Search Results

You are looking at 1 - 10 of 2,561 items for :

Clear All
Open access

Jerzy Kleer

, Corporate Clout: Time for responsible capitalism , Strategy Dynamic Global SA. Kleer J., 2011, Związki między gospodarką realną a wirtualną , ( Relations between the real economy and the virtual ), [in:] O nowy model działalności państwa w finansach , ( About the new model activities of the State in Finance ), PWE, Warszawa, 123–129. Kleer J., 2014, Destrukcyjne siły ładu światowego , ( Destructive Process of the World Order ), Studia Ekonomiczne, no. 4, 516–534. Kleer J., Kleiber M., 2015, Zagrożenia globalne barierami rozwoju , ( Threats of global

Open access

Mirosław Smolarek and Marek Witkowski

://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ [6] M. J. Littleton, Information age terrorism: toward cyber terror , Naval Postgraduate School Monterey, 1995. http://fas.org/irp/threat/cyber/docs/npgs/terror.htm [7] AAP-06 NATO Glossary of Terms and Definitions, NATO Standardization Office, 2015, 2-C-11. [8] A. Podraza, P. Potakowski, K. Wiak, Cyberterroryzm zagrożeniem XXI wieku. Perspektywa politologiczna i prawna, Warszawa, Difin, 2013.

Open access

Mihai Marcel Neag

References [1] Oana IORDAN, Hybrid war and cyber attacks, July 17, 2017, http://intelligence.sri.ro/razboi-hibrid-si-atacuri-cibernetice/, accessed on 27.03.2018. [2] Romania's Military Strategy, Modern Armed Forces for a Strong Romania in Europe and the World, of September 28, 2016, pp.14. [3] Dr. Petre DUŢU, Asymmetric threats or hybrid threats: Conceptual delimitations for the foundation of national security and defense, National Defense University Publishing House „Carol I”, Bucharest, 2013, pp.29

Open access

Wojciech Gotkiewicz and Agnieszka Wiśniewska

parks (6) and protected landscape areas (69), span nearly 47% of the region’s territory [ Program ochrony środowiska …, 2016 ]. Warmia and Mazury has been included in the Nature 2000 network as an area of outstanding natural value in Poland and the European Union. The aim of this study was to analyse factors that exert a negative influence on the biological diversity of Natura 2000 sites in the Region of Warmia and Mazury. Standard Data Forms (SDF) relating to all sites in the evaluated region were analysed. In SDF, the relative importance of a threat or pressure

Open access

Ingrida Gečienė-Janulionė

Lithuanian People in the Context of External Threats” in Culture and Society: Journal of Social Research , Vol. 6, No.1, pp. 55–69. Hampson, F. O. 2013. “Human Security” In Security Studies: An Introduction , ed. by Paul D. Williams, pp. 279–294. Oxon, New York: Routledge. Herman, Susan. 2011. Taking Liberties. The War on Terror and the Erosion of American Democracy . Oxford, UK: Oxford University Press. Human Security Approaches and Challenges 2008. UNESCO. Available at: http://unesdoc.unesco.org/images/0015/001593/159307e.pdf Human Security

Open access

Andrzej Lewandowski, Leszek Loroch and Monika Świech

. Kosny, A.: Środki obrony samolotów transportowych i pasażerskich , "Przegląd Sił Powietrznych", No 9, 2005. Laurenzo, R.: Antimissile Systems for Airlines. "Aerospace America", March 2005. Lidyard, G.: Air Countermeasures. URL: www.dlo.mod.uk O'Sullivan, T.: Extend Terrorist Threats to Civilian Airlines: A Summary Risk Analysis of Manpads, Other Ballistic Weapons, Risks, Future Threats, and Possible Countermeasures Policies. Create report April 14, 2005

Open access

Krastyu Ivanov Krastev

References [1] Alexey Klyonski, „The Revival Process 1984–1989 “– Volume 1, Sofia, 2009. [2] Dimov S. Assessing the threat of islamically motivated terrorism in Bulgaria, Calhoun: The NPS Institutional Archive 2015-12. [3] United States’ Department of State, “Country Reports on Terrorism 2013,” Country Report: Europe Overview, chapter 2, 2014. [4] United States’ Department of State, “Country Reports on Terrorism 2014,” Country Report: Europe Overview, chapter 2, 2015. [5] Dusica Tomovic, “Hundreds of Balkan jihadists have joined

Open access

Lucian Ispas and Paul Tudorache

References [1] Enrico Fassi, Sonia Lucarelli, Alessandro Marrone, What NATO for what threats, Warsaw and Beyond, NATO HQ - Boulevard Léopold III, 1110 Brussels - Belgium, 2015, p. 9. [2] Ibidem, p. 10. [3] Michael Codner, Hanging together: Interoperability within the alliance and with coalition partners in an era of technological innovation, Royal United Services Institute for Defence Studies Whitehall, London, United Kingdom, Final Report, June 1999, p. 13. [4] Ibidem, p. 23. [5

Open access

Tawakalitu Bisola Odubiyi and Ayodeji Emmanuel Oke

References Acs, Z., & Preston, L. (1997). Small and medium-sized enterprises. Technology and Globalisation, 9(9), pp. 1-6. Adeniyi, O., Aje, I., & Ogunsemi, D. (2011). Strengths, weaknesses, opportunities and threats for public, private partnership in infrastructure delivery in Nigeria. Journal of Construction Project Management and Innovation, 1(2), pp. 130-154. Amirhossein, M., Mohammad, H. S., & Samira, H. (2013). Enhancing general contractors capacities with collaborative network. Organization, Technology

Open access

T. Huang, R. Pi, E. Bompard, F. Profumo, P. Cuccia, G. Fulli and M. Masera

://www.ready.gov/natural-disasters [13] J. Kappenman, Geomagnetic Storms and Their Impacts on the U.S. Power Grid California Metatech Corporation 2010. [14] Ready.gov. (2013). Natural Disasters Available: http://www.ready.gov/natural-disasters. [15] Nhc.noaa.gov, "Tropical Cyclone Climatology," 2014. [16] E. Bompard, T. Huang, Y. Wu, and M. Cremenescu, "Classification and trend analysis of threats origins to the security of power system," Electrical Power & Energy Sytems, 2013. [17] Emdat.be. (2013). EM-DAT Disaster Trends. Available