National Security Studies最新文献

筛选
英文 中文
THE MIDDLE KINGDOM AS DEPICTED IN THE US STRATEGIC DOCUMENTS IN 2010-2019 2010-2019年美国战略文件中描述的中央王国
National Security Studies Pub Date : 2018-12-19 DOI: 10.37055/sbn/132141
Adam P. Kubiak
{"title":"THE MIDDLE KINGDOM AS DEPICTED IN THE US STRATEGIC DOCUMENTS IN 2010-2019","authors":"Adam P. Kubiak","doi":"10.37055/sbn/132141","DOIUrl":"https://doi.org/10.37055/sbn/132141","url":null,"abstract":"The article’s goal is to summarize the perception of China in key US strategic documents in the period of 2010-2019. The rationale behind the selection of such a period was based on an assumption, that the 2012 Defense Strategic Guidance issued by the Secretary of Defense upon order from the President, marked and announced, what has been nick-named the „Pacific Pivot”. To get a better understanding of the dynamics of the perception the author suggests a one step backwards move to the 2010 National Security Strategy issued by President Obama on the verge of withdrawing large US contingents from Middle East and just after receiving the Nobel Peace Prize. To meet the goal, author will follow the changes in China-oriented parts of the strategic documents issued by the US Presidents and the Secretaries of Defence until the recently announced NSS and National Defense Strategy.","PeriodicalId":414886,"journal":{"name":"National Security Studies","volume":"38 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132330147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HYBRIDITY – HALLMARKS OF A NEW WARFARE 混合——新战争的标志
National Security Studies Pub Date : 2018-12-19 DOI: 10.37055/sbn/132137
Leszek Elak
{"title":"HYBRIDITY – HALLMARKS OF A NEW WARFARE","authors":"Leszek Elak","doi":"10.37055/sbn/132137","DOIUrl":"https://doi.org/10.37055/sbn/132137","url":null,"abstract":"The term ‘hybrid’, used in connotation with military domain, proved to be very popular at the beginning of the current century. It is linked with using other than military tools in combination with military pressure to influence security situation in other opposing nations. It is based on valid assumption that it is not necessary to use combat power in globalized world to impact other nation’s internal situation, which could lead to their partial or complete subordination.","PeriodicalId":414886,"journal":{"name":"National Security Studies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129251377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NATIONAL SECURITY EXCUSE FOR THE NE0-PROTECTIONIST TRADE POLICY OF PRESIDENT’S TRUMP ADMINISTRATION 国家安全是特朗普政府新贸易保护主义政策的借口
National Security Studies Pub Date : 2018-12-19 DOI: 10.37055/sbn/132146
Ryszard Ławniczak
{"title":"NATIONAL SECURITY EXCUSE FOR THE NE0-PROTECTIONIST TRADE POLICY OF PRESIDENT’S TRUMP ADMINISTRATION","authors":"Ryszard Ławniczak","doi":"10.37055/sbn/132146","DOIUrl":"https://doi.org/10.37055/sbn/132146","url":null,"abstract":"In March 2018, the newly elected President of the United States, Donald Trump, surprised the world by triggering a trade war with his largest trading partners. He announced that he would introduce 25% and 10% of customs tariffs on imports of steel and aluminium. Besides he threatened to impose duties on imports of European cars, as well as on the entire list of other products, as long as the trading partners do not stop unfair trading practices and will not reduce their own barriers to American products. In the article, the author tries to explain why protectionist measures of the American administration should be defined as \"neo-protectionism\", and why and if justly those protectionist steps President Trump justifies as a “threat to national security\".","PeriodicalId":414886,"journal":{"name":"National Security Studies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114332244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE PROFESSIONAL EQUIPMENT AND SERVICES AS THE CONSTITUTIVE ELEMENTS OF AIR TRANSPORT SECURITY SYSTEM USING COUNTER-IED 将专业设备和服务作为航空运输安全保障系统的构成要素使用
National Security Studies Pub Date : 2018-12-19 DOI: 10.37055/sbn/132139
A. Cywiński
{"title":"THE PROFESSIONAL EQUIPMENT AND SERVICES AS THE CONSTITUTIVE ELEMENTS OF AIR TRANSPORT SECURITY SYSTEM USING COUNTER-IED","authors":"A. Cywiński","doi":"10.37055/sbn/132139","DOIUrl":"https://doi.org/10.37055/sbn/132139","url":null,"abstract":"Artykuł przedstawia problem jakim są IED (improwizowane urządzenia wybuchowe) w transporcie lotniczym. Skutecznemu przeciwdziałaniu ich użycia służą właściwe przepisy bezpieczeństwa, które scharakteryzowano we wcześniejszych publikacjach. W opracowaniu niniejszym skupiono się na takich czynnikach jak służby bezpieczeństwa działające w rejonie lotniska oraz na sprzęcie specjalistycznym jaki wykorzystują w swojej pracy. W dalszej części dokonano podziału sprzętu specjalistycznego, który wykorzystywany jest w systemach bezpieczeństwa w portach lotniczych. Scharakteryzowano jego możliwości oraz etapy na których jest on wykorzystywany w przypadku wykrycia IED. Zaprezentowano warunki oraz procedury użycia sprzętu specjalistycznego przez upoważnione służby w warunkach zagrożenia wybuchem IED.","PeriodicalId":414886,"journal":{"name":"National Security Studies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125793814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERSONAL DATA PROTECTION IN THE ENTERPRISE 企业中的个人数据保护
National Security Studies Pub Date : 2018-12-19 DOI: 10.37055/sbn/132122
Janusz Rybiński
{"title":"PERSONAL DATA PROTECTION IN THE ENTERPRISE","authors":"Janusz Rybiński","doi":"10.37055/sbn/132122","DOIUrl":"https://doi.org/10.37055/sbn/132122","url":null,"abstract":"Obowiązujący w naszym kraju system prawny chroni dane osobowe wszystkich mieszkańców Polski. System ten wykształcił się wraz ze zmianami ustrojowymi w latach 90-tych ubiegłego wieku. Przez czas jego stosowania był nowelizowany pod kątem stworzenia bardziej skutecznego i efektywnego sposobu chroniącego dobro wszystkich ludzi. Tworzenie prawa to zadanie Sejmu i Senatu, jednak, jako członek Unii Europejskiej jesteśmy również zobowiązani stosować prawo unijne. W tym zakresie działalność legislacyjna jest stosunkowo dynamiczna, ponieważ od wielu lat dąży się do wprowadzenia w całej Unii Europejskiej jednakowych standardów ochrony. Te standardy wchodzą w życie już w maju 2018 r. i faktycznie zmieniają wiele regulacji w obowiązujących zasadach ochrony. Celem artykułu jest przedstawienie dotychczasowych zasad ochrony oraz omówienie najważniejszych regulacji wprowadzonych przez prawo unijne oraz skutków ich stosowania tam gdzie będą one najbardziej widoczne, czyli w polskich przedsiębiorstwach.","PeriodicalId":414886,"journal":{"name":"National Security Studies","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114490687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UNDECLARED WAR ‒ DRUG CRIME Of CARTELS. PLATA O PLOMO 不宣而战-贩毒集团的毒品犯罪。Plata o plomo
National Security Studies Pub Date : 2018-12-19 DOI: 10.37055/sbn/132140
Arnold Warchał, P. Żukowski
{"title":"UNDECLARED WAR ‒ DRUG CRIME Of CARTELS. PLATA O PLOMO","authors":"Arnold Warchał, P. Żukowski","doi":"10.37055/sbn/132140","DOIUrl":"https://doi.org/10.37055/sbn/132140","url":null,"abstract":"Artykuł dotyczy umiejscowienia współczesnych karteli narkotykowych w globalnej sieci powiązań zagrażających bezpieczeństwu państwa, jego instytucji i obywateli. Autorzy rozwijają zagadnienia opisywane we wcześniejszym swoim artykule dotyczącego tej tematyki. Określają niniejszym zasadnicze cechy i aktywności najważniejszych karteli latyno-amerykańskich i ich udział w przestępczych procederach w Stanach Zjednoczonych i w Europie. Opisane zostały również niektóre mechanizmy działania i schemat operacyjny tych transnarodowych organizacji przestępczych. Są one równie niebezpieczne, co grupy terrorystyczne, a możliwości działania na każdym polu przestępczości, w tym kooperacji z grupami terrorystycznymi, umożliwia im ingerencję w życie polityczne i bezpieczeństwo państwa.","PeriodicalId":414886,"journal":{"name":"National Security Studies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134062066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INTERNET OF THINGS AS A DETERMINANT OF SECURITY AND CONTINUITY OF FUNCTIONING 物联网作为安全性和功能连续性的决定因素
National Security Studies Pub Date : 2018-12-19 DOI: 10.37055/sbn/132108
Dariusz Pałka, Piotr Zaskórski
{"title":"INTERNET OF THINGS AS A DETERMINANT OF SECURITY AND CONTINUITY OF FUNCTIONING","authors":"Dariusz Pałka, Piotr Zaskórski","doi":"10.37055/sbn/132108","DOIUrl":"https://doi.org/10.37055/sbn/132108","url":null,"abstract":"One of the fastest developing information technologies, the Internet of Things (IoT) facilitates integration of diverse devices and objects. The IoT technology is based on the strengths of the Internet, particularly on the ability to establish networks of cooperating devices used on a mass scale. More and more numerous devices are connected to the Internet which also serves to monitor their condition and work. This shows the future potential utilization of the Internet for various aspects of the management of economic processes and for complex systems of assuring the security and continuity of functioning of individual subjects and of the entire state. Farther development of this technology may, in the future, become the basis of the development of other technologies and of the implementation of diverse network models in economic and organizational processes in order to improve their effectiveness. This effectiveness can be directly related to the collection of very large amounts of data and to the multifaceted data exploration online (Big Data systems). Increasingly essential are therefore the issues of data explosion, of data processing security and of the security of the whole technology.","PeriodicalId":414886,"journal":{"name":"National Security Studies","volume":"801 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117044008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SHAPING THE MUNICIPAL POLICE LEGAL POSITION WITHIN THE INSTITUTIONAL SYSTEM OF RESPONSIBILITY FOR SAFETY AND ORDER 塑造城市警察在治安责任制度体系中的法律地位
National Security Studies Pub Date : 2018-12-19 DOI: 10.37055/sbn/132194
Adam Dudziak
{"title":"SHAPING THE MUNICIPAL POLICE LEGAL POSITION WITHIN THE INSTITUTIONAL SYSTEM OF RESPONSIBILITY FOR SAFETY AND ORDER","authors":"Adam Dudziak","doi":"10.37055/sbn/132194","DOIUrl":"https://doi.org/10.37055/sbn/132194","url":null,"abstract":"Przedmiotem artykułu jest proces tworzenia podstaw prawnych działania i form organizacyjnych straży miejskich w Polsce. W artykule uwzględniono kontekst historyczny działań samorządu lokalnego w zakresie ochrony bezpieczeństwa i porządku publicznego oraz pozycję samorządowej formacji w systemie organów odpowiedzialnych za bezpieczeństwo i porządek publiczny w Polsce.","PeriodicalId":414886,"journal":{"name":"National Security Studies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE CRIMEA, ISKANDER MISSILES, NOVICHOK. ACTIONS OF THE RUSSIAN FEDERATION AIMEDAT THE UNITED STATES OF AMERICA AND EUROPEAN UNION 克里米亚,伊斯坎德尔导弹,诺维乔克。俄罗斯联邦的行动是针对美利坚合众国和欧洲联盟的
National Security Studies Pub Date : 2018-12-19 DOI: 10.37055/sbn/132135
Magdalena Skwarska
{"title":"THE CRIMEA, ISKANDER MISSILES, NOVICHOK. ACTIONS OF THE RUSSIAN FEDERATION AIMED\u0000AT THE UNITED STATES OF AMERICA AND EUROPEAN UNION","authors":"Magdalena Skwarska","doi":"10.37055/sbn/132135","DOIUrl":"https://doi.org/10.37055/sbn/132135","url":null,"abstract":"The article presents the development of Russian foreign policy towards NATO and EU over the course of last few years. Special attention has been given to the most aggressive measures implemented by Moscow in order to preserve its importance in world political landscape. Author appeals to the Crimea case, military development, hybrid and information warfare and cases of assassinations of Russian emigrants linked to the opposition and business.","PeriodicalId":414886,"journal":{"name":"National Security Studies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133112129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE ACTIVITIES OF THE POLISH ARMY FOR SAFETY IN EASTERN MAŁOPOLSKA IN THE FIRST YEARS OF THE EXISTENCE OF THE SECOND POLISH REPUBLIC (1921-1925) 波兰第二共和国成立初期(1921-1925)波兰军队在东部maŁopolska的安全活动
National Security Studies Pub Date : 2018-12-19 DOI: 10.37055/sbn/132130
Adam Ostanek
{"title":"THE ACTIVITIES OF THE POLISH ARMY FOR SAFETY IN EASTERN MAŁOPOLSKA IN THE FIRST YEARS OF THE EXISTENCE OF THE SECOND POLISH REPUBLIC (1921-1925)","authors":"Adam Ostanek","doi":"10.37055/sbn/132130","DOIUrl":"https://doi.org/10.37055/sbn/132130","url":null,"abstract":"Presented research is characterized by the chronological-problem approach to content. The main research problem of this article focuses on place and role and activities of the Armed Forces of the Polish Republic in the process of holding the internal security in the area of Eastern Małopolska in the first half of the 1920s. The initial turning point was the signing of the Treaty of Riga in 1921 and the transition of the army to a peaceful activities, and the final one in 1925, in which an order was issued limiting the use of the army to activities that should be carried out by the State Police. During this period, soldiers from the Polish Army were used in battles with organized banditry, sabotage and subversive actions, which were repeated quite often, and which the police was not able to effectively counteract. All military actions were always carried out in close consultation with representatives of civilian field authorities on the principle of assistance. The army, however, had extensive powers with ad hoc jurisdiction, and the possibility of issuing and carrying out death sentences, also for crimes against property. The source basis of this research is the material from the archives in Poland and Ukraine, as well as literature and the local press.","PeriodicalId":414886,"journal":{"name":"National Security Studies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127044976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信