ORIGINAL PAPER
Threats and ensuring information security in crisis management systems
,
 
 
 
More details
Hide details
1
Military University of Technology, Faculty of Security, Logistics and Management
 
 
Online publication date: 2019-09-25
 
 
Publication date: 2019-09-25
 
 
NSZ 2019;14(3):113-122
 
KEYWORDS
TOPICS
ABSTRACT
Constantly progressing technical and technological development has allowed the creation of IT tools, the use of which will positively affect the actions taken by decision-makers. However, in order to be able to use them properly, in addition to thoroughly familiarizing themselves with their capabilities, it is necessary to develop operating schemes, e.g. human management, taking into account the use of the tools discussed in the article. When creating appropriate solutions, special attention should be paid to the possibility of securing information and data on which we will operate. This will be especially important during a crisis situation such as a flood, for example, where properly coordinated actions will allow a more effective rescue action. This will translate into lowering material and human losses. It should be remembered, however, that IT tools should always play a supporting role, and all decisions should be made after their prior assessment by a suitably qualified person.
 
REFERENCES (14)
1.
ACT WATER LAW, 2019, http://prawo.sejm.gov.pl/isap.... (15.07.2019).
 
2.
AGUILAR-SAVÉN R.S., 2004, Business process modelling: Review and framework, “International Journal of Production Economics”, Vol. 90, Issue 2, No. 28.
 
3.
BEING GURU, 2019, https://www.beingguru.com/2019... (15.07.2019).
 
4.
BITCOINWIKI, 2019, https://en.bitcoinwiki.org/wik... (15.07.2019).
 
5.
DHILLION V., Metcalf D., Hooper M., 2018, Blockchain technology applications, Wydawnictwo Naukowe PWN, Warsaw.
 
6.
GAWIN B., MARCINKOWSKI B., 2013, Symulacja procesów biznesowych. Standardy BPMS i BPMN w praktyce, Helion, Gliwice.
 
7.
GROCKI R., 2020, Zarządzanie kryzysowe dobre praktyki. Wydanie 2, Difin, Warsaw.
 
8.
LIDERMAN K., 2017, Bezpieczeństwo informacyjne. Nowe wyzwania, Wydawnictwo Naukowe PWN, Warsaw.
 
9.
MOUGAYAR W., 2019, The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology, Helion, Gliwice.
 
10.
POWODZ, 2019, http://powodz.gov.pl/pl/defini... (15.07.2019).
 
11.
RYSZ S.J., 2017, Ostrzeganie, alarmowanie, powiadamianie ratunkowe, Difin, Warsaw.
 
12.
SIMPSON R.C., 2004, https://ntrs.nasa.gov/archive/... (17.07.2019).
 
13.
ZIGNUTS TECHNOLAB, 2019, https://www.zignuts.com/blogs/... (15.07.2019).
 
14.
ŻELIŃSKI J., 2017, Analiza biznesowa. Praktyczne modelowanie organizacji, Helion, Gliwice.
 
eISSN:2719-860X
ISSN:1896-9380
Journals System - logo
Scroll to top