and internetisation of business processes. This also resulted in an increase in the scale of cybercrime development.The technological revolution currently taking place, defined as Industry 4.0, is motivated by the development of the following factors: Big Data database technologies, cloud computing, machine learning, Internet of Things, artificial intelligence, Business Intelligence and other technologies of advanced data processing Data Mining. On the basis of the development new technological solutions, in recent years there has been a dynamic development of Big Data Analytics.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":" 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139141583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article will attempt to analyse securitisation theory to explore the discursive features of cyber security, using a multi-actor approach that considers the role of state and non-state actors in the creation and management of cyber security discourses.The paper aims to assess the contribution of securitization theory to the understanding of both traditional and contemporary security policy issues. More specifically, it is an attempt to reflect on the identification of the challenges facing the modern state.Growing dependence on digital technology is inevitable, making the future more threatening than the present. Cyber technology is inherently vulnerable and thus impossible to fully secure. The call for "greater security" becomes justified because the more a country depends on cyber technology, the more inevitable cyber threats become. They are consistently treated by government circles as a security challenge, meaning that the problem is presented as an existential threat, requiring emergency measures and justifying action beyond the normal bounds of political procedure.As some conclusion and conclusion, it is worth reiterating observations about the multi-stakeholder nature of cyber security and observations about the co-creation of this security by a wide range of actors representing different and in some cases conflicting interests. It can be argued that there is no single discourse on cyber security or cyber threats, and it is simplistic to assume that there is even a single discourse that represents every securitization actor, be it government or the private sector. This diversity explains why the assumption and logic of securitization theory can only apply to some, but not all, cyber security discourses.
{"title":"Conceptualising securitisation in the field of cyber security policy","authors":"Marek Górka","doi":"10.13166/jms/176103","DOIUrl":"https://doi.org/10.13166/jms/176103","url":null,"abstract":"This article will attempt to analyse securitisation theory to explore the discursive features of cyber security, using a multi-actor approach that considers the role of state and non-state actors in the creation and management of cyber security discourses.The paper aims to assess the contribution of securitization theory to the understanding of both traditional and contemporary security policy issues. More specifically, it is an attempt to reflect on the identification of the challenges facing the modern state.Growing dependence on digital technology is inevitable, making the future more threatening than the present. Cyber technology is inherently vulnerable and thus impossible to fully secure. The call for \"greater security\" becomes justified because the more a country depends on cyber technology, the more inevitable cyber threats become. They are consistently treated by government circles as a security challenge, meaning that the problem is presented as an existential threat, requiring emergency measures and justifying action beyond the normal bounds of political procedure.As some conclusion and conclusion, it is worth reiterating observations about the multi-stakeholder nature of cyber security and observations about the co-creation of this security by a wide range of actors representing different and in some cases conflicting interests. It can be argued that there is no single discourse on cyber security or cyber threats, and it is simplistic to assume that there is even a single discourse that represents every securitization actor, be it government or the private sector. This diversity explains why the assumption and logic of securitization theory can only apply to some, but not all, cyber security discourses.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":" 30","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139137361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rapid evolution and progress in computer sciences present new determinants for informational technologies. The universal knowledge based on Mathematics and Computer science exploring processes in information dissemination, should be persistently analyzed. Its focus on practical applicability presents various problems and new possibilities for the field of Security Studies, adding new categories to its research interests, that should be constantly defined and redefined. And what is the objective of the article.The descriptive methodology used in the article is limited to a presentation of philosophical categories, as it allows for defining of chosen problems that correspond, upon analysis, to asymmetric threats mounting from IT evolution.The predicaments of technological evolution in view o the categories arising through philosophical focus, presented here by authors and as applied in Security studies, point to definitions and associated categories of potential dangers that IT progress may entail. Hence, the presentation of three categories analyzed – information, communication, asymmetric threat, and the following analysis of categories of threats with asymmetric values, as a potential nuisance and danger to state security, related to those categories.And as is concluded, the new developments, as discussed in the article, present challenges for state security and are presently evolving. Hence, those should be constantly categorized and associated with security predicaments – active and potential.
{"title":"Information and modern technologies as an asymmetric threat to state security. Philosophical perspective.","authors":"Arnold Warchał, K. Piotrkowski","doi":"10.13166/jms/175514","DOIUrl":"https://doi.org/10.13166/jms/175514","url":null,"abstract":"Rapid evolution and progress in computer sciences present new determinants for informational technologies. The universal knowledge based on Mathematics and Computer science exploring processes in information dissemination, should be persistently analyzed. Its focus on practical applicability presents various problems and new possibilities for the field of Security Studies, adding new categories to its research interests, that should be constantly defined and redefined. And what is the objective of the article.The descriptive methodology used in the article is limited to a presentation of philosophical categories, as it allows for defining of chosen problems that correspond, upon analysis, to asymmetric threats mounting from IT evolution.The predicaments of technological evolution in view o the categories arising through philosophical focus, presented here by authors and as applied in Security studies, point to definitions and associated categories of potential dangers that IT progress may entail. Hence, the presentation of three categories analyzed – information, communication, asymmetric threat, and the following analysis of categories of threats with asymmetric values, as a potential nuisance and danger to state security, related to those categories.And as is concluded, the new developments, as discussed in the article, present challenges for state security and are presently evolving. Hence, those should be constantly categorized and associated with security predicaments – active and potential.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":" 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139138134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of the article is to present the relations that exist between the culture of information security and information sciences.desk research, Literature criticism, Synthesis, Comparative analysis.The ability to manage information correctly is essential from the point of view of security. As a result, one may conduct research with the aim of developing optimised actions concerning information management and determine the borders between the security of information and informational security. In this aspect, the scientific considerations should also include studies of the relations that exist between information management and information security management. In order to manage security efficiently, it is necessary to understand the nature of security and to know the current challenges and threats.In a world where IT tools are an indispensable element of daily human activities, information science has a strong influence on the information security culture. These areas of activity mainly include the development of security technologies, where information science strives to develop systems that would effectively protect users from threats such as distortion or data loss.. Another sphere is education for employees about information security, which would help develop appropriate models for an information security culture. Another important aspect is the human awareness of threats that may be encountered during the use of IT tools or platforms. The final aspect that should be considered is risk management. Information science enables analysis to be conducted regarding risks related to information security and to treat them as the basis for developing optimum action plans in the event of an emergence of threat.
{"title":"Relations between information science and information security culture","authors":"Bogusław Jagusiak, Piotr Zaskórski","doi":"10.13166/jms/175510","DOIUrl":"https://doi.org/10.13166/jms/175510","url":null,"abstract":"The aim of the article is to present the relations that exist between the culture of information security and information sciences.desk research, Literature criticism, Synthesis, Comparative analysis.The ability to manage information correctly is essential from the point of view of security. As a result, one may conduct research with the aim of developing optimised actions concerning information management and determine the borders between the security of information and informational security. In this aspect, the scientific considerations should also include studies of the relations that exist between information management and information security management. In order to manage security efficiently, it is necessary to understand the nature of security and to know the current challenges and threats.In a world where IT tools are an indispensable element of daily human activities, information science has a strong influence on the information security culture. These areas of activity mainly include the development of security technologies, where information science strives to develop systems that would effectively protect users from threats such as distortion or data loss.. Another sphere is education for employees about information security, which would help develop appropriate models for an information security culture. Another important aspect is the human awareness of threats that may be encountered during the use of IT tools or platforms. The final aspect that should be considered is risk management. Information science enables analysis to be conducted regarding risks related to information security and to treat them as the basis for developing optimum action plans in the event of an emergence of threat.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":" 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139139227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InsurTech is a new and interesting phenomenon, linked to the use of new technologies, such as artificial intelligence or distributed ledger technology, in the insurance sector. The factual and legal nature of relationships in this area, due to their heterogeneous and complex international character, raises many questions. Some of these relate to private international law, where conflict situations raise questions such as which law (the law of which state) is the substantive law applicable to resolve these situations. Presenting the complexity of this area, this statement describes possible solutions and reflects on the need and potential of applying private international law in the InsurTech sector. It introduces the InsurTech phenomenon, presents its links with private international law, reflects on the adaptability of existing mechanisms of this law to highly technological legal relations, and concludes by an attempt to indicate how to combine InsurTech and private international law, and whether this is possible at all.The work was written using standard scientific methods for legal science. It is primarily a dogmatic work, but also reaches for comparative legal elements. This choice of methods is justified by the presented issues.The result of the research is an assessment as to the possible use of private international law tools for the problems that arise with InsurTech instruments.The author points out that the currently known private international law instruments are not suited to the modern requirements of the insurance services sector, especially in the context of the use of artificial intelligence or DLT technology (blockchain, smart contract) in the sector.
{"title":"InsurTech and private international law considerations","authors":"M. Załucki","doi":"10.13166/jms/175515","DOIUrl":"https://doi.org/10.13166/jms/175515","url":null,"abstract":"InsurTech is a new and interesting phenomenon, linked to the use of new technologies, such as artificial intelligence or distributed ledger technology, in the insurance sector. The factual and legal nature of relationships in this area, due to their heterogeneous and complex international character, raises many questions. Some of these relate to private international law, where conflict situations raise questions such as which law (the law of which state) is the substantive law applicable to resolve these situations. Presenting the complexity of this area, this statement describes possible solutions and reflects on the need and potential of applying private international law in the InsurTech sector. It introduces the InsurTech phenomenon, presents its links with private international law, reflects on the adaptability of existing mechanisms of this law to highly technological legal relations, and concludes by an attempt to indicate how to combine InsurTech and private international law, and whether this is possible at all.The work was written using standard scientific methods for legal science. It is primarily a dogmatic work, but also reaches for comparative legal elements. This choice of methods is justified by the presented issues.The result of the research is an assessment as to the possible use of private international law tools for the problems that arise with InsurTech instruments.The author points out that the currently known private international law instruments are not suited to the modern requirements of the insurance services sector, especially in the context of the use of artificial intelligence or DLT technology (blockchain, smart contract) in the sector.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":" 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139142267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olena Ivashko, Łukasz Wojciechowski, Adam Życzkowski, J. Witkowski
Abstract The stabilisation function of the state's finances encompasses measures aimed, inter alia, at achieving and maintaining a relatively high rate of economic growth, while limiting negative phenomena, i.e. high unemployment and inflation rates, mitigating business cycle fluctuations, stabilising the money market and making the most effective use of tangible factors of production. The role of the state in the economy and its influence on the behaviour of groups of economic units has undergone dynamic changes over the centuries, both with regard to the forms and scope of influence and the degree of interference of public authorities in the market mechanism Streszczenie Stabilizacyjna funkcja finansów pastwa obejmuje działania mające między innymi powodować osiągnięcie i utrzymanie relatywnie wysokiego tempa wzrostu gospodarczego, przy jednoczesnym ograniczaniu zjawisk negatywnych, tj. wysokiej stopy bezrobocia i inflacji, łagodzeniu wahań cyklu koniunkturalnego, stabilizację rynku pieniężnego oraz możliwie najbardziej efektywne wykorzystanie rzeczowych czynników produkcji. Rola państwa w gospodarce i jego wpływ na zachowanie się grup jednostek gospodarujących ulegała dynamicznym zmianom na przestrzeni wieków, zarówno odniesieniu do form i zakresu oddziaływania, jak i stopnia ingerencji władz publicznych w mechanizm rynkowy.
{"title":"Income taxes and stability and stimulation functions of public policy","authors":"Olena Ivashko, Łukasz Wojciechowski, Adam Życzkowski, J. Witkowski","doi":"10.13166/jms/176389","DOIUrl":"https://doi.org/10.13166/jms/176389","url":null,"abstract":"Abstract\u0000The stabilisation function of the state's finances encompasses measures aimed, inter alia, at achieving and maintaining a relatively high rate of economic growth, while limiting negative phenomena, i.e. high unemployment and inflation rates, mitigating business cycle fluctuations, stabilising the money market and making the most effective use of tangible factors of production. The role of the state in the economy and its influence on the behaviour of groups of economic units has undergone dynamic changes over the centuries, both with regard to the forms and scope of influence and the degree of interference of public authorities in the market mechanism\u0000\u0000Streszczenie\u0000Stabilizacyjna funkcja finansów pastwa obejmuje działania mające między innymi powodować osiągnięcie i utrzymanie relatywnie wysokiego tempa wzrostu gospodarczego, przy jednoczesnym ograniczaniu zjawisk negatywnych, tj. wysokiej stopy bezrobocia i inflacji, łagodzeniu wahań cyklu koniunkturalnego, stabilizację rynku pieniężnego oraz możliwie najbardziej efektywne wykorzystanie rzeczowych czynników produkcji. Rola państwa w gospodarce i jego wpływ na zachowanie się grup jednostek gospodarujących ulegała dynamicznym zmianom na przestrzeni wieków, zarówno odniesieniu do form i zakresu oddziaływania, jak i stopnia ingerencji władz publicznych w mechanizm rynkowy.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":"30 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138964972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to present a synthetic diagnostic tool for assessing wokeism in universities, offering a comprehensive framework derived from an extensive literature review. The purpose is to measure and evaluate the level and impact of wokeism, identifying strengths and weaknesses within university contexts. The framework development involves defining dimensions and indicators of wokeism, collecting and analyzing data through diverse sources like surveys and interviews, scoring and ranking wokeism levels.This paper presents a synthetic diagnostic tool designed for the assessment of wokeism in universities. It extensively reviews literature on wokeism, offering a framework for the creation of this diagnostic tool. The provided examples demonstrate practical applications for measuring and evaluating the level and impact of wokeism within university settings.The paper highlights several limitations and implications that warrant consideration. First, the broad and general definition of wokeism employed might overlook nuanced variations within the movement. Second, reliance on secondary sources and hypothetical data raises concerns about the representation of the actual situation of wokeism in universities. Third, the subjective scoring and ranking system employed may lack the validity and reliability required for a comprehensive assessment.The paper proposes directions for future research and practice. It recommends refining and operationalizing the definition and measurement of wokeism, testing and validating the tool and framework with primary and empirical data, and applying more objective and rigorous methods for scoring and ranking.
{"title":"Measuring woke culture in universities: a diagnostic approach","authors":"A. Rzepka, Jan Fazlagić, Imdiyas Ahamed","doi":"10.13166/jms/176387","DOIUrl":"https://doi.org/10.13166/jms/176387","url":null,"abstract":"This paper aims to present a synthetic diagnostic tool for assessing wokeism in universities, offering a comprehensive framework derived from an extensive literature review. The purpose is to measure and evaluate the level and impact of wokeism, identifying strengths and weaknesses within university contexts. The framework development involves defining dimensions and indicators of wokeism, collecting and analyzing data through diverse sources like surveys and interviews, scoring and ranking wokeism levels.This paper presents a synthetic diagnostic tool designed for the assessment of wokeism in universities. It extensively reviews literature on wokeism, offering a framework for the creation of this diagnostic tool. The provided examples demonstrate practical applications for measuring and evaluating the level and impact of wokeism within university settings.The paper highlights several limitations and implications that warrant consideration. First, the broad and general definition of wokeism employed might overlook nuanced variations within the movement. Second, reliance on secondary sources and hypothetical data raises concerns about the representation of the actual situation of wokeism in universities. Third, the subjective scoring and ranking system employed may lack the validity and reliability required for a comprehensive assessment.The paper proposes directions for future research and practice. It recommends refining and operationalizing the definition and measurement of wokeism, testing and validating the tool and framework with primary and empirical data, and applying more objective and rigorous methods for scoring and ranking.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":"105 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138995152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Volodymyr Martynyuk, Artur Dmowski, Marcin Gąsior, Grzegorz Hajduk
The paper presents the possibility of using artificial neural networks (ANN) with radial-basis transmission function (RBF) for modeling of economic phenomena and processes.The basic characteristics and parameters of an ANN with RBF are shown and the advantages of using this type of ANN for modeling economic phenomena and processes are emphasized. Using an ANN with RBF, together with official statistics for 2010-2017, the modeling of the influence caused by work efficiency indicators of the customs authorities of Ukraine on the indicators of economic security of Ukraine was carried out. These eighteen indicators of economic security of Ukraine, which comprehensively characterize the economic status of the country in terms of production, social, financial, food, transport, energy, and foreign economic security, were chosen as the most informative indicators.The results of the study showed that Artificial neural networks with Radial-basis transmission function well describe the trend of changing state economic security indicators under the influence of changing performance indicators of customs authorities. This allows us to recommend this type of artificial neural networks for analysis, evaluation and forecasting of economic phenomena and processes.The results obtained showed good analytical and prognostic properties of an ANN with RBF when modeling the impact of customs authorities' performance on the state's economic security indicators.
{"title":"Economic issue of using artificial neural networks with radial-basis transmission functions for modeling efficiency of management processes","authors":"Volodymyr Martynyuk, Artur Dmowski, Marcin Gąsior, Grzegorz Hajduk","doi":"10.13166/jms/176383","DOIUrl":"https://doi.org/10.13166/jms/176383","url":null,"abstract":"The paper presents the possibility of using artificial neural networks (ANN) with radial-basis transmission function (RBF) for modeling of economic phenomena and processes.The basic characteristics and parameters of an ANN with RBF are shown and the advantages of using this type of ANN for modeling economic phenomena and processes are emphasized. Using an ANN with RBF, together with official statistics for 2010-2017, the modeling of the influence caused by work efficiency indicators of the customs authorities of Ukraine on the indicators of economic security of Ukraine was carried out. These eighteen indicators of economic security of Ukraine, which comprehensively characterize the economic status of the country in terms of production, social, financial, food, transport, energy, and foreign economic security, were chosen as the most informative indicators.The results of the study showed that Artificial neural networks with Radial-basis transmission function well describe the trend of changing state economic security indicators under the influence of changing performance indicators of customs authorities. This allows us to recommend this type of artificial neural networks for analysis, evaluation and forecasting of economic phenomena and processes.The results obtained showed good analytical and prognostic properties of an ANN with RBF when modeling the impact of customs authorities' performance on the state's economic security indicators.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":"216 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139174228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}