首页 > 最新文献

Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje最新文献

英文 中文
PROPOSALS OF NEW METHODS FOR THEORY AND PRACTICE OF THE FIGHT AGAINST TERRORISM 对反恐理论和实践的新方法的建议
Pub Date : 2018-09-28 DOI: 10.5604/01.3001.0012.8599
Adam Kwiatkowski
The study is an attempt to show the vision of solving complex international problems and threats related to terrorism. This attempt, although controversial, is a search for unconventional, not always acceptable methods of minimizing the terrorist threat.
这项研究试图展示解决与恐怖主义有关的复杂国际问题和威胁的愿景。这一尝试虽然存在争议,但它是一种非传统的、并非总能被接受的最小化恐怖主义威胁的方法。
{"title":"PROPOSALS OF NEW METHODS FOR THEORY AND PRACTICE OF THE FIGHT AGAINST TERRORISM","authors":"Adam Kwiatkowski","doi":"10.5604/01.3001.0012.8599","DOIUrl":"https://doi.org/10.5604/01.3001.0012.8599","url":null,"abstract":"The study is an attempt to show the vision of solving complex international problems and threats related to terrorism. This attempt, although controversial, is a search for unconventional, not always acceptable methods of minimizing the terrorist threat.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCOPE AND NATURE OF CHANGES IN PERSONAL DATA PROTECTION SYSTEMS OF PUBLIC INSTITUTIONS IN THE LIGHT OF THE PROVISIONS OF THE GDPR (GENERAL DATA PROTECTION REGULATION) 根据GDPR(一般资料保护规例)的规定,公营机构的个人资料保护制度的变化范围及性质
Pub Date : 2018-09-28 DOI: 10.5604/01.3001.0012.8602
Marek Mazur
The EU GDPR Regulation introduced rules and regulations on the protection of individuals with regard to the processing of their personal data regardless of their citizenship or place of residence. The article focuses on issues related directly to the regulation on the protection of personal data and related to documents that regulate the protection of personal data and their processing in public institutions in Poland. The author presents basic estimates about the entry of the GDPR Regulation, indicates the importance of individual Dobies/organisations and entities playing a key role in the protection of personal data on the territory of Poland. It describes the documents that establish minimum standards for personal data protection systems to be developed in public institutions to guarantee security. In this article, the author attempted to indicate the scope and nature of changes in personal data systems in the light of the provisions of the GDPR Regulation.
欧盟GDPR条例在处理个人数据方面引入了保护个人的规则和条例,无论其公民身份或居住地如何。该条款侧重于与个人数据保护法规直接相关的问题,以及与规范波兰公共机构个人数据保护及其处理的文件相关的问题。作者提出了关于GDPR条例进入的基本估计,指出了在波兰境内保护个人数据方面发挥关键作用的个人/组织和实体的重要性。它描述了确立公共机构为保障安全而制定的个人数据保护系统最低标准的文件。在本文中,笔者试图结合GDPR条例的规定来指出个人数据系统变化的范围和性质。
{"title":"SCOPE AND NATURE OF CHANGES IN PERSONAL \u0000DATA PROTECTION SYSTEMS OF PUBLIC INSTITUTIONS \u0000IN THE LIGHT OF THE PROVISIONS OF THE GDPR (GENERAL \u0000DATA PROTECTION REGULATION)","authors":"Marek Mazur","doi":"10.5604/01.3001.0012.8602","DOIUrl":"https://doi.org/10.5604/01.3001.0012.8602","url":null,"abstract":"The EU GDPR Regulation introduced rules and regulations on the protection of individuals with regard to the processing of their personal data regardless of their citizenship or place of residence. The article focuses on issues related directly to the regulation on the protection of personal data and related to documents that regulate the protection of personal data and their processing in public institutions in Poland. The author presents basic estimates about the entry of the GDPR Regulation, indicates the importance of individual Dobies/organisations and entities playing a key role in the protection of personal data on the territory of Poland. It describes the documents that establish minimum standards for personal data protection systems to be developed in public institutions to guarantee security. In this article, the author attempted to indicate the scope and nature of changes in personal data systems in the light of the provisions of the GDPR Regulation.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125619378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The National Map of Security Threats as a tool to monitor security and public order 国家安全威胁地图作为监控安全和公共秩序的工具
Pub Date : 2018-09-28 DOI: 10.5604/01.3001.0012.8596
Marcin Kaduszkiewicz
Threats to public order compromise the personal security of the individual, forcing him to take action to improve it, and thus to guarantee it to the closest people. The right to ensure the security of the individual, society is one of the duties of a state whose omission can be considered a violation of human rights. By implementing this obligation, a threat monitoring system was created in Poland – the National Safety Threat Map. It is a tool used by the Police which in 2016 was initially piloted, then already throughout the country introduced this mechanism to monitor and counteract local threats, affecting the safety of residents. This tool uses the Internet as a source of information about threats from citizens. The instruction was issued for both users – citizens, as well as for policemen of users and local administrators, and instructions for proper and reliable implementation. They impose on the Police officers’ specific tasks in the system for the implementation of applications. The work is an attempt to answer the question: What tool is KMZB in the system of monitoring by the state of public security and order?National Map of Security Threats (KMZB) – functions of the National Map of Security Threats in shaping local community safety, constitutes an element of the process of managing the public safety, as well as inspiring the local community in this respect. The Police as the formation serving the society and opened for its needs implemented the additional channel of the information exchange about the most troublesome threats defined on the local level.
对公共秩序的威胁损害了个人的人身安全,迫使他采取行动来改善它,从而保证它对最亲近的人。保障个人和社会安全的权利是国家的义务之一,其疏忽可被视为侵犯人权。通过履行这一义务,波兰建立了一个威胁监测系统- -国家安全威胁地图。这是警方使用的一种工具,最初在2016年进行了试点,然后已经在全国范围内引入了这一机制,以监测和应对当地威胁,影响居民的安全。这个工具利用互联网作为公民威胁的信息来源。该指示既针对用户- -公民,也针对用户警察和地方行政人员,并针对适当和可靠的执行发出指示。它们规定了警务人员在系统中执行应用程序的具体任务。这个作品试图回答这样一个问题:KMZB在公共安全与秩序的监控系统中是什么工具?国家安全威胁地图(KMZB) -国家安全威胁地图在塑造当地社区安全方面的功能,构成管理公共安全过程的一个要素,并在这方面激励当地社区。警察作为为社会服务并为社会需要而开放的组织,执行了关于在地方一级确定的最棘手威胁的信息交流的额外渠道。
{"title":"The National Map of Security Threats as a tool to monitor security and public order","authors":"Marcin Kaduszkiewicz","doi":"10.5604/01.3001.0012.8596","DOIUrl":"https://doi.org/10.5604/01.3001.0012.8596","url":null,"abstract":"Threats to public order compromise the personal security of the individual, forcing him to take action to improve it, and thus to guarantee it to the closest people. The right to ensure the security of the individual, society is one of the duties of a state whose omission can be considered a violation of human rights. By implementing this obligation, a threat monitoring system was created in Poland – the National Safety Threat Map. It is a tool used by the Police which in 2016 was initially piloted, then already throughout the country introduced this mechanism to monitor and counteract local threats, affecting the safety of residents. This tool uses the Internet as a source of information about threats from citizens. The instruction was issued for both users – citizens, as well as for policemen of users and local administrators, and instructions for proper and reliable implementation. They impose on the Police officers’ specific tasks in the system for the implementation of applications. The work is an attempt to answer the question: What tool is KMZB in the system of monitoring by the state of public security and order?\u0000\u0000National Map of Security Threats (KMZB) – functions of the National Map of Security Threats in shaping local community safety, constitutes an element of the process of managing the public safety, as well as inspiring the local community in this respect. The Police as the formation serving the society and opened for its needs implemented the additional channel of the information exchange about the most troublesome threats defined on the local level.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
THREE PILLARS OF SECURITY CULTURE 安全文化的三大支柱
Pub Date : 2018-06-29 DOI: 10.5604/01.3001.0012.5891
J. Piwowarski
The article presents a proposal for multidisciplinary scientific platform,as a basis for security studies. It includes not only the military but mostlynon-military aspects of security. An emphasis is put on security culture,the main pivot of the “Security Culture” as a scientific journal, with the threepillars of the security culture concept: mental and spiritual (individual dimension),legal and organizational (social dimension), material.
文章提出了建立多学科科学平台的建议,作为安全研究的基础。它不仅包括军事方面,而且主要包括非军事方面的安全。强调安全文化,以《安全文化》作为科学期刊的主要支点,提出了安全文化概念的三大支柱:心理和精神(个人维度)、法律和组织(社会维度)、物质。
{"title":"THREE PILLARS OF SECURITY CULTURE","authors":"J. Piwowarski","doi":"10.5604/01.3001.0012.5891","DOIUrl":"https://doi.org/10.5604/01.3001.0012.5891","url":null,"abstract":"The article presents a proposal for multidisciplinary scientific platform,\u0000as a basis for security studies. It includes not only the military but mostly\u0000non-military aspects of security. An emphasis is put on security culture,\u0000the main pivot of the “Security Culture” as a scientific journal, with the three\u0000pillars of the security culture concept: mental and spiritual (individual dimension),\u0000legal and organizational (social dimension), material.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114863841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trzy filary kultury bezpieczeństwa
Pub Date : 2018-06-29 DOI: 10.5604/01.3001.0012.5880
J. Piwowarski
Artykuł prezentuje propozycję interdyscyplinarnej platformy naukowej,jako podstawy dla nauk o bezpieczeństwie. Zawierają się w niej nie tylkomilitarne, ale głównie niemilitarne aspekty bezpieczeństwa. Nacisk zostałpołożony na kulturę bezpieczeństwa, główną oś naukową czasopisma naukowego„Kultura Bezpieczeństwa”, wraz z koncepcją trzech filarów kulturybezpieczeństwa: mentalno-duchowy, prawno-organizacyjny, materialny.
文章提出了一个跨学科科学平台的建议,作为安全科学的基础。它不仅包括安全的军事方面,还主要包括安全的非军事方面。重点是安全文化,即《安全文化》科学杂志的主要科学轴心,以及安全文化三大支柱的概念:精神-心灵、法律-组织、物质。
{"title":"Trzy filary kultury bezpieczeństwa","authors":"J. Piwowarski","doi":"10.5604/01.3001.0012.5880","DOIUrl":"https://doi.org/10.5604/01.3001.0012.5880","url":null,"abstract":"Artykuł prezentuje propozycję interdyscyplinarnej platformy naukowej,\u0000jako podstawy dla nauk o bezpieczeństwie. Zawierają się w niej nie tylko\u0000militarne, ale głównie niemilitarne aspekty bezpieczeństwa. Nacisk został\u0000położony na kulturę bezpieczeństwa, główną oś naukową czasopisma naukowego\u0000„Kultura Bezpieczeństwa”, wraz z koncepcją trzech filarów kultury\u0000bezpieczeństwa: mentalno-duchowy, prawno-organizacyjny, materialny.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127386787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ANNONYMOUSAND INFORMATION SECURITY 匿名信息安全
Pub Date : 2018-06-29 DOI: 10.5604/01.3001.0012.5890
Peter Rozemberg
Anonymous could call movement, activists, community or idea. They haveno leader, no structure, yet have in the past influenced the decisions of thousandsof people around the world. Media is often referred to as hackers,because the greatest attention they raise is their attacks, which are mainlyfighting for freedom of the Internet or against various social phenomena.In addition to hackers, the movement itself creates, in addition to hackers,people who either share ideas of movement or use various programs to attackand shut down the servers of organizations, institutions, governments,or websites of various security agencies such as the FBI or the CIA.
匿名者可以称之为运动、活动家、社区或想法。他们没有领袖,没有结构,但在过去却影响了全世界成千上万人的决定。媒体通常被称为黑客,因为他们引起的最大关注是他们的攻击,这些攻击主要是为了争取互联网自由或反对各种社会现象。除了黑客之外,这场运动本身也创造了一些人,这些人要么分享运动的想法,要么使用各种程序攻击和关闭组织、机构、政府的服务器,或者各种安全机构(如联邦调查局或中央情报局)的网站。
{"title":"ANNONYMOUS\u0000AND INFORMATION SECURITY","authors":"Peter Rozemberg","doi":"10.5604/01.3001.0012.5890","DOIUrl":"https://doi.org/10.5604/01.3001.0012.5890","url":null,"abstract":"Anonymous could call movement, activists, community or idea. They have\u0000no leader, no structure, yet have in the past influenced the decisions of thousands\u0000of people around the world. Media is often referred to as hackers,\u0000because the greatest attention they raise is their attacks, which are mainly\u0000fighting for freedom of the Internet or against various social phenomena.\u0000In addition to hackers, the movement itself creates, in addition to hackers,\u0000people who either share ideas of movement or use various programs to attack\u0000and shut down the servers of organizations, institutions, governments,\u0000or websites of various security agencies such as the FBI or the CIA.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120972597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE CONCEPT AND ESSENCEOF INFORMATION SECURITY 信息安全的概念和本质
Pub Date : 2018-06-29 DOI: 10.5604/01.3001.0012.5885
Klaudia Grzebiela
A sense of security is one of the basic human needs that can be guaranteedby the state using the available methods and techniques. At present, securitycategories are distinguished where information security has foundits place. Due to the role of information and its impact on states, societiesand entities, the literature has highlighted this issue. The wide scope of informationsecurity and related topics have led to the creation of conceptsthat do not reflect current knowledge about information security. The aimof the article is to select, among the definitions presented by the doctrine– the definition of information security most aptly capturing its essence.In this work the author used the descriptive methodology, focusingon the comparative analytical method.
安全感是人类的基本需求之一,国家可以利用现有的方法和技术来保证。目前,信息安全已经有了立足之地,安全类别也有所区分。由于信息的作用及其对国家、社会和实体的影响,文献强调了这个问题。信息安全和相关主题的广泛范围导致了不能反映当前信息安全知识的概念的创建。本文的目的是在该学说提出的定义中选择最恰当地捕捉其本质的信息安全定义。在这项工作中,作者使用了描述性的方法,侧重于比较分析的方法。
{"title":"THE CONCEPT AND ESSENCE\u0000OF INFORMATION SECURITY","authors":"Klaudia Grzebiela","doi":"10.5604/01.3001.0012.5885","DOIUrl":"https://doi.org/10.5604/01.3001.0012.5885","url":null,"abstract":"A sense of security is one of the basic human needs that can be guaranteed\u0000by the state using the available methods and techniques. At present, security\u0000categories are distinguished where information security has found\u0000its place. Due to the role of information and its impact on states, societies\u0000and entities, the literature has highlighted this issue. The wide scope of information\u0000security and related topics have led to the creation of concepts\u0000that do not reflect current knowledge about information security. The aim\u0000of the article is to select, among the definitions presented by the doctrine\u0000– the definition of information security most aptly capturing its essence.\u0000In this work the author used the descriptive methodology, focusing\u0000on the comparative analytical method.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115294374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MECHANISMS OF SOCIAL INFLUENCE THROUGH THE APPRECIATIONS OF THE CRIME FRAUDAGE BY THE „GRANDSON” AND „THE POLICE” METHODS 通过鉴赏诈骗犯罪的社会影响机制,通过“孙子”和“警察”的方法
Pub Date : 2018-06-29 DOI: 10.5604/01.3001.0012.5889
A. Różańska, Beata Pastwa-Wojciechowska
The purpose of this work is to show the phenomenon of fraud committingmethods “grandson” and “policeman”. The offence of fraud is an act of highsocial harm, which victims become elderly, living alone or being alonein home at the time of committing the offence. In the literature of the subjectfor a long time it is shown that the elderly are preferred by offendersage group, as they show the limitations in the functioning of the physical,mental and social development. The offender, using a number of mechanisms of social influence and changing the way it operates, lead older peopleto huge losses, not only the material but also psychological (a letdownfor help anytime soon or loss of faith in the pure intentions of other people)and social (loss of confidence in the people and deepening insulation).Note one more accuracy, namely, if the elderly betting on victims of crimeis a constant element of the activities of the perpetrators, the offenderthemselves change their methods of operation, adapting them to the socialchanges and knowledge about our operation. Perpetrators have a greatunderstanding, what needs are most important for potential victims,and they still improve their knowledge in the area of tools to influence socialdevelopment. Changes in the behavior of the perpetrators within thesemethods affect crime detection by law enforcement and the implementationof preventive measures adversely. Practice of criminal in Poland lastsseveral years, and the offenders, by modifying the method of operation,made the crime a steady source of illicit income.
本作品的目的是展示诈骗现象的实施方法“孙子”和“警察”。诈骗犯罪是一种社会危害性较大的行为,犯罪发生时,受害人已年老、独居或独自在家。长期以来,在这一主题的文献中表明,老年人是犯罪群体的首选,因为他们在身体,心理和社会发展方面的功能受到限制。罪犯利用多种社会影响机制并改变其运作方式,导致老年人遭受巨大损失,不仅是物质上的,而且是心理上的(很快就会失望地寻求帮助,或者对他人的纯粹意图失去信心)和社会上的(对他人失去信心,加深隔离)。请注意另一个准确之处,即,如果老年人在犯罪受害者身上下注是犯罪者活动的一个恒定因素,那么犯罪者本身就会改变他们的操作方法,使他们适应社会的变化和对我们操作的了解。犯罪者对潜在受害者最重要的需求有着深刻的理解,并且他们仍然在影响社会发展的工具领域提高自己的知识。在这些方法中,犯罪者行为的变化会对执法部门的犯罪侦查和预防措施的实施产生不利影响。波兰的犯罪实践已持续数年,罪犯通过改变作案方法,使犯罪成为一种稳定的非法收入来源。
{"title":"MECHANISMS OF SOCIAL INFLUENCE THROUGH THE APPRECIATIONS OF THE CRIME FRAUDAGE BY THE „GRANDSON” AND „THE POLICE” METHODS","authors":"A. Różańska, Beata Pastwa-Wojciechowska","doi":"10.5604/01.3001.0012.5889","DOIUrl":"https://doi.org/10.5604/01.3001.0012.5889","url":null,"abstract":"The purpose of this work is to show the phenomenon of fraud committing\u0000methods “grandson” and “policeman”. The offence of fraud is an act of high\u0000social harm, which victims become elderly, living alone or being alone\u0000in home at the time of committing the offence. In the literature of the subject\u0000for a long time it is shown that the elderly are preferred by offenders\u0000age group, as they show the limitations in the functioning of the physical,\u0000mental and social development. The offender, using a number of mechanisms of social influence and changing the way it operates, lead older people\u0000to huge losses, not only the material but also psychological (a letdown\u0000for help anytime soon or loss of faith in the pure intentions of other people)\u0000and social (loss of confidence in the people and deepening insulation).\u0000Note one more accuracy, namely, if the elderly betting on victims of crime\u0000is a constant element of the activities of the perpetrators, the offender\u0000themselves change their methods of operation, adapting them to the social\u0000changes and knowledge about our operation. Perpetrators have a great\u0000understanding, what needs are most important for potential victims,\u0000and they still improve their knowledge in the area of tools to influence social\u0000development. Changes in the behavior of the perpetrators within these\u0000methods affect crime detection by law enforcement and the implementation\u0000of preventive measures adversely. Practice of criminal in Poland lasts\u0000several years, and the offenders, by modifying the method of operation,\u0000made the crime a steady source of illicit income.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126145555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JAPANESE STRATEGIC DOCUMENTS:CONTENT ANALYSIS OF THE NATIONALDEFENSE PROGRAM GUIDELINES 日本战略文件:国防计划指导方针的内容分析
Pub Date : 2018-06-29 DOI: 10.5604/01.3001.0012.5886
M. Heczko, Joseph E. Smolik
The development and direction of Japan’s security policy is a topic of strategicimportance in the region of East Asia, especially in the light of recentdevelopment of reinterpretation of the pacifist Constitution in termsof collective defense and its exercise. The aim of this article was to revealand analyze trends and dissimilarities in Japan’s security policy afterthe end of the Cold War through the use of both quantitative and qualitativecontent analysis. The objects of the analysis were four subsequent revisionsof National Defense Program Guidelines, a basic strategic document,from years 1995, 2004, 2010 and 2013. The first quantitative part revealedsignificant security concepts, which the strategic documents concentratedmost on and their changes over time. The second qualitative part providedfor a complex relationship model of security policy and influencing categories,and their gradual development in time.
日本安全政策的发展和方向在东亚地区是一个具有战略重要性的话题,特别是考虑到最近在集体防卫及其行使方面重新解释和平宪法的发展。本文的目的是通过定量和定性的内容分析,揭示和分析冷战结束后日本安全政策的趋势和差异。分析的对象是1995年、2004年、2010年和2013年的国防计划指南(一个基本的战略文件)的四次后续修订。第一部分揭示了战略文件最关注的重要安全概念及其随时间的变化。定性的第二部分给出了安全政策与影响范畴的复杂关系模型,以及它们在时间上的逐步发展。
{"title":"JAPANESE STRATEGIC DOCUMENTS:\u0000CONTENT ANALYSIS OF THE NATIONAL\u0000DEFENSE PROGRAM GUIDELINES","authors":"M. Heczko, Joseph E. Smolik","doi":"10.5604/01.3001.0012.5886","DOIUrl":"https://doi.org/10.5604/01.3001.0012.5886","url":null,"abstract":"The development and direction of Japan’s security policy is a topic of strategic\u0000importance in the region of East Asia, especially in the light of recent\u0000development of reinterpretation of the pacifist Constitution in terms\u0000of collective defense and its exercise. The aim of this article was to reveal\u0000and analyze trends and dissimilarities in Japan’s security policy after\u0000the end of the Cold War through the use of both quantitative and qualitative\u0000content analysis. The objects of the analysis were four subsequent revisions\u0000of National Defense Program Guidelines, a basic strategic document,\u0000from years 1995, 2004, 2010 and 2013. The first quantitative part revealed\u0000significant security concepts, which the strategic documents concentrated\u0000most on and their changes over time. The second qualitative part provided\u0000for a complex relationship model of security policy and influencing categories,\u0000and their gradual development in time.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132459292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SENSE OF SECURITYOF THE INHABITANTSOF BIAŁA PODLASKA IN THE CONTEXTOF THE CITY’S DEVELOPMENT 在城市发展的背景下,biaŁa podlaska居民的安全感
Pub Date : 2018-06-29 DOI: 10.5604/01.3001.0012.5883
Grzegorz Czapski
The article presents an analysis of a questionnaire-based survey conductedamong the inhabitants of the city of Biała Podlaska. The resultspresented are supposed to illustrate the level of sense of security amongthe people. The article also contains inhabitants’ propositions that couldincrease security in the city. Further parts of the work also entail the scaleof crime registered by the City Police Headquarters in the area of the cityin the years 2012 to 2017.
本文介绍了对Biała波德拉斯卡市居民进行的问卷调查的分析。提出的结果应该说明人们的安全感水平。这篇文章还包含了居民提出的可以增加城市安全的建议。这项工作的进一步部分还涉及2012年至2017年城市警察总部在该地区登记的犯罪规模。
{"title":"SENSE OF SECURITY\u0000OF THE INHABITANTS\u0000OF BIAŁA PODLASKA IN THE CONTEXT\u0000OF THE CITY’S DEVELOPMENT","authors":"Grzegorz Czapski","doi":"10.5604/01.3001.0012.5883","DOIUrl":"https://doi.org/10.5604/01.3001.0012.5883","url":null,"abstract":"The article presents an analysis of a questionnaire-based survey conducted\u0000among the inhabitants of the city of Biała Podlaska. The results\u0000presented are supposed to illustrate the level of sense of security among\u0000the people. The article also contains inhabitants’ propositions that could\u0000increase security in the city. Further parts of the work also entail the scale\u0000of crime registered by the City Police Headquarters in the area of the city\u0000in the years 2012 to 2017.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127307571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1