Pub Date : 2019-06-28DOI: 10.5604/01.3001.0013.5191
Jakub Tartak
The paper addresses racism as a key contemporary challenge to safety at football matches in Europe. The hypothesis is that racism does occur in the sports environment. To prepare the paper, press excerpts and scholarly publications on racism were used. To interpret the material, comparative method was used, so as to present the environments that harm safety in sports. The goal was to demonstrate the role of education in fighting discrimination in contemporary European football and the need to care for security culture in football. It is because football stadiums become arenas for expressing political and ideological views, as well as for racist at-tacks. The author points at the role of mass media and public entities in shaping social atti-tudes concerning racism in sports. He also indicates shortcomings in the law and in the activi-ties of the institutions overseeing sportspeople’s and sports activists’ safety. The conclusion is that the upbringing of society as regards tolerance and respect must become a priority in fighting racism in sports. Further research should focus on the education of children and ado-lescents and on introducing costly and effective sanctions for the individuals and entities that violate the rule of respecting one’s sports competitor.
{"title":"The problem of racism in European football","authors":"Jakub Tartak","doi":"10.5604/01.3001.0013.5191","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5191","url":null,"abstract":"The paper addresses racism as a key contemporary challenge to safety at football matches in Europe. The hypothesis is that racism does occur in the sports environment. To prepare the paper, press excerpts and scholarly publications on racism were used. To interpret the material, comparative method was used, so as to present the environments that harm safety in sports. The goal was to demonstrate the role of education in fighting discrimination in contemporary European football and the need to care for security culture in football. It is because football stadiums become arenas for expressing political and ideological views, as well as for racist at-tacks. The author points at the role of mass media and public entities in shaping social atti-tudes concerning racism in sports. He also indicates shortcomings in the law and in the activi-ties of the institutions overseeing sportspeople’s and sports activists’ safety. The conclusion is that the upbringing of society as regards tolerance and respect must become a priority in fighting racism in sports. Further research should focus on the education of children and ado-lescents and on introducing costly and effective sanctions for the individuals and entities that violate the rule of respecting one’s sports competitor.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133450781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.5604/01.3001.0013.5188
S. Minchenko, Hanna Shcherbakova
The article presents current tendencies related to juvenile delinquency in Ukraine based on data from the 2016–2017 period. Quantitative juvenile delinquency indices differ substantially from quantitative adult crime indices. This is primarily caused by the fact that the former apply to a four-year period (14–18 years of age), while the latter apply to the period after reaching the age of majority. Differences between juvenile and adult crime also manifest in the form of e.g. the nature and degree of social harm inflicted by the crimes, which is determined by the age of the perpetrators. Their age is not only related to the socio-psychological profiles of offenders, but also their position in society (which is why juvenile delinquency does not encompass e.g. economic crimes, professional offences etc.). The article presents the fundamental determinants of juvenile delinquency, based on the premise that a thorough analysis of crimes committed by persons under 18 years of age is necessary to effectively combat the phenomenon in Ukraine. The article also identifies the major methods currently used to prevent and counteract this type of crimes.
{"title":"Juvenile delinquency rates in Ukraine in 2016–2017","authors":"S. Minchenko, Hanna Shcherbakova","doi":"10.5604/01.3001.0013.5188","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5188","url":null,"abstract":"The article presents current tendencies related to juvenile delinquency in Ukraine based on data from the 2016–2017 period. Quantitative juvenile delinquency indices differ substantially from quantitative adult crime indices. This is primarily caused by the fact that the former apply to a four-year period (14–18 years of age), while the latter apply to the period after reaching the age of majority. Differences between juvenile and adult crime also manifest in the form of e.g. the nature and degree of social harm inflicted by the crimes, which is determined by the age of the perpetrators. Their age is not only related to the socio-psychological profiles of offenders, but also their position in society (which is why juvenile delinquency does not encompass e.g. economic crimes, professional offences etc.). The article presents the fundamental determinants of juvenile delinquency, based on the premise that a thorough analysis of crimes committed by persons under 18 years of age is necessary to effectively combat the phenomenon in Ukraine. The article also identifies the major methods currently used to prevent and counteract this type of crimes.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"6 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114124578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.5604/01.3001.0013.5193
B. Wiśniewski
The aim of the article is to present the major issues related to the protection of the Polish border from the perspective of the tasks and functions of the Border Guard and border checkpoints. The present analysis is a result of research conducted with use of theoretical research methods used in the social sciences. The aforementioned research was carried out with the purpose of diagnosing the functioning of the state border protection and traffic control system. The result of the research leads to the conclusion that the Polish border protection and traffic control system is being gradually improved, which is a result of changes in the security environment, primarily related to the emergence of new threats and increasing levels of existing threats. This leads to the expansion of the range of functions performed not by the Border Guard in general, but specifically by border checkpoints, which are closely related to field government and local authority administration bodies. These bodies have a definitive influence on local security, and thus on the security of areas controlled by the Border Guard.
{"title":"State border protection from the perspective of the tasks and functions of the border guard and border checkpoints","authors":"B. Wiśniewski","doi":"10.5604/01.3001.0013.5193","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5193","url":null,"abstract":"The aim of the article is to present the major issues related to the protection of the Polish border from the perspective of the tasks and functions of the Border Guard and border checkpoints. The present analysis is a result of research conducted with use of theoretical research methods used in the social sciences. The aforementioned research was carried out with the purpose of diagnosing the functioning of the state border protection and traffic control system. The result of the research leads to the conclusion that the Polish border protection and traffic control system is being gradually improved, which is a result of changes in the security environment, primarily related to the emergence of new threats and increasing levels of existing threats. This leads to the expansion of the range of functions performed not by the Border Guard in general, but specifically by border checkpoints, which are closely related to field government and local authority administration bodies. These bodies have a definitive influence on local security, and thus on the security of areas controlled by the Border Guard.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122741910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.5604/01.3001.0013.5190
J. Piwowarski
Goal The goal of this article is to present the author’s definition of security environment. It constitutes a redefinition and expansion of the narrow (four-element) approach presented in the White Book on National Security of the Republic of Poland. I propose a broad, eight-element approach. Methods I redefine security environment based on several premises. The first is the concept of the triangle of (the need for) security – the existence of this triangle necessitates and is sufficient for the need for security to arise. The second premise is the existence of the rhombus of security (culture), which necessitates and is sufficient for security to manifest, i.e. for the need for security to be satisfied. Results The above premises lead to the conclusion that the narrow approach to security environment should be ontically expanded to include elements comprising the triangle of the (need for) security and the security (culture) rhombus. This results in an eight-element definition of security environment. Conclusions The article illustrates an important issue in the security sciences – the need to expand the definition of security environment. I present and justify an alternative to the narrow approach to security environment, which is based on the narrow definition presented in the White Book on National Security of the Republic of Poland.
{"title":"The security (culture) rhombus. Redefining security environment","authors":"J. Piwowarski","doi":"10.5604/01.3001.0013.5190","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5190","url":null,"abstract":"Goal The goal of this article is to present the author’s definition of security environment. It constitutes a redefinition and expansion of the narrow (four-element) approach presented in the White Book on National Security of the Republic of Poland. I propose a broad, eight-element approach.\u0000Methods I redefine security environment based on several premises. The first is the concept of the triangle of (the need for) security – the existence of this triangle necessitates and is sufficient for the need for security to arise. The second premise is the existence of the rhombus of security (culture), which necessitates and is sufficient for security to manifest, i.e. for the need for security to be satisfied.\u0000Results The above premises lead to the conclusion that the narrow approach to security environment should be ontically expanded to include elements comprising the triangle of the (need for) security and the security (culture) rhombus. This results in an eight-element definition of security environment.\u0000Conclusions The article illustrates an important issue in the security sciences – the need to expand the definition of security environment. I present and justify an alternative to the narrow approach to security environment, which is based on the narrow definition presented in the White Book on National Security of the Republic of Poland.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114976834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.5604/01.3001.0013.5187
Lucia Kucbelová, Rastislav Kazanský
This article deals with the legal processing of a serious problem regarding societal security, human rights and the rights of minors, i.e. child abduction. The procedure of the returning of an abducted child is one of the most challenging types of court proceedings. Courts decide within the statutory time limit of six weeks after filing the petition. There is a foreign element in the proceedings, embodied either by the parties to the proceedings or by the necessity of clarifying the child’s habitual residence. Translators or interpreters are recruited to guarantee the parties’ right to act in their mother tongues. The court, as a rule, executes and orders expert evidence within a short period of time, for example to determine the circumstances that rule out the return of the minor to his/her country. As a rule, hearings take place all day or several days in a row. Courts apply international treaties and EU law when making decisions. The difficulty of bringing proceedings is additionally increased by frequent requests from the court hearing the authorities of the Member State of the habitual residence of the minor. The return of the child is usually accompanied by tensions between the parties, emotions and stress.
{"title":"Child abduction proceedings","authors":"Lucia Kucbelová, Rastislav Kazanský","doi":"10.5604/01.3001.0013.5187","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5187","url":null,"abstract":"This article deals with the legal processing of a serious problem regarding societal security, human rights and the rights of minors, i.e. child abduction. The procedure of the returning of an abducted child is one of the most challenging types of court proceedings. Courts decide within the statutory time limit of six weeks after filing the petition. There is a foreign element in the proceedings, embodied either by the parties to the proceedings or by the necessity of clarifying the child’s habitual residence. Translators or interpreters are recruited to guarantee the parties’ right to act in their mother tongues. The court, as a rule, executes and orders expert evidence within a short period of time, for example to determine the circumstances that rule out the return of the minor to his/her country. As a rule, hearings take place all day or several days in a row. Courts apply international treaties and EU law when making decisions. The difficulty of bringing proceedings is additionally increased by frequent requests from the court hearing the authorities of the Member State of the habitual residence of the minor. The return of the child is usually accompanied by tensions between the parties, emotions and stress.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128342859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-28DOI: 10.5604/01.3001.0013.5189
Jerzy Ochmann
The author hypothesizes that in the era of information technology, logic is the crucial tool of security sciences, and logicians have a greater role to play in this field than politicians. This viewpoint is held by two significant institutions dealing with the logic of security: Academia Diplomatica Europaea (ADE) in Brussels and US Army War College in Carlisle, Pennsylvania. The author focuses on the assumptions and activities of Academia Diplomatica Europaea. ADE assumes that the major challenge to contemporary security is to change the enemy’s mentality into the mentality of an ally. To do this, one should analyse the following logical categories: the category of relations (between individuals and societies) and the category of hostility. ADE mainly focuses on social relations, with their sociological and psychological aspects, assuming that enemies have not only official, explicit opinions but also implicit ones, and learning these implicit opinions is a key to change the enemy’s mentality according to the aforementioned pattern. The author then discusses the methods relating to the logic of security used by ADE. Finally, in the light of the assumptions stated by ADE, he analyses the institution’s activities aimed at contemporary threats, the major threat being, according to ADE, terrorism.
{"title":"Changing the enemy into the ally in the light of the security logic of Academia Diplomatica Europaea","authors":"Jerzy Ochmann","doi":"10.5604/01.3001.0013.5189","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5189","url":null,"abstract":"The author hypothesizes that in the era of information technology, logic is the crucial tool of security sciences, and logicians have a greater role to play in this field than politicians. This viewpoint is held by two significant institutions dealing with the logic of security: Academia Diplomatica Europaea (ADE) in Brussels and US Army War College in Carlisle, Pennsylvania. The author focuses on the assumptions and activities of Academia Diplomatica Europaea. ADE assumes that the major challenge to contemporary security is to change the enemy’s mentality into the mentality of an ally. To do this, one should analyse the following logical categories: the category of relations (between individuals and societies) and the category of hostility. ADE mainly focuses on social relations, with their sociological and psychological aspects, assuming that enemies have not only official, explicit opinions but also implicit ones, and learning these implicit opinions is a key to change the enemy’s mentality according to the aforementioned pattern. The author then discusses the methods relating to the logic of security used by ADE. Finally, in the light of the assumptions stated by ADE, he analyses the institution’s activities aimed at contemporary threats, the major threat being, according to ADE, terrorism.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114270532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.5604/01.3001.0013.1944
E. Kublik
The article describes the theoretical foundations, genesis and application of reflexive control methods. It contains the characteristics of the views of the leading researchers investigating the topics of reflexive control and the manipulation of information. It explains the importance of reflexive control in the concepts of information fights and its impact on state security. The article is based on two approaches to the Russian and American phenomena. It also explains issues in the field of war and information fights.
{"title":"Strategic meaning of reflexive control methods in the concept of information fight","authors":"E. Kublik","doi":"10.5604/01.3001.0013.1944","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1944","url":null,"abstract":"The article describes the theoretical foundations, genesis and application of reflexive control methods. It contains the characteristics of the views of the leading researchers investigating the topics of reflexive control and the manipulation of information. It explains the importance of reflexive control in the concepts of information fights and its impact on state security. The article is based on two approaches to the Russian and American phenomena. It also explains issues in the field of war and information fights.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.5604/01.3001.0013.1945
Piotr Maciejczyk-Cień
Nowadays, humanity has become dependent on the devices and systems which form part of everyday life. This relation was made clear by the terrorist attacks in New York, Madrid and London. The attacks resulted not only in human casualties and damage to infrastructure, but also made people aware of the close relations between the damage and the effective operation of the rescuers. This gave rise to the need to face the problem of protecting the infrastructure which is important for the security of the state and its citizens. At the same time, the issue of threats to critical infrastructure has started to emerge more and more in the literature devoted to internal security and stopped being associated solely with military concepts. In Poland, the notion of ‘critical infrastructure’ first started to appear in government documents and literature in 2007 after the introduction of the Crisis Management Act. The legislator specifies in the document the conceptual range of critical infrastructure which is closely related to the functioning of facilities, devices, and installations relevant for the security of the state and citizens. The following systems were regarded as critical infrastructures: the energy and fuel, communications and ICT, transport, rescue, financial, food and water supply, and healthcare systems, and also the one related to chemical and radioactive substances. This paper is an attempt at characterising the defence of critical infrastructure in Poland and the possibilities of preventing threats to important state security systems in the context of the establishment of the Territorial Defence Force.
{"title":"The security of critical infrastructure in the concept of the Territorial Defence Force of the Republic of Poland","authors":"Piotr Maciejczyk-Cień","doi":"10.5604/01.3001.0013.1945","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1945","url":null,"abstract":"Nowadays, humanity has become dependent on the devices and systems which form part of everyday life. This relation was made clear by the terrorist attacks in New York, Madrid and London. The attacks resulted not only in human casualties and damage to infrastructure, but also made people aware of the close relations between the damage and the effective operation of the rescuers. This gave rise to the need to face the problem of protecting the infrastructure which is important for the security of the state and its citizens. At the same time, the issue of threats to critical infrastructure has started to emerge more and more in the literature devoted to internal security and stopped being associated solely with military concepts. In Poland, the notion of ‘critical infrastructure’ first started to appear in government documents and literature in 2007 after the introduction of the Crisis Management Act. The legislator specifies in the document the conceptual range of critical infrastructure which is closely related to the functioning of facilities, devices, and installations relevant for the security of the state and citizens. The following systems were regarded as critical infrastructures: the energy and fuel, communications and ICT, transport, rescue, financial, food and water supply, and healthcare systems, and also the one related to chemical and radioactive substances. This paper is an attempt at characterising the defence of critical infrastructure in Poland and the possibilities of preventing threats to important state security systems in the context of the establishment of the Territorial Defence Force.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133798019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.5604/01.3001.0013.1946
Danuta Bożena Ożarowska
This article is a case study of the process of mobilization to violence on the internet. The goal of this paper was to identify a select number of factors within the narrative on the topic of modern immigration that can be found on the internet and analyze them using the theoretical constructs that can be found in the literature on this subject. The scientists that study genocide have identified several factors commonly found in historically documented events that must be present in order for genocide to occur. In this paper the author will refer to works of scientists such as Helen Fein, Manus I. Midlarsky, Lech M. Nijakowski. The author of the paper analyzed the content published on the internet that deals with the topic of immigration. The materials selected for research contained topics that treat the subject of accepting refugees from outside of Europe, their process of assimilation and the way they coexist with the local population. The analysis was based on content in the Polish language which includes both materials that were created in Polish and those that were originally in a different language and then were remade with Polish footnotes. The content for the study was selected from among the following sources: propaganda movies which spread on the internet through social media, short unscientific propaganda and informational articles and finally memes (pictures with short footnotes). Factors that were analyzed in the following article: 1) Universe of obligation, construct created by Helen Fein. 2) Conspiratory discourse, described by Lech Nijakowski. 3) Utility and parasitism; discourse referring to them. 4) Two conditions necessary to instigate genocide, described by Manus I. Midlarsky. 5) Discourse on the topic of immoral sexual actions described by the author based on the theory of discourses created by Lech Nijakowski. During the study all the aforementioned factors have been identified. The author described the examples analyzed, interpreted them and subsequently matched them to the categories described above. It was determined that within those examples we can distinguish a number of factors that match the elements of mobilizing the population to violence. The article closes with an analysis of potential consequences of the phenomena described.
这篇文章是一个案例研究的过程动员暴力在互联网上。本文的目的是确定一些可以在互联网上找到的关于现代移民主题的叙述中的因素,并使用可以在这一主题的文献中找到的理论结构来分析它们。研究种族灭绝的科学家已经确定了在历史记载的事件中常见的几个因素,这些因素必须存在,才能导致种族灭绝的发生。在本文中,作者将参考科学家的工作,如海伦·费恩,马努斯·米德拉斯基,莱赫·M. Nijakowski。本文的作者分析了网上发表的有关移民话题的内容。所选研究材料的主题是接纳来自欧洲以外的难民,他们的同化过程以及他们与当地居民共存的方式。分析是基于波兰语的内容,包括用波兰语创作的材料和那些最初用不同语言制作,然后用波兰语脚注重新制作的材料。研究的内容从以下来源中选择:通过社交媒体在互联网上传播的宣传电影,短的不科学宣传和信息性文章,最后是模因(带有简短脚注的图片)。本文主要分析了以下因素:1)海伦·芬所创造的“义务世界”(Universe of obligation); 2)莱赫·尼雅科夫斯基所描述的“阴谋论话语”(conspiracy discourse);4)马努斯·米德拉斯基(Manus I. midlarsky)描述的煽动种族灭绝的两个必要条件。5)作者基于莱赫·尼雅科夫斯基(Lech Nijakowski)创造的话语理论所描述的关于不道德性行为主题的话语。在研究过程中,上述所有因素都已确定。作者描述了分析的例子,解释了它们,随后将它们与上述类别相匹配。我们确定,在这些例子中,我们可以区分出一些与动员人民采取暴力的因素相匹配的因素。文章最后分析了所描述的现象的潜在后果。
{"title":"An analysis of the activity in the Polish internet sphere from the angle of social mobilization to perform acts of violence. A case study of the immigrant crisis","authors":"Danuta Bożena Ożarowska","doi":"10.5604/01.3001.0013.1946","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1946","url":null,"abstract":"This article is a case study of the process of mobilization to violence on the internet. The goal of this paper was to identify a select number of factors within the narrative on the topic of modern immigration that can be found on the internet and analyze them using the theoretical constructs that can be found in the literature on this subject.\u0000The scientists that study genocide have identified several factors commonly found in historically documented events that must be present in order for genocide to occur. In this paper the author will refer to works of scientists such as Helen Fein, Manus I. Midlarsky, Lech M. Nijakowski.\u0000The author of the paper analyzed the content published on the internet that deals with the topic of immigration. The materials selected for research contained topics that treat the subject of accepting refugees from outside of Europe, their process of assimilation and the way they coexist with the local population. The analysis was based on content in the Polish language which includes both materials that were created in Polish and those that were originally in a different language and then were remade with Polish footnotes. The content for the study was selected from among the following sources: propaganda movies which spread on the internet through social media, short unscientific propaganda and informational articles and finally memes (pictures with short footnotes).\u0000Factors that were analyzed in the following article:\u00001) Universe of obligation, construct created by Helen Fein.\u00002) Conspiratory discourse, described by Lech Nijakowski.\u00003) Utility and parasitism; discourse referring to them.\u00004) Two conditions necessary to instigate genocide, described by Manus I. Midlarsky.\u00005) Discourse on the topic of immoral sexual actions described by the author based on the theory of discourses created by Lech Nijakowski.\u0000During the study all the aforementioned factors have been identified. The author described the examples analyzed, interpreted them and subsequently matched them to the categories described above. It was determined that within those examples we can distinguish a number of factors that match the elements of mobilizing the population to violence. The article closes with an analysis of potential consequences of the phenomena described.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126779033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-29DOI: 10.5604/01.3001.0013.1955
Ł. Trzciński, J. Piwowarski
The topic of the article is the relationship between security culture and anthropology of securi-ty. The authors recall the most important definitions of security culture and anthropology of security, both of which belong to the discipline of security sciences, and conclude that culture, including its special sphere called security culture, is a human creation that strongly affects people, so it would be difficult to explore it scientifically without anthropological knowledge and tools. The authors give an account of the development of security sciences research in Poland, and point out that its subdiscipline called security anthropology is not fully formed yet, its theoretical and methodological identity still being underway; however, it develops dynamically. In forming this new subdiscipline of security sciences, apart from applying mul-tidisciplinary research, it is also necessary to consider different types of anthropology, above all biological, cultural and philosophical anthropology. The authors signalize the potential di-rections of research within the field and conclude that a methodological framework of securi-ty anthropology should be worked out, in a form that is most important and legible at the cur-rent stage of the development of science.
{"title":"Security culture and security anthropology","authors":"Ł. Trzciński, J. Piwowarski","doi":"10.5604/01.3001.0013.1955","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1955","url":null,"abstract":"The topic of the article is the relationship between security culture and anthropology of securi-ty. The authors recall the most important definitions of security culture and anthropology of security, both of which belong to the discipline of security sciences, and conclude that culture, including its special sphere called security culture, is a human creation that strongly affects people, so it would be difficult to explore it scientifically without anthropological knowledge and tools. The authors give an account of the development of security sciences research in Poland, and point out that its subdiscipline called security anthropology is not fully formed yet, its theoretical and methodological identity still being underway; however, it develops dynamically. In forming this new subdiscipline of security sciences, apart from applying mul-tidisciplinary research, it is also necessary to consider different types of anthropology, above all biological, cultural and philosophical anthropology. The authors signalize the potential di-rections of research within the field and conclude that a methodological framework of securi-ty anthropology should be worked out, in a form that is most important and legible at the cur-rent stage of the development of science.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125516392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}