- Author:
Jarosław Piątek
- E-mail:
jarekpiatek@wp.pl
- Institution:
University of Szczecin
- Year of publication:
2017
- Source:
Show
- Pages:
74-89
- DOI Address:
https://doi.org/10.15804/rop201705
- PDF:
rop/2017/rop201705.pdf
The multitude of defining the concept of security is related to the fact that representatives of various fields of science describe and perceive this phenomenon from the point of view of terminology, own knowledge, as well as from the scope of their discipline. For many security is a belief that you are out of the reach of any threat. Based on the Copenhagen school theory, the essence of the objective and subjective understanding of security was emphasized. Against this background, the movement of people was analyzed as a security issue. Poles living in Great Britain are more often in contact with this issue than in their country of origin. The scale of threats is extremely different. For Poles migrating to the UK, the most dangerous threats appear to be in the social sphere. The aim of the article is to analyze the phenomenon of Polish migration to Great Britain after 2004. Additionally, the process of describing security and its transition from the sphere of theory to practice was attempted. Although in the open public space, on city streets, parks and squares, there are personal threats related to crimes, as well as to social threats – attacks and assaults caused by frustrated and aggressive groups or individuals, Poles feel safe. Despite knowing about terrorism or manifestations of social or cultural phobias, Poles migrate to Great Britain. In addition, the article attempts to prove that the technological extension of public space leads to a sense of greater security.
- Author:
Robert Osypowicz
- E-mail:
r.osypowicz@gmail.com
- Institution:
Uniwersytet Jana Kochanowskiego w Kielcach
- Year of publication:
2016
- Source:
Show
- Pages:
237-252
- DOI Address:
https://doi.org/10.15804/ppk.2016.05.14
- PDF:
ppk/33/ppk3314.pdf
Constitutional transformation of the Republic of Croatia during the monitoring procedure of the Council of Europe
The author analyses the constitutional transformation of the Republic of Croatia during the monitoring procedure of the Council of Europe. Croatia once achieving the membership in the Council of Europe took several obligations to change constitutional system according to values and democratic standards represented by the Council of Europe. They have included e.g. protection of national minorities, freedom of media, changing of the system of the local government and the election law. Realization of those obligations was controlled by the Monitoring Committee of the Parliamentary Assembly of the Council of Europe. Council of Europe, through the Venice Committee, has helped Croatia to fulfill those obligations.
- Author:
Jarosław Piątek
- E-mail:
jarekpiatek@wp.pl
- Institution:
University of Szczecin
- ORCID:
https://orcid.org/0000-0003-4754-3371
- Year of publication:
2018
- Source:
Show
- Pages:
59-70
- DOI Address:
https://doi.org/10.15804/rop201804
- PDF:
rop/2018/rop201804.pdf
Contemporary time, interpreted by the prism of security, is no longer dominated by easy to describe inter-state conflicts or regional threats. Experts every now and then define new types of threats such as cybercrime, cyberterrorism or cyberwar. The intense and multi-level uncertainty affects the understanding of the present and the predicted future, and thus the search for security by all of us. The answer depends in part on whether we are able to understand contemporary security environment. These issues are, to my mind, independent of the place in which we are. Using tools for diagnosing and monitoring security remains an open question. At the moment we are searching for a solution to this problem by means of modern technologies. The paper stresses the importance and application of e.g. Internet technology and global telecommunication. Interpersonal relations are being replaced with technological solutions. Nowadays, a phone or a computer connected to the web is sufficient to make contact with another person or check what information official sources are bringing us today. Actions for security as a result of incorrect reception of a message may be associated with erroneous perception of the content and propaganda. As a result, the recipient is consciously manipulated. New technologies take the form of nonconventional, organized activities for security. Any number of people can cooperate through the web for security management without actual superior authority. Members of such groups, established ad hoc, may use their knowledge to express objections or dissatisfaction. The paper also presents another aspect of using technology. According to the author, there are situations in which technologies acting for reinforcing security often cause objection, motivated by restricting civil freedoms and by the threat of an attack on a free and open society.
- Author:
Halina Zięba-Załucka
- E-mail:
hzalucka@onet.eu
- Institution:
Uniwersytet Rzeszowski
- ORCID:
https://orcid.org/0000-0003-1646-3141
- Year of publication:
2019
- Source:
Show
- Pages:
205-221
- DOI Address:
https://doi.org/10.15804/ppk.2019.02.12
- PDF:
ppk/48/ppk4812.pdf
Monitoring system vs the right to privacy
The author discusses the issue of finding a balance between monitoring that works both in public and private space as an element of ensuring the security of citizens, and violating their right to privacy guaranteed in the constitution. It is a matter of dispute enough that disputes persist in many environments, to the extent that the use of monitoring complies with legal and ethical standards and serves to ensure the security of citizens. The boundary between security protection and the right to privacy is also important. The author points out that there is still no law on video monitoring, despite work on its content for over 5 years. It shows how widely used monitoring is and how it affects the right to privacy. The main thesis was assumption that access to modern technologies and information techniques significantly changed the perception of human rights and the use of monitoring in the context of, in particular, the right to privacy – significantly limiting them. The author notices that privacy as a good of special significance for a man but also in a specific scope of a legal person takes the form of constitutional value resulting from several provisions of the binding constitution, including the most important article 47 and others, ie article 48–51, 53.
- Author:
Luciana Joana
- E-mail:
lucianaj@utad.pt
- Institution:
University of Porto and University of Trás-os-Montes and Alto Douro, Portugal
- ORCID:
https://orcid.org/0000-0002-0869-3396
- Year of publication:
2022
- Source:
Show
- Pages:
82-91
- DOI Address:
https://doi.org/10.15804/tner.22.68.2.06
- PDF:
tner/202202/tner6806.pdf
The emerging dichotomy between control and support/monitoring, which takes place when the performance of inspection at schools is at stake, was crucial to the definition of our goal: knowing the perceptions of teachers and inspectors regarding the relationship between them and the impact of this relation in the collaborative work that they must undertake in the context of the monitoring programmes. The methodological option, of a qualitative nature, comprised a case study involving five school clusters. We used questionnaires and semi-structured interviews as data collection instruments. Data were analysed through content analysis and descriptive statistical analysis. In total, the study involved 130 participants, including teachers and inspectors. The research results show the contradictory nature of the multiple activities under the responsibility of this inspection body, which means that inspectors are not always well received by teachers, even if the activities have a different nature from the evaluation and control ones.