Genezowanie bezpieczeństwa
View/ Open
Author:
Falecki, Janusz
xmlui.dri2xhtml.METS-1.0.item-citation: Annales Universitatis Paedagogicae Cracoviensis. 266, Studia de Securitate 9 (1) (2019), s. [135]-146
xmlui.dri2xhtml.METS-1.0.item-iso: pl
Subject:
bezpieczeństwostan bezpieczeństwa
proces bezpieczeństwa
badanie bezpieczeństwa
genezowanie
security
security state
security process
studying security
analyzing evolution of security
Date: 2019
Metadata
Show full item recordAbstract
Pursuing security, i.e. the expected state, free from threats requires conducting scientific
research, which show that security undergoes dramatic changes , is a complex and intricate
matter to study and it is not possible to capture its objective state without analyzing
its genesis. Since security is characterized by certain continuity and occurring tendencies, it
is necessary, while analyzing its present situation, to consider past phenomena, determinants
and tendencies which influence the reality. While studying the present state or process or the
flow of that process or conditions determining the present situation, naturally considering
new, previously unknown occurrences. The aim of the conducted research was defining
the security evolution analysis and its role in security studies. Within the framework of the
research process the following problems were formulated:
1. How to understand the concept of “security”?
2. What is security evolution analysis and its role in security studies?
The answers to the problems were found in the course of the research process which
involve theoretical methods of analysis for studying mainly professional literature. Whereas
prescinding allowed to remove from the research subject area objects of the analysis which
were of little importance for the research and identifying crucial facts, phenomena and
processes to solve complex problems and formulating conclusive remarks. Comparison as
a selection of similarities and differences among the studied objects by referring to another
object was helpful for identifying similarities and differences between the evolution analysis
applied in engineering disciplines and the evolution analysis in security studies. The final
conclusion is that analyzing evolution of security is studying its states and processes which
occurred in a defined time span in the past and influence the presence. Properly conducted
security evolution analysis helps to identify and define reasons for negative states and
processes in the security environment and guarantees accurate diagnosis, which consequently
reduces the mistakes in diagnosis and eliminates those negative phenomena or minimizes
possibility of their occurrence in the future. The results of the analysis of security evolution
are indispensable to present the full security diagnosis. On the basis of, among others, the
security evolution analysis it is possible to project changes of the particular security state
or processes for making more accurate decisions on modifying existing procedures or
creating new ones, methods or organizational structures of entities or systems responsible
for providing security.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Istota bezpieczeństwa państwa
Zdrodowski, Bogdan (2019)Security is one of the basic needs of people, social groups and society. It is even the basic category attributed to most objects of human cognition, defined very differently, depending on the perception of these objects ... -
Służby specjalne w zmieniającym się środowisku bezpieczeństwa międzynarodowego w XXI wieku
Żebrowski, Andrzej (2016)Służby specjalne zawsze zabezpieczały potrzeby informacyjne uprawnionych podmiotów politycznych i wojskowych państwa. Wykonują swoje ustawowe zadania zarówno w czasie pokoju, kryzysu i wojny. Przemiany systemowe na świecie ... -
Zagrożenia bezpieczeństwa informacyjnego na przykładzie Krajowej Mapy Zagrożeń Bezpieczeństwa
Polończyk, Agnieszka (2017)Artykuł przedstawia główne zagrożenia identyfikowane w obszarze bezpieczeństwa informacyjnego oraz związane z nimi sposoby włamań do systemów informatycznych w odniesieniu do wybranego narzędzia informatycznego – Krajowej ...