65 research outputs found

    Koncepcja nowej struktury organizacyjnej i modelu operacyjnego Systemu Bezpieczeństwa Narodowego RP

    Get PDF
    Paper presents the problem of designing the organizational structure and operating model for National Security System of the Republic of Poland (SEN RP). Classical and modern organizational structures have been taken into consideration. These structures provide mecha­nisms to increase the flexibility and coordination of the functioning of such organizations. Author has introduced the idea of the rational model of organizational structure of the system, consisting of parts of relatively constant (stable) and highly flexible. The required level of integration and standardization of processes carried out within the newly proposed organizational structures SEN RP also have been determined

    Wybrane elementy modelu zarządzania transformacją SBN RP

    Get PDF
    The article presents the problem of selection and application of appropriate methods, tools and techniques in relation to the process control of SBN RP transformation. Their integration in the form of a uniform model managed by this process will allow to achieve the best possible value of the system features of the new SBN RP form by coordinating activities carried out in the legal, organizational, informational, technical and physical layers. The application of the proposed ap-proach allows to construct a transformation program that allows effective management of the im-plementation of complex SBN changes in the conditions of occurrence of new, difficult and unique and uncertain situations in this process

    Usability Study Methodologies of Electronic Health Record Systems: A Systematic Review

    Get PDF
    This study is a systematic review of literature on electronic health record systems (EHRs) and the evaluation methods performed to study their usability. The purpose was to identify and review the extent of usability testing methods in their respective clinical environments. Full text review was completed for 121 of 753 titles intentionally identified, and 70 final articles were included. The majority of methodologies reviewed were well established in HCI and the most common was the questionnaire. There was a wide range of study designs in terms of user populations (physicians, nurses, pharmacists, nurse practitioners, physical therapists and others), clinical settings (inpatient and outpatient, ambulatory, pediatric, intensive care units, and others), testing time (pre-implementation or post), and qualitative data analysis. Chosen methodologies and study designs closely depended on study goals, but all of them had large implications for the future of quality healthcare and how to achieve it.Master of Science in Information Scienc

    Long-term observationsof selected heavy metals contained in otoliths of cod from the Southern Baltic

    Get PDF
    Cadmium, lead, copper, chromium and zinc contents were determined in otoliths of the cod Gadus morhua L. from the Southern Baltic. It was shown that the levels of these heavy metals fluctuated during the period of investigation (1969-1985). It was found that levels of Cd, Cu, Cr and Zn decreased with age and age-dependent morphometric parameters, while the amount of lead increased. Sex of cod did not affect the level of bioaccumulation of these five trace elements in the otoliths. With the exception of Cu no differences were found between heavy metal contents in otoliths of cod from the Gdańsk and Bornholm Deep

    A Review of Flood-Related Storage and Remobilization of Heavy Metal Pollutants in River Systems

    Full text link

    Zintegrowana transformacja systemu bezpieczeństwa narodowego RP

    No full text
    The paper presents general assumptions for an integrated approach to the transformation of the National Security System of the Republic of Poland (NSS RP) based on the Enterprise Architecture concept. The analysis covers the background elements with the strongest and most direct impact on the NSS RP transformation process. Paper also identifies the expected benefits and challenges associated with this process

    Preliminary studies on bone fluoride content in the Arctic charr, Salvelinus alpinus (L.) from the Hornsund region

    No full text
    Fluoride contents were determined in vertebrae of the Arctic charr in the Hornsund region, using the zirconium-eriochrome cyanine technique. The fluoride content were found to range within 21.5-150.6 µgּg-1, i.e. within a natural range

    Long term studies on heavy metals in aquatic organisms from the River Odra mouth area

    No full text
    Contents of Hg, Cd, Pb, Cu, and Zn were determined within 1984-1988 in plankton, zebra mussel (Dreissena polymorpha), roach (Rutilus rutilus), bream (Abramis brama), and pikeperch (Lucioperca lucioperca) from different parts of the Rira Odra mouth area. Mercury was determined with CV AAS and assays of the remaining metals were carried out with flame AAS. In terms of their heavy metal contents, the organisms studied can be ordered in the following way: plankton > mussel > fish. A downstream decrease in heavy metal content was observed in the plankton. Mercury contents in fish decreased downstream, too. Mercury, copper, and zinc contents in fish were species-dependent, the highest contents being recorded in roach. Heavy metal dynamics in the plankton over the 5 years of study seems to evidence a gradual reduction in mercury and zinc and an increase in cadmium and lead. However, the changes were not reflected in contents of the metals in fish. No definite trend could be revealed in Hg, Cd, Pb, Cu, and Zn dynamics in roach, bream, and pikeperch, nor a clear-cut pattern could be found with respect to the author′s results published earlier

    Mercury in fishes and in selected elements of the ¦widwie lake ecosystem

    No full text
    The paper demonstrates concentration and distribution of mercury in selected elements of the Świdwie lake ecosystem: sediment, surface and rain water, fish tissues (gills, kidney, liver, muscles, alimentary tract and its contents-of rudd, perch, roach, white bream, and pike); duckweed, bladderwort; leaves, stems, and roots of reed and cattail

    The role of malware in geopolitics

    No full text
    Ilość zagrożeń teleinformatycznych w świecie wzrasta dynamicznie wraz z upowszechnianiem wykorzystania systemów komputerowych w kolejnych obszarach ludzkiej aktywności. Współczesne państwa w znacznym stopniu zależne są od szybkiego dostępu do informacji uwzględniając także ich przechowywanie, przetwarzanie oraz przesyłanie, co sprawia, że obszar ten stał się elementem gry geopolitycznej. Społeczeństwa oraz powoływane przez nie organy i instytucje powszechnie wspomagają się rozwiązaniami komputerowymi. Obecnie komputer zaliczany jest do typowego wyposażenia gospodarstw domowych. Należy do tego doliczyć także skomputeryzowane urządzenia zaliczane do szeroko rozumianej elektroniki użytkowej. Analogicznie w sferze publicznej komputery i urządzenia skomputeryzowane stały się powszechne. Zagrożenia teleinformatyczne, takie jak szkodliwe oprogramowanie, w tym wirusy i robaki komputerowe, jak również ataki DoS/DDoS, kradzieże, podmiana i uszkadzanie danych jak również celowe uszkodzenia systemów komputerowych należy współcześnie zaliczyć do katalogu metod i środków rywalizacji w środowisku międzynarodowym. Właściwymi dla nauk społecznych, w tym nauk o bezpieczeństwie metodami analizy i krytyki literatury przedmiotu, metodą historyczną i metodą obserwacyjną dokonano selekcji oraz analizy wydarzeń świadczących o wykorzystaniu szkodliwego oprogramowania w geopolityce w przeszłości. Wskazano przykłady wykorzystania poszczególnych zagrożeń teleinformatycznych w rywalizacji międzynarodowej. Omówiono przebieg i skutki zastosowania szkodliwego oprogramowania, ataków DoS/DDoS oraz kradzieży danych wskazując współczesne metody i środki zabezpieczania przed omawianymi zagrożeniami. Określono także zakres i potencjalne znaczenie zagrożeń teleinformatycznych w geopolityce w przyszłości.he amount of IT threats in the world is growing dynamically with the spread of the use of computer systems in the subsequent areas of human activity. Modern countries depend on quick access to information, including its storage, processing and transmission, which makes this area an element of the geopolitical game. Societies, organisations and institutions commonly support themselves with computer solutions both in private life and in public space. Currently, the computer is included in typical household equipment. It should also be added to computerized devices classified as consumer electronics. Similarly, in the public sphere, computers and computerized devices have become commonplace. ICT threats, such as malware, including viruses and computer worms, as well as DoS / DDoS attacks, thefts, replacements and data corruption as well as deliberate damage to computer systems are nowadays considered to be part of catalog of methods and means of competition in the international environment. The selection and analysis of events demonstrating the use of malware in geopolitics in the past were appropriate for social sciences, including security studies, through methods of analysis and criticism of the literature of subject, historical method and observational method. The examples of the use of particular ICT threats in international competition are indicated. The course and effects of using malware, DoS / DDoS attacks and data theft are discussed, indicating contemporary methods and means of protection against these threats. The scope and potential significance of teleinformatic threats in geopolitics in the future was also define
    corecore