A Worrying Present and an Uncertain Future. Challenges for Security in Central and Eastern Europe Region
Summary
Excerpt
Table Of Contents
- Cover
- Title Page
- Copyright Page
- Table of Contents
- List of Figures
- List of Tables
- Introduction (Agnieszka Kampka and Wojciech Mincewicz)
- References
- Defense Preparedness Against Russian Military Aggression. Strategic Challenges for Poland and the Baltic States (Eugeniusz Cieślak and George Spencer Terry)
- 1. Introduction
- 2. Shared Challenges
- 2.1. Geography, Institutions, and Allies
- 2.2. Defense Policies and the Development of the Armed Forces
- 2.3. Non-Military Preparations
- 2.4. Defense Budgets
- 3. Inverse Challenges in a Status Quo or a Negotiated Settlement
- 4. Conclusions
- References
- Challenges to Epistemic Rights in the Era of AI: (Re)mediation(s) of Russian-Ukrainian War (Katarzyna Molek-Kozakowska)
- 1. Introduction
- 2. Epistemic Rights
- 3. Information Security
- 4. Study Design of Using ChatGPT to Represent the Ukraine War
- 5. Analysis of Similarities and Differences Across User Profiles
- 5.1. Explaining the Motivations for War
- 5.2. Ascribing Accountability for War
- 5.3. Envisioning the Post-War Future
- 6. Conclusion
- References
- On the Brink of the Third World War: The Russian-Ukrainian Conflict and the Threat of a Global War in Political and Media Narratives (Przemysław Wywiał)
- 1. Introduction
- 2. The Concept of Another World War
- 3. The Russian-Ukrainian War as the Start of the Third World War in Politicians’ Narrative
- 4. The Threat of Global Conflict in the Views of Academics and Analysts
- 5. Analogies to the International Situation in 1939
- 6. Not just Ukraine …
- 7. Conclusion
- References
- Energy Under Fire, Cyberattacks as a New Battlefield (Michał Bukowski)
- 1. Introduction
- 2. Cyberattacks on Ukraine: Methods, Consequences, and Foreign Actors
- 3. Lessons for Poland From the Ukrainian Experience
- 4. Strengthening Defenses Against Phishing
- 5. Developing National Capacity to Respond to Cyberattacks
- References
- Building Climate Resilience With Renewable Energy (Aleksander Wasiuta)
- 1. Introduction: The Importance of Building Climate Resilience
- 2. Changing Climate Conditions as a Global Challenge
- 3. Technological Contributions of Renewable Energy to Climate Resilience
- 4. Challenges of Implementing Renewable Energy
- 5. Technological Innovations Supporting Renewable Energy in Climate Resilience
- 6. Strategic Pathways to Climate Resilience Through Renewable Energy
- 7. Synergies Between Renewables and Other Adaptive Actions
- 8. Future Directions for Research and Policy
- 9. Conclusion and Takeaways
- References
- Security and Climate in the Political Parties Manifestos (Piotr Swacha and Renata Putkowska-Smoter)
- 1. Introduction
- 2. Linking Climate With Security
- 3. Climate Policy and the Polish Political Parties
- 4. Climate Securitization/Desecuritization in Manifestos of Polish Political Parties
- 5. Social Network of Climate-Related Political Message
- 6. Conclusions
- References
- Energy Security and Transition—Spatial Analysis of Energy Infrastructure Vulnerability to Flood Hazards (Grzegorz Kunikowski)
- 1. Introduction
- 2. Literature Review
- 3. Materials and Methods
- 4. Results
- 5. Discussion and Conclusions
- 6. Limitations of the Study and Interpretational Implications of the Results
- 7. Summary
- Declaration of Generative AI in Scientific Writing
- References
- Paperless Money: How the Disappearance of Cash Is Changing the State and Society—Trend Analysis. Facing the Consequences of Transformation (Wojciech Mincewicz)
- 1. Introduction
- 2. Material and Methods
- 3. From Cash to Digital Currencies—Trend Analysis
- 4. In Search of an Alternative—the Development of Virtual Currencies
- 5. Discussion and Conclusions
- 5.1. Global Trend of Digitization of Payments vs. Regional Differences
- 5.2. Impact of COVID-19 Pandemic on Accelerating Digitization of Payments
- 5.3. Financial Exclusion and the Cashless Society
- 5.4. Cryptocurrencies and CBDC as Alternative Forms of Value Exchange
- 5.5. Political and Economic Consequences of Digitization of Money
- References
- Demographic Challenges in the Context of Aging Societies and Migration: Analysis of Risk Parameters of Selected Countries (Janusz Gierszewski and Marek Bednarz)
- 1. Introduction
- 2. Theories of Aging Societies and Migration
- 3. Risk Parameters
- 4. Aging Societies in Selected EU Countries
- 5. Emigration to Selected EU Countries
- 6. Conclusions
- References
- Healthy and Safe Aging of Seniors in Poland—Challenges Related to Institutional and Informal Care (Małgorzata Herudzińska and Izabela Podobas)
- 1. Introduction
- 2. Challenges Related to the Care of the Elderly—the Healthcare System in Poland
- 3. Challenges Related to Caring for the Elderly—Informal Care
- 4. Summary. Is Old Age (Not) Safe?
- References
- The Issue of Risk Perception by the Academic Community as a Significant Social and Educational Challenge (Joanna Sadłowska-Wrzesińska and Michał Skwierczyński)
- 1. Introduction
- 2. Materials and Methods
- 3. Results
- 3.1. Analysis of Responses Regarding the Sense of Security
- 3.2. Evaluation of Evacuation Procedures
- 3.3. Awareness and Identification of Potential Threats in the Building
- 4. Discussion
- 5. Conclusion
- References
- Administration and Politics (Jacek Zieliński and Sylwia Zakrzewska)
- 1. Introduction
- 2. Legal Aspects of Coexistence
- 3. Coming Back to the Mainstream of Considerations
- 4. Filling Managerial Positions in Administrative Departments
- 5. Conclusion
- References
- Fear in the Digital Age: A Focus Group Study on Young People’s Responses to Visual Content on Social Media (Marcin Kesler, Iga Szymańska, Wiktoria Ługowska, and Oliwia Chomontowska)
- 1. Introduction: Purpose and Rationale of the Study
- 2. Research Method and Procedure
- 3. Topics of Fear-Inducing Messages
- 4. Context of Messages
- 5. Reactions to Fear-Inducing Messages
- 6. Conclusions and Discussion
- References
- Security Challenges in a Changing World: Preliminary Results of a Quantitative Study (Wojciech Mincewicz, Filip Marć, Dominika Kliszczak and Zuzanna Pietrucha)
- 1. Introduction
- 2. Methodology of the Survey
- 3. The Essence and Role of Preliminary Research in the Project
- 4. Security Challenges: Trying to Identify
- 5. General Assumptions of the Quantitative Study and Partial Results
- Military Security
- Subjective Assessment
- Assessment of the Reality of the Threat
- Political Security
- Subjective Assessment
- Assessment of the Reality of the Threat
- Economic Security
- Subjective Assessment
- Assessment of the Reality of the Threat
- Demographic and Social Safety
- Subjective Assessment
- Assessment of the Reality of the Threat
- Cultural Safety
- Subjective Assessment
- Assessment of the Reality of the Threat
- Environmental Safety
- Subjective Assessment
- Assessment of the Reality of the Threat
- Security in Cyberspace
- Subjective Assessment
- Assessment of the Reality of the Threat
- 6. Discussion and Conclusions
- References
List of Figures
Figure 6.1: A bimodal network indicates the connections between the manifestos of individual parties in particular years and the use of chosen, climate-related discourses
Figure 7.1: Population in communes and power plants and transmission networks
Figure 7.2: Power plants at risk of river flooding 0.2%
Figure 7.3: Flood risk of CHP installations for the risk of river flooding in the event of flood embankment destruction
Figure 7.4: Flood risk of the analyzed small photovoltaic installations for the risk of river flooding 0.2%
Figure 7.5: Highest voltage networks at risk of river flooding 0.2%
Figure 7.6: High-voltage networks at risk of river flooding 1%
Figure 9.1: Correlation matrix of demographic variables
Graph 1: The distribution of respondents’ answers regarding potential threats at the university
List of Tables
Table 6.1: Distribution of climate/energy and environment-related text fragments by year and party
Table 6.2: Distribution of climate-related text fragments by discourse type
Table 6.3: The occurrence of codes
Table 6.4: The SNA analysis of retrieved quasi-sentences on climate
Table 7.1: GIS project structure with data sources
Table 7.2: Characteristics of electricity networks in Poland
Table 7.3: Characteristics of the analyzed energy infrastructure facilities
Table 7.4: Results of the assessment of the vulnerability of energy facilities to flood hazards (number of facilities/lengths in km)
Table 7.5: Object vulnerability assessment results expressed in percentages
Table 8.1: Share of digital payments in total transactions
Table 8.2: Share of cash in total transactions
Table 9.1: Types of challenges related to the aging population and their assigned effects and risk parameters
Table 9.2: Migration and age structure in selected European countries
Table 9.3: Descriptive statistics for selected EU countries
Table 9.4: Correlations between variables
Table 9.5: Demographic data of selected EU countries (2022)
Table 9.6: Correlation matrix of demographic variables
Table 9.7: Legal and illegal migration in the European Union over the past decade
Table 9.8: Migration rate in relation to the total population in selected EU countries (2022)
Table 9.9: Number of refugees in relation to the total population in selected EU countries (2022)
Table 9.10: Challenges to social security related to migration
Table 9.11: EU countries and the risks associated with aging society and migration
Table 11.1: Legend for converting the Likert scale to school grades
Table 11.2: Summary of mean scores for all respondent groups on the sense of security at the faculty of management engineering, Poznań University of Technology
Table 11.3: Summary of average ratings for all respondent groups at the faculty of management engineering, Poznań University of Technology, regarding the sufficiency of current evacuation procedures
Table 11.4: Faculty of management engineering, Poznań University of Technology, regarding whether they believe there are other hazards besides fire that require evacuation
Table 11.5: Most frequently identified threats by respondents at the faculty of management engineering, Poznań University of Technology
Table 11.6: Hierarchy of respondents’ declarations at the faculty of management engineering, Poznań University of Technology, regarding the three most likely threats
Table 14.1: Reliability analysis of subjective assessment measures
Table 14.2: Analysis of the reliability of the assessment of the reality of the threat metrics
Table 14.3: Subjective assessment of the threat
Table 14.4: Assessment of the reality of the threat
Introduction
The strength of the primacy of the United States of America since the end of the Cold War has ensured peace and security for Europe. The defeat in the systemic war of the military and economic hegemon determines the collapse of the liberal American primacy and, thus, the current security architecture. The new era initiated by the armed aggression of the Russian Federation against Ukraine in 2022, the next chapter of which was the election of Donald Trump as the 47th President of the United States, will mean, among other things, the restoration and legitimization of the instrument of force as a political tool in relations between states. One of the basic functions of the state as an institution, described and defined in the scientific literature at least since the time of Thomas Hobbes, is to ensure security for all citizens, identifying them with the military dimension of threats. The concept of security understood in this way is narrowly limited. It is synonymous with certainty and lack of physical danger or protection against it (Zięba, 1999, p. 27). The very need to ensure it is dynamic, which means that security is understood as a process in which the desired state is subject to changes in accordance with the natural evolution of its conditions. The change in the security environment associated with the new order emerging in the third decade of the twenty-first century means that it is necessary to refer to the processual understanding of security (Koziej, 2011, p. 18). In dynamic terms, security will be identified with the continuous activity of individuals, the state and international organizations in creating the desired state of security. Security, perceived in the time perspective as the process of its acquisition and securing the expected state, understood as a human need in Abraham Maslow’s view, will include the satisfaction of such needs as existence and survival.
This is the so-called negative, primary understanding of the term security. Over the years, the security category has evolved to gain a new meaning at the end of the twentieth century. At that time, new security aspects were formed and developed, supported by economic, cultural and ecological factors (Kukułka, 1994, p. 67). This is one of the reasons why the concept of political, economic, social, ecological, energy, cultural, social and health security has developed and then developed in the academic debate. The multidimensional aspect of security today, which refers to successive state functioning sectors, is the so-called objective approach. It concerns various spheres of the functioning of the state, protected values and directions of functioning of the individual (Kitler, 2011, pp. 50–52). The object of security in the new, contemporary dimension is the human being but perceived in the system of collective space as a member of organized macro-, meso- and microspatial structures. The change of orientation and the expansion of interest in security to other areas results from the role of the modern state as a stabilizer of internal law and order, as well as the development of the socioeconomic and care and development functions. In this way, a positive approach to security was developed, where to the traditional components of existence and survival were added peace, independence, possession and certainty of undisturbed development. However, it is worth pointing out that these are not equivalent components in creating (ensuring) safety. For example, ensuring the inviolable survival of a given entity gives the possibility of physical survival. The positive approach perceives security from the perspective of actively shaping the certainty of survival, the possession of fundamental values and the freedom of development of a given entity.
The basic step in the process of creating a security state is to determine the nature of threats. A number of non-military threats can be listed and defined, and they have become a part of both the state and individual groups of citizens, social groups, or communities living in a specific area. Examples of those occurring today with particular intensity include migration, demographic and economic crisis, disinformation, social inequalities, climate change, natural disasters, environmental pollution, shortages in access to basic resources such as water, and the development of dangerous and destructive technologies. Their occurrence results from the lack of a sense of security in individual spheres of the functioning of the state and man. Threats cause anxiety or fear in individuals of varying intensity, including terror and incapacitation, or a reflex or conscious desire to counteract.
In parallel to security threats, challenges are analyzed as a second phenomenon with a negative connotation. While threats are factors that undermine the actions of the state and the individual aimed at maintaining or ensuring security, challenges refer to situations where inalienable needs arise and the actions of the entity are necessary to achieve the desired state (Pokruszyński, 2010, p. 10). Security challenges are, therefore, understood as new situations that require the interest of the security subject, the formulation of responses and the taking of actions to be counteracted (Zięba, 2016, p. 11) subject to permanent redefinition and evolution. Taking up challenges will often be positive because it does not mean eliminating actions, that is, negative ones. In positive terms, identifying challenges allows us to predict potential threats, design a strategy, and thus minimize the risk of their occurrence.
On the other hand, when challenges become threats, it is necessary for security entities to take negative, eliminating, and then positive actions, that is, preventive actions against the recurrence or accumulation of threats (Zięba, 2012, p. 13). Security challenges can be internal or external. They are related, for example, to geographical location, processes taking place in the international environment, cultural differences, climate change or instability of the economic situation or social processes. Challenges are usually dynamic, and the direction of change is not clear. Therefore, the analysis of challenges, mainly because of the dynamics of changes in the security infrastructure, is legitimate and necessary.
The publication A Worrying Present and an Uncertain Future. Challenges for Society and Security in Central and Eastern Europe Region is designed to meet the demand for interdisciplinary studies on security challenges in the modern world. The publication, which consists of 14 chapters, indicates contemporary challenges in the area of security selected by the authors.
The topic of the war in Ukraine dominates the study of security in Central and Eastern Europe. Several of the first chapters of our collection are dedicated to this issue. Eugeniusz Cieślak and George Spencer Terry (Defense Preparedness Against Russian Military Aggression. Strategic Challenges for Poland and the Baltic States) discuss the consequences of various scenarios for ending or freezing the Russian-Ukrainian conflict. What challenges will the Baltic states face if they want to increase their defense capabilities? What structural, institutional and economic challenges will they have to face? Does the shared experience and similar situations open up opportunities for co-operation between the Baltic states and create a chance for better preparation?
While the first chapter focuses on the material dimension of security, the chapter by Katarzyna Molek-Kozakowska (Challenges to Epistemic Rights in the Era of AI: (Re)mediation(s) of Russian-Ukrainian War) deals with issues concerning the cognitive dimension of security. The author describes an example of ChatGPT’s interpretation of information about the conflict in Ukraine. Depending on user preferences, the chat gives different answers, explaining the causes of the outbreak of the conflict, the parties to the conflict and their goals in various ways. These differences raise questions about digital and media literacy as a key challenge for information security.
Przemysław Wywiał also writes about the importance of interpretation (On the Brink of the Third World War: The Russian-Ukrainian Conflict and the Threat of a Global War in Political and Media Narratives). The author analyses statements made by political leaders and journalistic reports that refer to World War III. He traces narrative strategies that interpret current events as a harbinger of the outbreak of another global conflict or as the beginning of one.
Details
- Pages
- 326
- Publication Year
- 2025
- ISBN (PDF)
- 9783631925492
- ISBN (ePUB)
- 9783631941225
- ISBN (Hardcover)
- 9783631925485
- DOI
- 10.3726/b23139
- Language
- English
- Publication date
- 2026 (January)
- Keywords
- Security studies Risk society War and conflict Russia-Ukraine war Cyber threats AI and society Climate risk Demographic change Political communication Energy transition Trust Web 3.0 Digital fear Resilience Interdisciplinary research
- Published
- Berlin, Bruxelles, Chennai, Lausanne, New York, Oxford, 2025. 326 pp., 9 fig. b/w, 32 tables.
- Product Safety
- Peter Lang Group AG