PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Prevention of terrorist attacks on critical infrastructure on the example of an airport

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Purpose: The purpose of this article is to evaluate the state's critical infrastructure protection system using an airport as an example. Identifying potential weaknesses and suggesting improvements is a key part of this assessment. Selected research is presented to highlight the need to protect airports from terrorist threats and to illustrate the importance of inter-agency cooperation, resource allocation and advanced security measures in enhancing national security. Design/methodology/approach: The research combines theoretical analysis and empirical investigation. Theoretical methods include a review of the literature and legal frameworks concerning critical infrastructure protection. Empirical research involves a diagnostic survey conducted through structured interviews with experts in national security and airport operations and survey technique using survey questionnaire tool. The data collected were analyzed qualitatively to synthesize key findings and recommendations. Findings: The study reveals that while significant efforts have been made in securing airports, vulnerabilities remain due to accessibility and operational complexity. The findings highlight critical issues such as insufficient inter-agency coordination, inadequate allocation of resources, and the need for better threat anticipation capabilities. Recommendations are provided to address these gaps and improve the overall resilience of airports against terrorist attacks. Research limitations/implications: The primary limitation of the research is the focus on airports as a specific type of critical infrastructure, which may limit the applicability of findings to other sectors. Additionally, reliance on expert opinions may introduce subjective bias. Future research could expand the scope to include other critical infrastructure types and incorporate quantitative data for broader validation. Practical implications: The research offers practical guidelines for policymakers and airport operators to enhance the security of critical infrastructure. By implementing the proposed measures, such as advanced surveillance technologies and improved inter-agency coordination, airports can reduce their vulnerability to terrorist attacks. The paper also has implications for the development of standardized protocols in critical infrastructure protection. Social implications: The findings have significant social implications by contributing to public safety and national security. Improved airport security can increase public confidence in the safety of transportation infrastructure, reduce the societal impact of potential terrorist attacks, and foster trust in government measures aimed at protecting citizens. Originality/value: The originality of the paper lies in its comprehensive approach to evaluating airport security as part of critical infrastructure protection. By combining theoretical insights with empirical data from expert interviews, the paper provides a valuable resource for academics, policymakers, and security professionals interested in enhancing national security frameworks.
Rocznik
Tom
Strony
185--206
Opis fizyczny
Bibliogr. 19 poz.
Bibliografia
  • 1. Act of 12 October 1990 on the Border Guard (Journal of Laws of 2005, No. 226, item 1944, as amended).
  • 2. Act of 26 April 2007 on crisis management (Journal of Laws of 2017, No. 91, item 209, as amended).
  • 3. Act of 3 July 2002 on Aviation Law (Journal of Laws of 2002, No. 130, item 1112, as amended).
  • 4. Dilling, M. (2005), Przeciwdziałanie atakom terrorystycznym w cywilnych portach lotniczych. In: S. Zajas, A. Glen, P. Krawczyk, T. Zieliński (eds.), Przeciwdziałanie atakom terrorystycznym na lotniskach wojskowych i cywilnych (p. 35), Warsaw: AON.
  • 5. Hoffman, B. (2001). Oblicza terroryzmu. Warsaw: Grupa Wydawnicza Bertelsmann Media, pp. 32-34.
  • 6. https://ale-wiedza.pl/kable-sensoryczne-systemach-ochrony-charakterystyka/, 23 October 2024.
  • 7. https://atline.pl/kategorie-oferta/bariery-mikrofalowe/, 23 October 2024.
  • 8. https://lanster.com/systemy-zabezpieczajace-z-rozproszona-inteligencja-cem-systems/, 23 October 2024.
  • 9. https://trimis.ec.europa.eu/project/intelligent-surveillance-and-management-functionsairfield-aplications-based-low-cost#tab-contact, 23 October 2024.
  • 10. Jakubczak, R. (2006). Bezpieczeństwo narodowe Polski w XXI w. R. Jakubczak (ed.). Warsaw: Bellona, p. 355.
  • 11. Lidwa, W., Krzeszowski, W., Więcek, W., Kamiński, P. (2012). Ochrona infrastruktury krytycznej. Warsaw: AON, pp. 9-18.
  • 12. Liedel, K. (2013). Zwalczanie terroryzmu lotniczego: aspekty prawnomiędzynarodowe. Warsaw: Jurysta, pp. 12-14.
  • 13. Moteff, J.D. (2015). Critical Infrastructures: Background, Policy, and Implementation. Congressional Research Service, pp. 73-77.
  • 14. Narodowy Program Ochrony Infrastruktury Krytycznej (2013). Available at: https://www.gov.pl/web/rcb/narodowy-program-ochrony-infrastruktury-krytycznej, 20 October 2024.
  • 15. Piątek, Z., Truchan J.R. (2013). Technologie w ochronie infrastruktury krytycznej zewnętrznego kraju Unii Europejskiej. Warsaw: Stowarzyszenie Ruch Wspólnot Obronnych, pp. 13-15.
  • 16. Presch-Cronin, K., Marion, N.E. (2016). Critical infrastructure protection, risk management, and resilience: a policy perspective. CRC Press, p. 86.
  • 17. Terroryzm. Available at: https://www.sjp.pwn.pl/szukaj/terroryzm.html, 20 October 2024.
  • 18. Tyburska, A. (2010). Infrastruktura krytyczna - kluczowe problemy oraz strategiczne kierunki działań. In: Z. Piątek, A. Letkiewicz (eds.), Terroryzm a infrastruktura krytyczna państwa - zewnętrznego kraju Unii Europejskiej. Warsaw: Stowarzyszenie Ruch Wspólnot Obronnych, pp. 13-23.
  • 19. Zabłocki, E. (ed.) (2009). Ochrona przed zagrożeniami terroryzmu lotniczego, Temat 2 (II.3.11.1.0). Warsaw: AON, pp. 19-27.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b4f3d1ee-59b4-4e70-a67c-90f785d88666
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.