Karolina Wojtasik | University of Silesia in Katowice (original) (raw)

Papers by Karolina Wojtasik

Research paper thumbnail of Protection of Polish critical infrastructure (CI) against air threats

Security and Defence Quarterly

The goal of this paper is to analyse challenges related to protecting Polish critical infrastruct... more The goal of this paper is to analyse challenges related to protecting Polish critical infrastructure (CI) against air threats, such as UAVs, as a case study in a wider discussion on protection of critical infrastructure worldwide. The Polish legal definition of critical infrastructure and laws regarding the protection of such facilities are explained in the article in order to provide context. A review of scientific literature and open-source analysis of known air attacks on CI and the capabilities of air platforms are also included, with special attention being paid to unmanned systems. The threats themselves have been divided into two groups of scenarios: peacetime threats and crisis situations that have hybrid wartime scenarios. Depending on the scenario, the different capabilities of actors must be taken into account. Peacetime air threats include the use of commercially available drones. Those devices have limited capabilities, in terms of weaponisation, due to the limited weig...

Research paper thumbnail of Transfer technologii jako nowe oblicze innowacyjności : szkic teoretyczny

Koncepcja tworzenia przestrzeni, w której spotyka się nauka, nowoczesny przemysł i przedsiębiorcz... more Koncepcja tworzenia przestrzeni, w której spotyka się nauka, nowoczesny przemysł i przedsiębiorczość, narodziła się w latach 50. XX wieku w USA. Celem tworzenia takich miejsc było zbliżenie naukowców i ich badań z przedsiębiorcami, którzy mogli wyniki tych badań praktycznie wykorzystać. Ówcześni przedsiębiorcy odkryli, iż by rozwijać się i sprostać konkurencji, nie mogą ograniczać się tylko do własnych zasobów w sferze know-how oraz nowoczesnych rozwiązań. Naukowcy z kolei zdali sobie sprawę z faktu, że bez finansowania i doświadczenia szeroko pojętego biznesu nie wdrożą swoich nawet najbardziej innowacyjnych projektów. Taki sposób myślenia zapoczątkował współpracę pomiędzy uczelniami oraz biznesem/przemysłem

Research paper thumbnail of “Rely on Allah, Not on Your Equipment”. Modus Operandi and All Errors of Tsarnaev Brothers

Studia Politologiczne

The article analyses modus operandi of perpetrators who carried out the bomb attack during the Bo... more The article analyses modus operandi of perpetrators who carried out the bomb attack during the Boston Marathon on 15 April 2013. The author indicates the consequences of using this type of IED and explains how the location of the bombs affected the number of casualties. The article includes an analysis of the bombers’ tactics and the course of action beginning with the detonation of the bombs and ending with the apprehension of the last perpetrator. Moreover, the analysed attack shows something which does not receive enough attention – that terrorists make errors and act in a chaotic manner. A detailed analysis of the bombers’ preparation, behavior and modus operandi showed how poorly trained, insecure and chaotic the terrorists were. The slogan “Rely on Allah, not on your equipment”, popular in the jihadist media, has proved to be deceptive

Research paper thumbnail of Państwo Islamskie - recenzja

Recenzja: Patrick Cockburn, Państwo Islamskie, przeł. Martyna Bielik, Wydawnictwo Naukowe PWN, Wa... more Recenzja: Patrick Cockburn, Państwo Islamskie, przeł. Martyna Bielik, Wydawnictwo Naukowe PWN, Warszawa 2015, s. 204

Research paper thumbnail of Terrorist Threats and the Anti-Terrorism System in the Republic of Poland Vol. I (2020)

Research paper thumbnail of Analysis of the Bombers’ Tactics and the Consequences of a Series of Terrorist Attacks in Brussels (22 March 2016)

PRZEGLĄD POLICYJNY, 2021

The purpose of the article is to analyse the modus operandi of the terrorists who on 22 March 201... more The purpose of the article is to analyse the modus operandi of the terrorists who on 22 March 2016 organised the bomb attacks in Brussels. The article characterises the targets of the attackers, analyses their operational tactics and the aftermath of their attacks. In addition, the consequences of the attacks are discussed – both economic and legal. Another issue analysed in the article is the perpetrators of the assassinations – their origin, path of radicalisation and network of contacts. The summary shows why returning foreign terrorist fighters are a threat to security in the EU countries, including Poland.

Research paper thumbnail of New Impulse, New Challenges. Safety Procedures in a Production Enterprise. A Case Study

System Safety: Human - Technical Facility - Environment, 2020

In connection with the entry into force of the Anti-terrorism Act, administrators of many product... more In connection with the entry into force of the Anti-terrorism Act, administrators of many production facilities are required to prepare a number of anti-terrorism procedures called anti-terrorist/AT attachment (Security plan related to facilities and equipment subject to mandatory protection in respect of terrorist threats). The article is a case study of the AT attachment implementation in several production plants belonging to one enterprise. It characterizes the strategy adopted in this company and the solutions developed in 2017-2019 in several production plants. The purpose of the article is to show why the implementation of this procedure is a challenge for the company.

Research paper thumbnail of Recenzja. Patrick Cockburn, Państwo Islamskie, przeł. Martyna Bielik, Wydawnictwo Naukowe PWN, Warszawa 2015, s. 204

Research paper thumbnail of Caliphate Calls to Arms. European ISIS Fighters in the Light of Sociological Analysis

The article concerns European volunteers travelling to Iraq and Syria to participate in armed jih... more The article concerns European volunteers travelling to Iraq and Syria to participate in armed jihad. It includes an analysis of propaganda materials prepared for potential ISIS fighters from Europe and the broadly understood West and the characterisation of the type of motives leading to the decision to travel to the territories occupied by the so-called Islamic State (the Caliphate). The theoretical system of reference was based on push-pull model combined with the cost-benefit theory which allowed to analyse this phenomenon in the context of the most popular theories of migration.

Research paper thumbnail of Terror w Sieci. Jak organizacje terrorystyczne wykorzystują Internet i jego możliwości? Próba analizy materiałów filmowych

Research paper thumbnail of Utøya – Christchurch – Halle. Right-wing Extremists’ Terrorism

Security Dimensions, 2020

The article deals with three terrorist attacks of right-wing extremists: in Norway (2011), New Ze... more The article deals with three terrorist attacks of right-wing extremists: in Norway (2011), New Zealand (2019) and Germany (2019). First, the modus operandi of perpetrators was shown and the course of each attack was analyzed. It was indicated what tactics the attackers used and why it was or was not effective. Secondly, the ideological background and motivations of the perpetrators were shown. It was possible to analyze the manifestos that the perpetrators left, and thus their way of thinking, their ideologies, and the purposes of organizing the attacks. Thirdly, issues related to the publicizing of the attacks by the perpetrators were shown. The goal of the article is to show that radical ideology of right-wing extremists (expressed in manifestos) leads to tragedies. In analyzed cases radical appointment of the perpetrators caused three deadly attacks. The article shows that the radical actions are preceded by radical speech, expressions, manifestos. The second goal is to pay atten...

Research paper thumbnail of How and Why Do Terrorist Organizations Use the Internet?

Polish Political Science Yearbook, Dec 15, 2017

The article gives general characterisation of the ways in which these organizations use modern co... more The article gives general characterisation of the ways in which these organizations use modern communication technologies. Currently, every major terrorist organisation maintain robust media wings, which focus on producing videos, publishing magazines and sharing them with the public via the Web. The empirical system of reference is based on the activity of al-Qaeda, her franchise AQAP (al-Qaeda in the Arabian Peninsula) and ISIS (the so-called Islamic State). While analysing the media of terrorist organisations, the Lasswell model was applied. This formula is a standard research procedure used for investigating acts of communication by answering the questions: who, says what, in which channel, to whom, with what effect?. The author also present typology of videos produced by jihadist organisations, characterised the most important and active media actions of terrorist organisations and a typology of recipients of such messages. The article presents a number of reasons why the Internet has become such an important tool for terrorists

Research paper thumbnail of Nowoczesne technologie i internet w służbie organizacji terrorystycznych - próba analizy socjologicznej

Studia Humanistyczne AGH, 2017

Research paper thumbnail of Security Culture at Production Facility. Conclusions from Employees’ Training

Quality Production Improvement - QPI, 2019

A high level of safety culture is a factor affecting the quality of production. The article conta... more A high level of safety culture is a factor affecting the quality of production. The article contains conclusions and recommendations regarding creating a safety culture based on the awareness of threats and the ability to respond to them. The aim of the article is to analyze trainings on AT (antiterrorist) security procedures conducted in critical infrastructure (CI) enterprises and enterprises which are subject to mandatory protection. The theoretical system of reference is based on the issues regarding security culture and sociology of work. Observation of employee training, followed by analysis of employees' behavior and interviews with their supervisors, allowed to assess the functionality of solutions and develop recommendations for the training of with and blue collar workers.

Research paper thumbnail of Do-It-Yourself Terrorism. How Do Terrorist Organizations Inspire, Support and Teach Their European Supporters via Internet?

System Safety: Human - Technical Facility - Environment, 2019

The following paper is a review article. It is an attempt to analyze the most widely available pu... more The following paper is a review article. It is an attempt to analyze the most widely available publications of Salafi terrorist organizations addressed to European supporters. This article concentrates primarily on publications describing tactics related to committing acts of terror on civilian population. Organizations like AQ and ISIS suggest launching attacks using the most available resources (attack using a knife or a sharp tool, arson, ramming with a vehicle), constructing various kinds of IED (pipe bomb, pressure cooker bomb), encourage to attack in public and poorly protected places or advise on how to organize a shooting and hostage-taking situation. Moreover, they state bluntly that theft, vandalism or causing major traffic accidents are also actions which can help in the war with infidels. The substantive value of the instructions is questionable – the authors of many of them (e.g. the attack using a knife) have vague idea about equipment and combat. The content of these ...

Research paper thumbnail of System and Human Safety: Critical Infrastructure and Anti-Terrorist Attachment

System Safety: Human - Technical Facility - Environment, 2019

The critical infrastructure (CI) has an important place in Polish security system. The article di... more The critical infrastructure (CI) has an important place in Polish security system. The article discusses legal acts and characterises the notion of critical infrastructure as an element essential for the functioning of the society. As a result of the entry into force of the Anti-terrorism Act from 10 June 2016 (Journal of Laws [Dz. U.], item 904), the current procedure of security plan Accepted was extended to include participation of the Internal Security Agency through the requirement to submit a so-called anti-terrorist attachment. The article is an analysis of the constituent parts of the document and procedures it covers. Moreover, the authors present conclusions and recommendations resulting from the analysis of AT attachments of CI facilities and other facilities subject to mandatory protection. The empirical system of reference is based on facilities located in Silesia. The authors described their experiences related to the process of preparation and Accepted of AT attachmen...

Research paper thumbnail of Protection of Polish critical infrastructure (CI) against air threats

Security and Defence Quarterly

The goal of this paper is to analyse challenges related to protecting Polish critical infrastruct... more The goal of this paper is to analyse challenges related to protecting Polish critical infrastructure (CI) against air threats, such as UAVs, as a case study in a wider discussion on protection of critical infrastructure worldwide. The Polish legal definition of critical infrastructure and laws regarding the protection of such facilities are explained in the article in order to provide context. A review of scientific literature and open-source analysis of known air attacks on CI and the capabilities of air platforms are also included, with special attention being paid to unmanned systems. The threats themselves have been divided into two groups of scenarios: peacetime threats and crisis situations that have hybrid wartime scenarios. Depending on the scenario, the different capabilities of actors must be taken into account. Peacetime air threats include the use of commercially available drones. Those devices have limited capabilities, in terms of weaponisation, due to the limited weig...

Research paper thumbnail of Transfer technologii jako nowe oblicze innowacyjności : szkic teoretyczny

Koncepcja tworzenia przestrzeni, w której spotyka się nauka, nowoczesny przemysł i przedsiębiorcz... more Koncepcja tworzenia przestrzeni, w której spotyka się nauka, nowoczesny przemysł i przedsiębiorczość, narodziła się w latach 50. XX wieku w USA. Celem tworzenia takich miejsc było zbliżenie naukowców i ich badań z przedsiębiorcami, którzy mogli wyniki tych badań praktycznie wykorzystać. Ówcześni przedsiębiorcy odkryli, iż by rozwijać się i sprostać konkurencji, nie mogą ograniczać się tylko do własnych zasobów w sferze know-how oraz nowoczesnych rozwiązań. Naukowcy z kolei zdali sobie sprawę z faktu, że bez finansowania i doświadczenia szeroko pojętego biznesu nie wdrożą swoich nawet najbardziej innowacyjnych projektów. Taki sposób myślenia zapoczątkował współpracę pomiędzy uczelniami oraz biznesem/przemysłem

Research paper thumbnail of “Rely on Allah, Not on Your Equipment”. Modus Operandi and All Errors of Tsarnaev Brothers

Studia Politologiczne

The article analyses modus operandi of perpetrators who carried out the bomb attack during the Bo... more The article analyses modus operandi of perpetrators who carried out the bomb attack during the Boston Marathon on 15 April 2013. The author indicates the consequences of using this type of IED and explains how the location of the bombs affected the number of casualties. The article includes an analysis of the bombers’ tactics and the course of action beginning with the detonation of the bombs and ending with the apprehension of the last perpetrator. Moreover, the analysed attack shows something which does not receive enough attention – that terrorists make errors and act in a chaotic manner. A detailed analysis of the bombers’ preparation, behavior and modus operandi showed how poorly trained, insecure and chaotic the terrorists were. The slogan “Rely on Allah, not on your equipment”, popular in the jihadist media, has proved to be deceptive

Research paper thumbnail of Państwo Islamskie - recenzja

Recenzja: Patrick Cockburn, Państwo Islamskie, przeł. Martyna Bielik, Wydawnictwo Naukowe PWN, Wa... more Recenzja: Patrick Cockburn, Państwo Islamskie, przeł. Martyna Bielik, Wydawnictwo Naukowe PWN, Warszawa 2015, s. 204

Research paper thumbnail of Terrorist Threats and the Anti-Terrorism System in the Republic of Poland Vol. I (2020)

Research paper thumbnail of Analysis of the Bombers’ Tactics and the Consequences of a Series of Terrorist Attacks in Brussels (22 March 2016)

PRZEGLĄD POLICYJNY, 2021

The purpose of the article is to analyse the modus operandi of the terrorists who on 22 March 201... more The purpose of the article is to analyse the modus operandi of the terrorists who on 22 March 2016 organised the bomb attacks in Brussels. The article characterises the targets of the attackers, analyses their operational tactics and the aftermath of their attacks. In addition, the consequences of the attacks are discussed – both economic and legal. Another issue analysed in the article is the perpetrators of the assassinations – their origin, path of radicalisation and network of contacts. The summary shows why returning foreign terrorist fighters are a threat to security in the EU countries, including Poland.

Research paper thumbnail of New Impulse, New Challenges. Safety Procedures in a Production Enterprise. A Case Study

System Safety: Human - Technical Facility - Environment, 2020

In connection with the entry into force of the Anti-terrorism Act, administrators of many product... more In connection with the entry into force of the Anti-terrorism Act, administrators of many production facilities are required to prepare a number of anti-terrorism procedures called anti-terrorist/AT attachment (Security plan related to facilities and equipment subject to mandatory protection in respect of terrorist threats). The article is a case study of the AT attachment implementation in several production plants belonging to one enterprise. It characterizes the strategy adopted in this company and the solutions developed in 2017-2019 in several production plants. The purpose of the article is to show why the implementation of this procedure is a challenge for the company.

Research paper thumbnail of Recenzja. Patrick Cockburn, Państwo Islamskie, przeł. Martyna Bielik, Wydawnictwo Naukowe PWN, Warszawa 2015, s. 204

Research paper thumbnail of Caliphate Calls to Arms. European ISIS Fighters in the Light of Sociological Analysis

The article concerns European volunteers travelling to Iraq and Syria to participate in armed jih... more The article concerns European volunteers travelling to Iraq and Syria to participate in armed jihad. It includes an analysis of propaganda materials prepared for potential ISIS fighters from Europe and the broadly understood West and the characterisation of the type of motives leading to the decision to travel to the territories occupied by the so-called Islamic State (the Caliphate). The theoretical system of reference was based on push-pull model combined with the cost-benefit theory which allowed to analyse this phenomenon in the context of the most popular theories of migration.

Research paper thumbnail of Terror w Sieci. Jak organizacje terrorystyczne wykorzystują Internet i jego możliwości? Próba analizy materiałów filmowych

Research paper thumbnail of Utøya – Christchurch – Halle. Right-wing Extremists’ Terrorism

Security Dimensions, 2020

The article deals with three terrorist attacks of right-wing extremists: in Norway (2011), New Ze... more The article deals with three terrorist attacks of right-wing extremists: in Norway (2011), New Zealand (2019) and Germany (2019). First, the modus operandi of perpetrators was shown and the course of each attack was analyzed. It was indicated what tactics the attackers used and why it was or was not effective. Secondly, the ideological background and motivations of the perpetrators were shown. It was possible to analyze the manifestos that the perpetrators left, and thus their way of thinking, their ideologies, and the purposes of organizing the attacks. Thirdly, issues related to the publicizing of the attacks by the perpetrators were shown. The goal of the article is to show that radical ideology of right-wing extremists (expressed in manifestos) leads to tragedies. In analyzed cases radical appointment of the perpetrators caused three deadly attacks. The article shows that the radical actions are preceded by radical speech, expressions, manifestos. The second goal is to pay atten...

Research paper thumbnail of How and Why Do Terrorist Organizations Use the Internet?

Polish Political Science Yearbook, Dec 15, 2017

The article gives general characterisation of the ways in which these organizations use modern co... more The article gives general characterisation of the ways in which these organizations use modern communication technologies. Currently, every major terrorist organisation maintain robust media wings, which focus on producing videos, publishing magazines and sharing them with the public via the Web. The empirical system of reference is based on the activity of al-Qaeda, her franchise AQAP (al-Qaeda in the Arabian Peninsula) and ISIS (the so-called Islamic State). While analysing the media of terrorist organisations, the Lasswell model was applied. This formula is a standard research procedure used for investigating acts of communication by answering the questions: who, says what, in which channel, to whom, with what effect?. The author also present typology of videos produced by jihadist organisations, characterised the most important and active media actions of terrorist organisations and a typology of recipients of such messages. The article presents a number of reasons why the Internet has become such an important tool for terrorists

Research paper thumbnail of Nowoczesne technologie i internet w służbie organizacji terrorystycznych - próba analizy socjologicznej

Studia Humanistyczne AGH, 2017

Research paper thumbnail of Security Culture at Production Facility. Conclusions from Employees’ Training

Quality Production Improvement - QPI, 2019

A high level of safety culture is a factor affecting the quality of production. The article conta... more A high level of safety culture is a factor affecting the quality of production. The article contains conclusions and recommendations regarding creating a safety culture based on the awareness of threats and the ability to respond to them. The aim of the article is to analyze trainings on AT (antiterrorist) security procedures conducted in critical infrastructure (CI) enterprises and enterprises which are subject to mandatory protection. The theoretical system of reference is based on the issues regarding security culture and sociology of work. Observation of employee training, followed by analysis of employees' behavior and interviews with their supervisors, allowed to assess the functionality of solutions and develop recommendations for the training of with and blue collar workers.

Research paper thumbnail of Do-It-Yourself Terrorism. How Do Terrorist Organizations Inspire, Support and Teach Their European Supporters via Internet?

System Safety: Human - Technical Facility - Environment, 2019

The following paper is a review article. It is an attempt to analyze the most widely available pu... more The following paper is a review article. It is an attempt to analyze the most widely available publications of Salafi terrorist organizations addressed to European supporters. This article concentrates primarily on publications describing tactics related to committing acts of terror on civilian population. Organizations like AQ and ISIS suggest launching attacks using the most available resources (attack using a knife or a sharp tool, arson, ramming with a vehicle), constructing various kinds of IED (pipe bomb, pressure cooker bomb), encourage to attack in public and poorly protected places or advise on how to organize a shooting and hostage-taking situation. Moreover, they state bluntly that theft, vandalism or causing major traffic accidents are also actions which can help in the war with infidels. The substantive value of the instructions is questionable – the authors of many of them (e.g. the attack using a knife) have vague idea about equipment and combat. The content of these ...

Research paper thumbnail of System and Human Safety: Critical Infrastructure and Anti-Terrorist Attachment

System Safety: Human - Technical Facility - Environment, 2019

The critical infrastructure (CI) has an important place in Polish security system. The article di... more The critical infrastructure (CI) has an important place in Polish security system. The article discusses legal acts and characterises the notion of critical infrastructure as an element essential for the functioning of the society. As a result of the entry into force of the Anti-terrorism Act from 10 June 2016 (Journal of Laws [Dz. U.], item 904), the current procedure of security plan Accepted was extended to include participation of the Internal Security Agency through the requirement to submit a so-called anti-terrorist attachment. The article is an analysis of the constituent parts of the document and procedures it covers. Moreover, the authors present conclusions and recommendations resulting from the analysis of AT attachments of CI facilities and other facilities subject to mandatory protection. The empirical system of reference is based on facilities located in Silesia. The authors described their experiences related to the process of preparation and Accepted of AT attachmen...