首页 > 最新文献

Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje最新文献

英文 中文
The problem of racism in European football 欧洲足球的种族主义问题
Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5191
Jakub Tartak
The paper addresses racism as a key contemporary challenge to safety at football matches in Europe. The hypothesis is that racism does occur in the sports environment. To prepare the paper, press excerpts and scholarly publications on racism were used. To interpret the material, comparative method was used, so as to present the environments that harm safety in sports. The goal was to demonstrate the role of education in fighting discrimination in contemporary European football and the need to care for security culture in football. It is because football stadiums become arenas for expressing political and ideological views, as well as for racist at-tacks. The author points at the role of mass media and public entities in shaping social atti-tudes concerning racism in sports. He also indicates shortcomings in the law and in the activi-ties of the institutions overseeing sportspeople’s and sports activists’ safety. The conclusion is that the upbringing of society as regards tolerance and respect must become a priority in fighting racism in sports. Further research should focus on the education of children and ado-lescents and on introducing costly and effective sanctions for the individuals and entities that violate the rule of respecting one’s sports competitor.
该论文将种族主义视为当代欧洲足球比赛安全的关键挑战。假设种族主义确实发生在体育环境中。为了编写这份文件,使用了关于种族主义的新闻节录和学术出版物。运用对比的方法对资料进行解读,呈现运动中危害安全的环境。其目的是展示教育在打击当代欧洲足球歧视方面的作用,以及关注足球安全文化的必要性。这是因为足球场不仅成为种族主义攻击的场所,而且成为表达政治和意识形态观点的场所。作者指出了大众媒体和公共实体在塑造有关体育种族主义的社会态度方面的作用。他还指出了监督运动员和体育活动人士安全的机构在法律和活动方面的缺陷。结论是,社会在宽容和尊重方面的培养必须成为在体育运动中打击种族主义的优先事项。进一步的研究应集中于儿童和青少年的教育,以及对违反尊重体育竞赛对手规则的个人和实体实行代价高昂和有效的制裁。
{"title":"The problem of racism in European football","authors":"Jakub Tartak","doi":"10.5604/01.3001.0013.5191","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5191","url":null,"abstract":"The paper addresses racism as a key contemporary challenge to safety at football matches in Europe. The hypothesis is that racism does occur in the sports environment. To prepare the paper, press excerpts and scholarly publications on racism were used. To interpret the material, comparative method was used, so as to present the environments that harm safety in sports. The goal was to demonstrate the role of education in fighting discrimination in contemporary European football and the need to care for security culture in football. It is because football stadiums become arenas for expressing political and ideological views, as well as for racist at-tacks. The author points at the role of mass media and public entities in shaping social atti-tudes concerning racism in sports. He also indicates shortcomings in the law and in the activi-ties of the institutions overseeing sportspeople’s and sports activists’ safety. The conclusion is that the upbringing of society as regards tolerance and respect must become a priority in fighting racism in sports. Further research should focus on the education of children and ado-lescents and on introducing costly and effective sanctions for the individuals and entities that violate the rule of respecting one’s sports competitor.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133450781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Juvenile delinquency rates in Ukraine in 2016–2017 2016-2017年乌克兰青少年犯罪率
Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5188
S. Minchenko, Hanna Shcherbakova
The article presents current tendencies related to juvenile delinquency in Ukraine based on data from the 2016–2017 period. Quantitative juvenile delinquency indices differ substantially from quantitative adult crime indices. This is primarily caused by the fact that the former apply to a four-year period (14–18 years of age), while the latter apply to the period after reaching the age of majority. Differences between juvenile and adult crime also manifest in the form of e.g. the nature and degree of social harm inflicted by the crimes, which is determined by the age of the perpetrators. Their age is not only related to the socio-psychological profiles of offenders, but also their position in society (which is why juvenile delinquency does not encompass e.g. economic crimes, professional offences etc.). The article presents the fundamental determinants of juvenile delinquency, based on the premise that a thorough analysis of crimes committed by persons under 18 years of age is necessary to effectively combat the phenomenon in Ukraine. The article also identifies the major methods currently used to prevent and counteract this type of crimes.
本文根据2016-2017年期间的数据介绍了乌克兰青少年犯罪的当前趋势。青少年犯罪的定量指数与成人犯罪的定量指数有很大的不同。这主要是由于前者适用于四年期间(14-18岁),而后者适用于达到成年年龄后的时期。青少年犯罪与成人犯罪的区别还表现在犯罪的性质和社会危害程度等方面,而社会危害程度是由犯罪人的年龄决定的。他们的年龄不仅与罪犯的社会心理特征有关,而且与他们在社会中的地位有关(这就是为什么青少年犯罪不包括经济犯罪、职业犯罪等)。本文提出了青少年犯罪的基本决定因素,其前提是必须对18岁以下的人所犯的罪行进行彻底分析,以便有效地打击乌克兰的这一现象。文章还指出了目前用于预防和打击这类犯罪的主要方法。
{"title":"Juvenile delinquency rates in Ukraine in 2016–2017","authors":"S. Minchenko, Hanna Shcherbakova","doi":"10.5604/01.3001.0013.5188","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5188","url":null,"abstract":"The article presents current tendencies related to juvenile delinquency in Ukraine based on data from the 2016–2017 period. Quantitative juvenile delinquency indices differ substantially from quantitative adult crime indices. This is primarily caused by the fact that the former apply to a four-year period (14–18 years of age), while the latter apply to the period after reaching the age of majority. Differences between juvenile and adult crime also manifest in the form of e.g. the nature and degree of social harm inflicted by the crimes, which is determined by the age of the perpetrators. Their age is not only related to the socio-psychological profiles of offenders, but also their position in society (which is why juvenile delinquency does not encompass e.g. economic crimes, professional offences etc.). The article presents the fundamental determinants of juvenile delinquency, based on the premise that a thorough analysis of crimes committed by persons under 18 years of age is necessary to effectively combat the phenomenon in Ukraine. The article also identifies the major methods currently used to prevent and counteract this type of crimes.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"6 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114124578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
State border protection from the perspective of the tasks and functions of the border guard and border checkpoints 从国家边境保护的角度分析边防警卫和边防检查站的任务和职能
Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5193
B. Wiśniewski
The aim of the article is to present the major issues related to the protection of the Polish border from the perspective of the tasks and functions of the Border Guard and border checkpoints. The present analysis is a result of research conducted with use of theoretical research methods used in the social sciences. The aforementioned research was carried out with the purpose of diagnosing the functioning of the state border protection and traffic control system. The result of the research leads to the conclusion that the Polish border protection and traffic control system is being gradually improved, which is a result of changes in the security environment, primarily related to the emergence of new threats and increasing levels of existing threats. This leads to the expansion of the range of functions performed not by the Border Guard in general, but specifically by border checkpoints, which are closely related to field government and local authority administration bodies. These bodies have a definitive influence on local security, and thus on the security of areas controlled by the Border Guard.
本文的目的是从边防部队和边境检查站的任务和职能的角度,提出与保护波兰边境有关的主要问题。目前的分析是使用社会科学中使用的理论研究方法进行研究的结果。进行上述研究的目的是诊断国家边境保护和交通管制系统的功能。研究结果得出结论,波兰的边境保护和交通管制系统正在逐步改善,这是安全环境变化的结果,主要与新威胁的出现和现有威胁的增加有关。这导致扩大了与外地政府和地方当局行政机构密切相关的边防检查站而不是一般边防警卫所执行的职能范围。这些机构对地方安全,从而对边防军控制地区的安全具有决定性的影响。
{"title":"State border protection from the perspective of the tasks and functions of the border guard and border checkpoints","authors":"B. Wiśniewski","doi":"10.5604/01.3001.0013.5193","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5193","url":null,"abstract":"The aim of the article is to present the major issues related to the protection of the Polish border from the perspective of the tasks and functions of the Border Guard and border checkpoints. The present analysis is a result of research conducted with use of theoretical research methods used in the social sciences. The aforementioned research was carried out with the purpose of diagnosing the functioning of the state border protection and traffic control system. The result of the research leads to the conclusion that the Polish border protection and traffic control system is being gradually improved, which is a result of changes in the security environment, primarily related to the emergence of new threats and increasing levels of existing threats. This leads to the expansion of the range of functions performed not by the Border Guard in general, but specifically by border checkpoints, which are closely related to field government and local authority administration bodies. These bodies have a definitive influence on local security, and thus on the security of areas controlled by the Border Guard.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122741910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The security (culture) rhombus. Redefining security environment 安全(文化)菱形。重新定义安全环境
Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5190
J. Piwowarski
Goal The goal of this article is to present the author’s definition of security environment. It constitutes a redefinition and expansion of the narrow (four-element) approach presented in the White Book on National Security of the Republic of Poland. I propose a broad, eight-element approach.Methods I redefine security environment based on several premises. The first is the concept of the triangle of (the need for) security – the existence of this triangle necessitates and is sufficient for the need for security to arise. The second premise is the existence of the rhombus of security (culture), which necessitates and is sufficient for security to manifest, i.e. for the need for security to be satisfied.Results The above premises lead to the conclusion that the narrow approach to security environment should be ontically expanded to include elements comprising the triangle of the (need for) security and the security (culture) rhombus. This results in an eight-element definition of security environment.Conclusions The article illustrates an important issue in the security sciences – the need to expand the definition of security environment. I present and justify an alternative to the narrow approach to security environment, which is based on the narrow definition presented in the White Book on National Security of the Republic of Poland.
本文的目的是介绍作者对安全环境的定义。它是对《波兰共和国国家安全白皮书》中提出的狭隘(四要素)方法的重新定义和扩大。我提出一个宽泛的八要素方法。方法基于几个前提重新定义安全环境。首先是安全(需要)三角的概念——这个三角的存在使得安全需要的产生成为必要和充分的条件。第二个前提是安全菱形(文化)的存在,它是安全得以显现的必要条件和充分条件,即安全的需要得以满足。结果根据上述前提,安全环境的狭义分析应扩展到安全(需要)和安全(文化)菱形的三角关系。这就产生了安全环境的八个元素定义。本文阐述了安全科学中的一个重要问题——扩展安全环境定义的必要性。我提出并证明了对安全环境采取狭隘做法的另一种选择,这种做法是基于《波兰共和国国家安全白皮书》中提出的狭隘定义。
{"title":"The security (culture) rhombus. Redefining security environment","authors":"J. Piwowarski","doi":"10.5604/01.3001.0013.5190","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5190","url":null,"abstract":"Goal The goal of this article is to present the author’s definition of security environment. It constitutes a redefinition and expansion of the narrow (four-element) approach presented in the White Book on National Security of the Republic of Poland. I propose a broad, eight-element approach.\u0000Methods I redefine security environment based on several premises. The first is the concept of the triangle of (the need for) security – the existence of this triangle necessitates and is sufficient for the need for security to arise. The second premise is the existence of the rhombus of security (culture), which necessitates and is sufficient for security to manifest, i.e. for the need for security to be satisfied.\u0000Results The above premises lead to the conclusion that the narrow approach to security environment should be ontically expanded to include elements comprising the triangle of the (need for) security and the security (culture) rhombus. This results in an eight-element definition of security environment.\u0000Conclusions The article illustrates an important issue in the security sciences – the need to expand the definition of security environment. I present and justify an alternative to the narrow approach to security environment, which is based on the narrow definition presented in the White Book on National Security of the Republic of Poland.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114976834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Child abduction proceedings 儿童诱拐诉讼
Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5187
Lucia Kucbelová, Rastislav Kazanský
This article deals with the legal processing of a serious problem regarding societal security, human rights and the rights of minors, i.e. child abduction. The procedure of the returning of an abducted child is one of the most challenging types of court proceedings. Courts decide within the statutory time limit of six weeks after filing the petition. There is a foreign element in the proceedings, embodied either by the parties to the proceedings or by the necessity of clarifying the child’s habitual residence. Translators or interpreters are recruited to guarantee the parties’ right to act in their mother tongues. The court, as a rule, executes and orders expert evidence within a short period of time, for example to determine the circumstances that rule out the return of the minor to his/her country. As a rule, hearings take place all day or several days in a row. Courts apply international treaties and EU law when making decisions. The difficulty of bringing proceedings is additionally increased by frequent requests from the court hearing the authorities of the Member State of the habitual residence of the minor. The return of the child is usually accompanied by tensions between the parties, emotions and stress.
本文论述了对拐卖儿童这一涉及社会安全、人权和未成年人权利的严重问题的法律处理。归还被拐儿童的程序是最具挑战性的法庭诉讼程序之一。法院在提交请愿书后六个星期的法定期限内作出裁决。诉讼中有一个外国因素,体现在诉讼当事人或澄清儿童经常居住地的必要性上。聘请笔译或口译员,以保证当事人以母语行事的权利。法院通常在很短的时间内执行和下令提供专家证据,例如确定排除将未成年人送回其本国的情况。通常,听证会全天或连续几天举行。法院在作出决定时适用国际条约和欧盟法律。提起诉讼的困难还因审理该未成年人经常居住地的会员国当局的法院经常提出要求而增加。孩子的回归通常伴随着双方之间的紧张关系、情绪和压力。
{"title":"Child abduction proceedings","authors":"Lucia Kucbelová, Rastislav Kazanský","doi":"10.5604/01.3001.0013.5187","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5187","url":null,"abstract":"This article deals with the legal processing of a serious problem regarding societal security, human rights and the rights of minors, i.e. child abduction. The procedure of the returning of an abducted child is one of the most challenging types of court proceedings. Courts decide within the statutory time limit of six weeks after filing the petition. There is a foreign element in the proceedings, embodied either by the parties to the proceedings or by the necessity of clarifying the child’s habitual residence. Translators or interpreters are recruited to guarantee the parties’ right to act in their mother tongues. The court, as a rule, executes and orders expert evidence within a short period of time, for example to determine the circumstances that rule out the return of the minor to his/her country. As a rule, hearings take place all day or several days in a row. Courts apply international treaties and EU law when making decisions. The difficulty of bringing proceedings is additionally increased by frequent requests from the court hearing the authorities of the Member State of the habitual residence of the minor. The return of the child is usually accompanied by tensions between the parties, emotions and stress.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128342859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Changing the enemy into the ally in the light of the security logic of Academia Diplomatica Europaea 从欧洲外交学界的安全逻辑看化敌为友
Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5189
Jerzy Ochmann
The author hypothesizes that in the era of information technology, logic is the crucial tool of security sciences, and logicians have a greater role to play in this field than politicians. This viewpoint is held by two significant institutions dealing with the logic of security: Academia Diplomatica Europaea (ADE) in Brussels and US Army War College in Carlisle, Pennsylvania. The author focuses on the assumptions and activities of Academia Diplomatica Europaea. ADE assumes that the major challenge to contemporary security is to change the enemy’s mentality into the mentality of an ally. To do this, one should analyse the following logical categories: the category of relations (between individuals and societies) and the category of hostility. ADE mainly focuses on social relations, with their sociological and psychological aspects, assuming that enemies have not only official, explicit opinions but also implicit ones, and learning these implicit opinions is a key to change the enemy’s mentality according to the aforementioned pattern. The author then discusses the methods relating to the logic of security used by ADE. Finally, in the light of the assumptions stated by ADE, he analyses the institution’s activities aimed at contemporary threats, the major threat being, according to ADE, terrorism.
作者假设,在信息技术时代,逻辑是安全科学的关键工具,逻辑学家在这一领域比政治家发挥更大的作用。这一观点由两家研究安全逻辑的重要机构持有:布鲁塞尔的欧洲外交学院(ADE)和宾夕法尼亚州卡莱尔的美国陆军战争学院。作者着重论述了欧洲外交学会的设想和活动。《战略战略》认为,当代安全面临的主要挑战是将敌人的心态转变为盟友的心态。要做到这一点,我们应该分析以下逻辑范畴:关系范畴(个人与社会之间)和敌意范畴。ADE主要关注社会关系,从社会学和心理学的角度出发,假设敌人既有正式的、明确的意见,也有内隐的意见,学习这些内隐的意见是按照上述模式改变敌人心态的关键。然后讨论了ADE使用的安全逻辑相关方法。最后,根据ADE的假设,他分析了该机构针对当代威胁的活动,根据ADE的说法,主要威胁是恐怖主义。
{"title":"Changing the enemy into the ally in the light of the security logic of Academia Diplomatica Europaea","authors":"Jerzy Ochmann","doi":"10.5604/01.3001.0013.5189","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5189","url":null,"abstract":"The author hypothesizes that in the era of information technology, logic is the crucial tool of security sciences, and logicians have a greater role to play in this field than politicians. This viewpoint is held by two significant institutions dealing with the logic of security: Academia Diplomatica Europaea (ADE) in Brussels and US Army War College in Carlisle, Pennsylvania. The author focuses on the assumptions and activities of Academia Diplomatica Europaea. ADE assumes that the major challenge to contemporary security is to change the enemy’s mentality into the mentality of an ally. To do this, one should analyse the following logical categories: the category of relations (between individuals and societies) and the category of hostility. ADE mainly focuses on social relations, with their sociological and psychological aspects, assuming that enemies have not only official, explicit opinions but also implicit ones, and learning these implicit opinions is a key to change the enemy’s mentality according to the aforementioned pattern. The author then discusses the methods relating to the logic of security used by ADE. Finally, in the light of the assumptions stated by ADE, he analyses the institution’s activities aimed at contemporary threats, the major threat being, according to ADE, terrorism.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114270532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategic meaning of reflexive control methods in the concept of information fight 信息战概念下自反性控制方法的战略意义
Pub Date : 2019-03-29 DOI: 10.5604/01.3001.0013.1944
E. Kublik
The article describes the theoretical foundations, genesis and application of reflexive control methods. It contains the characteristics of the views of the leading researchers investigating the topics of reflexive control and the manipulation of information. It explains the importance of reflexive control in the concepts of information fights and its impact on state security. The article is based on two approaches to the Russian and American phenomena. It also explains issues in the field of war and information fights.
本文介绍了自反性控制方法的理论基础、产生和应用。它包含了调查反身性控制和信息操纵主题的主要研究人员的观点的特征。它解释了反身性控制在信息战概念中的重要性及其对国家安全的影响。本文基于对俄罗斯和美国现象的两种研究方法。它还解释了战争和信息战领域的问题。
{"title":"Strategic meaning of reflexive control methods in the concept of information fight","authors":"E. Kublik","doi":"10.5604/01.3001.0013.1944","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1944","url":null,"abstract":"The article describes the theoretical foundations, genesis and application of reflexive control methods. It contains the characteristics of the views of the leading researchers investigating the topics of reflexive control and the manipulation of information. It explains the importance of reflexive control in the concepts of information fights and its impact on state security. The article is based on two approaches to the Russian and American phenomena. It also explains issues in the field of war and information fights.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The security of critical infrastructure in the concept of the Territorial Defence Force of the Republic of Poland 波兰共和国领土防卫部队概念中的关键基础设施的安全
Pub Date : 2019-03-29 DOI: 10.5604/01.3001.0013.1945
Piotr Maciejczyk-Cień
Nowadays, humanity has become dependent on the devices and systems which form part of everyday life. This relation was made clear by the terrorist attacks in New York, Madrid and London. The attacks resulted not only in human casualties and damage to infrastructure, but also made people aware of the close relations between the damage and the effective operation of the rescuers. This gave rise to the need to face the problem of protecting the infrastructure which is important for the security of the state and its citizens. At the same time, the issue of threats to critical infrastructure has started to emerge more and more in the literature devoted to internal security and stopped being associated solely with military concepts. In Poland, the notion of ‘critical infrastructure’ first started to appear in government documents and literature in 2007 after the introduction of the Crisis Management Act. The legislator specifies in the document the conceptual range of critical infrastructure which is closely related to the functioning of facilities, devices, and installations relevant for the security of the state and citizens. The following systems were regarded as critical infrastructures: the energy and fuel, communications and ICT, transport, rescue, financial, food and water supply, and healthcare systems, and also the one related to chemical and radioactive substances. This paper is an attempt at characterising the defence of critical infrastructure in Poland and the possibilities of preventing threats to important state security systems in the context of the establishment of the Territorial Defence Force.
如今,人类已经变得依赖于构成日常生活一部分的设备和系统。纽约、马德里和伦敦发生的恐怖袭击清楚地表明了这种关系。这些袭击不仅造成了人员伤亡和基础设施的破坏,而且使人们意识到破坏与救援人员的有效行动之间的密切关系。这就需要面对保护基础设施的问题,这对国家及其公民的安全至关重要。与此同时,对关键基础设施的威胁问题已开始越来越多地出现在专门讨论国内安全的文献中,而不再仅仅与军事概念联系在一起。在波兰,“关键基础设施”的概念在2007年《危机管理法》出台后首次出现在政府文件和文献中。立法者在文件中详细说明了关键基础设施的概念范围,这些基础设施与与国家和公民安全相关的设施、设备和装置的功能密切相关。以下系统被视为关键基础设施:能源和燃料、通信和信息通信技术、运输、救援、金融、食品和供水、医疗保健系统,以及与化学和放射性物质有关的系统。本文试图描述波兰关键基础设施的防御特点,以及在建立领土国防军的背景下防止对重要国家安全系统构成威胁的可能性。
{"title":"The security of critical infrastructure in the concept of the Territorial Defence Force of the Republic of Poland","authors":"Piotr Maciejczyk-Cień","doi":"10.5604/01.3001.0013.1945","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1945","url":null,"abstract":"Nowadays, humanity has become dependent on the devices and systems which form part of everyday life. This relation was made clear by the terrorist attacks in New York, Madrid and London. The attacks resulted not only in human casualties and damage to infrastructure, but also made people aware of the close relations between the damage and the effective operation of the rescuers. This gave rise to the need to face the problem of protecting the infrastructure which is important for the security of the state and its citizens. At the same time, the issue of threats to critical infrastructure has started to emerge more and more in the literature devoted to internal security and stopped being associated solely with military concepts. In Poland, the notion of ‘critical infrastructure’ first started to appear in government documents and literature in 2007 after the introduction of the Crisis Management Act. The legislator specifies in the document the conceptual range of critical infrastructure which is closely related to the functioning of facilities, devices, and installations relevant for the security of the state and citizens. The following systems were regarded as critical infrastructures: the energy and fuel, communications and ICT, transport, rescue, financial, food and water supply, and healthcare systems, and also the one related to chemical and radioactive substances. This paper is an attempt at characterising the defence of critical infrastructure in Poland and the possibilities of preventing threats to important state security systems in the context of the establishment of the Territorial Defence Force.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133798019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An analysis of the activity in the Polish internet sphere from the angle of social mobilization to perform acts of violence. A case study of the immigrant crisis 从社会动员的角度分析波兰网络领域的活动,以执行暴力行为。移民危机的个案研究
Pub Date : 2019-03-29 DOI: 10.5604/01.3001.0013.1946
Danuta Bożena Ożarowska
This article is a case study of the process of mobilization to violence on the internet. The goal of this paper was to identify a select number of factors within the narrative on the topic of modern immigration that can be found on the internet and analyze them using the theoretical constructs that can be found in the literature on this subject.The scientists that study genocide have identified several factors commonly found in historically documented events that must be present in order for genocide to occur. In this paper the author will refer to works of scientists such as Helen Fein, Manus I. Midlarsky, Lech M. Nijakowski.The author of the paper analyzed the content published on the internet that deals with the topic of immigration. The materials selected for research contained topics that treat the subject of accepting refugees from outside of Europe, their process of assimilation and the way they coexist with the local population. The analysis was based on content in the Polish language which includes both materials that were created in Polish and those that were originally in a different language and then were remade with Polish footnotes. The content for the study was selected from among the following sources: propaganda movies which spread on the internet through social media, short unscientific propaganda and informational articles and finally memes (pictures with short footnotes).Factors that were analyzed in the following article:1) Universe of obligation, construct created by Helen Fein.2) Conspiratory discourse, described by Lech Nijakowski.3) Utility and parasitism; discourse referring to them.4) Two conditions necessary to instigate genocide, described by Manus I. Midlarsky.5) Discourse on the topic of immoral sexual actions described by the author based on the theory of discourses created by Lech Nijakowski.During the study all the aforementioned factors have been identified. The author described the examples analyzed, interpreted them and subsequently matched them to the categories described above. It was determined that within those examples we can distinguish a number of factors that match the elements of mobilizing the population to violence. The article closes with an analysis of potential consequences of the phenomena described.
这篇文章是一个案例研究的过程动员暴力在互联网上。本文的目的是确定一些可以在互联网上找到的关于现代移民主题的叙述中的因素,并使用可以在这一主题的文献中找到的理论结构来分析它们。研究种族灭绝的科学家已经确定了在历史记载的事件中常见的几个因素,这些因素必须存在,才能导致种族灭绝的发生。在本文中,作者将参考科学家的工作,如海伦·费恩,马努斯·米德拉斯基,莱赫·M. Nijakowski。本文的作者分析了网上发表的有关移民话题的内容。所选研究材料的主题是接纳来自欧洲以外的难民,他们的同化过程以及他们与当地居民共存的方式。分析是基于波兰语的内容,包括用波兰语创作的材料和那些最初用不同语言制作,然后用波兰语脚注重新制作的材料。研究的内容从以下来源中选择:通过社交媒体在互联网上传播的宣传电影,短的不科学宣传和信息性文章,最后是模因(带有简短脚注的图片)。本文主要分析了以下因素:1)海伦·芬所创造的“义务世界”(Universe of obligation); 2)莱赫·尼雅科夫斯基所描述的“阴谋论话语”(conspiracy discourse);4)马努斯·米德拉斯基(Manus I. midlarsky)描述的煽动种族灭绝的两个必要条件。5)作者基于莱赫·尼雅科夫斯基(Lech Nijakowski)创造的话语理论所描述的关于不道德性行为主题的话语。在研究过程中,上述所有因素都已确定。作者描述了分析的例子,解释了它们,随后将它们与上述类别相匹配。我们确定,在这些例子中,我们可以区分出一些与动员人民采取暴力的因素相匹配的因素。文章最后分析了所描述的现象的潜在后果。
{"title":"An analysis of the activity in the Polish internet sphere from the angle of social mobilization to perform acts of violence. A case study of the immigrant crisis","authors":"Danuta Bożena Ożarowska","doi":"10.5604/01.3001.0013.1946","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1946","url":null,"abstract":"This article is a case study of the process of mobilization to violence on the internet. The goal of this paper was to identify a select number of factors within the narrative on the topic of modern immigration that can be found on the internet and analyze them using the theoretical constructs that can be found in the literature on this subject.\u0000The scientists that study genocide have identified several factors commonly found in historically documented events that must be present in order for genocide to occur. In this paper the author will refer to works of scientists such as Helen Fein, Manus I. Midlarsky, Lech M. Nijakowski.\u0000The author of the paper analyzed the content published on the internet that deals with the topic of immigration. The materials selected for research contained topics that treat the subject of accepting refugees from outside of Europe, their process of assimilation and the way they coexist with the local population. The analysis was based on content in the Polish language which includes both materials that were created in Polish and those that were originally in a different language and then were remade with Polish footnotes. The content for the study was selected from among the following sources: propaganda movies which spread on the internet through social media, short unscientific propaganda and informational articles and finally memes (pictures with short footnotes).\u0000Factors that were analyzed in the following article:\u00001) Universe of obligation, construct created by Helen Fein.\u00002) Conspiratory discourse, described by Lech Nijakowski.\u00003) Utility and parasitism; discourse referring to them.\u00004) Two conditions necessary to instigate genocide, described by Manus I. Midlarsky.\u00005) Discourse on the topic of immoral sexual actions described by the author based on the theory of discourses created by Lech Nijakowski.\u0000During the study all the aforementioned factors have been identified. The author described the examples analyzed, interpreted them and subsequently matched them to the categories described above. It was determined that within those examples we can distinguish a number of factors that match the elements of mobilizing the population to violence. The article closes with an analysis of potential consequences of the phenomena described.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126779033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security culture and security anthropology 安全文化与安全人类学
Pub Date : 2019-03-29 DOI: 10.5604/01.3001.0013.1955
Ł. Trzciński, J. Piwowarski
The topic of the article is the relationship between security culture and anthropology of securi-ty. The authors recall the most important definitions of security culture and anthropology of security, both of which belong to the discipline of security sciences, and conclude that culture, including its special sphere called security culture, is a human creation that strongly affects people, so it would be difficult to explore it scientifically without anthropological knowledge and tools. The authors give an account of the development of security sciences research in Poland, and point out that its subdiscipline called security anthropology is not fully formed yet, its theoretical and methodological identity still being underway; however, it develops dynamically. In forming this new subdiscipline of security sciences, apart from applying mul-tidisciplinary research, it is also necessary to consider different types of anthropology, above all biological, cultural and philosophical anthropology. The authors signalize the potential di-rections of research within the field and conclude that a methodological framework of securi-ty anthropology should be worked out, in a form that is most important and legible at the cur-rent stage of the development of science.
本文的主题是安全文化与安全人类学的关系。作者回顾了安全文化和安全人类学最重要的定义,这两个定义都属于安全科学的学科,并得出结论,文化,包括其称为安全文化的特殊领域,是一种强烈影响人们的人类创造,因此如果没有人类学的知识和工具,就很难科学地探索它。本文介绍了波兰安全科学研究的发展情况,指出其分支学科安全人类学尚未完全形成,其理论和方法认同仍在进行中;然而,它是动态发展的。在形成安全科学这一新的分支学科时,除了应用多学科研究外,还必须考虑不同类型的人类学,首先是生物、文化和哲学人类学。作者指出了该领域的潜在研究方向,并得出结论,应制定安全人类学的方法框架,其形式在科学发展的当前阶段是最重要和最清晰的。
{"title":"Security culture and security anthropology","authors":"Ł. Trzciński, J. Piwowarski","doi":"10.5604/01.3001.0013.1955","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1955","url":null,"abstract":"The topic of the article is the relationship between security culture and anthropology of securi-ty. The authors recall the most important definitions of security culture and anthropology of security, both of which belong to the discipline of security sciences, and conclude that culture, including its special sphere called security culture, is a human creation that strongly affects people, so it would be difficult to explore it scientifically without anthropological knowledge and tools. The authors give an account of the development of security sciences research in Poland, and point out that its subdiscipline called security anthropology is not fully formed yet, its theoretical and methodological identity still being underway; however, it develops dynamically. In forming this new subdiscipline of security sciences, apart from applying mul-tidisciplinary research, it is also necessary to consider different types of anthropology, above all biological, cultural and philosophical anthropology. The authors signalize the potential di-rections of research within the field and conclude that a methodological framework of securi-ty anthropology should be worked out, in a form that is most important and legible at the cur-rent stage of the development of science.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125516392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1