Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 4

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
1
Content available How to Estimate Security – Problem Analysis
100%
EN
Background: The article presents a method of estimating the security level which indicates how probable it is for a phenomenon to occur. Objectives: The author attempts to answer the question: How do we estimate security? Decision makers usually need percentage showing the probability of an incident taking place in the future. This information is needed in the first place, later decision makers can use more descriptive information. Methods: The research problem concerns the assessment of security using the estimation method. Depicting security in numbers is difficult, thus the descriptive method is also usually applied. The estimation method facilitates the assessment. It is helpful since it is partly done by calculation and partly by guessing or approximation. Based on a case study analysing whether a terrorist attack may occur, the author also used tools such as averaging expert predictions, scenario analysis and risk analysis. Results: This article provides a view on forecasting security, which results in a method of estimating the level of security. Conclusions: The author presents an approach which allows to initially estimate the security level of the analyzed phenomenon in a relatively short period of time.
2
100%
EN
The fact that NATO has acknowledged cyberspace as the fifth dimension of combat operations indicates that this problem issue is really topical and is pointing at the direction from which the possible threat can be expected. However, the issues of information communication technology (ICT) security on the national level have been tackled in numerous countries for many years. Technological advancement has resulted in making communication, and at the same time services rendered in cyberspace, an international domain. Thus, the aspects of cyberspace threats should be considered through the international prism. The above-presented approach has become an incentive for the author to take up research on international activities in terms of cyberspace defence and reaction to the already identified as well as future threats.
3
Content available Conceptual Analysis in the Field of Management
100%
EN
In the literature on the subject, the terms steering, management and control are often used interchangeably. However, in the course of the terminological analysis, the author indicated the dependencies between these concepts and defined the area of their application. The conducted research allowed for the identification of the concept of command and the area of its influence. The system of command, as a special (specific) form of management, allowed for the presentation of the entirety of the commander's purposeful activity as part of the command system. As a result of the terminological analysis, the author drew attention to the diversity of the analysed concepts, which will allow for their purposeful and proper use in research in the field of social sciences in the disciplines of safety science as well as management and quality science.
EN
The article discusses the matter of contemporary cyberattack techniques aimed at the financial security of banks and their clients and presents the relationship of banks with their clients in the light of the applicable provisions of the European Union (Directive of the European Parliament and the EU Council 2015/2366 of November 25, 2015 on payment services in internal market) and the Polish Act of 19 August 2011 on payment services. The authors also analyze the practical side of the relationship between banks and their customers who have fallen victim to computer fraud, pointing out that the common practice of banks refusing to return funds stolen from their customers in the electronic banking system is inconsistent with the applicable standards of Polish and European law.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.