Preferences help
enabled [disable] Abstract
Number of results
2016 | 57 | 122-128
Article title

Possibilities of the spatial information system usage by the Internal Security Agency

Title variants
Languages of publication
The article concerns the possibilities of the spatial information system usage by the Internal Security Agency. We are currently living in the age of informational society. The progress in the fields of technology and IT, which has been taking place over the last years, has expedited and facilitated access to information. Exchange of information is important in all forms of activity, also in the activity of the Internal Security Agency. The ISA’s operational-fact-finding and analytical-informational actions include obtaining, gathering, processing, and analysing information. A useful tool for performing these actions is the spatial information system, which is the combination of information with geographical location. Databases, which are an integral part of the geographic information system, are also helpful.
Physical description
  • Faculty of Law and Administration, University of Warmia and Mazury in Olsztyn, Poland
  • Faculty of Geodesy, Geospatial and Civil Engineering, University of Warmia and Mazury in Olsztyn, Poland
  • Faculty of Geodesy, Geospatial and Civil Engineering, University of Warmia and Mazury in Olsztyn, Poland
  • [1] D. P Farrington, Developmental and life‐course criminology: Key theoretical and empirical issues‐the 2002 Sutherland Award address. Criminology 41(2) (2003) 221-225.
  • [2] Misiuk, Administracja porządku i bezpieczeństwa publicznego, zagadnienia prawnoustrojowe, (2011), 143-145.
  • [3] K.A. Wojtaszczyk, Polskie służby specjalne, słownik (2011) 35.
  • [4] J. Gaździcki, Systemy informacji przestrzennej (1990) 11.
  • [5] J. Malczewski, GIS and multicriteria decision analysis (1999) 15-77.
  • [6] K. A. Wojtaszczyk, Polskie służby specjalne, słownik (2011) 56-57.
  • [7] M. Kulicki, Kryminalistyka, Wybrane zagadnienia teorii i praktyki śledczo-sądowej (1994) 69.
  • [8] Sprengel, Służby mundurowe ochrony bezpieczeństwa wewnętrznego (2008) 133-135.
  • [9] P. Urbanowicz, M. Płonkowski, D. Urbanowicz, Bazy danych Teoria i praktyka (2010) 13-15.
  • [10] M. J. Hernandez, Bazy danych dla zwykłych śmiertelników (2000) 30.
  • [11] H. Garcia-molina, J. D. Ullman, J. Widom, Database systems (2009) 15-36.
  • [12] J. L. Harrington, Obiektowe bazy danych dla każdego (2001) 16.
  • [13] J. Peterson, Wprowadzenie do baz danych dla zupełnie początkujących, (2003) 20.
  • [14] J. S. Bowman, S. L. Emerson, M. Darnovsky, The Practical SQL Handbook: Using Structured Query Language (1996) 40-50.
  • [15] A.K.W. Yeung, G. Brent Hall, Spatial Database Systems, Dordrecht (2007) 93.
  • [16] Empowering GIS with Big Data, stan z dnia 15.03.2016.
  • [17] Terrago share anywhere, stan z dnia 18.03.2016.
  • [18] M. Gill, Martin, Security management and crime in hotels, International Journal of Contemporary Hospitality Management 14(2) (2002) 58-64.
  • [19] S. Fotheringham, P. Rogerson, Spatial analysis and GIS (2002)
  • [20] S. MacDougal, Myres S, Florentino P. Feliciano. The international law of war: transnational coercion and world public order 9 (1994) 24-32. Martinus Nijhoff Publishers.
  • [21] R. Wise, Charles, Organizing for homeland security, Public Administration Review 62(2) (2002) 131-144.
Document Type
Publication order reference
YADDA identifier
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.