65 research outputs found
Koncepcja nowej struktury organizacyjnej i modelu operacyjnego Systemu Bezpieczeństwa Narodowego RP
Paper presents the problem of designing the organizational structure and operating model for National Security System of the Republic of Poland (SEN RP). Classical and modern organizational structures have been taken into consideration. These structures provide mecha­nisms to increase the flexibility and coordination of the functioning of such organizations. Author has introduced the idea of the rational model of organizational structure of the system, consisting of parts of relatively constant (stable) and highly flexible. The required level of integration and standardization of processes carried out within the newly proposed organizational structures SEN RP also have been determined
Wybrane elementy modelu zarządzania transformacją SBN RP
The article presents the problem of selection and application of appropriate methods, tools and techniques in relation to the process control of SBN RP transformation. Their integration in the form of a uniform model managed by this process will allow to achieve the best possible value of the system features of the new SBN RP form by coordinating activities carried out in the legal, organizational, informational, technical and physical layers. The application of the proposed ap-proach allows to construct a transformation program that allows effective management of the im-plementation of complex SBN changes in the conditions of occurrence of new, difficult and unique and uncertain situations in this process
Usability Study Methodologies of Electronic Health Record Systems: A Systematic Review
This study is a systematic review of literature on electronic health record systems (EHRs) and the evaluation methods performed to study their usability. The purpose was to identify and review the extent of usability testing methods in their respective clinical environments. Full text review was completed for 121 of 753 titles intentionally identified, and 70 final articles were included.
The majority of methodologies reviewed were well established in HCI and the most common was the questionnaire. There was a wide range of study designs in terms of user populations (physicians, nurses, pharmacists, nurse practitioners, physical therapists and others), clinical settings (inpatient and outpatient, ambulatory, pediatric, intensive care units, and others), testing time (pre-implementation or post), and qualitative data analysis. Chosen methodologies and study designs closely depended on study goals, but all of them had large implications for the future of quality healthcare and how to achieve it.Master of Science in Information Scienc
Long-term observationsof selected heavy metals contained in otoliths of cod from the Southern Baltic
Cadmium, lead, copper, chromium and zinc contents were determined in otoliths of the cod Gadus morhua L. from the Southern Baltic. It was shown that the levels of these heavy metals fluctuated during the period of investigation (1969-1985). It was found that levels of Cd, Cu, Cr and Zn decreased with age and age-dependent morphometric parameters, while the amount of lead increased. Sex of cod did not affect the level of bioaccumulation of these five trace elements in the otoliths. With the exception of Cu no differences were found between heavy metal contents in otoliths of cod from the Gdańsk and Bornholm Deep
Zintegrowana transformacja systemu bezpieczeństwa narodowego RP
The paper presents general assumptions for an integrated approach to the transformation of the National Security System of the Republic of Poland (NSS RP) based on the Enterprise Architecture concept. The analysis covers the background elements with the strongest and most direct impact on the NSS RP transformation process. Paper also identifies the expected benefits and challenges associated with this process
Preliminary studies on bone fluoride content in the Arctic charr, Salvelinus alpinus (L.) from the Hornsund region
Fluoride contents were determined in vertebrae of the Arctic charr in the Hornsund region, using the zirconium-eriochrome cyanine technique. The fluoride content were found to range within 21.5-150.6 µgּg-1, i.e. within a natural range
Long term studies on heavy metals in aquatic organisms from the River Odra mouth area
Contents of Hg, Cd, Pb, Cu, and Zn were determined within 1984-1988 in plankton, zebra mussel (Dreissena polymorpha), roach (Rutilus rutilus), bream (Abramis brama), and pikeperch (Lucioperca lucioperca) from different parts of the Rira Odra mouth area. Mercury was determined with CV AAS and assays of the remaining metals were carried out with flame AAS. In terms of their heavy metal contents, the organisms studied can be ordered in the following way: plankton > mussel > fish. A downstream decrease in heavy metal content was observed in the plankton. Mercury contents in fish decreased downstream, too. Mercury, copper, and zinc contents in fish were species-dependent, the highest contents being recorded in roach. Heavy metal dynamics in the plankton over the 5 years of study seems to evidence a gradual reduction in mercury and zinc and an increase in cadmium and lead. However, the changes were not reflected in contents of the metals in fish. No definite trend could be revealed in Hg, Cd, Pb, Cu, and Zn dynamics in roach, bream, and pikeperch, nor a clear-cut pattern could be found with respect to the author′s results published earlier
Mercury in fishes and in selected elements of the ¦widwie lake ecosystem
The paper demonstrates concentration and distribution of mercury in selected elements of the Świdwie lake ecosystem: sediment, surface and rain water, fish tissues (gills, kidney, liver, muscles, alimentary tract and its contents-of rudd, perch, roach, white bream, and pike); duckweed, bladderwort; leaves, stems, and roots of reed and cattail
The role of malware in geopolitics
Ilość zagrożeń teleinformatycznych w świecie wzrasta dynamicznie wraz z
upowszechnianiem wykorzystania systemów komputerowych w kolejnych obszarach
ludzkiej aktywności. Współczesne państwa w znacznym stopniu zależne są od
szybkiego dostępu do informacji uwzględniając także ich przechowywanie,
przetwarzanie oraz przesyłanie, co sprawia, że obszar ten stał się elementem gry
geopolitycznej. Społeczeństwa oraz powoływane przez nie organy i instytucje
powszechnie wspomagają się rozwiązaniami komputerowymi. Obecnie komputer
zaliczany jest do typowego wyposażenia gospodarstw domowych. Należy do tego
doliczyć także skomputeryzowane urządzenia zaliczane do szeroko rozumianej
elektroniki użytkowej. Analogicznie w sferze publicznej komputery i urządzenia
skomputeryzowane stały się powszechne. Zagrożenia teleinformatyczne, takie jak
szkodliwe oprogramowanie, w tym wirusy i robaki komputerowe, jak również ataki
DoS/DDoS, kradzieże, podmiana i uszkadzanie danych jak również celowe
uszkodzenia systemów komputerowych należy współcześnie zaliczyć do katalogu metod
i środków rywalizacji w środowisku międzynarodowym. Właściwymi dla nauk
społecznych, w tym nauk o bezpieczeństwie metodami analizy i krytyki literatury
przedmiotu, metodą historyczną i metodą obserwacyjną dokonano selekcji oraz analizy
wydarzeń świadczących o wykorzystaniu szkodliwego oprogramowania w geopolityce
w przeszłości. Wskazano przykłady wykorzystania poszczególnych zagrożeń
teleinformatycznych w rywalizacji międzynarodowej. Omówiono przebieg i skutki
zastosowania szkodliwego oprogramowania, ataków DoS/DDoS oraz kradzieży
danych wskazując współczesne metody i środki zabezpieczania przed omawianymi
zagrożeniami. Określono także zakres i potencjalne znaczenie zagrożeń
teleinformatycznych w geopolityce w przyszłości.he amount of IT threats in the world is growing dynamically with the spread of the use
of computer systems in the subsequent areas of human activity. Modern countries depend
on quick access to information, including its storage, processing and transmission, which
makes this area an element of the geopolitical game. Societies, organisations and
institutions commonly support themselves with computer solutions both in private life
and in public space. Currently, the computer is included in typical household equipment.
It should also be added to computerized devices classified as consumer electronics.
Similarly, in the public sphere, computers and computerized devices have become
commonplace. ICT threats, such as malware, including viruses and computer worms, as
well as DoS / DDoS attacks, thefts, replacements and data corruption as well as
deliberate damage to computer systems are nowadays considered to be part of catalog of
methods and means of competition in the international environment. The selection and
analysis of events demonstrating the use of malware in geopolitics in the past were
appropriate for social sciences, including security studies, through methods of analysis
and criticism of the literature of subject, historical method and observational method.
The examples of the use of particular ICT threats in international competition are
indicated. The course and effects of using malware, DoS / DDoS attacks and data theft are discussed, indicating contemporary methods and means of protection against these
threats. The scope and potential significance of teleinformatic threats in geopolitics in
the future was also define
- …