Ograniczanie wyników
Czasopisma help
Autorzy help
Lata help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 1416

Liczba wyników na stronie
first rewind previous Strona / 71 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  security
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 71 next fast forward last
EN
In addition to the catastrophic effects on the environment, infrastructure and the population, the 2024 flood in Poland demonstrated additional means of pressure characteristic of hybrid warfare, unprecedented in this type of threat. At issue is false information spread through social media and private messaging platforms, triggering social unrest and division. It is social media platforms, with their structure for instantaneous sharing of news, that provide an exceptionally fertile environment for the spread of disinformation. The content was intended to undermine trust in public institutions, dividing local communities, and realistically affecting the undertaken rescue efforts. The aim of the research, the results of which are presented in the article, was to identify socio-political effects of disinformation during the flood in question. The article attempts to find how false information and data manipulation influenced citizens’ attitudes, the actions of public institutions, and political decision-making during the crisis. In order to effectively comprehend the social and political dynamics during this type of emergency, it was necessary to look at the role played by disinformation in shaping attitudes and decisions during difficult times. The findings highlight the role of emotional triggers in amplifying disinformation and point to the need of developing media education, content verification tools and regulation to mitigate its effects during crises.
EN
This article begins by exploring social distance and migration from a theoretical perspective. The following sections present the views of students on social distance towards migrants, specifically concerning their potential presence in the Republic of Poland. The survey was structured around three life domains and six social roles, as follows: 1) Casual interactions, involving indirect contact with the so-called “Foreigner” in the roles of citizen and neighbour 2) Power/dependence dynamics, examining direct interactions with the “Other” in roles such as co-worker and supervisor; 3) Family/intimate settings, covering the acceptability of a marital/partner relationship with the “Other” and their role as a child caregiver. To ensure robust findings, a social distance index comprising various data elements was developed.
EN
The Union of Soviet Socialist Republics has collapsed. The republics have regained their autonomy and subjectivity and became independent states. Russia began to be perceived as a partner rather than an enemy. We were accustomed to a situation in which the threats to the security of our existence were far away from the European borders. The main security challenge was primarily terrorism. Countries around the world have begun to set up counter-terrorism sub-units with the major task being principally to carry out combat operations in hostage rescue operations and to counter terrorist attacks by apprehending or eliminating terrorists. The establishing of counter-terrorist sub-units was based on models taken from elite military units, the so-called special units. The new situation – Russia’s war against Ukraine – led to recognition of the potential of counter-terrorism forces during armed conflicts.
EN
The article complements the theoretical aspects of forecasting and designing in security, which was published in “Zeszyty Naukowe SGSP” (“Scientific Reports of the Fire University”) no. 92(2)/2024. The main aim of the second part of the article was to demonstrate the usefulness of designing as a research procedure complementary to forecasting in the process of formulating full-scale security policy objectives in a turbulent state security environment. The optimum level of state technological security in relation to the megatrend such as universal access to modern technology was identified as the subject of the study. The first part of the study was a state strategic analysis - identifying the underlying categories such as threats and opportunities, strengths and weaknesses, extrapolating, reducing them, and grouping for the identification of national interests. Both qualitative (expert method) and quantitative (cluster analysis - k-means algorithm) methods were used for this purpose. The results obtained in the analysis process were then used in the second part of the study – the previously identified categories constituted a reference to the vision of the state and the projected conditions of its functioning using the method of idealization and gradual concretization. As a result, it has been possible to modify the wording of the security policy objective to its full-scale form – adequately to the current needs of the state and the complex and dynamic changes in its security environment.
5
Content available Current issues of special construction facilities
EN
The article discusses the issue of state security infrastructure construction facilities, which refer to the concept of special construction facilities in force until 1974, introduced in 1961 by the provisions of the Construction Law Act. It is based on the adoption of an integrated nature of state security and the assumption that the security of the state, individuals and social groups against external and internal threats is determined by the quality of functional, spatial, material and construction solutions of facilities, resulting from their location, design, construction and operation.
EN
This article concerns the development of autonomous ship technology in maritime navigation, which entails safety and risk management challenges. This study aims to compare the risk analyses of two levels of autonomy of seagoing ships – A3-B1 (ships with limited crew) and A2-B0 (ships fully unmanned) – based on the results of a project named SAFEMASS developed by DNV GL company for the European Maritime Safety Agency. In addition, identifying new, emerging risks relating to the functioning of MASS is another research goal. The article uses hazard identification methods (HAZID) and fault tree analysis (FTA). In the case of A3-B1 vessels, the main threats result from reduced situational awareness of operators and dependence on automatic systems. In the A2-B0 model, the most significant risks are communication system failures and a lack of physical supervision of processes. The research results indicate the need to implement additional risk control measures, such as system optimization and improvement of human-machine interfaces (HMI). It is suggested that autonomous and low-emission technologies will develop conceptually in the coming years. Still, the widespread implementation of these technologies will take a long time due to the complexity of the processes and high operating costs. This article emphasizes that implementing autonomous technologies is a promising path for the sustainable development of maritime transport. Still, further research is required, investment in infrastructure is needed, and legal regulations must be adjusted.
PL
W Niemczech w 1955 r. założono grupę roboczą VDE 0435, zajmującą się zabezpieczeniami. W 1962 r. opublikowano dokument „Wytyczne dotyczące przekaźników w systemach wysokiego napięcia („Regeln für elektrische Relais in Starkstromanlagen”, rys. 1). Wytyczne dotyczyły działania i eksploatacji zabezpieczeń oraz pomiarów. W 1960 r. założono TC 41 w IEC, która jest odpowiednim międzynarodowym organem normalizacyjnym („Zabezpieczenia”). Zaktualizowana wersja niemieckich wytycznych została opublikowana jako VDE 0435/9.62.
EN
The contemporary international security environment faces many challenges and threats resulting from the various goals of the entities that create it. The aim of the article is to indicate the ways in which the Russian Federation has influenced the cyberspace of Ukraine, starting from the annexation of Crimea in 2014. The main research problem is an attempt to answer the question: what value is attributed to the sphere of cyberspace in the area of conducting hybrid activities? The article hypothesises that cyber warfare has grown in importance in recent years and is one of the essential elements of hybrid warfare. The research methodology is based on a critical analysis of literature, definitions, induction and deduction. The conclusions from the research indicate the need to educate the security community, which is a key issue in formulating methods of counteracting practices conducted by the Russian Federation.
PL
Współczesne międzynarodowe środowisko bezpieczeństwa napotyka wiele wyzwań i zagrożeń wynikających z różnych celów podmiotów je tworzących. Celem artykułu jest wskazanie sposobów oddziaływania w cyberprzestrzeni Ukrainy przez Federację Rosyjską, począwszy od aneksji Krymu w 2014 roku. Główny problem badawczy stanowi próba odpowiedzi na pytanie: jaką wartość przypisuje się sferze cyberprzestrzeni w obszarze prowadzenia działań hybrydowych? W artykule przyjęto hipotezę, iż walka w cyberprzestrzeni nabrała w ostatnich latach na znaczeniu i stanowi jeden z zasadniczych elementów wojny hybrydowej. Metodyka badań oparta została o krytyczną analizę literatury, definiowanie, indukcję i dedukcję. Wnioski z badań wskazują potrzebę edukacji środowisk bezpieczeństwa, co jest kluczową kwestią w formułowaniu metod przeciwdziałania praktykom prowadzonym przez Federację Rosyjską.
PL
W artykule przedstawiono możliwości wykorzystania języka Python w systemach wbudowanych. Przeanalizowano różnice oraz ograniczenia w stosunku do jego wersji standardowej, zwrócono uwagę na aspekt bezpieczeństwa i jakość aplikacji do zastosowań w medycynie i w automatyce.
EN
The article presents the potential of using Python in embedded systems. Differences and limitations compared to the standard version are analysed, with attention given to the aspects of security and application quality for use in medicine and automation.
10
Content available Macierzowy cyfrowy cień sieci czujników IoT
PL
W artykule przedstawiono koncepcję macierzowego cyfrowego cienia sieci czujników IoT. Omówiono różnice między cyfrowym bliźniakiem a cyfrowym cieniem i uzasadniono wybór koncepcji cienia sieci czujników. Przedstawiono macierzowy opis takiej sieci i wprowadzono koncepcję εk - sąsiedztwa czujnika. Zamieszczono wzory dla modeli liniowych εk - sąsiedztw typu plus i typu gwiazdka. Na wybranych przykładach pokazano możliwość wykrywania i eliminacji niektórych zagrożeń bezpieczeństwa takiej sieci.
EN
This paper presents the concept of a matrix digital shadow of an IoT sensor network. The differences between digital twin and digital shadow are discussed and the choice of the sensor network shadow concept is justified. A matrix description of such a network is presented and the concept of εk - neighborhood of sensor is introduced. Formulas for linear models of plus and star εk - neighborhoods are provided. Selected examples show the possibility of detecting and eliminating some security threats to sensor networks.
11
Content available remote The impact of migration on demographic structure and security in Germany
EN
Research objectives and hypothesis/research questions : The article addresses the research problem: what impact does migration have on demographic structure of Germany, and how can national security be maintained in this context? The aim of the study is to conduct a multidimensional comparative analysis of the impact of migration on demographic structure of Germany and security. The study hypothesizes that migrants positively influence the country’s demographic structure by mitigating unfavorable trends related to population aging and the negative birth-death gap, thus ensuring national security by increasing national income and securing the workforce. Research methods : The research method applied in the elaboration is source analysis, including inference techniques. Main results : The study indicates that the largest age groups in Germany are those between approximately 50 and 70 years old, meaning that a significant portion of the population is approaching or has already been in retirement age. The difference between births and deaths was negative during the period under study and worsened year by year: from -212,428 in 2020 to a record -335,217 in 2023. A slight improvement was noted in 2024 (-330,641), but the demographic imbalance was still incredibly significant. Between 2018 and 2024, Germany recorded a significant influx of migrants, totaling over 3.8 million during that period. The vast majority of migrants were young people, primarily aged 15 to 40, with a significant concentration in the 20-35 age group. Such an age distribution brings many potential benefits and is a principal factor in stabilizing the aging population, low fertility and labour shortages, and thus affects the security of the state. Implications for theory and practice : Migration policy in Germany should be far-reaching, flexible, controlled, and sustainable. It is not about unconditional “opening of borders”, but about pursuing a wise, realistic, and long-term strategy that combines humanitarian aid with the interests of the state and society. Criticism should not be directed at the concept of migration itself, but rather at its specific flaws and shortcomings, which can and should be addressed.
PL
Cel badań i hipotezy/pytania badawcze : W artykule sformułowano problem badawczy: jaki wpływ na strukturę demograficzną Niemiec ma migracja oraz w jaki sposób zapewnić utrzymanie bezpieczeństwa państwa w tym kontekście? Cel badań to przeprowadzenie wielowymiarowej analizy porównawczej wpływu migracji na strukturę demograficzną i bezpieczeństwo Niemiec. W opracowaniu postawiono hipotezę badawczą: przypuszcza się, że migranci wpływają pozytywnie na strukturę demograficzną kraju, łagodząc niekorzystne tendencje związane ze starzeniem się społeczeństwa i ujemną różnicą narodzin i zgonów, a tym samym zapewniają utrzymanie bezpieczeństwa państwa w aspekcie zwiększania dochodu narodowego i zapewnienia siły roboczej. Metody badawcze :W pracy zastosowano metodę badawczą w postaci analizy źródłowej, w tym technikę wnioskowania. Główne wyniki : W opracowaniu wskazano, że najliczniejsze grupy wiekowe w Niemczech to osoby w przedziale wiekowym od około 50 do 70 lat, co oznacza, że znaczna część populacji zbliża się do wieku emerytalnego lub już w nim pozostaje. Różnica między urodzeniami i zgonami była w badanym okresie ujemna i pogarszała się z roku na rok: z -212 428 w 2020 roku do rekordowego poziomu -335 217 w 2023 roku. W 2024 roku odnotowano nieznaczną poprawę (-330 641), jednak nadal był to bardzo wysoki ujemny bilans demograficzny. W latach 2018-2024 Niemcy zarejestrowały znaczący napływ migrantów, których liczba w tym okresie wyniosła łącznie ponad 3,8 miliona osób. Zdecydowaną większość migrantów stanowiły osoby młode, przede wszystkim w wieku od około 15 do 40 lat, z wyraźną koncentracją w grupie 20-35 lat. Taki rozkład wiekowy niesie ze sobą wiele potencjalnych korzyści i stanowi ważny czynnik stabilizujący starzenie się populacji, niską dzietność oraz niedobór siły roboczej, a tym samym wpływa na bezpieczeństwo państwa. Implikacje dla teorii i praktyki : Polityka migracyjna Niemiec powinna być dalekosiężna, elastyczna, kontrolowana i zrównoważona. Nie chodzi o bezwarunkowe „otwieranie granic”, lecz o prowadzenie mądrej, realistycznej i długofalowej strategii, która łączy pomoc humanitarną z interesem państwa i społeczeństwa. Krytyka nie powinna dotyczyć samej idei migracji, lecz jej konkretnych błędów i niedociągnięć, które można i trzeba naprawiać.
EN
Research objectives and hypothesis/research questions The focus was on the following research problem: to what extent the mass nature of migration of people from Ukraine to Poland affected the number of visas issued in Poland. The aim of the research is to conduct a multidimensional analysis of data on the migration of people from Ukraine to Poland between 2022-2025 (until January 2025) and the number of visas issued in Poland. A research hypothesis was also outlined: it is assumed that the increase in migration of people from Ukraine will reduce the number of visas issued to Ukrainians in Poland. Research methods Research methods which were used in the article - source analysis, and within it a research technique - observation. As part of the technique, research tools such as an Excel sheet and figures were used. Main results The conducted research shows the multifaceted impact of the war in Ukraine on migration phenomena and forms of the stay legalization of Ukrainian citizens in Poland between 2022-2025. The starting point of the analysis was the dynamics of crossing the Polish-Ukrainian border, which in the first quarter of 2022 reached an unprecedented level - culminating in March (1,944,111 people). Such data indicate a direct migration reaction to the escalation of the armed conflict. In subsequent years, border traffic showed a stabilization trend with seasonal peaks in the summer periods, related, among others, to labour migration. At the same time, a systematic increase in the number of Ukrainian citizens with a valid residence permit in Poland was observed. Since 2022, their number has increased rapidly, reaching a record 1,55 million in March 2025. The observed trend is the result not only of the war, but also of procedural simplifications and the growing integration of Ukrainians with Polish society. The data also confirm the dominance of that national group among all foreigners legally staying in Poland. Implications for theory and practice The research proves that the war in Ukraine caused radical changes in the structure and nature of the migration of citizens of this country to Poland. We observe both the intensification of the influx and the ongoing process of settlement and formal integration of Ukrainians in Poland. The data are crucial for further shaping of the migration, social and integration policy of the Polish state.
PL
Cel badań i hipotezy/pytania badawcze Skupiono się na następującym problemie badawczym: w jakim stopniu masowy charakter migracji ludności z Ukrainy do Polski wpłynął na liczbę wydanych wiz w Polsce? Celem badań jest przeprowadzenie wielowymiarowej analizy danych dotyczących migracji ludzi z Ukrainy do Polski w latach 2022-2025 (do stycznia 2025) oraz liczby wydanych wiz w Polsce. Postawiono również hipotezę badawczą: przypuszcza się, że wzrost migracji ludności z Ukrainy wpłynie na zmniejszenie liczby wydanych wiz dla Ukraińców w Polsce. Metody badawcze W artykule zastosowano metody badawcze - analizę źródłową, w tym technikę badawczą w postaci obserwacji. W ramach techniki zastosowano narzędzia badawcze, np. arkusz Excel, rysunki. Główne wyniki Przeprowadzone badania pokazują wieloaspektowy wpływ wojny w Ukrainie na zjawiska migracyjne oraz formy legalizacji pobytu obywateli Ukrainy w Polsce w latach 2022-2025. Punktem wyjścia analizy była dynamika przekroczeń granicy polsko-ukraińskiej. W pierwszym kwartale 2022 roku osiągnęła ona bezprecedensowy poziom - z kulminacją w marcu (1944 111 osób). Dane te wskazują na bezpośrednią reakcję migracyjną na eskalację konfliktu zbrojnego. W kolejnych latach ruch graniczny wykazywał tendencję stabilizacji z sezonowymi szczytami w okresach letnich, związanymi m.in. z migracjami zarobkowymi. Równolegle obserwowano systematyczny wzrost liczby obywateli Ukrainy posiadających ważny dokument pobytowy w Polsce. Od 2022 roku ich liczba gwałtownie wzrosła, osiągając w marcu 2025 roku rekordowe 1,55 miliona osób. Obserwowany trend jest wynikiem nie tylko wojny, lecz także uproszczeń proceduralnych oraz rosnącej integracji Ukraińców z polskim społeczeństwem. Dane potwierdzają również dominację tej grupy narodowościowej wśród wszystkich cudzoziemców legalnie przebywających w Polsce. Implikacje dla teorii i praktyki Badania dowodzą, że wojna w Ukrainie wywołała radykalne zmiany w strukturze i charakterze migracji obywateli tego kraju do Polski. Obserwujemy zarówno intensyfikację napływu, jak i postępujący proces osiedlania się oraz formalnej integracji Ukraińców w Polsce. Dane te są kluczowe dla dalszego kształtowania polityki migracyjnej, społecznej i integracyjnej państwa polskiego.
PL
W artykule podjęto próbę oceny skuteczności realizacji założeń strategicznych Sojuszu Północnoatlantyckiego zawartych w Koncepcji Strategicznej NATO 2010. Jako podstawę oceny przyjęto wskaźniki: militarne i operacyjne, polityczne i dyplomatyczne, finansowe i zasobowe, dotyczące zagrożeń stabilności międzynarodowej oraz społeczne i komunikacyjne. W pracy badawczej wykorzystano literaturę przedmiotu oraz dokument strategiczny Koncepcja strategiczna obrony i bezpieczeństwa członków Organizacji Traktatu Północnoatlantyckiego, przyjęta przez szefów państw i rządów w Lizbonie 20 listopada 2010 r. Ze względu na zmiany w globalnym środowisku bezpieczeństwa po 2010 roku, wynikające głównie z imperialnej polityki Federacji Rosyjskiej i jej agresji na Ukrainę, nie wszystkie założenia strategiczne Sojuszu Północnoatlantyckiego zawarte w analizowanej koncepcji zostały zrealizowane. Ogólnie jednak skuteczność predykcji jej założeń można ocenić pozytywnie.
EN
The article attempts to assess the effectiveness of implementing the strategic assumptions of the North Atlantic Alliance contained in the NATO Strategic Concept 2010. The following indicators were adopted as the basis for the assessment: military and operational, political and diplomatic, financial and resource, concerning threats to international stability, and social and communication. The research work referred to the literature on the subject and the strategic document on the Strategic Concept for the Defense and Security of the Members of the North Atlantic Treaty Organization Adopted by Heads of State and Government at the NATO Summit in Lisbon in November 19-20, 2010. Due to changes in the global security environment after 2010, resulting mainly from the imperial policy of the Russian Federation and its aggression against Ukraine, not all strategic assumptions of the North Atlantic Alliance contained in the analyzed concept were implemented. In general, however, the effectiveness of the prediction of its assumptions can be assessed positively.
EN
Motivation The increasing integration of intelligent sensors into autonomous systems, especially in the context of IoT, requires comprehensive and safer solutions, additionally adaptable and reliable. Modelling their dynamic behavior in complex environments remains a challenge. This study fits into these areas and computationally models capacitive and inductive skin sensors to ensure robust functionality and seamless IoT integration. Results This study introduces a robust model of IoT-integrated multi-sensors, demonstrating their ability to convert capacitance changes in the environment into current signals and shape them for control purposes, which is crucial for smart skin sensor systems. Interval calculations were used to optimize the parameters of the integrated sensors. This analysis highlighted their sensitivity to touch and environmental conditions, which is critical for developing safer and more intelligent responses of such systems. It is shown how changes in the sensor-object distance affect the optimization of the integrated sensor behavior, which is essential for managing uncertainty in real-world applications, ensuring reliable and consistent performance. The authors proposed a model for integrating an intelligent skin sensor with an autonomous IoT system. This model shows significant potential for miniaturization, integration with nanogenerators, and scalability, making it particularly suitable for IoT applications. The study confirmed the practical usefulness of these models in designing intelligent and autonomous sensor arrays capable of robust and trouble-free operation in complex, dynamic, and safety-critical IoT-enabled environments.
EN
Artificial intelligence has proven to be a key tool to improve the efficiency of video surveillance systems, contributing to public safety. This systematic review aims to analyze the contributions of Artificial Intelligence in this field, in line with Sustainable Development Goal 16 (SDG 16), which promotes peaceful and inclusive societies. 145 articles extracted from major databases such as Scopus, WOS, ProQuest, EBSCO, IEEE Xplore, and ScienceDirect were analyzed. Using PRISMA methodology, inclusion and exclusion criteria were applied, resulting in 42 articles relevant to the review. The findings indicate that the use of advanced AI technologies, such as the Internet of Things, Computer Vision, and Edge Computing, are the most integrated with artificial intelligence, enhancing its capabilities in video surveillance systems. In this framework, Deep Learning stands out as an essential basis for optimizing these applications. Finally, the results of this review provide a solid foundation for future research on the use of Artificial Intelligence in video surveillance. The technologies evaluated have the potential to further contribute to the improvement of security and operational efficiency in different contexts and environments.
EN
The article attempts to analyze emergency calls to the 112 number and demonstrate the challenges and threats faced by the 112 operators in the Mazowieckie Voivodeship during the COVID-19 pandemic, a disease caused by the SARS-CoV-2 coronavirus. The research focuses on changes in the type of calls, an increase in the number of calls and other difficulties that operators have had to face. The analysis is based on data from the period of 2017 to 2022, particularly highlighting the new challenges caused by the pandemic, such as handling requests connected with COVID-19. The authors draw attention to the important role of operators in public health protection and their exposure to stress in difficult working conditions. The study aims to understand the burden on the emergency notification system in the context of the pandemic and to highlight the role of operators in this process.
17
Content available Geopolitical analysis of Poland
EN
In order to properly analyse the significance of Poland’s geopolitical location, it is worth emphasizing a few facts. Poland is situated in Central-Eastern Europe at the intersection of the rimland and the heartland. The region of this part of Europe is predominantly lowland, characterized by vast steppes and considerable distances between cities, which led to its dominance in agriculture. The countries in this area of Europe were often referred to as the “granaries of Europe,” contributing to their technological backwardness. Looking at the countries in this area in terms of population, GDP and military potential, two poles of power that have been clashing for over 500 years can be distinguished – Poland and Russia. Since the 14th century, they have influenced the region’s landscape.
EN
The National Security Threat Map is a technological tool that enables citizens to become active in the identification of contemporary threats. The functionality of this tool allows implementing the assumptions of participatory management related to the participation of the entire society in the security management process. The research carried in the period of 2020–2022 was aimed at obtaining public opinion on the functionality of the National Security Threat Map in order to propose areas for modification on this basis. The study was conducted using the diagnostic survey method in a group of 206 respondents. An electronic questionnaire was used for this purpose, which was sent to the respondents via social networking sites. The document analysing method, including available literature, normative acts and statistical data, on the basis of which the National Security Threat Map is functioning, was also of key importance in the preparation of research tools. Thanks to the conducted research, it was possible to answer the adopted research questions. An analysis of the obtained data allowed for formulating conclusions that may contribute to a broader consideration of the assumptions of participatory safety management during the application of the National Security Threat, and, consequently to the design of more effective actions in the field of safety prevention. A participatory approach to security management allows increased activity and involvement of citizens in implementing set goals. Through social activism, existing technologies can be improved to make them more efficient. Taking into account the assumptions of participatory management through the National Security Threat Map allows increasing the motivation of the society to take actions aimed at the own safety of other people.
EN
Processes coming from outside the realm of cognition have a significant and critical impact on the functioning of the state in the turbulent security environment of the 21st century. Consequently, the main aim of the article was to demonstrate in theory the usefulness of forecasting and designing as complementary research procedures in the process of strategic analysis in the field of security in a changeable, highly complex and unpredictable state environment. The author’s intent is also to outline the concept of using designing as a strategic analysis tool in practice in another article. When it comes to state security, the fundamental feature of strategic planning is that through building strategic plans the future can and should be shaped in a rational and orderly manner. When designing in the field of security, the methodology developed by Wojciech Gasparski both with the model IV of the idealising theory of science described by Leszek Nowak can be applied.
EN
The main goal and assumption of the article is to determine the impact of economic knowledge on the shaping of economic security in the dimension of micro-entities. The presented research was carried out in 2022 using the standardized diagnostic survey. The research was qualitative, and the main criterion was to obtain information in the scope of subjective assessment of the level of knowledge about economic phenomena and its impact on economic decisions that shape the sense of economic security in terms of personnel. The adopted research hypothesis assumes that the economic knowledge at disposal is directly related to ensuring a sense of economic security. This assumption triggered the need to solve research problems related to: • establishing the level of knowledge about economic phenomena among individual entities, • establishing the impact of economic knowledge on the rationality of economic decisions in terms of shaping the personal sense of economic security, • respondents’ understanding of the concept of economic security. The article uses the method of critical literature analysis, observes contemporary socio-economic processes and carries out own research to obtain information posed in research questions.
first rewind previous Strona / 71 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.