Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje最新文献

筛选
英文 中文
The problem of racism in European football 欧洲足球的种族主义问题
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5191
Jakub Tartak
{"title":"The problem of racism in European football","authors":"Jakub Tartak","doi":"10.5604/01.3001.0013.5191","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5191","url":null,"abstract":"The paper addresses racism as a key contemporary challenge to safety at football matches in Europe. The hypothesis is that racism does occur in the sports environment. To prepare the paper, press excerpts and scholarly publications on racism were used. To interpret the material, comparative method was used, so as to present the environments that harm safety in sports. The goal was to demonstrate the role of education in fighting discrimination in contemporary European football and the need to care for security culture in football. It is because football stadiums become arenas for expressing political and ideological views, as well as for racist at-tacks. The author points at the role of mass media and public entities in shaping social atti-tudes concerning racism in sports. He also indicates shortcomings in the law and in the activi-ties of the institutions overseeing sportspeople’s and sports activists’ safety. The conclusion is that the upbringing of society as regards tolerance and respect must become a priority in fighting racism in sports. Further research should focus on the education of children and ado-lescents and on introducing costly and effective sanctions for the individuals and entities that violate the rule of respecting one’s sports competitor.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133450781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Juvenile delinquency rates in Ukraine in 2016–2017 2016-2017年乌克兰青少年犯罪率
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5188
S. Minchenko, Hanna Shcherbakova
{"title":"Juvenile delinquency rates in Ukraine in 2016–2017","authors":"S. Minchenko, Hanna Shcherbakova","doi":"10.5604/01.3001.0013.5188","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5188","url":null,"abstract":"The article presents current tendencies related to juvenile delinquency in Ukraine based on data from the 2016–2017 period. Quantitative juvenile delinquency indices differ substantially from quantitative adult crime indices. This is primarily caused by the fact that the former apply to a four-year period (14–18 years of age), while the latter apply to the period after reaching the age of majority. Differences between juvenile and adult crime also manifest in the form of e.g. the nature and degree of social harm inflicted by the crimes, which is determined by the age of the perpetrators. Their age is not only related to the socio-psychological profiles of offenders, but also their position in society (which is why juvenile delinquency does not encompass e.g. economic crimes, professional offences etc.). The article presents the fundamental determinants of juvenile delinquency, based on the premise that a thorough analysis of crimes committed by persons under 18 years of age is necessary to effectively combat the phenomenon in Ukraine. The article also identifies the major methods currently used to prevent and counteract this type of crimes.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"6 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114124578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
State border protection from the perspective of the tasks and functions of the border guard and border checkpoints 从国家边境保护的角度分析边防警卫和边防检查站的任务和职能
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5193
B. Wiśniewski
{"title":"State border protection from the perspective of the tasks and functions of the border guard and border checkpoints","authors":"B. Wiśniewski","doi":"10.5604/01.3001.0013.5193","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5193","url":null,"abstract":"The aim of the article is to present the major issues related to the protection of the Polish border from the perspective of the tasks and functions of the Border Guard and border checkpoints. The present analysis is a result of research conducted with use of theoretical research methods used in the social sciences. The aforementioned research was carried out with the purpose of diagnosing the functioning of the state border protection and traffic control system. The result of the research leads to the conclusion that the Polish border protection and traffic control system is being gradually improved, which is a result of changes in the security environment, primarily related to the emergence of new threats and increasing levels of existing threats. This leads to the expansion of the range of functions performed not by the Border Guard in general, but specifically by border checkpoints, which are closely related to field government and local authority administration bodies. These bodies have a definitive influence on local security, and thus on the security of areas controlled by the Border Guard.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122741910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The security (culture) rhombus. Redefining security environment 安全(文化)菱形。重新定义安全环境
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5190
J. Piwowarski
{"title":"The security (culture) rhombus. Redefining security environment","authors":"J. Piwowarski","doi":"10.5604/01.3001.0013.5190","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5190","url":null,"abstract":"Goal The goal of this article is to present the author’s definition of security environment. It constitutes a redefinition and expansion of the narrow (four-element) approach presented in the White Book on National Security of the Republic of Poland. I propose a broad, eight-element approach.\u0000Methods I redefine security environment based on several premises. The first is the concept of the triangle of (the need for) security – the existence of this triangle necessitates and is sufficient for the need for security to arise. The second premise is the existence of the rhombus of security (culture), which necessitates and is sufficient for security to manifest, i.e. for the need for security to be satisfied.\u0000Results The above premises lead to the conclusion that the narrow approach to security environment should be ontically expanded to include elements comprising the triangle of the (need for) security and the security (culture) rhombus. This results in an eight-element definition of security environment.\u0000Conclusions The article illustrates an important issue in the security sciences – the need to expand the definition of security environment. I present and justify an alternative to the narrow approach to security environment, which is based on the narrow definition presented in the White Book on National Security of the Republic of Poland.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114976834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Child abduction proceedings 儿童诱拐诉讼
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5187
Lucia Kucbelová, Rastislav Kazanský
{"title":"Child abduction proceedings","authors":"Lucia Kucbelová, Rastislav Kazanský","doi":"10.5604/01.3001.0013.5187","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5187","url":null,"abstract":"This article deals with the legal processing of a serious problem regarding societal security, human rights and the rights of minors, i.e. child abduction. The procedure of the returning of an abducted child is one of the most challenging types of court proceedings. Courts decide within the statutory time limit of six weeks after filing the petition. There is a foreign element in the proceedings, embodied either by the parties to the proceedings or by the necessity of clarifying the child’s habitual residence. Translators or interpreters are recruited to guarantee the parties’ right to act in their mother tongues. The court, as a rule, executes and orders expert evidence within a short period of time, for example to determine the circumstances that rule out the return of the minor to his/her country. As a rule, hearings take place all day or several days in a row. Courts apply international treaties and EU law when making decisions. The difficulty of bringing proceedings is additionally increased by frequent requests from the court hearing the authorities of the Member State of the habitual residence of the minor. The return of the child is usually accompanied by tensions between the parties, emotions and stress.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128342859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Changing the enemy into the ally in the light of the security logic of Academia Diplomatica Europaea 从欧洲外交学界的安全逻辑看化敌为友
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje Pub Date : 2019-06-28 DOI: 10.5604/01.3001.0013.5189
Jerzy Ochmann
{"title":"Changing the enemy into the ally in the light of the security logic of Academia Diplomatica Europaea","authors":"Jerzy Ochmann","doi":"10.5604/01.3001.0013.5189","DOIUrl":"https://doi.org/10.5604/01.3001.0013.5189","url":null,"abstract":"The author hypothesizes that in the era of information technology, logic is the crucial tool of security sciences, and logicians have a greater role to play in this field than politicians. This viewpoint is held by two significant institutions dealing with the logic of security: Academia Diplomatica Europaea (ADE) in Brussels and US Army War College in Carlisle, Pennsylvania. The author focuses on the assumptions and activities of Academia Diplomatica Europaea. ADE assumes that the major challenge to contemporary security is to change the enemy’s mentality into the mentality of an ally. To do this, one should analyse the following logical categories: the category of relations (between individuals and societies) and the category of hostility. ADE mainly focuses on social relations, with their sociological and psychological aspects, assuming that enemies have not only official, explicit opinions but also implicit ones, and learning these implicit opinions is a key to change the enemy’s mentality according to the aforementioned pattern. The author then discusses the methods relating to the logic of security used by ADE. Finally, in the light of the assumptions stated by ADE, he analyses the institution’s activities aimed at contemporary threats, the major threat being, according to ADE, terrorism.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114270532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategic meaning of reflexive control methods in the concept of information fight 信息战概念下自反性控制方法的战略意义
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje Pub Date : 2019-03-29 DOI: 10.5604/01.3001.0013.1944
E. Kublik
{"title":"Strategic meaning of reflexive control methods in the concept of information fight","authors":"E. Kublik","doi":"10.5604/01.3001.0013.1944","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1944","url":null,"abstract":"The article describes the theoretical foundations, genesis and application of reflexive control methods. It contains the characteristics of the views of the leading researchers investigating the topics of reflexive control and the manipulation of information. It explains the importance of reflexive control in the concepts of information fights and its impact on state security. The article is based on two approaches to the Russian and American phenomena. It also explains issues in the field of war and information fights.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The security of critical infrastructure in the concept of the Territorial Defence Force of the Republic of Poland 波兰共和国领土防卫部队概念中的关键基础设施的安全
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje Pub Date : 2019-03-29 DOI: 10.5604/01.3001.0013.1945
Piotr Maciejczyk-Cień
{"title":"The security of critical infrastructure in the concept of the Territorial Defence Force of the Republic of Poland","authors":"Piotr Maciejczyk-Cień","doi":"10.5604/01.3001.0013.1945","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1945","url":null,"abstract":"Nowadays, humanity has become dependent on the devices and systems which form part of everyday life. This relation was made clear by the terrorist attacks in New York, Madrid and London. The attacks resulted not only in human casualties and damage to infrastructure, but also made people aware of the close relations between the damage and the effective operation of the rescuers. This gave rise to the need to face the problem of protecting the infrastructure which is important for the security of the state and its citizens. At the same time, the issue of threats to critical infrastructure has started to emerge more and more in the literature devoted to internal security and stopped being associated solely with military concepts. In Poland, the notion of ‘critical infrastructure’ first started to appear in government documents and literature in 2007 after the introduction of the Crisis Management Act. The legislator specifies in the document the conceptual range of critical infrastructure which is closely related to the functioning of facilities, devices, and installations relevant for the security of the state and citizens. The following systems were regarded as critical infrastructures: the energy and fuel, communications and ICT, transport, rescue, financial, food and water supply, and healthcare systems, and also the one related to chemical and radioactive substances. This paper is an attempt at characterising the defence of critical infrastructure in Poland and the possibilities of preventing threats to important state security systems in the context of the establishment of the Territorial Defence Force.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133798019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An analysis of the activity in the Polish internet sphere from the angle of social mobilization to perform acts of violence. A case study of the immigrant crisis 从社会动员的角度分析波兰网络领域的活动,以执行暴力行为。移民危机的个案研究
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje Pub Date : 2019-03-29 DOI: 10.5604/01.3001.0013.1946
Danuta Bożena Ożarowska
{"title":"An analysis of the activity in the Polish internet sphere from the angle of social mobilization to perform acts of violence. A case study of the immigrant crisis","authors":"Danuta Bożena Ożarowska","doi":"10.5604/01.3001.0013.1946","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1946","url":null,"abstract":"This article is a case study of the process of mobilization to violence on the internet. The goal of this paper was to identify a select number of factors within the narrative on the topic of modern immigration that can be found on the internet and analyze them using the theoretical constructs that can be found in the literature on this subject.\u0000The scientists that study genocide have identified several factors commonly found in historically documented events that must be present in order for genocide to occur. In this paper the author will refer to works of scientists such as Helen Fein, Manus I. Midlarsky, Lech M. Nijakowski.\u0000The author of the paper analyzed the content published on the internet that deals with the topic of immigration. The materials selected for research contained topics that treat the subject of accepting refugees from outside of Europe, their process of assimilation and the way they coexist with the local population. The analysis was based on content in the Polish language which includes both materials that were created in Polish and those that were originally in a different language and then were remade with Polish footnotes. The content for the study was selected from among the following sources: propaganda movies which spread on the internet through social media, short unscientific propaganda and informational articles and finally memes (pictures with short footnotes).\u0000Factors that were analyzed in the following article:\u00001) Universe of obligation, construct created by Helen Fein.\u00002) Conspiratory discourse, described by Lech Nijakowski.\u00003) Utility and parasitism; discourse referring to them.\u00004) Two conditions necessary to instigate genocide, described by Manus I. Midlarsky.\u00005) Discourse on the topic of immoral sexual actions described by the author based on the theory of discourses created by Lech Nijakowski.\u0000During the study all the aforementioned factors have been identified. The author described the examples analyzed, interpreted them and subsequently matched them to the categories described above. It was determined that within those examples we can distinguish a number of factors that match the elements of mobilizing the population to violence. The article closes with an analysis of potential consequences of the phenomena described.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126779033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security culture and security anthropology 安全文化与安全人类学
Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje Pub Date : 2019-03-29 DOI: 10.5604/01.3001.0013.1955
Ł. Trzciński, J. Piwowarski
{"title":"Security culture and security anthropology","authors":"Ł. Trzciński, J. Piwowarski","doi":"10.5604/01.3001.0013.1955","DOIUrl":"https://doi.org/10.5604/01.3001.0013.1955","url":null,"abstract":"The topic of the article is the relationship between security culture and anthropology of securi-ty. The authors recall the most important definitions of security culture and anthropology of security, both of which belong to the discipline of security sciences, and conclude that culture, including its special sphere called security culture, is a human creation that strongly affects people, so it would be difficult to explore it scientifically without anthropological knowledge and tools. The authors give an account of the development of security sciences research in Poland, and point out that its subdiscipline called security anthropology is not fully formed yet, its theoretical and methodological identity still being underway; however, it develops dynamically. In forming this new subdiscipline of security sciences, apart from applying mul-tidisciplinary research, it is also necessary to consider different types of anthropology, above all biological, cultural and philosophical anthropology. The authors signalize the potential di-rections of research within the field and conclude that a methodological framework of securi-ty anthropology should be worked out, in a form that is most important and legible at the cur-rent stage of the development of science.\u0000\u0000","PeriodicalId":432439,"journal":{"name":"Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125516392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信