This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
ACLED, 2024. Armed Conflict Location & Event Data (ACLED), Project Ukraine Q & A 2024. [online] Available at: <https://acleddata.com/acleddatanew/wp-con-tent/uploads/2024/03/Ukraine-QA-2024.pdf>ACLED, 2024. Armed Conflict Location & Event Data (ACLED), Project Ukraine Q & A 2024. [online] Available at: <https://acleddata.com/acleddatanew/wp-con-tent/uploads/2024/03/Ukraine-QA-2024.pdf>Search in Google Scholar
Babbie, E., 2005. Badania społeczne w prak-tyce (The Practice of Social Research). Warszawa: Wydawnictwo Naukowe PWN.BabbieE.2005. Badania społeczne w prak-tyce (The Practice of Social Research). Warszawa: Wydawnictwo Naukowe PWN.Search in Google Scholar
Banasik, M., 2015. How to understand the hybrid war. Securitologia, 1(21), pp. 19-34. [online] Available at: <https://www.civi-tas.edu.pl/wp-content/uploads/2015/03/Secu-ritologia-1-21-2015_019-034.pdf>BanasikM.2015. How to understand the hybrid war. Securitologia, 1(21), pp. 19-34. [online] Available at: <https://www.civi-tas.edu.pl/wp-content/uploads/2015/03/Secu-ritologia-1-21-2015_019-034.pdf>Search in Google Scholar
Benjamin, N., 2021. How effective is blockchain in cybersecurity? ISACA Journal, 4. [online] Available at: <https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-effective-is-blockchain-in-cybersecurity>BenjaminN.2021. How effective is blockchain in cybersecurity?ISACA Journal, 4. [online] Available at: <https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-effective-is-blockchain-in-cybersecurity>Search in Google Scholar
Bennett, M. and Gupta, V., 2010. Dealing in Security: understanding vital services and how they keep you safe. [online] Available at: <http://resiliencemaps.org/files/Dealing_in_Security.July2010.en.pdf>BennettM.GuptaV.2010. Dealing in Security: understanding vital services and how they keep you safe. [online] Available at: <http://resiliencemaps.org/files/Dealing_in_Security.July2010.en.pdf>
Search in Google Scholar
Caliskan, M., 2019. Hybrid warfare through the lens of strategy theory. Defense and Security Analysis, 35(1), pp. 40-58. https://doi.org/10.1080/14751798.2019.1565364.CaliskanM.2019. Hybrid warfare through the lens of strategy theory. Defense and Security Analysis, 35(1), pp. 40-58. https://doi.org/10.1080/14751798.2019.1565364.Search in Google Scholar
Council on Foreign Relations, 2024. Global Conflict Tracker, Council on Foreign Relations. [online] Available at: <https://www.cfr.org/global-conflict-tracker> [Accessed 9 October 2023].Council on Foreign Relations, 2024. Global Conflict Tracker, Council on Foreign Relations. [online] Available at: <https://www.cfr.org/global-conflict-tracker> [Accessed 9 October 2023].Search in Google Scholar
Cybersecurity and Infrastructure Security Agency, 2019. National Critical Functions. [online] Available at: <https://www.cisa.gov/topics/risk-management/national-critical-func-tions>Cybersecurity and Infrastructure Security Agency, 2019. National Critical Functions. [online] Available at: <https://www.cisa.gov/topics/risk-management/national-critical-func-tions>
Search in Google Scholar
Fabian, E., 2004. Authorities name 713 soldiers, 66 police officers killed in Gaza war. The Time of Israel. [online] Available at: <https://www.timesofisrael.com/authorities-name-44-soldiers-30-police-officers-killed-in-hamas-attack/> [Accessed 8 July 2024].FabianE.2004. Authorities name 713 soldiers, 66 police officers killed in Gaza war. The Time of Israel. [online] Available at: <https://www.timesofisrael.com/authorities-name-44-soldiers-30-police-officers-killed-in-hamas-attack/ [Accessed 8 July 2024].Search in Google Scholar
Fox, A.C., 2017. Hybrid Warfare: The 21st Century Russian of Warfare. Master’s Thesis. https://doi.org/10.13140/RG.2.2.35922.38086.FoxA.C.2017. Hybrid Warfare: The 21st Century Russian of Warfare. Master’s Thesis. https://doi.org/10.13140/RG.2.2.35922.38086.Search in Google Scholar
Gaynor, K.M., Cherry, M.J., Gilbert, S.L., Kohl, M.T., Larson, C.L., Newsome, T.M., Prugh, L.R., Suraci, J.P., Young, J.K. and Smith, J.A., 2021. An applied ecology of fear framework: linking theory to conservation practice. Animal Conservation, 24(3), pp. 308-321. https://doi.org/10.1111/acv.12629.GaynorK.M.CherryM.J.GilbertS.L.KohlM.T.LarsonC.L.NewsomeT.M.PrughL.R.SuraciJ.P.YoungJ.K.SmithJ.A.2021. An applied ecology of fear framework: linking theory to conservation practice. Animal Conservation, 24(3), pp. 308-321. https://doi.org/10.1111/acv.12629.Search in Google Scholar
Habib, G., Sharma, S., Ibrahim, S., Ahmad, I., Qureshi, S. and Ishfaq, M., 2022. Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing. Future Internet, 14, 341. https://doi.org/10.3390/fi14110341.HabibG.SharmaS.IbrahimS.AhmadI.QureshiS.IshfaqM.2022. Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing. Future Internet, 14, 341. https://doi.org/10.3390/fi14110341.Search in Google Scholar
Hoffman, F.G., 2007. Conflict in the 21st Century: The Rise of Hybrid Wars. Arlington, VA: Potomac Institute for Policy Studies.HoffmanF.G.2007. Conflict in the 21st Century: The Rise of Hybrid Wars. Arlington, VA: Potomac Institute for Policy Studies.Search in Google Scholar
Hoffman, F.G., 2018. Examining complex forms of conflict: Gray zone and hybrid challenges. Prism, 7(4), pp. 30-47.HoffmanF.G.2018. Examining complex forms of conflict: Gray zone and hybrid challenges. Prism, 7(4), pp. 30-47.Search in Google Scholar
Hosanagar, K., 2021. How the Blockchain Will Impact the financial sector, Knowledge at Wharton. [online] Available at: <https://knowledge.wharton.upenn.edu>HosanagarK.2021. How the Blockchain Will Impact the financial sector, Knowledge at Wharton. [online] Available at: <https://knowledge.wharton.upenn.edu>Search in Google Scholar
Hosseini, S., Barker, K. and Ramirez-Marquez, J.E., 2016. A review of definitions and measures of system resilience. Reliability Engineering & System Safety, 145, pp. 47-61. https://doi.org/10.1016/j.ress.2015.08.006.HosseiniS.BarkerK.Ramirez-MarquezJ.E.2016. A review of definitions and measures of system resilience. Reliability Engineering & System Safety, 145, pp. 47-61. https://doi.org/10.1016/j.ress.2015.08.006.Search in Google Scholar
Iskandarov, K. and Gawliczek, P., 2023. Hybrid Warfare as a new type of War. The evolution of its conceptual construct. In: M. Banasik, P. Gawliczek and A. Rogozińska, eds. 2020. The Russian federation and international security, Poland: Difin, pp. 96-107 <https://www.researchgate.net/publication/373118996_hybrid_warfare_as_a_new_type _of_war_the_evolution_of_its_concep-tual_construct>IskandarovK.GawliczekP.2023. Hybrid Warfare as a new type of War. The evolution of its conceptual construct. In: BanasikM.GawliczekP.RogozińskaA., eds. 2020. The Russian federation and international security, Poland: Difin, pp. 96-107<https://www.researchgate.net/publication/373118996_hybrid_warfare_as_a_new_type _of_war_the_evolution_of_its_concep-tual_construct>Search in Google Scholar
Itich-Drabarek, I., Misiuk, A., Mitkow, Sz. and Bryczek-Wróbel, P., 2023. Encyklopedia Bezpieczeństwa Narodowego (Encyclopedia of National Security). Warszawa: Dom Wydawniczy ELIPSI. [online] Available at: <https://en-cyklopedia.revite.pl/>Itich-DrabarekI.MisiukA.MitkowSz.Bryczek-WróbelP.2023. Encyklopedia Bez-pieczeństwa Narodowego (Encyclopedia of National Security). Warszawa: Dom Wydawni-czy ELIPSI. [online] Available at: <https://en-cyklopedia.revite.pl/>Search in Google Scholar
Joshi A., 2017. Comparison between Scopus & ISI Web of science. Journal Global Values, 7(1), pp. 1-11.JoshiA.2017. Comparison between Scopus & ISI Web of science. Journal Global Values, 7(1), pp. 1-11.Search in Google Scholar
Kabir, S. and Papadopoulos, Y., 2019. Applications of Bayesian networks and Petri nets in safety, reliability, and risk assessments: A review. Safety science, 115, pp. 154-175. https://doi.org/10.1016/j.ssci.2019.02.009KabirS.PapadopoulosY.2019. Applications of Bayesian networks and Petri nets in safety, reliability, and risk assessments: A review. Safety science, 115, pp. 154-175. https://doi.org/10.1016/j.ssci.2019.02.009Search in Google Scholar
Kisilowski, M., Skomra, W., Smagowicz, J., Wiśniewski, M. and Szwarc, K, 2021. Zarządzanie bezpieczeństwem infrastruktury krytycznej i ciągłością usług kluczowych państwa (Management of critical infrastructure security and continuity of essential services of the state). Warszawa: Oficyna Wydawnicza Politechniki Warszawskiej.KisilowskiM.SkomraW.SmagowiczJ.WiśniewskiM.SzwarcK2021. Zarzą-dzanie bezpieczeństwem infrastruktury krytycz-nej i ciągłością usług kluczowych państwa (Management of critical infrastructure security and continuity of essential services of the state). Warszawa: Oficyna Wydawnicza Politechniki Warszawskiej.Search in Google Scholar
Krupa, T. and Ostrowska, T., 2012. Decision making in the flat and hierarchical decision problem. Foundations of Management, 4(2), pp. 23-36. https://doi.org/10.2478/fman-2013-0008.KrupaT.OstrowskaT.2012. Decision making in the flat and hierarchical decision problem. Foundations of Management, 4(2), pp. 23-36. https://doi.org/10.2478/fman-2013-0008.Search in Google Scholar
Krupa, T. and Wisniewski, M., 2015. Wykorzystanie wiedzy w zarządzaniu sytuacyjnym bezpieczeństwem infrastruktury krytycznej Polski (Use of knowledge in situational management of critical infrastructure security in poland). Logistyka, 5, pp. 1027-1033.KrupaT.WisniewskiM.2015. Wyko-rzystanie wiedzy w zarządzaniu sytuacyjnym bezpieczeństwem infrastruktury krytycznej Polski (Use of knowledge in situational management of critical infrastructure security in poland). Logistyka, 5, pp. 1027-1033.Search in Google Scholar
Landucci, G., Argenti, F., Cozzani, V. and Reniers, G., 2017. Assessment of attack likelihood to support security risk assessment studies for chemical facilities. Process Safety and Environmental Protection, 110, pp. 102-114. https://doi.org/10.1016/j.psep.2017.06.019.LanducciG.ArgentiF.CozzaniV.ReniersG.2017. Assessment of attack likelihood to support security risk assessment studies for chemical facilities. Process Safety and Environmental Protection, 110, pp. 102-114. https://doi.org/10.1016/j.psep.2017.06.019.Search in Google Scholar
Landucci, G., Khakzad, N. and Reniers, G.L.L., 2020. Physical security in the process industry: theory with applications. Cambridge, MA: Elsevier.LanducciG.KhakzadN.ReniersG.L.L.2020. Physical security in the process industry: theory with applications. Cambridge, MA: Elsevier.Search in Google Scholar
Leonhard, R. and Philips, S., 2015. Little Green Men: A Primer on Modern Russian Unconventional Warfare, Ukraine 2013-2014. Fort Bragg, NC: US Army Special Operations Command.LeonhardR.PhilipsS.2015. Little Green Men: A Primer on Modern Russian Unconventional Warfare, Ukraine 2013-2014. Fort Bragg, NC: US Army Special Operations Command.Search in Google Scholar
Linebarger, C., 2021. Preventive medicine: domestic repression and foreign revolutionary states. Dynamics of Asymmetric Conflict, 14(1), pp. 3-24.LinebargerC.2021. Preventive medicine: domestic repression and foreign revolutionary states. Dynamics of Asymmetric Conflict, 14(1), pp. 3-24.Search in Google Scholar
Moosavi, N. and Taherdoost, H., 2023. Blockchain technology application in security: A systematic review. Blockchains, 1(2), pp. 58-72. https://doi.org/10.3390/blockchains1020005.MoosaviN.TaherdoostH.2023. Blockchain technology application in security: A systematic review. Blockchains, 1(2), pp. 58-72. https://doi.org/10.3390/blockchains1020005.Search in Google Scholar
Moteff, J., Copeland, C. and Fischer, J., 2003. Critical Infrastructures: What Makes an Infrastructure Critical? [online] Available at: <https://irp.fas.org/crs/RL31556.pdf>MoteffJ.CopelandC.FischerJ.2003. Critical Infrastructures: What Makes an Infrastructure Critical?[online] Available at: <https://irp.fas.org/crs/RL31556.pdf>
Search in Google Scholar
North Atlantic Council, 2016. Deklaracja końcowa szczytu NATO w Warszawie (The Warsaw declaration on Transatlantic Security). [online] Available at: <https://www.bbn.gov.pl/ftp/dok/03/37-40_KBN_Deklaracja_ szczytu.pdf>North Atlantic Council, 2016. Deklaracja końcowa szczytu NATO w Warszawie (The Warsaw declaration on Transatlantic Security). [online] Available at: <https://www.bbn.gov.pl/ftp/dok/03/37-40_KBN_Deklaracja_ szczytu.pdf>Search in Google Scholar
OHCHR, 2024. Office of the United Nations High Commissioner for Human Rights (OHCHR), Gaza Report on the Ground, OHCHR Press Briefing notes. [online] Available at: <https://www.ohchr.org/en/press-brief-ing-notes/2024/01/gaza-report-ground>OHCHR, 2024. Office of the United Nations High Commissioner for Human Rights (OHCHR), Gaza Report on the Ground, OHCHR Press Briefing notes. [online] Available at: <https://www.ohchr.org/en/press-brief-ing-notes/2024/01/gaza-report-ground>Search in Google Scholar
PAP, 2024. Mieszkańcy Mariupola z głodu jedzą gołębie, brakuje wody pitnej (Mariupol residents eat pigeons out of hunger, drinking water is in short supply). Polish Press Agency (PAP). [online] Available at: <https://www.pap.pl/aktualnosci/news%2C1269876%2Cmieszkancy-mariupola-z-glodu-je-dza-golebie-brakuje-wody-pitnej.html>PAP, 2024. Mieszkańcy Mariupola z głodu jedzą gołębie, brakuje wody pitnej (Mariupol residents eat pigeons out of hunger, drinking water is in short supply). Polish Press Agency (PAP). [online] Available at: <https://www.pap.pl/aktualnosci/news%2C1269876%2Cmieszkancy-mariupola-z-glodu-je-dza-golebie-brakuje-wody-pitnej.html>Search in Google Scholar
Peterson, N., 2023. The Chinese Communist Party’s Theory of Hybrid Warfare. [online] Available at: <https://www.understand-ingwar.org/sites/default/files/The%20Chi-nese%20Communist%20Party%27s%20The-ory%20of%20Hybrid%20Warfare_0.pdf>PetersonN.2023. The Chinese Communist Party’s Theory of Hybrid Warfare. [online] Available at: <https://www.understand-ingwar.org/sites/default/files/The%20Chi-nese%20Communist%20Party%27s%20The-ory%20of%20Hybrid%20Warfare_0.pdf>Search in Google Scholar
Singh, S.K. and Kumar, S., 2021. Blockchain technology: introduction. Integration and Security Issues with IoT. https://arxiv.org/abs/2101.10921.SinghS.K.KumarS.2021. Blockchain technology: introduction. Integration and Security Issues with IoT. https://arxiv.org/abs/2101.10921.Search in Google Scholar
Statista Research Department, 2024. Number of civilian casualties during the war in Ukraine 2022-2024, Statista. [online] Available at: <https://www.statista.com/statis-tics/1293492/ukraine-war-casualties/>Statista Research Department, 2024. Number of civilian casualties during the war in Ukraine 2022-2024, Statista. [online] Available at: <https://www.statista.com/statis-tics/1293492/ukraine-war-casualties/>Search in Google Scholar
Tamplin, T., 2023. Blockchain transaction verification, Meaning and how it works. Finance Strategists. [online] Available at: <https://www.financestrategists.com>TamplinT.2023. Blockchain transaction verification, Meaning and how it works. Finance Strategists. [online] Available at: <https://www.financestrategists.com>Search in Google Scholar
The Wall Street Magazine, 2023. How are transactions verified in Blockchain: The ultimate guide to trust. [online] Available at: <https://thewallstreetmagazine.com/how-are-transactions-verified-in-blockchain/>The Wall Street Magazine, 2023. How are transactions verified in Blockchain: The ultimate guide to trust. [online] Available at: <https://thewallstreetmagazine.com/how-are-transactions-verified-in-blockchain/>Search in Google Scholar
UN News, 2024. Ukraine: Report reveals war’s long-term impact which will be felt for generations, UN News, 22 February. [online] Available at: <https://news.un.org/en/story/2024/02/1146842>UN News, 2024. Ukraine: Report reveals war’s long-term impact which will be felt for generations, UN News, 22 February. [online] Available at: <https://news.un.org/en/story/2024/02/1146842>Search in Google Scholar
Visser, M., van Eck, N. and Waltman, L., 2021. Large-scale comparison of bibliographic data sources: Scopus, Web of Science, Dimensions, Crossref and Microsoft Academic. Quantitative Science Studies, 2(1). https://doi.org/10.1162/qss_a_00112.VisserM.van EckN.WaltmanL.2021. Large-scale comparison of bibliographic data sources: Scopus, Web of Science, Dimensions, Crossref and Microsoft Academic. Quantitative Science Studies, 2(1). https://doi.org/10.1162/qss_a_00112.Search in Google Scholar
VOA, 2024. As Israel-Hamas War Reaches 100-Day Mark, Here’s the Conflict by Numbers. [online] Available at: <https://www.voanews.com/a/as-israel-hamas-war-reaches-100-day-mark-here-s-the-conflict-by-num-bers-/7439224.html> [Accessed 18 July 2024].VOA, 2024. As Israel-Hamas War Reaches 100-Day Mark, Here’s the Conflict by Numbers. [online] Available at: <https://www.voanews.com/a/as-israel-hamas-war-reaches-100-day-mark-here-s-the-conflict-by-num-bers-/7439224.html [Accessed 18 July 2024].Search in Google Scholar
Walecki, O.B. and Niejełow, B.M., 2015. Ocoōehhocmu napmu3aHCĸux u npomuB-onapmu3aHCKUX òeŭcmeuŭ b xode Mpaĸcĸoŭ doiuibi 2003-2011 (Features of guerrilla and anti-guerrilla actions during the Iraq War 2003-2011). Moscow.WaleckiO.B.NiejełowB.M.2015. OcoōeHHOcmu napmu3aHCĸux u npomuB-onapmu3aHCKUX òeŭcmeuŭ b xode Mpaĸcĸoŭ doiuibi 2003-2011 (Features of guerrilla and anti-guerrilla actions during the Iraq War 2003-2011). Moscow.Search in Google Scholar
WHO, 2024. Emergency Situation Update, Issue 28, 7 October 2023 - 20 April 2024. [online] Available at: <https://www.emro.who.int/images/stories/Sitrep_-_is-sue_28b.pdf?ua=1>WHO, 2024. Emergency Situation Update, Issue 28, 7 October 2023-20 April 2024. [online] Available at: <https://www.emro.who.int/images/stories/Sitrep_-_is-sue_28b.pdf?ua=1>Search in Google Scholar
Wiśniewski, M., 2020. Methodology of Situational Management of Critical Infrastructure Security. Foundations of Management, 12(1), pp. 43-60. https://doi.org/10.2478/fman-2020-0004.WiśniewskiM.2020. Methodology of Situational Management of Critical Infrastructure Security. Foundations of Management, 12(1), pp. 43-60. https://doi.org/10.2478/fman-2020-0004.Search in Google Scholar
Wiśniewski, M., Marczewski, M. and Kisilowski, M., 2016, Zasady budowy scenariuszy zdarzeń niekorzystnych w publicznym zarządzaniu kryzysowym (Rules ror Construction Scenarios Adverse of Events in the Public Crisis Management). [in] M. Ćwiklicki, M. Jabłoński I S. Mazur, red., Współczesne koncepcje zarządzania publicznego. Wyzwania modernizacyjne sektora publicznego (Contemporary concepts of public management. Challenges of public sector modernization). Fundacja Gospodarki i Administracji Publicznej. pp. 97-110.WiśniewskiM.MarczewskiM.Kisilow-skiM.2016, Zasady budowy scenariuszy zda-rzeń niekorzystnych w publicznym zarządzaniu kryzysowym (Rules ror Construction Scenarios Adverse of Events in the Public Crisis Management). [in] ĆwiklickiM.JabłońskiM.MazurI S., ed., Współczesne koncepcje zarządzania publicznego. Wyzwania modernizacyjne sektora publicznego (Contemporary concepts of public management. Challenges of public sector modernization). Fundacja Gospodarki i Administracji Publicznej. pp. 97-110. Search in Google Scholar
World Health Organization Eastern Mediterranean Regional Office, 2024. Emergency Situation Reports. [online] Available at: <https://www.emro.who.int/opt/information-resources/emergency-situation-reports.html>World Health Organization Eastern Mediterranean Regional Office, 2024. Emergency Situation Reports. [online] Available at: <https://www.emro.who.int/opt/information-resources/emergency-situation-reports.html>Search in Google Scholar
Xu, J.J., 2016. Are blockchains immune to all malicious attacks? Financial Innovation, 2(25). https://doi.org/10.1186/s40854-016-0046-5.XuJ.J.2016. Are blockchains immune to all malicious attacks?Financial Innovation, 2(25). https://doi.org/10.1186/s40854-016-0046-5.Search in Google Scholar
Zio, E., 2018. The future of risk assessment. Reliability Engineering & System Safety, 177, pp. 176-190. https://doi.org/10.1016/j.ress.2018.04.020ZioE.2018. The future of risk assessment. Reliability Engineering & System Safety, 177, pp. 176-190. https://doi.org/10.1016/j.ress.2018.04.020Search in Google Scholar
Zubaydi, H.D., Varga, P. and Molnár, S., 2023. Leveraging Blockchain technology for ensuring security and privacy aspects in internet of things: A systematic literature review. Sensors, 23(2). https://doi.org/10.3390/s23020788.ZubaydiH.D.VargaP.MolnárS.2023. Leveraging Blockchain technology for ensuring security and privacy aspects in internet of things: A systematic literature review. Sensors, 23(2). https://doi.org/10.3390/s23020788.Search in Google Scholar
Zwęgliński, T., Smolarkiewicz, M. and Gromek, P., 2020. Efekt kaskadowy współczesnym wyzwaniem zarządzania kryzysowego (The cascading effect a modern challenge of crisis management). Szkoła Główna Służby Pożarniczej, ISBN 978-83-957235-9-9.ZwęglińskiT.SmolarkiewiczM.Gro-mekP.2020. Efekt kaskadowy współczesnym wyzwaniem zarządzania kryzysowego (The cascading effect a modern challenge of crisis management). Szkoła Główna Służby Pożarni-czej, ISBN 978-83-957235-9-9.Search in Google Scholar