首页 > 最新文献

Journal of modern science最新文献

英文 中文
Eastern European perspective on Security Studies. Lessons from Poland 东欧安全研究视角。波兰的经验教训
Pub Date : 2023-12-30 DOI: 10.13166/jms/175509
Janusz Gierszewski, P. Tomaszewski, P. Siemiątkowski
The aim of the article is to determine the directions of research conducted in the field of security, and realized by the most frequently cited (according to popular bibliometric databases) scholars. On this basis, the frequency of selection of research areas of Polish scientists dealing with issues in the field of security was determined.The text presents the author's conclusions from a cross-sectional analysis of Scopus and Google Scholar databases of the most frequently cited authors. The selection of sources was based on several citation indices. Foreign publications were selected in the field of social science on the basis of citations from the internationally recognized and prestigious Scopus database . The analysis refers to the years 2015-2020, as this is the period in which the scientific discipline took shape.Polish research, despite raising often important from the point of view of world security problems, is not very noticed in the world. There are several reasons for this. First of all, until recently, it was published mainly in Polish. Secondly, local scientific periodicals or multi-author monographs were usually chosen as the place of publication.The Polish literature is dominated by topics related to internal security, such as: public and general security (crisis management), social security, cultural security, etc. Another theme is terrorism (along with its varieties), which is replaced by other problems, such as: the aging of society, the relationship between security and development, or the problems of migration. They mostly refer to regional or even local problems.
本文旨在确定安全领域的研究方向,以及最常被引用(根据流行的文献计量数据库)的学者的研究方向。在此基础上,确定了波兰科学家在处理安全领域问题时选择研究领域的频率。文中介绍了作者对 Scopus 和 Google Scholar 数据库中被引用次数最多的作者进行横向分析后得出的结论。资料来源的选择以若干引用指数为依据。根据国际公认的著名 Scopus 数据库的引用情况,选择了社会科学领域的国外出版物。波兰的研究尽管从世界安全问题的角度来看往往具有重要意义,但在世界上却并不引人注意。这有几个原因。首先,直到最近,研究成果主要以波兰文发表。其次,通常选择当地的科学期刊或多作者专著作为出版地。波兰的文献主要是与国内安全有关的主题,如:公共和一般安全(危机管理)、社会安全、文化安全等。另一个主题是恐怖主义(及其各种形式),取而代之的是其他问题,如:社会老龄化、安全与发展之间的关系或移民问题。它们大多涉及地区甚至地方问题。
{"title":"Eastern European perspective on Security Studies. Lessons from Poland","authors":"Janusz Gierszewski, P. Tomaszewski, P. Siemiątkowski","doi":"10.13166/jms/175509","DOIUrl":"https://doi.org/10.13166/jms/175509","url":null,"abstract":"The aim of the article is to determine the directions of research conducted in the field of security, and realized by the most frequently cited (according to popular bibliometric databases) scholars. On this basis, the frequency of selection of research areas of Polish scientists dealing with issues in the field of security was determined.The text presents the author's conclusions from a cross-sectional analysis of Scopus and Google Scholar databases of the most frequently cited authors. The selection of sources was based on several citation indices. Foreign publications were selected in the field of social science on the basis of citations from the internationally recognized and prestigious Scopus database . The analysis refers to the years 2015-2020, as this is the period in which the scientific discipline took shape.Polish research, despite raising often important from the point of view of world security problems, is not very noticed in the world. There are several reasons for this. First of all, until recently, it was published mainly in Polish. Secondly, local scientific periodicals or multi-author monographs were usually chosen as the place of publication.The Polish literature is dominated by topics related to internal security, such as: public and general security (crisis management), social security, cultural security, etc. Another theme is terrorism (along with its varieties), which is replaced by other problems, such as: the aging of society, the relationship between security and development, or the problems of migration. They mostly refer to regional or even local problems.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139137563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulators used in training for internal safety purposes 用于内部安全培训的模拟器
Pub Date : 2023-12-30 DOI: 10.13166/jms/175156
Andrzej Czesław Urban
The author of the article is trying to solve the research problem posed in the form of a question: in what way can the simulators be used in training sessions for the sake of safety and what is the level of effectiveness of such training sessions? The author uses theoretical and empirical methods in order to address the research problem. Simulators taken advantage of in the Police Academy as well as their capabilities and ways of usage, during the training or drilling sessions, have been described in the article. In the last part of the article, the results of the evaluation of the training sessions, using the simulators, have been indicated. he author of the article is trying to solve the research problem posed in the form of a question: in what way can the simulators be used in training sessions for the sake of safety and what is the level of effectiveness of such training sessions? The author uses theoretical and empirical methods in order to address the research problem. Simulators taken advantage of in the Police Academy as well as their capabilities and ways of usage, during the training or drilling sessions, have been described in the article. In the last part of the article, the results of the evaluation of the training sessions, using the simulators, have been indicated.
文章作者试图解决以问题形式提出的研究问题:为了安全起见,模拟器可以以何种方式用于培训课程?作者采用理论和实证方法来解决研究问题。文章介绍了警察学院使用的模拟器,以及在培训或演习过程中模拟器的功能和使用方法。文章最后一部分介绍了使用模拟器进行培训的评估结果。 文章作者试图解决以问题形式提出的研究课题:为了安全起见,模拟器在培训中的使用方式是什么?作者采用理论和实证方法来解决研究问题。文章介绍了警察学院使用的模拟器,以及在培训或演习过程中模拟器的功能和使用方法。文章的最后一部分介绍了使用模拟器对培训课程进行评估的结果。
{"title":"Simulators used in training for internal safety purposes","authors":"Andrzej Czesław Urban","doi":"10.13166/jms/175156","DOIUrl":"https://doi.org/10.13166/jms/175156","url":null,"abstract":"The author of the article is trying to solve the research problem posed in the form of a question: in what way can the simulators be used in training sessions for the sake of safety and what is the level of effectiveness of such training sessions? The author uses theoretical and empirical methods in order to address the research problem. Simulators taken advantage of in the Police Academy as well as their capabilities and ways of usage, during the training or drilling sessions, have been described in the article. In the last part of the article, the results of the evaluation of the training sessions, using the simulators, have been indicated. he author of the article is trying to solve the research problem posed in the form of a question: in what way can the simulators be used in training sessions for the sake of safety and what is the level of effectiveness of such training sessions? The author uses theoretical and empirical methods in order to address the research problem. Simulators taken advantage of in the Police Academy as well as their capabilities and ways of usage, during the training or drilling sessions, have been described in the article. In the last part of the article, the results of the evaluation of the training sessions, using the simulators, have been indicated.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139138164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of Big Data and Data Science in the context of information security and cybersecurity 大数据和数据科学在信息安全和网络安全方面的作用
Pub Date : 2023-12-30 DOI: 10.13166/jms/177036
Dariusz Prokopowicz, Anna Gołębiowska, Małgorzata Such-Pyrgiel
In the area of the fastest growing fields of ICT technology which determine the successive stages of progress in the field of online electronic banking, it is necessary to disseminate standards for conducting financial operations carried out in the so-called cloud as well as using the large data sets located in the so-called Big Data platforms.For the purposes of this article, research has been carried out on the broad issue of Big Data Analytics applications in the context of social, normative, economic, environmental, climate aspects. A questionnaire survey was conducted. The method of analysis of literature sources concerning the subject of the article was applied.Currently emerging trends in the development of technology based on Big Data dataset platforms usually allow to perform multidimensional calculations and reported results of analyzes in real time. The analyzes conducted on huge data sets allow for comprehensive, multi-aspect risk assessments at the level of the whole entity. During the SARS-CoV-2 (Covid-19) coronavirus pandemic, there was an increase in the importance of analytics based on Big Data Analytics. During the pandemic, there was also an increase in the digitisation and internetisation of business processes. This also resulted in an increase in the scale of cybercrime development.The technological revolution currently taking place, defined as Industry 4.0, is motivated by the development of the following factors: Big Data database technologies, cloud computing, machine learning, Internet of Things, artificial intelligence, Business Intelligence and other technologies of advanced data processing Data Mining. On the basis of the development new technological solutions, in recent years there has been a dynamic development of Big Data Analytics.
在决定在线电子银行业务连续发展阶段的信息和通信技术领域中,有必要推广在所谓的云中开展金融业务的标准,以及使用所谓的大数据平台中的大型数据集的标准。进行了问卷调查。目前,基于大数据数据集平台的新兴技术发展趋势通常允许执行多维计算并实时报告分析结果。通过对海量数据集进行分析,可以在整个实体层面进行全面、多角度的风险评估。在 SARS-CoV-2(Covid-19)冠状病毒大流行期间,基于大数据分析的分析变得更加重要。疫情期间,业务流程的数字化和互联网化程度也有所提高。目前正在进行的技术革命被定义为 "工业 4.0",其动力来自以下因素的发展:大数据数据库技术、云计算、机器学习、物联网、人工智能、商业智能和其他先进的数据处理数据挖掘技术。在开发新技术解决方案的基础上,近年来大数据分析得到了蓬勃发展。
{"title":"The role of Big Data and Data Science in the context of information security and cybersecurity","authors":"Dariusz Prokopowicz, Anna Gołębiowska, Małgorzata Such-Pyrgiel","doi":"10.13166/jms/177036","DOIUrl":"https://doi.org/10.13166/jms/177036","url":null,"abstract":"In the area of the fastest growing fields of ICT technology which determine the successive stages of progress in the field of online electronic banking, it is necessary to disseminate standards for conducting financial operations carried out in the so-called cloud as well as using the large data sets located in the so-called Big Data platforms.For the purposes of this article, research has been carried out on the broad issue of Big Data Analytics applications in the context of social, normative, economic, environmental, climate aspects. A questionnaire survey was conducted. The method of analysis of literature sources concerning the subject of the article was applied.Currently emerging trends in the development of technology based on Big Data dataset platforms usually allow to perform multidimensional calculations and reported results of analyzes in real time. The analyzes conducted on huge data sets allow for comprehensive, multi-aspect risk assessments at the level of the whole entity. During the SARS-CoV-2 (Covid-19) coronavirus pandemic, there was an increase in the importance of analytics based on Big Data Analytics. During the pandemic, there was also an increase in the digitisation and internetisation of business processes. This also resulted in an increase in the scale of cybercrime development.The technological revolution currently taking place, defined as Industry 4.0, is motivated by the development of the following factors: Big Data database technologies, cloud computing, machine learning, Internet of Things, artificial intelligence, Business Intelligence and other technologies of advanced data processing Data Mining. On the basis of the development new technological solutions, in recent years there has been a dynamic development of Big Data Analytics.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139141583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptualising securitisation in the field of cyber security policy 网络安全政策领域的安全概念化
Pub Date : 2023-12-30 DOI: 10.13166/jms/176103
Marek Górka
This article will attempt to analyse securitisation theory to explore the discursive features of cyber security, using a multi-actor approach that considers the role of state and non-state actors in the creation and management of cyber security discourses.The paper aims to assess the contribution of securitization theory to the understanding of both traditional and contemporary security policy issues. More specifically, it is an attempt to reflect on the identification of the challenges facing the modern state.Growing dependence on digital technology is inevitable, making the future more threatening than the present. Cyber technology is inherently vulnerable and thus impossible to fully secure. The call for "greater security" becomes justified because the more a country depends on cyber technology, the more inevitable cyber threats become. They are consistently treated by government circles as a security challenge, meaning that the problem is presented as an existential threat, requiring emergency measures and justifying action beyond the normal bounds of political procedure.As some conclusion and conclusion, it is worth reiterating observations about the multi-stakeholder nature of cyber security and observations about the co-creation of this security by a wide range of actors representing different and in some cases conflicting interests. It can be argued that there is no single discourse on cyber security or cyber threats, and it is simplistic to assume that there is even a single discourse that represents every securitization actor, be it government or the private sector. This diversity explains why the assumption and logic of securitization theory can only apply to some, but not all, cyber security discourses.
本文将尝试分析安全化理论,探讨网络安全的话语特征,采用多行为体方法,考虑国家和非国家行为体在创建和管理网络安全话语中的作用。本文旨在评估安全化理论对理解传统和当代安全政策问题的贡献。更具体地说,本文试图反思现代国家所面临挑战的识别问题。对数字技术的日益依赖是不可避免的,这使得未来比现在更具威胁性。网络技术本质上是脆弱的,因此不可能完全安全。一个国家对网络技术的依赖程度越高,网络威胁就越不可避免,因此 "加强安全 "的呼声也就越高。政府始终将网络威胁视为一种安全挑战,这意味着问题被视为一种生存威胁,需要采取紧急措施,并有理由采取超出正常政治程序范围的行动。作为结论和总结,值得重申的是,网络安全具有多方利益相关者的性质,代表不同利益(有时甚至是相互冲突的利益)的众多参与者共同创造了这种安全。可以说,关于网络安全或网络威胁并不存在单一的论述,甚至认为存在一种单一的论述来代表每一个安全行为者(无论是政府还是私营部门)也是简单化的。这种多样性解释了为什么安全化理论的假设和逻辑只能适用于某些而非所有网络安全论述。
{"title":"Conceptualising securitisation in the field of cyber security policy","authors":"Marek Górka","doi":"10.13166/jms/176103","DOIUrl":"https://doi.org/10.13166/jms/176103","url":null,"abstract":"This article will attempt to analyse securitisation theory to explore the discursive features of cyber security, using a multi-actor approach that considers the role of state and non-state actors in the creation and management of cyber security discourses.The paper aims to assess the contribution of securitization theory to the understanding of both traditional and contemporary security policy issues. More specifically, it is an attempt to reflect on the identification of the challenges facing the modern state.Growing dependence on digital technology is inevitable, making the future more threatening than the present. Cyber technology is inherently vulnerable and thus impossible to fully secure. The call for \"greater security\" becomes justified because the more a country depends on cyber technology, the more inevitable cyber threats become. They are consistently treated by government circles as a security challenge, meaning that the problem is presented as an existential threat, requiring emergency measures and justifying action beyond the normal bounds of political procedure.As some conclusion and conclusion, it is worth reiterating observations about the multi-stakeholder nature of cyber security and observations about the co-creation of this security by a wide range of actors representing different and in some cases conflicting interests. It can be argued that there is no single discourse on cyber security or cyber threats, and it is simplistic to assume that there is even a single discourse that represents every securitization actor, be it government or the private sector. This diversity explains why the assumption and logic of securitization theory can only apply to some, but not all, cyber security discourses.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139137361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information and modern technologies as an asymmetric threat to state security. Philosophical perspective. 信息和现代技术是对国家安全的不对称威胁。哲学视角。
Pub Date : 2023-12-30 DOI: 10.13166/jms/175514
Arnold Warchał, K. Piotrkowski
Rapid evolution and progress in computer sciences present new determinants for informational technologies. The universal knowledge based on Mathematics and Computer science exploring processes in information dissemination, should be persistently analyzed. Its focus on practical applicability presents various problems and new possibilities for the field of Security Studies, adding new categories to its research interests, that should be constantly defined and redefined. And what is the objective of the article.The descriptive methodology used in the article is limited to a presentation of philosophical categories, as it allows for defining of chosen problems that correspond, upon analysis, to asymmetric threats mounting from IT evolution.The predicaments of technological evolution in view o the categories arising through philosophical focus, presented here by authors and as applied in Security studies, point to definitions and associated categories of potential dangers that IT progress may entail. Hence, the presentation of three categories analyzed – information, communication, asymmetric threat, and the following analysis of categories of threats with asymmetric values, as a potential nuisance and danger to state security, related to those categories.And as is concluded, the new developments, as discussed in the article, present challenges for state security and are presently evolving. Hence, those should be constantly categorized and associated with security predicaments – active and potential.
计算机科学的迅速发展和进步为信息技术提供了新的决定因素。应坚持不懈地分析以数学和计算机科学为基础的、探索信息传播过程的普遍知识。对实际应用的关注为安全研究领域带来了各种问题和新的可能性,为其研究兴趣增添了新的类别,应不断对其进行定义和重新定义。本文所使用的描述性方法仅限于对哲学范畴的介绍,因为它允许对所选问题进行定义,这些问题经分析后与信息技术发展所带来的非对称威胁相对应。作者在本文中介绍了哲学焦点所产生的技术发展困境,并将其应用于安全研究中,指出了信息技术发展可能带来的潜在危险的定义和相关类别。因此,本文分析了三个类别--信息、通信和非对称威胁,并分析了与这些类别相关的具有非对称价值的威胁类别,它们是对国家安全的潜在滋扰和危险。因此,应不断对这些挑战进行分类,并将其与安全困境--积极的和潜在的安全困境--联系起来。
{"title":"Information and modern technologies as an asymmetric threat to state security. Philosophical perspective.","authors":"Arnold Warchał, K. Piotrkowski","doi":"10.13166/jms/175514","DOIUrl":"https://doi.org/10.13166/jms/175514","url":null,"abstract":"Rapid evolution and progress in computer sciences present new determinants for informational technologies. The universal knowledge based on Mathematics and Computer science exploring processes in information dissemination, should be persistently analyzed. Its focus on practical applicability presents various problems and new possibilities for the field of Security Studies, adding new categories to its research interests, that should be constantly defined and redefined. And what is the objective of the article.The descriptive methodology used in the article is limited to a presentation of philosophical categories, as it allows for defining of chosen problems that correspond, upon analysis, to asymmetric threats mounting from IT evolution.The predicaments of technological evolution in view o the categories arising through philosophical focus, presented here by authors and as applied in Security studies, point to definitions and associated categories of potential dangers that IT progress may entail. Hence, the presentation of three categories analyzed – information, communication, asymmetric threat, and the following analysis of categories of threats with asymmetric values, as a potential nuisance and danger to state security, related to those categories.And as is concluded, the new developments, as discussed in the article, present challenges for state security and are presently evolving. Hence, those should be constantly categorized and associated with security predicaments – active and potential.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139138134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relations between information science and information security culture 信息科学与信息安全文化之间的关系
Pub Date : 2023-12-30 DOI: 10.13166/jms/175510
Bogusław Jagusiak, Piotr Zaskórski
The aim of the article is to present the relations that exist between the culture of information security and information sciences.desk research, Literature criticism, Synthesis, Comparative analysis.The ability to manage information correctly is essential from the point of view of security. As a result, one may conduct research with the aim of developing optimised actions concerning information management and determine the borders between the security of information and informational security. In this aspect, the scientific considerations should also include studies of the relations that exist between information management and information security management. In order to manage security efficiently, it is necessary to understand the nature of security and to know the current challenges and threats.In a world where IT tools are an indispensable element of daily human activities, information science has a strong influence on the information security culture. These areas of activity mainly include the development of security technologies, where information science strives to develop systems that would effectively protect users from threats such as distortion or data loss.. Another sphere is education for employees about information security, which would help develop appropriate models for an information security culture. Another important aspect is the human awareness of threats that may be encountered during the use of IT tools or platforms. The final aspect that should be considered is risk management. Information science enables analysis to be conducted regarding risks related to information security and to treat them as the basis for developing optimum action plans in the event of an emergence of threat.
从安全的角度来看,正确管理信息的能力至关重要。因此,我们可以开展研究,以制定有关信息管理的优化行动,并确定信息安全与信息安全之间的界限。在这方面,科学考虑还应包括对信息管理和信息安全管理之间关系的研究。为了有效地进行安全管理,有必要了解安全的本质,了解当前的挑战和威胁。在信息技术工具已成为人类日常活动中不可或缺的元素的世界里,信息科学对信息安全文化有着巨大的影响。这些活动领域主要包括安全技术的开发,信息科学致力于开发能够有效保护用户免受篡改或数据丢失等威胁的系统。另一个领域是对员工进行信息安全教育,这将有助于建立适当的信息安全文化模式。另一个重要方面是人对使用信息技术工具或平台过程中可能遇到的威胁的认识。最后一个需要考虑的方面是风险管理。信息科学可以对与信息安全有关的风险进行分析,并在出现威胁时将其作为制定最佳行动计划的基础。
{"title":"Relations between information science and information security culture","authors":"Bogusław Jagusiak, Piotr Zaskórski","doi":"10.13166/jms/175510","DOIUrl":"https://doi.org/10.13166/jms/175510","url":null,"abstract":"The aim of the article is to present the relations that exist between the culture of information security and information sciences.desk research, Literature criticism, Synthesis, Comparative analysis.The ability to manage information correctly is essential from the point of view of security. As a result, one may conduct research with the aim of developing optimised actions concerning information management and determine the borders between the security of information and informational security. In this aspect, the scientific considerations should also include studies of the relations that exist between information management and information security management. In order to manage security efficiently, it is necessary to understand the nature of security and to know the current challenges and threats.In a world where IT tools are an indispensable element of daily human activities, information science has a strong influence on the information security culture. These areas of activity mainly include the development of security technologies, where information science strives to develop systems that would effectively protect users from threats such as distortion or data loss.. Another sphere is education for employees about information security, which would help develop appropriate models for an information security culture. Another important aspect is the human awareness of threats that may be encountered during the use of IT tools or platforms. The final aspect that should be considered is risk management. Information science enables analysis to be conducted regarding risks related to information security and to treat them as the basis for developing optimum action plans in the event of an emergence of threat.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139139227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
InsurTech and private international law considerations 保险科技和国际私法考虑因素
Pub Date : 2023-12-30 DOI: 10.13166/jms/175515
M. Załucki
InsurTech is a new and interesting phenomenon, linked to the use of new technologies, such as artificial intelligence or distributed ledger technology, in the insurance sector. The factual and legal nature of relationships in this area, due to their heterogeneous and complex international character, raises many questions. Some of these relate to private international law, where conflict situations raise questions such as which law (the law of which state) is the substantive law applicable to resolve these situations. Presenting the complexity of this area, this statement describes possible solutions and reflects on the need and potential of applying private international law in the InsurTech sector. It introduces the InsurTech phenomenon, presents its links with private international law, reflects on the adaptability of existing mechanisms of this law to highly technological legal relations, and concludes by an attempt to indicate how to combine InsurTech and private international law, and whether this is possible at all.The work was written using standard scientific methods for legal science. It is primarily a dogmatic work, but also reaches for comparative legal elements. This choice of methods is justified by the presented issues.The result of the research is an assessment as to the possible use of private international law tools for the problems that arise with InsurTech instruments.The author points out that the currently known private international law instruments are not suited to the modern requirements of the insurance services sector, especially in the context of the use of artificial intelligence or DLT technology (blockchain, smart contract) in the sector.
保险科技(InsurTech)是一种有趣的新现象,与人工智能或分布式账本技术等新技术在保险领域的应用有关。该领域关系的事实和法律性质,由于其异质性和复杂的国际性,引发了许多问题。其中一些问题与国际私法有关,冲突情况引起的问题包括哪部法律(哪个国家的法律)是解决这些情况所适用的实体法。本陈述介绍了这一领域的复杂性,描述了可能的解决方案,并思考了在保险科技领域适用国际私法的必要性和潜力。它介绍了保险科技(InsurTech)现象,介绍了其与国际私法的联系,反思了该法现有机制对高度技术化法律关系的适应性,最后试图指出如何将保险科技与国际私法结合起来,以及这是否可能。该著作主要是一部教条主义著作,但也涉及比较法律要素。作者指出,目前已知的国际私法文书并不适合保险服务行业的现代要求,尤其是在该行业使用人工智能或 DLT 技术(区块链、智能合约)的背景下。
{"title":"InsurTech and private international law considerations","authors":"M. Załucki","doi":"10.13166/jms/175515","DOIUrl":"https://doi.org/10.13166/jms/175515","url":null,"abstract":"InsurTech is a new and interesting phenomenon, linked to the use of new technologies, such as artificial intelligence or distributed ledger technology, in the insurance sector. The factual and legal nature of relationships in this area, due to their heterogeneous and complex international character, raises many questions. Some of these relate to private international law, where conflict situations raise questions such as which law (the law of which state) is the substantive law applicable to resolve these situations. Presenting the complexity of this area, this statement describes possible solutions and reflects on the need and potential of applying private international law in the InsurTech sector. It introduces the InsurTech phenomenon, presents its links with private international law, reflects on the adaptability of existing mechanisms of this law to highly technological legal relations, and concludes by an attempt to indicate how to combine InsurTech and private international law, and whether this is possible at all.The work was written using standard scientific methods for legal science. It is primarily a dogmatic work, but also reaches for comparative legal elements. This choice of methods is justified by the presented issues.The result of the research is an assessment as to the possible use of private international law tools for the problems that arise with InsurTech instruments.The author points out that the currently known private international law instruments are not suited to the modern requirements of the insurance services sector, especially in the context of the use of artificial intelligence or DLT technology (blockchain, smart contract) in the sector.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139142267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Income taxes and stability and stimulation functions of public policy 所得税与公共政策的稳定和刺激功能
Pub Date : 2023-12-18 DOI: 10.13166/jms/176389
Olena Ivashko, Łukasz Wojciechowski, Adam Życzkowski, J. Witkowski
AbstractThe stabilisation function of the state's finances encompasses measures aimed, inter alia, at achieving and maintaining a relatively high rate of economic growth, while limiting negative phenomena, i.e. high unemployment and inflation rates, mitigating business cycle fluctuations, stabilising the money market and making the most effective use of tangible factors of production. The role of the state in the economy and its influence on the behaviour of groups of economic units has undergone dynamic changes over the centuries, both with regard to the forms and scope of influence and the degree of interference of public authorities in the market mechanismStreszczenieStabilizacyjna funkcja finansów pastwa obejmuje działania mające między innymi powodować osiągnięcie i utrzymanie relatywnie wysokiego tempa wzrostu gospodarczego, przy jednoczesnym ograniczaniu zjawisk negatywnych, tj. wysokiej stopy bezrobocia i inflacji, łagodzeniu wahań cyklu koniunkturalnego, stabilizację rynku pieniężnego oraz możliwie najbardziej efektywne wykorzystanie rzeczowych czynników produkcji. Rola państwa w gospodarce i jego wpływ na zachowanie się grup jednostek gospodarujących ulegała dynamicznym zmianom na przestrzeni wieków, zarówno odniesieniu do form i zakresu oddziaływania, jak i stopnia ingerencji władz publicznych w mechanizm rynkowy.
摘要 国家财政的稳定职能包括采取各种措施,特别是旨在实现和保持较高的经济增长率,同时限制负面现象,即高失业率和高通货膨胀率,缓解商业周期波动,稳定货币市场和最有效地利用有形生产要素。几个世纪以来,国家在经济中的作用及其对经济单位群体行为的影响,无论是在影响的形式和范围方面,还是在公共当局对市场机制的干预程度方面,都经历了动态的变化。摘要 国家财政的稳定职能包括旨在实现和保持相对较高的经济增长率,同时限制负面现象(即高失业率和高通货膨胀率)、减缓商业周期波动、稳定货币市场以及最有效地利用有形生产要素等活动。几个世纪以来,国家在经济中的作用及其对经济单位群体行为的影响,无论是在影响的形式和范围方面,还是在公共当局对市场机制的干预程度方面,都经历了动态的变化。
{"title":"Income taxes and stability and stimulation functions of public policy","authors":"Olena Ivashko, Łukasz Wojciechowski, Adam Życzkowski, J. Witkowski","doi":"10.13166/jms/176389","DOIUrl":"https://doi.org/10.13166/jms/176389","url":null,"abstract":"Abstract\u0000The stabilisation function of the state's finances encompasses measures aimed, inter alia, at achieving and maintaining a relatively high rate of economic growth, while limiting negative phenomena, i.e. high unemployment and inflation rates, mitigating business cycle fluctuations, stabilising the money market and making the most effective use of tangible factors of production. The role of the state in the economy and its influence on the behaviour of groups of economic units has undergone dynamic changes over the centuries, both with regard to the forms and scope of influence and the degree of interference of public authorities in the market mechanism\u0000\u0000Streszczenie\u0000Stabilizacyjna funkcja finansów pastwa obejmuje działania mające między innymi powodować osiągnięcie i utrzymanie relatywnie wysokiego tempa wzrostu gospodarczego, przy jednoczesnym ograniczaniu zjawisk negatywnych, tj. wysokiej stopy bezrobocia i inflacji, łagodzeniu wahań cyklu koniunkturalnego, stabilizację rynku pieniężnego oraz możliwie najbardziej efektywne wykorzystanie rzeczowych czynników produkcji. Rola państwa w gospodarce i jego wpływ na zachowanie się grup jednostek gospodarujących ulegała dynamicznym zmianom na przestrzeni wieków, zarówno odniesieniu do form i zakresu oddziaływania, jak i stopnia ingerencji władz publicznych w mechanizm rynkowy.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138964972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring woke culture in universities: a diagnostic approach 衡量大学清醒文化:一种诊断方法
Pub Date : 2023-12-18 DOI: 10.13166/jms/176387
A. Rzepka, Jan Fazlagić, Imdiyas Ahamed
This paper aims to present a synthetic diagnostic tool for assessing wokeism in universities, offering a comprehensive framework derived from an extensive literature review. The purpose is to measure and evaluate the level and impact of wokeism, identifying strengths and weaknesses within university contexts. The framework development involves defining dimensions and indicators of wokeism, collecting and analyzing data through diverse sources like surveys and interviews, scoring and ranking wokeism levels.This paper presents a synthetic diagnostic tool designed for the assessment of wokeism in universities. It extensively reviews literature on wokeism, offering a framework for the creation of this diagnostic tool. The provided examples demonstrate practical applications for measuring and evaluating the level and impact of wokeism within university settings.The paper highlights several limitations and implications that warrant consideration. First, the broad and general definition of wokeism employed might overlook nuanced variations within the movement. Second, reliance on secondary sources and hypothetical data raises concerns about the representation of the actual situation of wokeism in universities. Third, the subjective scoring and ranking system employed may lack the validity and reliability required for a comprehensive assessment.The paper proposes directions for future research and practice. It recommends refining and operationalizing the definition and measurement of wokeism, testing and validating the tool and framework with primary and empirical data, and applying more objective and rigorous methods for scoring and ranking.
本文旨在介绍一种综合诊断工具,用于评估大学中的觉醒主义,提供了一个从广泛的文献综述中得出的综合框架。其目的是衡量和评估觉醒主义的程度和影响,找出大学环境中的优势和劣势。该框架的开发包括定义觉醒主义的维度和指标,通过调查和访谈等不同来源收集和分析数据,对觉醒主义水平进行评分和排序。本文广泛综述了有关觉醒主义的文献,为创建这一诊断工具提供了一个框架。所提供的示例展示了在大学环境中衡量和评估觉醒主义的程度和影响的实际应用。首先,对觉醒主义所采用的广泛而笼统的定义可能会忽略该运动内部的细微差别。其次,对二手资料和假设数据的依赖引发了对大学中觉醒主义实际情况代表性的担忧。第三,采用的主观评分和排名系统可能缺乏全面评估所需的有效性和可靠性。论文提出了未来研究和实践的方向,建议完善和操作化清醒主义的定义和测量方法,用原始数据和经验数据测试和验证工具和框架,并采用更加客观和严格的方法进行评分和排名。
{"title":"Measuring woke culture in universities: a diagnostic approach","authors":"A. Rzepka, Jan Fazlagić, Imdiyas Ahamed","doi":"10.13166/jms/176387","DOIUrl":"https://doi.org/10.13166/jms/176387","url":null,"abstract":"This paper aims to present a synthetic diagnostic tool for assessing wokeism in universities, offering a comprehensive framework derived from an extensive literature review. The purpose is to measure and evaluate the level and impact of wokeism, identifying strengths and weaknesses within university contexts. The framework development involves defining dimensions and indicators of wokeism, collecting and analyzing data through diverse sources like surveys and interviews, scoring and ranking wokeism levels.This paper presents a synthetic diagnostic tool designed for the assessment of wokeism in universities. It extensively reviews literature on wokeism, offering a framework for the creation of this diagnostic tool. The provided examples demonstrate practical applications for measuring and evaluating the level and impact of wokeism within university settings.The paper highlights several limitations and implications that warrant consideration. First, the broad and general definition of wokeism employed might overlook nuanced variations within the movement. Second, reliance on secondary sources and hypothetical data raises concerns about the representation of the actual situation of wokeism in universities. Third, the subjective scoring and ranking system employed may lack the validity and reliability required for a comprehensive assessment.The paper proposes directions for future research and practice. It recommends refining and operationalizing the definition and measurement of wokeism, testing and validating the tool and framework with primary and empirical data, and applying more objective and rigorous methods for scoring and ranking.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138995152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Economic issue of using artificial neural networks with radial-basis transmission functions for modeling efficiency of management processes 利用带有径向基础传输函数的人工神经网络建立管理过程效率模型的经济问题
Pub Date : 2023-12-18 DOI: 10.13166/jms/176383
Volodymyr Martynyuk, Artur Dmowski, Marcin Gąsior, Grzegorz Hajduk
The paper presents the possibility of using artificial neural networks (ANN) with radial-basis transmission function (RBF) for modeling of economic phenomena and processes.The basic characteristics and parameters of an ANN with RBF are shown and the advantages of using this type of ANN for modeling economic phenomena and processes are emphasized. Using an ANN with RBF, together with official statistics for 2010-2017, the modeling of the influence caused by work efficiency indicators of the customs authorities of Ukraine on the indicators of economic security of Ukraine was carried out. These eighteen indicators of economic security of Ukraine, which comprehensively characterize the economic status of the country in terms of production, social, financial, food, transport, energy, and foreign economic security, were chosen as the most informative indicators.The results of the study showed that Artificial neural networks with Radial-basis transmission function well describe the trend of changing state economic security indicators under the influence of changing performance indicators of customs authorities. This allows us to recommend this type of artificial neural networks for analysis, evaluation and forecasting of economic phenomena and processes.The results obtained showed good analytical and prognostic properties of an ANN with RBF when modeling the impact of customs authorities' performance on the state's economic security indicators.
论文介绍了使用具有径向基传输函数(RBF)的人工神经网络(ANN)对经济现象和过程进行建模的可能性。论文展示了具有 RBF 的人工神经网络的基本特征和参数,并强调了使用这种类型的人工神经网络对经济现象和过程进行建模的优势。利用带 RBF 的方差网络,结合 2010-2017 年的官方统计数据,对乌克兰海关当局的工作效率指标对乌克兰经济安全指标的影响进行了建模。研究结果表明,具有径向基础传输函数的人工神经网络能够很好地描述国家经济安全指标在海关当局工作效率指标变化影响下的变化趋势。研究结果表明,在建立海关当局绩效对国家经济安全指标影响的模型时,具有径向基础传输函数的人工神经网络具有良好的分析和预测性能。
{"title":"Economic issue of using artificial neural networks with radial-basis transmission functions for modeling efficiency of management processes","authors":"Volodymyr Martynyuk, Artur Dmowski, Marcin Gąsior, Grzegorz Hajduk","doi":"10.13166/jms/176383","DOIUrl":"https://doi.org/10.13166/jms/176383","url":null,"abstract":"The paper presents the possibility of using artificial neural networks (ANN) with radial-basis transmission function (RBF) for modeling of economic phenomena and processes.The basic characteristics and parameters of an ANN with RBF are shown and the advantages of using this type of ANN for modeling economic phenomena and processes are emphasized. Using an ANN with RBF, together with official statistics for 2010-2017, the modeling of the influence caused by work efficiency indicators of the customs authorities of Ukraine on the indicators of economic security of Ukraine was carried out. These eighteen indicators of economic security of Ukraine, which comprehensively characterize the economic status of the country in terms of production, social, financial, food, transport, energy, and foreign economic security, were chosen as the most informative indicators.The results of the study showed that Artificial neural networks with Radial-basis transmission function well describe the trend of changing state economic security indicators under the influence of changing performance indicators of customs authorities. This allows us to recommend this type of artificial neural networks for analysis, evaluation and forecasting of economic phenomena and processes.The results obtained showed good analytical and prognostic properties of an ANN with RBF when modeling the impact of customs authorities' performance on the state's economic security indicators.","PeriodicalId":16359,"journal":{"name":"Journal of modern science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139174228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of modern science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1