Preferences help
enabled [disable] Abstract
Number of results
2017 | 72 | 262-267
Article title

Security management of mass events

Title variants
Languages of publication
In recent years there has been a growing interest in the improvement of the security of mass events. Work on the regulations concerning mass events gained in significance by the multiplicity of occurrence of these events in our country. Mass event is a very large undertaking, which organizer must cope with. The aim of the article is to present legal regulations of issues connected with security of mass events in the range of those involved in the project.
Physical description
  • Faculty of Management, Czestochowa University of Technology, Czestochowa, Poland
  • [1] Frykberg, Eric R. Medical management of disasters and mass casualties from terrorist bombings: how can we cope? Journal of Trauma and Acute Care Surgery 53.2 (2002) 201-212
  • [2] Antonowicz, Dominik, Radosław Kossakowski, and Tomasz Szlendak. Flaming Flares, Football Fanatics and Political Rebellion: Resistant Youth Cultures in Late Capitalism. Eastern European Youth Cultures in a Global Context. Palgrave Macmillan UK, 2016. 131-144
  • [3] Boyle, Philip, and Kevin D. Haggerty. Spectacular security: mega‐events and the security complex. International Political Sociology 3.3 (2009) 257-274.
  • [4] Donham, Wallace B., and Nathan Isaacs. Business Security and Legal Security. Harvard Law Review 37.2 (1923) 201-213
  • [5] Freeman, Bennett. Managing risk and building trust: the challenge of implementing the Voluntary Principles on Security and Human Rights. Transnational Dispute Management (TDM) 1.1 (2004).
  • [6] Brunnee, Jutta, and Stephen J. Toope. Canada and the use of force: reclaiming human security. International Journal 59.2 (2004) 247-260
  • [7] Zadrożniak H.: events - selected dilemmas and de lege ferenda [in] Local government, Publisher Oficyna a Wolters Kluwer, Warsaw 7-8 / 2008.
  • [8] Rhee, Hyeun-Suk, Young U. Ryu, and Cheong-Tag Kim. Unrealistic optimism on information security management. Computers & Security 31.2 (2012) 221-232
Document Type
Publication order reference
YADDA identifier
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.