Journal articles on the topic '940301 Improving Defence and Security'

To see the other types of publications on this topic, follow the link: 940301 Improving Defence and Security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic '940301 Improving Defence and Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Saragih, Herlina JR, Rayanda Barnas, and Purwanto Purwanto. "Defense Management concepts improving Indonesian Maritime Security." Jurnal Pertahanan 2, no. 3 (September 29, 2016): 257. http://dx.doi.org/10.33172/jp.v2i3.104.

Full text
Abstract:
This study aimed to analyze the concept of Indonesian Defence Management in the 21st century in the context of Indonesian Maritime Security and to determine the readiness of defence management capabilities in facing threats. Research method used is descriptive qualitative with data collection methods through in-depth interview and documentation. The results showed that in order to improve maritime security in Indonesia has not been implemented in a structured and comprehensive defense in accordance with the management perspective of the countries more advanced, especially on defense preparedness in logistics management such as the management and alutsista availability owned Indonesia
APA, Harvard, Vancouver, ISO, and other styles
2

Dorosh, Lesia, and Vasyl Romanyk. "PESCO, CARD, EDF: Strategy, Analysis, and Financing in the European Union Security Guaratee." Humanitarian vision 6, no. 2 (November 25, 2020): 1–7. http://dx.doi.org/10.23939/shv2020.02.001.

Full text
Abstract:
In the article the authors analyze the institutional basis for strengthening the EU security and the implementation of specific projects designed to expand cooperation between the Member States in the defence and security sectors. The point at issue is about Permanent Structured Cooperation (PESCO); the Coordinated Annual Review on Defence (CARD) and the European Defence Fund (EDF). The relevance of the comprehensive study of PESCO, CARD, EDF, which activities are aimed at ensuring the strategic component of cooperation, the analysis of the defence sector and funding priorities in the security sphere of the Union have been proved. The authors claim that PESCO has become a key strategic initiative of the EU, CARD allows coordinating the development of military capabilities in the Member States; the EDF was created to coordinate, increase investment and improve defence interoperability between EU member states. The challenges faced within the functioning of these initiatives have been analyzed. It is alleged that a key challenge for the CARD is the unwillingness of Member countries to share national defence plans, as well as the available and potential coordination and harmonization of defence planning within NATO’s Defence Planning. The peculiarities of specific projects financed within the European Defense Fund (“Ocean 2020”, “Eurodrone”, “SPIDER”, “EuroSWARM”, “TRAWA”, “ACAMSII”, “Gossra”, “Vestlife”) have been analyzed. There is continued progress in the field of the EU security and defence: numerous defence projects have been initiated under PESCO; there is a synchronization of defence planning through the CARD; the investments in defence are stimulated by financing the defence research projects through the EDF, the improving military mobility is continuing; coordination of the EU-NATO cooperation is improving, etc.
APA, Harvard, Vancouver, ISO, and other styles
3

Fiott, Daniel. "Improving CSDP Planning and Capability Development: Could there be a ‘Frontex Formula’?" European Foreign Affairs Review 18, Issue 1 (February 1, 2013): 47–62. http://dx.doi.org/10.54648/eerr2013003.

Full text
Abstract:
The newly agreed operational rules for Frontex allows the Agency to, among other things, buy or lease its own equipment for missions and/or to do so in co-ownership with the Member States and to request national seconded staff for its operations. The new rules are a major step forward in further developing Frontex's resources. Yet this progress has not been matched, despite the Lisbon treaty's protocol on Permanent Structured Cooperation, and in light of the defence budget cuts being made in many European Union (EU) Member States, when it comes to the Common Security and Defence Policy (CSDP). This article asks why, given that each policy area is ultimately aimed at the defence and security of the EU, are the innovations that have been agreed for Frontex not equally applicable to CSDP? Why have Member States increased cooperation under Frontex without equivalent or similar progress under the CSDP? This article aims to shed light on the differences and similarities of the two policy domains in order to see if a 'Frontex formula' could be applicable to the CSDP
APA, Harvard, Vancouver, ISO, and other styles
4

BROŽIČ, LILIANA. "SECURITY AS AN IMPERATIVE." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2017, ISSUE 19/1 (May 15, 2017): 11–13. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.19.1.00.

Full text
Abstract:
In 2017, the publication Contemporary Military Challenges entered its nineteenth year of existence, which reminds us of an important anniversary coming up in 2018. The first issue was published in September 1999 under the name of Bulletin of the Slovenian Armed Forces. From then until the end of last year, 18 volumes of the publication included 438 articles by 564 authors. There were 289 authors from the Slovenian Armed Forces and 48 authors from the administrative part of the Ministry of Defence; 161 authors were from different institutions and 66 authors from abroad. This year, we will focus on topical issues, which will, hopefully, be of interest to our readers and will motivate you to open discussions, reflect upon and perhaps even write about your views on the emergence of new security as an imperative for the future. This year's second issue titled Veteran organizations – are they even needed will be released in English. Since this topic has never before been discussed in our publication, it is perhaps time that we speak about it and share experiences of different countries. This year’s third issue titled Migrations and security on the Old Continent will also be published in English. It will be dedicated to the unstable Middle East, terrorism in Europe and national experiences with migration. Special focus will be put on the migration flows from autumn 2015 to spring 2016 as well as to the Europe's response to them. The title of the fourth issue will be Security forces of the future. It will focus on the way forward in ensuring safety. Some of the topical issues will certainly include the new old ways of manning the armed forces, achieving capability targets and international operations and missions. This year also marks 20 years since members of the Slovenian Armed Forces have joined an international operation for the first time. It was Operation Alba in Albania. Since then, they have participated in numerous operations and missions throughout the world. The 2017 will undoubtedly also be marked by the findings of the 2016 Strategic Defence Review, and the tasks arising from it. The chapter referring to the strengthening of the defence capability and resilience defines the primary objective of further development of the defence system and defence capacity of the Republic of Slovenia, which arises from the findings of the strategic review. The authors of the document classified them as follows: provision of the country’s defence capabilities, enhancing the resilience of the state and society to security threats, improving the preparedness and sustainability of the Slovenian Armed Forces, and achieving of common goals and commitments in the framework of the EU and NATO. It is our firm belief that the articles in this issue of the Contemporary Military Challenges titled Security as an imperative can contribute to the goals set out in the Strategic Defence Review.
APA, Harvard, Vancouver, ISO, and other styles
5

Zaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 5 (November 17, 2021): 42–68. http://dx.doi.org/10.33731/52021.244518.

Full text
Abstract:
Keywords: defense capability, intellectual property, regulatory support The conceptual issues of the legislation of Ukraine,which determine the state policy in the field of national security and defence, regardingthe settlement of issues related to ensuring the state defence capabilities are considered.The scientific publications on actual questions in this sphere concerningproblems and prospects of increase of defence capability of Ukraine are analysed.The role of intellectual property in all components of Ukraine's defence system hasbeen studied, and it has been noted that unresolved problems in the field of intellectualproperty management pose an increasing threat to Ukraine's national security.The importance of ensuring the protection of intellectual property in the process ofimplementing measures to improve the defence capabilities of the state and the needto improve legislation in this area is defined. Recommendations for improving the regulatory framework for national securityand defence in order to address the problematic issues of intellectual property in thisarea are submitted.State defence capability is the ability of state to defend itself in the event of armedaggression or armed conflict. It consists of material and immaterial elements and is aset of military, economic, social and moral and political potential in the field of defenceand appropriate conditions for its implementation.Resolving the issues of reforming not only the Armed Forces of Ukraine, but firstthe entire state, modernization and rearmament of the Ukrainian army has become avital necessity. Only the solution of this issue will allow to raise the defence capabilityof our state to the proper level for the preservation of independent Ukraine.Ensuring the military security of Ukraine largely depends on equipping the ArmedForces of Ukraine with modern types and models of weapons and military equipment,developed on the basis of intellectual property rights.It is the military-technical sphere where the objects of intellectual property rightsbelonging to the sphere of national security and defence are created, and the state isobliged to ensure their protection. This will increase the competitiveness of the domesticdefence industry and make claims impossible for anyone in the mass productionof weapons and military equipment for their own needs and for exports, which directlyaffects defence capabilities.And this requires proper protection of intellectual property rights both in theprocess of own production of weapons and military equipment, as well as in militarytechnicalcooperation.
APA, Harvard, Vancouver, ISO, and other styles
6

Zaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 4 (October 25, 2021): 33–53. http://dx.doi.org/10.33731/42021.243120.

Full text
Abstract:
Keywords: defense capability, intellectual property, regulatory support The conceptual issues of the legislation of Ukraine,which determine the state policy in the field of national security and defence, regardingthe settlement of issues related to ensuring the state defence capabilities are considered.The scientific publications on actual questions in this sphere concerningproblems and prospects of increase of defence capability of Ukraine are analysed.The role of intellectual property in all components of Ukraine's defence system hasbeen studied, and it has been noted that unresolved problems in the field of intellectualproperty management pose an increasing threat to Ukraine's national security.The importance of ensuring the protection of intellectual property in the process ofimplementing measures to improve the defence capabilities of the state and the needto improve legislation in this area is defined.Recommendations for improving the regulatory framework for national securityand defence in order to address the problematic issues of intellectual property in thisarea are submitted.State defence capability is the ability of state to defend itself in the event of armedaggression or armed conflict. It consists of material and immaterial elements and is aset of military, economic, social and moral and political potential in the field of defenceand appropriate conditions for its implementation.Resolving the issues of reforming not only the Armed Forces of Ukraine, but firstthe entire state, modernization and rearmament of the Ukrainian army has become avital necessity. Only the solution of this issue will allow to raise the defence capabilityof our state to the proper level for the preservation of independent Ukraine.Ensuring the military security of Ukraine largely depends on equipping the ArmedForces of Ukraine with modern types and models of weapons and military equipment,developed on the basis of intellectual property rights.It is the military-technical sphere where the objects of intellectual property rightsbelonging to the sphere of national security and defence are created, and the state isobliged to ensure their protection. This will increase the competitiveness of the domesticdefence industry and make claims impossible for anyone in the mass productionof weapons and military equipment for their own needs and for exports, which directlyaffects defence capabilities.And this requires proper protection of intellectual property rights both in theprocess of own production of weapons and military equipment, as well as in militarytechnicalcooperation.
APA, Harvard, Vancouver, ISO, and other styles
7

POPIEL, Henryk, Bogusław ROGOWSKI, and Krzysztof WALCZAK. "POLISH DEFENSE STANDARDS WITHIN THE EUROPEAN RANGE." National Security Studies 5, no. 1 (May 15, 2014): 311–20. http://dx.doi.org/10.37055/sbn/135200.

Full text
Abstract:
The article is an account of activities conducted in the field of standardization related to State defence and security for the development of military standards in the area of water supply for forces in field conditions. This adheres to the level of European defence standardization procesess. Thus, a type of summary has been presented of this not so popular case, when – for the very first time in the history of Polish military standardization – national defence standards have become the standards within the European range. What has been pointed out in this aspect is the importance and the need to promote – in a similar way – the achievements of military standardization in other areas of social and economic life, especially in the field of State defence and security, as well as anywhere where Poland has a potential and considerable achievements on a global scale. Such actions – except for a considerable contribution to improving a positive image of Poland in international relations – may be one of the ways to gain a more effective access to information and markets, education and development.
APA, Harvard, Vancouver, ISO, and other styles
8

Zaikivskyi, Oleksandr, and Oleksandr Onistrat. "Regulatory and legal support of intellectual property protection in the defense sphere (in the development of armaments and military equipment; in the implementation of international military- technical cooperation)." Theory and Practice of Intellectual Property, no. 6 (December 27, 2021): 49–67. http://dx.doi.org/10.33731/62021.248981.

Full text
Abstract:
Keywords: defence capability, intellectual property, regulatory and legal support,armament and military equipment, military-technical cooperation The condition of regulatory and legal support of defencecapability of Ukraine and problems concerning protection of intellectual propertyand protection of state interests in this sphere are investigated. The importance ofprotection of intellectual property rights to ensure the enhancement of the state's defencecapabilities is noted.Ensuring Ukraine’s defence capability largely depends on equipping the ArmedForces of Ukraine with modern types and models of armaments and military equipmentdeveloped on the basis of the intellectual property rights.It is the military-technical sphere where the objects of intellectual property rightsbelonging to the sphere of national security and defence are created, and the state isobliged to ensure their protection. This will increase the competitiveness of the domesticdefence industry and make it impossible for anyone in the mass production ofarmaments and military equipment for their own needs and for exports, that directlyaffects defence capabilities.This requires proper protection of intellectual property rights both in the processof own production of weapons and military equipment, and in military-technical cooperation.The legislation of Ukraine on national security and defence determines the need touse scientific and technical achievements and the introduction of new technologies toincrease the state's defence capabilities. However, the issue of intellectual property,which is the basis of these achievements and technologies, is not raised. It is notedonly that the acquisition, security, protection of intellectual property rights to scientificand technical (applied) results are carried out in accordance with the law, and incase of infringement of intellectual property rights is protected in the manner prescribedby administrative, civil and criminal law.Thus, all issues related to the defence and protection of intellectual property rightsmust be resolved within the framework of special legislation on intellectual property.Recommendations for improving the regulatory and legal support of Ukraine's defencecapabilities with a purpose of solution of intellectual property issues in this areaand compliance with national interests and security of the state on intellectual propertyrights in the development of armaments and military equipment, as well as internationalmilitary-technical cooperation were submitted.
APA, Harvard, Vancouver, ISO, and other styles
9

Davis Cross, Mai’a K. "The European Defence Agency and the Member States: Public and Hidden Transcripts." European Foreign Affairs Review 20, Special Issue (July 1, 2015): 83–102. http://dx.doi.org/10.54648/eerr2015026.

Full text
Abstract:
The European Defence Agency (EDA) was founded in 2004 with the aim of improving the EU’s defence capabilities through promoting collaboration, common initiatives, and innovative solutions to the EU’s security needs. This article examines the nature of the relationship between European Union Member States and the EDA a decade after its founding. The agency has solidified a clear body of norms that it seeks Member States to implement. To a surprising extent, Member States have publically embraced these norms as necessary for the future viability of European security. But they at the same time resist implementing these norms in certain fundamental ways. Building upon the framework article of this special issue, the author applies the concepts of ‘public’ and ‘hidden’ transcripts to shed light on how Member States simultaneously embrace and resist norms in a climate of supranational pressure.
APA, Harvard, Vancouver, ISO, and other styles
10

Kosmacz-chorodowska, Anna. "Improving management in favour of defence and security on the basis of e-economy tools." Scientific Papers of Silesian University of Technology. Organization and Management Series 2018, no. 128 (2018): 231–42. http://dx.doi.org/10.29119/1641-3466.2018.128.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Bogdanov, Plamen. "Perspectives and development of the Bulgarian military-educational system." Scientific Journal of the Military University of Land Forces 197, no. 3 (September 11, 2020): 489–500. http://dx.doi.org/10.5604/01.3001.0014.3921.

Full text
Abstract:
The report presents all the current challenges which the Bulgarian military-educational system is facing in the context of the basic features of the security environment and trends for the first half of the 21th century by identifying the main problem areas in its functioning. The status and capabilities of the military-educational system of the Republic of Bulgaria are discussed on the basis of an analysis of key strategic documents in the sectors of education, security and defence, as well as the current state of military and civil education and the inherent activities of the training institutions. Outlined are the basic principles of construction and operation of military-educational systems and the fundamental strategic goals and tasks according to modern strategic security environment and dynamically changing conditions in NATO and the EU. Described are the main elements of the military-educational system as a complex, adaptive and flexible system that develops in unity and complementarity with the system of civil education in Bulgaria. Guidelines are formulated for improving the military educational system in relation to its contribution to strengthening national security and defence of the country in three directions – conceptual, organizational and technological improvement.
APA, Harvard, Vancouver, ISO, and other styles
12

D'Almeida, Irina Bratosin, Rebekka Haffner, and Corinna Hörst. "Women in the CSDP: Strengthening the EU's Effectiveness as an International Player." European View 16, no. 2 (December 2017): 313–24. http://dx.doi.org/10.1007/s12290-017-0467-1.

Full text
Abstract:
Security and defence cooperation in the EU is being upgraded, and therefore the importance of the civilian missions and military operations launched in the framework of the Union's Common Security and Defence Policy (CSDP) is likely to increase. This article argues that much can be gained by improving the gender balance in CSDP missions and operations. The participation of female personnel in crisis management has a positive effect on operational effectiveness and contributes to the acceptance of the mission by the local population. Moreover, women deployed abroad play an important role in overcoming gender stereotypes and demonstrating the EU's commitment to gender equality. This article explores the reasons for the low number of women in CSDP missions and operations. It suggests ways to improve the gender balance at the national and EU levels, which would increase the EU's chances of resolving foreign affairs issues abroad.
APA, Harvard, Vancouver, ISO, and other styles
13

Thomson, Catarina P., and David Blagden. "A Very British National Security State: Formal and informal institutions in the design of UK security policy." British Journal of Politics and International Relations 20, no. 3 (July 6, 2018): 573–93. http://dx.doi.org/10.1177/1369148118784722.

Full text
Abstract:
What are the roles of government institutions in the design and implementation of effective national security policy? Using the case of post-2010 reform to Britain’s central government security policy machinery, we find that formal institutions can help the informal strategy-making institutions on their periphery to function better. Through interviews with 25 senior officials, we find that Britain’s National Security Council and quinquennial Strategic Defence and Security Reviews – both instituted in 2010 with the intention of improving UK security policymaking – remain limited as formal makers of national strategy. But the networks of individuals and ideas they support, by absolving some decision-makers of audience costs while immersing others in creative yet coherent strategy-development communities, have improved the overall quality of UK security policymaking compared to its pre-2010 condition. This finding also carries implications for other contexts and thus represents a promising avenue for future research. (Final version accepted 20 June 2018.)
APA, Harvard, Vancouver, ISO, and other styles
14

BROŽIČ, LILIANA. "VARNOST KOT IMPERATIV." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2017, ISSUE 19/1 (May 15, 2017): 7–9. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.19.1.0.

Full text
Abstract:
In 2017, the publication Contemporary Military Challenges entered its nineteenth year of existence, which reminds us of an important anniversary coming up in 2018. The first issue was published in September 1999 under the name of Bulletin of the Slovenian Armed Forces. From then until the end of last year, 18 volumes of the publication included 438 articles by 564 authors. There were 289 authors from the Slovenian Armed Forces and 48 authors from the administrative part of the Ministry of Defence; 161 authors were from different institutions and 66 authors from abroad. This year, we will focus on topical issues, which will, hopefully, be of interest to our readers and will motivate you to open discussions, reflect upon and perhaps even write about your views on the emergence of new security as an imperative for the future. This year's second issue titled Veteran organizations – are they even needed will be released in English. Since this topic has never before been discussed in our publication, it is perhaps time that we speak about it and share experiences of different countries. This year’s third issue titled Migrations and security on the Old Continent will also be published in English. It will be dedicated to the unstable Middle East, terrorism in Europe and national experiences with migration. Special focus will be put on the migration flows from autumn 2015 to spring 2016 as well as to the Europe's response to them. The title of the fourth issue will be Security forces of the future. It will focus on the way forward in ensuring safety. Some of the topical issues will certainly include the new old ways of manning the armed forces, achieving capability targets and international operations and missions. This year also marks 20 years since members of the Slovenian Armed Forces have joined an international operation for the first time. It was Operation Alba in Albania. Since then, they have participated in numerous operations and missions throughout the world. The 2017 will undoubtedly also be marked by the findings of the 2016 Strategic Defence Review, and the tasks arising from it. The chapter referring to the strengthening of the defence capability and resilience defines the primary objective of further development of the defence system and defence capacity of the Republic of Slovenia, which arises from the findings of the strategic review. The authors of the document classified them as follows: provision of the country’s defence capabilities, enhancing the resilience of the state and society to security threats, improving the preparedness and sustainability of the Slovenian Armed Forces, and achieving of common goals and commitments in the framework of the EU and NATO. It is our firm belief that the articles in this issue of the Contemporary Military Challenges titled Security as an imperative can contribute to the goals set out in the Strategic Defence Review. Defence planning – vital policy instrument in supporting a nation's defence needs is the title of the article written by Pavel Vuk. In the final part of the article, the author writes that the main question of the politics when discussing future defence needs of a county from the perspective of limited economic ability should always focus on defence planning. It should primarily attempt to find the answer to the fundamental question of whether the proposed plan will offer adequate answers to the future national defence needs.
APA, Harvard, Vancouver, ISO, and other styles
15

Gabrielyan, Hakob. "Gender-Sensitive Approaches in Confidence- and Security-Building Measures." Journal of Political Science: Bulletin of Yerevan University 1, no. 3 (December 29, 2022): 51–59. http://dx.doi.org/10.46991/jops/2022.1.3.051.

Full text
Abstract:
The paper examines the existing issues and proposes new outlook on the solutions for incorporating gender-sensitive approaches in the sphere of arms control and confidence- and security-building measures in Europe (CSBMs). Based on a thorough consideration of the current practices and relevant documentation, the notion of gender-positive approach is introduced, while a set of particular measures for improving gender mainstreaming in the security sector is suggested. To assess adequately the degree of streamlining the OSCE’s gender-related principles at local level and underline the existing gaps between theory and practice, short interviews were conducted with former and current female officers and specialists, engaged in human rights promotion in the defence and security structures. The paper concludes with the diagram offering interconnected steps to the efficient engagement of women in CSBMs.
APA, Harvard, Vancouver, ISO, and other styles
16

Lisovenko, D., and G. Belous. "MILITARY FORCES OF THE ARMED FORCES OF UKRAINE AND NATO AS THE BASIS OF SECURITY AND STABILITY IN THE BLACK SEA REGION." Collection of scientific works of Odesa Military Academy 2, no. 14 (January 25, 2021): 51–58. http://dx.doi.org/10.37129/2313-7509.2020.14.2.51-58.

Full text
Abstract:
The article considers the issue of Cooperation of Ukraine with the North Atlantic Treaty Organization (NATO). Beginning in 2014, Ukraine is actually improving control with the use of international assistance in the security industry and the relevant reporting on operational and tactical levels. General activities of Ukraine and the Alliance in the direction of security and defence, objectives: transformation and strengthening of the national security and defence sector, in relation to the performance of inherent tasks, according to the interests of the country. To ensure regional, large-scale and stable security; to facilitate and improve the development of the Armed Forces of Ukraine; to involve Ukraine in the performance of tasks in accordance with the requirements of the state defence and participation in international operations; to achieve effective compatibility of the Armed Forces of Ukraine in the context of other component parts of defence and security to ensure the performance of tasks in international operations and exercises. After the annexation of the Crimea by the Russian Federation, the Armed Forces of Ukraine received significant assistance in 2014. The priority of joint activities with NATO is primarily to guarantee the alliance of the principle of collective defence, to preserve and strengthen peace and to ensure the prospect of future security. The Alliance's ability to perform strategic tasks depends on a high degree of coordination and planning of compatible actions at the political level of the defence sector. Analysis of the participation of the Naval Forces of Ukraine and the Alliance during joint international exercises and operations, the events of the war in 2014, the military aggression of the Russian Federation, the construction of relations between Ukraine and the United States during the armed conflict, adaptation of NATO standards and principles – a number of issues for the need for rapid solution in turbo mode. Based on the analysis, the authors conclude that it is legitimate and expedient to use and gain experience in the context of the concept of development of the Navy of the Armed Forces of Ukraine. Involvement and participation in multinational military exercises is a set of measures in the context of international military cooperation, which is allowed in conditions as close as possible to combat and real. Comprehensive improvement of the level of combat training of units of the Navy of the Armed Forces of Ukraine during the increase of the level of professionalism, combat readiness and combat ability. The necessity of introduction and application of compatible measures for performance of peacekeeping, humanitarian, search and rescue and other special tasks is the priority of the concept of modern Ukraine. Constant improvement of the combat readiness level in modern conditions is achieved during the international exercises for the necessity and possibility to strengthen the professional experience of partnership, which always fundamentally affects the quality of combat tasks ahead of the number of participants involved in joint activities. Keywords: NATO, Alliance, Ukrainian Navy, Armed Forces of Ukraine, standards, training, security, Charter.
APA, Harvard, Vancouver, ISO, and other styles
17

Lipka, Mirosław. "Civilian CSPD Missions as European Union's Response to International Crises: Selected Aspects of Crisis Management." Security Dimensions 36, no. 36 (July 19, 2021): 64–93. http://dx.doi.org/10.5604/01.3001.0015.0487.

Full text
Abstract:
This article provides an overview of EU Common Security and Defence Policy (CSDP) missions’ crisis management achievements and challenges since 2003, in connection with the European External Action Service (EEAS), the Civilian Planning and Conduct Capability (CPCC) Directorate, and their respective roles. The analysis describes and evaluates the changes in the overall political and security context and the EU’s approach, suggesting some of the consequences in the launch and implementation of civilian CSDP Missions. The article also discusses the evolution of the EU’s integrated approach to external conflict and crises, and its cooperation with other security actors. The concluding remarks compare achievements and shortcomings of ongoing missions against their mandates and objectives, outlining some selected EU initiatives which aim at improving the EU’s performance in crisis management situations.
APA, Harvard, Vancouver, ISO, and other styles
18

Dumić, Aleksandar, and Mitar Kovač. "The impact of the common security and defence policy of the European Union on the security of the Republic of Serbia." Vojno delo 73, no. 2 (2021): 18–30. http://dx.doi.org/10.5937/vojdelo2102018d.

Full text
Abstract:
The answer to transnational and asymmetric threats that are a topical issue on the world geopolitical stage can be found in the integration of national security systems, strengthening multilateral forms of security and the collective system of international security, as the key factors in providing peace, stability and democratic development of modern countries. In such circumstances, the need for a cooperative approach in preserving and improving security, based on cooperation and pooling of security capacities of nation states, is strengthening. This paper views the current achievements of the European Union (hereinafter EU) in terms of implementing its own security policy, primarily in the Western Balkans, in a broader sense, and the specific impact of such a policy on the security of the Republic of Serbia, in a narrower sense. Having in mind the extensive and complex context of the discussed topic, the paper considers, in the authors' opinion, an essential part of this issue, through the analysis of the position of the Republic of Serbia in such context, reviewing the genesis of the EU-Serbia relations and identifying current issues in these relations, and also through the possibilities of progress of cooperation and greater involvement of the capacities of our country in the current EU security policy in this region and beyond.
APA, Harvard, Vancouver, ISO, and other styles
19

Vatamanyuk-Zelinska, Uliana, Victoria Bednarchuk, and Alina Mlintsova. "Financing the needs of the defence sector in Ukraine." INNOVATIVE ECONOMY, no. 7-8 (November 2020): 22–27. http://dx.doi.org/10.37332/2309-1533.2020.7-8.3.

Full text
Abstract:
Purpose. The aim of the article is to comprehensive study of the financing of expenditures for the needs of the defence sector in Ukraine, practical study and analysis of their composition and dynamics for the national security and defence of the state in the ongoing aggression of the Russian Federation. Methodology of research. A set of general scientific research methods was used to achieve the defined goal and objectives, which made it possible to present directions for improving the process of financing the expenditures of the State Budget of Ukraine for the needs of the defence sector. The scientific literature, normative and legislative documents on the topic of scientific research are considered. Thus, descriptive statistics were used in the analysis of data on the amount of financial support for military expenditures from the state budget. A method of comparison was used to identify trends and patterns in the financing of expenditures for the needs of the defence sector of the state. It allowed to identify the dynamics of defence expenditures on their functional basis. With the help of a systematic approach it was possible to study the patterns of financing the expenditures of the Ministry of Defence of Ukraine and to identify the need to provide budget funds for innovative developments and capital investments in the production of military equipment and military education. Methods of classification (typology) were identified to systematize the factors that have a significant impact on strengthening the defence and national security of Ukraine, and thus on the social and economic development of our state. Findings. The main reasons for the reduction of funding for expenditures for the needs of the defence sector in Ukraine are identified, which are primarily: the lack of budget requests from the Ministry of Defence of Ukraine, which are not registered by the State Treasury Service of Ukraine; imperfection of the legal and regulatory framework in the field of financing military expenditures in relation to their ratio to GDP; lack of financial component in the strategic plans for the development of the defence complex of Ukraine. This is accompanied by negative social and economic phenomena and a tense political situation in the country due to hostilities in the East. The main directions of solving problems in the field of financing defence expenditures in Ukraine are substantiated, which include: bringing in line with the provisions of certain regulations governing the relationship between expenditures for the needs of the defence industry and GDP; establishing the projected amounts of expenditures for the medium and long term, providing for their mandatory amounts in the financial component of the documents on the strategic planning of the development of the defence-industrial complex of Ukraine; increase in capital transfers of the special fund of the State Budget of Ukraine to finance the needs of the state defence sphere, taking into account the need for innovative developments and capital investments in the production of military equipment; formation of the state order for the industrial enterprises of machine-building branch, capable to make accessories for needs of a defence industrial complex; reducing corruption by ensuring greater transparency in the governance of military authorities and the implementation of NATO procedures, principles and standards. Originality. The directions of improvement of practical approaches in the field of management of budgetary funds directed on financing of the defence sphere in Ukraine are singled out. Practical value. The results of scientific research can be implemented in the activities of public administration in terms of the use of measures of operational management of public expenditures on defence and national security in a military conflict. Key words: state budget, expenditures, budget request, functional classification of expenditures, military activity, national security.
APA, Harvard, Vancouver, ISO, and other styles
20

Kárász, Balázs, and Imre Négyesi. "Information Security Responsibilities of Critical (Information) Infrastructures in the Aspect of Human Risk Factors." Hadtudományi Szemle 13, no. 3 (2020): 71–86. http://dx.doi.org/10.32563/hsz.2020.3.6.

Full text
Abstract:
With regard to the threats of information society nowadays, the digital asset management and the safety of the related information systems as well as critical infrastructure elements became highly important. The defence of cyberspace itself evolved as a social necessity. This paper aims to provide an overview of how each of the occurring human risk factors influence the effectuation of information security purposes of firms and/or organisations operating critical infrastructure or critical information infrastructure, as well as the engineering of their data processing and data analytics procedures. Moreover, the helpful role of the possible methodological toolset (connected to HR, management and risk management) is also assessed in the context of managing and improving information security awareness.
APA, Harvard, Vancouver, ISO, and other styles
21

Zaikivskyi, Oleksandr, and Oleksandr Onistrat. "State national security policy and intellectual property issues." Theory and Practice of Intellectual Property, no. 3 (September 7, 2021): 19–33. http://dx.doi.org/10.33731/32021.239573.

Full text
Abstract:
Keywords: state policy, national security, intellectual property National security (“NS”) of Ukraine is achieved through a balancedstate policy in accordance with accepted doctrines, strategies, concepts and programsin such areas as political, economic, social, military, environmental, scientific andtechnological, information, etc.However, many theoretical and practical issues concerning the definition of thecontent, challenges, tasks and mechanisms of implementation of effective functions ofpublic policy and management decisions for the further development of social processesstill remain insufficiently studied. Therefore, the main tasks of the NS system subjectsare constant monitoring of the impact on NS of processes taking place in variousfields (including intellectual property), forecasting, identifying and assessing possiblethreats, destabilizing factors and conflicts, their causes and occurrence consequences.In particular, the impact on NS (especially on defence capabilities) of the significantdevelopment of intellectual property and the full use of intellectual property rights isnot taken into account at all.State NS policy should include measures to prevent the emergence and neutralizationof sources of threats to NS under the influence of the development of intellectualproperty.Theoretical aspects of the state policy of National Security and Defence of Ukraine(“NSDU”) development are considered. The necessity of current problems definition inthis sphere and the inclusion of intellectual property questions in these processes isinvestigated. It is determined that the effective implementation of the state NS policyis impossible without a comprehensive analysis of intellectual property issues impacton the sphere of the NSDU. The importance of further research on the development ofa unified approach to improving the protection of intellectual property and its determinationas a component of NSDU, the development of appropriate recommendationsto address issues of intellectual property in this area and to neutralize sources ofthreats under the influence of intellectual property in the structure of NSDU.
APA, Harvard, Vancouver, ISO, and other styles
22

Okhrimenko, Ivan M., Nina V. Lyhun, Viktoriia P. Pryimak, Yaroslav I. Korol, and Mykhailo S. Myroshnychenko. "NEGATIVE FACTORS OF MANAGEMENT ACTIVITIES OF THE SECURITY AND DEFENCE SECTOR REPRESENTATIVES AND DIRECTIONS OF THEIR OVERCOMING." Wiadomości Lekarskie 74, no. 4 (2021): 891–95. http://dx.doi.org/10.36740/wlek202104115.

Full text
Abstract:
The aim is to substantiate the expediency of performing physical exercises by representatives of the security and defence sector to reduce the negative impact of management activities factors on their state of health. Materials and methods: The peculiarities of professional activities of 82 officers of the National Police and the Armed Forces of Ukraine, who had military and special ranks of “lieutenant colonel”, “colonel” and held senior positions (heads of faculties, departments, divisions, services and other units) were studied. Research methods: theoretical analysis and generalization of literature sources, pedagogical observation, interviews, questionnaires. Results: It was found that management activities are characterized by a number of negative factors, which negatively affect the body of management level officers. With systematic interference, they significantly worsen the state of officers’ health and negatively affect the effectiveness of their management activities. Conclusions: Physical education has significant potential in improving the efficiency of professional activities of management level officers, strengthening their health and enhancing working ability. The direction of improving physical training of management level personnel is determined as increasing the amount of general physical training, conducting classes with different orientations taking into account the age group, service load and training within the working time pattern.
APA, Harvard, Vancouver, ISO, and other styles
23

Chernysheva, Galina N., Nikolay V. Rogov, and Maria Vyacheslavovna Tkacheva. "Methods for ensuring the reliable fulfilment of state defence orders." Vestnik Voronezhskogo gosudarstvennogo universiteta. Ser.: Ekonomika i upravlenie = Proceedings of Voronezh State University. Series: Economics and Management, no. 3 (September 30, 2021): 94–108. http://dx.doi.org/10.17308/econ.2021.3/3621.

Full text
Abstract:
Introduction. The national security of the Russian Federation, both within the country and externally, is ensured by the development of its military-technical potential. The military-technical potential is viewed as an ability of the state to maintain the armed forces and to provide the army with modern and competitive military equipment. This is performed through state defence orders (SDOs). Taking into account both internal and external factors, it is impossible to fulfil SDOs without a reliable system of contract liabilities. To ensure proper fulfilment of SDOs, it is necessary to consider the following measures: 1) to retain all the liabilities of contracts for the duration of the contracts, i.e. the liabilities of the customer with regard to the financing of SDOs, and the liabilities of the contractor with regard to the production of the military equipment of high quality; 2) to prevent unauthorised use of the financing provided for the SDOs. Purpose. The purpose of our study was to analyse the factors preventing the fulfilment of SDOs and suggest measures for improving the system for managing SDOs and the economic security of defence industry enterprises. Methodology. In our study we used general scientific methods and specific economic analysis methods: systems analysis, time series analysis, modelling, and expert evaluation methods. The analysis was based on Russian and international sources, as well as the regulatory and legal framework concerning SDOs. Results. In our study, we listed and classified the factors preventing the fulfilment of SDOs, and suggested a SDO model in the form of a system of financial relations between entities. To ensure the fulfilment of SDOs, we suggest a series of measures to control the compliance of financial flows and the economic security of defence industry enterprises. Conclusions. The article presents a specific study of financial flows between the key participants of SDOs. The determined problems and suggested measures will help to reduce the risks and ensure the proper fulfilment of SDOs.
APA, Harvard, Vancouver, ISO, and other styles
24

Gupta, Sanjay Mohan, Vandana Pandey, Ankur Agarwal, Basant Ballabh, and Madhu Bala. "Role of DIBER DRDO Technologies in Improving Livelihood Opportunities and Curtailing Migration in Uttarakhand." Defence Life Science Journal 6, no. 2 (June 3, 2021): 187–95. http://dx.doi.org/10.14429/dlsj.6.16229.

Full text
Abstract:
Migration of local population of Uttarakhand (UK) border areas is presently serious issues for national security since; this State is sharing international border (~650 km) with China/Tibet and Nepal. Among the various factors reported for migration, few notables are search for better livelihood, unemployment, difficult remote terrain and poor land connectivity, less productivity from agriculture due to abiotic and biotic stresses etc. Hence, measures to increase the livelihood opportunities in these border areas to curb the problem of migration through intervention of modern agro-animal technologies are essentially required. In this attempt, Defence Institute of Bio Energy Research (DIBER) has already developed various agro-animal mature technologies, in terms of high yielding and genuine quality seed/seedlings, protected cultivation technology, soil-less cultivation technology, angora farming, mushroom cultivation, medicinal and aromatic plants (MAPs) cultivation technology, hydro-fodder, etc that shown great promise and impact in increasing the farm income and livelihood opportunities for civil inhabitants of these marginal regions. This article highlights the DIBER outreach extension efforts for ensuring better livelihood opportunities to farmers of border area and also to curtail migration that will in turn increase strategic support to Army and paramilitary defence forces deployed in three border Distts (Uttarkashi, Chamoli and Pithoragarh) of UK.
APA, Harvard, Vancouver, ISO, and other styles
25

Zhuravel, Valery. "NORWAY’s ARCTIC STRATEGY AND SECURITY ISSUES." Scientific and Analytical Herald of IE RAS 23, no. 5 (October 31, 2021): 23–30. http://dx.doi.org/10.15211/vestnikieran520212330.

Full text
Abstract:
The article examines Norway’s Arctic strategy and the country’s policy in the field of defence and security. It is noted that Oslo, among the countries of the Arctic Council, is the leader in the development and further improvement of strategies in the Arctic, taking into account the peculiarities of the country and its northern territories. The country is implementing one of the most innovative economic strategies in the region, developing high-tech sectors of the economy, reducing its dependence on the export of hydrocarbon raw materials, improving the administrative-territorial division of the country in the interests of developing the northern provinces. Attention is paid to the development of the industrial sector of the economy, transport (primarily port) infrastructure, scientific and educational complexes, Arctic tourism and recreational business, migration policy and support of the indigenous population. The author pays special attention to Norway’s place in NATO, noting that the North of Norway is becoming one of Scandinavia’s most militarised regions. It is emphasised that this greatly hinders international cooperation with the closest neighbours, primarily with Russia. It is necessary to seek to improve relations between our countries, even in the face of the current friction at the interstate level in matters of security and severe contradictions in the area of the Spitsbergen archipelago.
APA, Harvard, Vancouver, ISO, and other styles
26

M., Raymond, and Ibyingibo S. "National Defence Expenditure and Its Implications on Economic Development in Nigeria." African Journal of Economics and Sustainable Development 4, no. 1 (May 7, 2021): 17–31. http://dx.doi.org/10.52589/ajesd-4iwkvnsi.

Full text
Abstract:
The issue of security is presently a critical challenge for the Nigeria State: biggest democracy in Africa as reports of killings are plastered on a daily basis on both print and social media. This is unpalatable for a developing country like Nigeria that has its eyes set on improving the lot of its citizens and becoming a force to reckon with in the global economy. It is on this backdrop that this study set sail to examine the association between national defence expenditure and economic development in Nigeria. The study adopted Ex-post facto research design as the variables- Misery Index, CDEX and RDEX: cannot be manipulated as they are annual time series data sourced from the World Development Indicator and the Central Bank of Nigeria annual report from a period of 38 years covering from 1981 to 2018, which were in turn analyzed using the error correction model (ECM) method of estimation. The result of the Johansen cointegration test revealed that government capital spending on defence, recurrent spending on defence, foreign direct investment and misery index have common trends in the long run. The outcome of the normalized cointegration disclosed a negative and significant relationship between government capital spending on defence and misery index, while a positive and significant long run relationship exists between government recurrent spending on defence and misery index. The short run analysis pointed to a positive and significant relationship between previous year’s misery index and current year’s misery index. The study thus recommended that government defence spending be reassessed to make it development oriented and proper monitoring of defence spending be carried out.
APA, Harvard, Vancouver, ISO, and other styles
27

Miraglia, Armando, and Matteo Casenove. "Fight fire with fire: the ultimate active defence." Information & Computer Security 24, no. 3 (July 11, 2016): 288–96. http://dx.doi.org/10.1108/ics-01-2015-0004.

Full text
Abstract:
Purpose This paper proposes an approach to deal with malware and botnets, which in recent years have become one of the major threats in the cyber world. These malicious pieces of software can cause harm not only to the infected victims but also to actors at a much larger scale. For this reason, defenders, namely, security researchers and analysts, and law enforcement have fought back and contained the spreading infections. However, the fight is fundamentally asymmetric. Design/methodology/approach In this paper, the authors argue the need to equip defenders with more powerful active defence tools such as malware and botnets, called antidotes, which must be used as last resort to mitigate malware epidemics. Additionally, the authors argue the validity of this approach by considering the ethical and legal concerns of leveraging sane and compromised hosts to mitigate malware epidemics. Finally, the authors further provide evidence of the possible success of these practices by applying their approach to Hlux, Sality and Zeus malware families. Findings Although attackers have neither ethical nor legal constraints, defenders are required to follow much stricter rules and develop significantly more intricate tools. Additionally, attackers have been improving their malware to make them more resilient to takeovers. Originality/value By combining existing research, the authors provide an analysis and possible implication of a more intrusive yet effective solution for fighting the spreading of malware.
APA, Harvard, Vancouver, ISO, and other styles
28

Grover, Atul, Lekha Charan Meher, Ranjit Singh, Abhinav Singh, Sudhanshu Tiwari, Sanjai Kumar Dwivedi, and Madhu Bala. "Biofuels for Defence Use: Past, Present And Future." Defence Life Science Journal 4, no. 1 (December 31, 2018): 3–11. http://dx.doi.org/10.14429/dlsj.4.12366.

Full text
Abstract:
Defence sector desires to attain energy self-sufficiency and security. In recent years, emergence of biofuel as an alternative source has raised the hopes of Defence. Ethanol and bio-diesel are currently being used as blends in different parts of the world. While, bio-diesel is mostly being blended in 2-20% in different parts of the world, ethanol blending has reached upto 85%. Owing to the sustainability reasons, the choice of feedstock for ethanol production is gradually changing from corn to lignocelluloses biomass. Jatropha curcas, is still the choice feedstockfor bio-diesel in most third world countries. This institute has put in rigrous efforts to identify high yielding varieties of Jatropha, improving its yield, standardizing trans-esterification to obtain high quality bio-diesel and its trials and testing in various vehicles and equipment. Second generation biofuels using biomass such as farm and forest wastes as feedstocks are promising in terms of their overall sustainability and volume produced. They can be used as drop in fuels. However, time is required to utilize their potential fully. Algae, the third generation biofuel feedstock still needs extensive R&D to make it economically sustainable. Whatever, the technology used, defence forces will accept any biofuel, which should be available constantly and priced below the existing petroleum fuels. The scope of producing by-products and finding a lucarative market for these products can ensure that prices ofbiofuels remain lower than the petroleum fuels
APA, Harvard, Vancouver, ISO, and other styles
29

Gajic, Dejan. "Development of armed forces in the European Union." Medjunarodni problemi 55, no. 3-4 (2003): 339–53. http://dx.doi.org/10.2298/medjp0304339g.

Full text
Abstract:
After the end of World War II leaders of the West European countries had realised the necessity to create new security frameworks, thus making the security of the continent the concern of the Europeans themselves. However, immediately after it had been formed the North Atlantic Alliance, as a trans-Atlantic defence shield against the danger from the "communist East", became the central security component in Europe. Just after the end of the Cold War and disappearance of the "danger from the East" the European leaders initiated the process of creation of the new European defence system. The system would be designed in such a way not to jeopardise the position of the NATO, improving at the same time the security and stability in the continent. In the first part of the article the author considers the course of European integration in the second half of the last century that proceeded through creation of institutions preceding the establishment of the European Union. During the period of creation of this specific form of action performed by the European states at the internal and international levels, the deficiency of integration in the military field was notable. In that regard, the author stresses the role of the Western European Union as an alliance for collective defence of West European countries. The second part of the paper discusses the shaping of the EU security component through the provisions on the Common Foreign and Security Policy, which are included in the EU agreements. The Maastricht Treaty defined the Common Foreign and Security Policy as an instrument to reach agreement by member states in the defence field. The Amsterdam Treaty confirmed the role of this mechanism expanding the authorities resulting from it. The Treaty of Nice supplements the existing mechanism by a new military and political structure that should help implement the decisions made by the European Union institutions in the military field. In the third part of the article, the author presents the facts concerning the establishment and internal organisation of the Eurocorps. The creation of this military formation took place in early 1990s and was initiated by the two states of "the old Europe" - Germany and France. The authors also emphasises that the establishment of this formation is the first step towards creation of the armed forces in Europe. The fourth part of the paper treats the Rapid Reaction Force that was established by the Helsinki Agreement (1999). It became operative in early 2003 and its basic aim is to prevent the outbreak of crises in the region and to improve stability in Europe. In spite of the opinions that the establishment of such a force is the skeleton for creation of the European armed forces, the author thinks that, at least in the near future, they will not be a rival to the NATO. In his opinion, their possible military missions will be carried out only when the alliance takes no interest in being engaged in them.
APA, Harvard, Vancouver, ISO, and other styles
30

RZAYEVA, GULNAZ AYDIN, and AYTAKIN NAZIM IBRAHIMOVA. "Organization of Information Security in E-Goverment as Means of Information Rights Protection." Право України, no. 2020/04 (2020): 225. http://dx.doi.org/10.33498/louu-2020-04-225.

Full text
Abstract:
As a concept, electronic government is directed to improving the efficiency of the activity of the state institutions and improving the living standards of citizens. Formation of the electronic state determines the pace of development of human rights and freedoms in accordance with the requirements of the time, among which the rights of information are of particular importance. However, in a situation where the completeness, accessibility and confidentiality of information is not fully ensured, there are obstacles to the realization of information rights. Therefore, the organization of information security is one of the means of guaranteeing information rights. In this regard, information security should be analyzed not only from technical aspect but also from human rights law. These highlights confirm the relevance of the topic of the article. The article’s objective is to analyze the notions “e-government”, “e-parliament” and “e-court”, to list priorities of e-state from aspect of human rights and freedoms provision, to determine the legal, theoretical and technical approaches to the information security in various models of e-government, to define difference between electronic security or information security, to research the importance of e-governance from the human rights aspect and to put forward suggestions about protection of information rights violated in cyberspace. The authors conclude that, full access to information, in new society ensures information and other rights and freedoms. Therefore, the lack of information security or low level of information security prevents the e-government from benefiting its citizens. One such barrier is considered an electronic divide or digital divide. Due to the global nature of cyberspace and information society, these problems should be solved not only at national level but also internationally. Above all, security should not be taken from the technical aspect. This prevents problems from being solved. Information security should also be analyzed as a legal institution, and the distinction between the terms “information protection” and “information defence” should be clarified. The legal aspect of the matter should be expressed. Thus, the authors conclude with an optimistic approach that elimination the problems arising during the formation of e-government will serve both to promote basic human rights and freedoms, and to make every citizen an active member of the digital society.
APA, Harvard, Vancouver, ISO, and other styles
31

Santhosh Kumar, S. V. N., M. Selvi, and A. Kannan. "A Comprehensive Survey on Machine Learning-Based Intrusion Detection Systems for Secure Communication in Internet of Things." Computational Intelligence and Neuroscience 2023 (January 27, 2023): 1–24. http://dx.doi.org/10.1155/2023/8981988.

Full text
Abstract:
The Internet of Things (IoT) is a distributed system which is made up of the connections of smart objects (things) that can continuously sense the events in their sensing domain and transmit the data via the Internet. IoT is considered as the next revolution of the Internet since it has provided vast improvements in day-to-day activities of humans including the provision of efficient healthcare services and development of smart cities and intelligent transport systems. The IoT environment, by the application of suitable security mechanisms through efficient security management techniques, intrusion detection systems provide a wall of defence against the attacks on the Internet and on the devices connected with Internet by effective monitoring of the Internet traffic. Therefore, the intrusion detection system (IDS) is a resolution proposed by the researchers to monitor and secure the IoT communication. In this work, a meticulous analysis of the security of IoT networks based on quality-of-service metrics is performed for deploying intrusion detection systems by carrying out experiments on secured communication and measuring the network’s performance based on comparing them with the existing security metrics. Finally, we propose a new and effective IDS using a deep learning-based classification approach, namely, fuzzy CNN, for improving the security of communication. The major and foremost advantages of this system include an upsurge in detection accuracy, the accurate detection of denial of service (DoS) attacks more efficiently, and the reduction of false positive rates.
APA, Harvard, Vancouver, ISO, and other styles
32

Risal, Semuel, Irawanto Irawanto, Putri Hergianasari, Anita Ade Rahma, and Ika Devy Pramudiana. "Border Development Model on the Human Development Aspects for Sustainable Community." Jurnal Borneo Administrator 18, no. 2 (August 25, 2022): 125–38. http://dx.doi.org/10.24258/jba.v18i2.971.

Full text
Abstract:
The Indonesian government has implemented a border development policy. Still, it has not been able to answer the complexity of the problems that occur in border areas, especially in North Kalimantan. The development of border areas is closely related to the mission of national development, defence and state security to improve the Welfare of the people in the border areas, especially to ensure the integrity and sovereignty of the state. However, the condition of border communities in North Kalimantan is increasingly marginalized, where poverty and regional isolation trigger the high demands of local people to become border crossers to Malaysia. This study will examine the factors causing the economic backwardness of border communities in North Kalimantan, poverty and isolation of border communities, and security issues at the border. The results show that the border area needs to be closely monitored because it is a security-prone area. This makes the border development paradigm in Kaltara prioritize a security approach rather than Welfare. This causes the border areas in North Kalimantan to be scarcely touched by the dynamics of development. Therefore, border development needs to be placed in a people centre of development-oriented to people's economic development for sustainable communities through accelerating economic growth, improving the quality of human resources, and strengthening institutional capacity for border area development. Thus, border communities can enjoy prosperity by protecting and maintaining state sovereignty at the border.
APA, Harvard, Vancouver, ISO, and other styles
33

Babiński, Aleksander, and Janusz Falecki. "Joint Operations of the Polish Armed Forces and the Police." Internal Security 9, no. 1 (December 29, 2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7464.

Full text
Abstract:
Task performance in the area of counteraction and removal of contemporary threats results requires a state to use all of its possible sources and resources. Main entities that carry out those tasks are Armed Forces of the Republic of Poland and Polish Police. Important areas of Polish Armed Forces and Police activities include tasks in the field of crisis management, security and public order maintenance, as well as country’s defence. An effective task performance in particular areas is highly reliant on the quality of joint operations of the entities. Different legislative acts only slightly define powers to organize joint operations by Armed Forces and Police, however, the rules of such operations are described in detail in the agreements concluded between them. The area of joint operations of Polish Armed Forces and Police which should be of much attention is a good organization of joint training courses and field exercises. Such undertakings would significantly improve the effectiveness of joint operations of the entities, consequently reducing the number of victims and material loss, improving the protection of natural environment and providing the state security at a high level.
APA, Harvard, Vancouver, ISO, and other styles
34

Perepelytsia, Hryhorii. "Challenges for the Foreign Policy of Ukrainian President Volodymyr Zelenskyy." Diplomatic Ukraine, no. XX (2019): 462–81. http://dx.doi.org/10.37837/2707-7683-2019-29.

Full text
Abstract:
The article refers to the challenges for the foreign policy of the President of Ukraine Volodymyr Zelenskyi, which arose as a result of the emergence of negative international trends, the bad policy of President Petro Poroshenko. The latter significantly complicated the implementation of Ukraine’s interests in the international arena for the new head of state and led to the emergence of a number of destructive internal trends. The author notes that the European international order is now destroyed, and international institutions have lost their effectiveness and capacity. Reliance on international security structures does not make it possible to ensure national security and defence of Ukraine, and reliance solely on political and diplomatic means for resolving foreign policy problems becomes meaningless. It is also noted that among the reasons for the loss of Ukraine’s subjectivity is the lack of strategic thinking among the ruling kleptocratic elite. During the five years of war with Russia, the government has not proposed any effective strategy of behaviour in this war. In addition, the author argues that in order to overcome the existing challenges to President Zelenskyi during his term of office, it is necessary to resolve the issue of overthrowing the oligarchic-kleptocratic regime and replacing it with a democratic political system, destroying total corruption, bringing a new national elite to power, carrying out radical political reforms aimed at strengthening the Ukrainian state, strengthening the country’s defence capability, establishing national values in the public life of Ukrainians, and building an effective and competitive model of the economy, improving social standards of life. It is noted that only if the tasks listed in the article are fulfilled, one can count on an optimistic scenario for the development of Ukraine and the end of the Russian-Ukrainian war. Keywords: President of Ukraine, kleptocratic regime, international political system, Ukrainian statehood.
APA, Harvard, Vancouver, ISO, and other styles
35

Romanova, Tatyana. "The EU’s Discourse on Sovereignty: Content and Consequences." Contemporary Europe 105, no. 5 (October 31, 2021): 32–44. http://dx.doi.org/10.15211/soveurope520213244.

Full text
Abstract:
Emmanuel Macron‟s 2017 speeches gave start to the discourse on the European Union‟s (EU‟s) sovereignty. This discourse has been advanced by the national and supranational elite of the EU as well as by its expert community. The article identifies key characteristics of this discourse and its potential consequences for the EU and its relations with Russia. The four ways (attributes) in which sovereignty has been used as identified by Stephen Krasner are used as the theoretical basis of the analysis. With the help of discourse analysis, the author identifies three dimensions in the EU‟s discourse on sovereignty: these are Westphalian, interdependence and domestic sovereignties. The first and the second manifest themselves in the economic field (in particular, in the regulation of the digital sphere), the third one is linked to the discussion on cooperation in the field of security and defence. The discussion on strengthening of the supranational level in the field of security and defence substitutes the absence of the discussion on citizens as holders of domestic sovereignty; it limits the potential of the EU‟s sovereignty. De facto, the discourse on the EU‟s sovereignty is a response to global processes, where the EU finds challenges and threats for itself. References to values and to the EU as its agent form an important component of the discourse on the EU‟s sovereignty. Externally the EU as a result demonstrates both its wish for more independence from external players and its determination to maintain its participation in the globalization processes. The rhetoric of sovereignty also conceptually means the EU‟s refusal of ambitions to be a normative power. Sovereignty has also been an integral part of EU-Russian discussions. Yet the EU‟s discourse on sovereignty does not create any prospects for improving this relationship.
APA, Harvard, Vancouver, ISO, and other styles
36

van Puyenbroeck, Laurens, and Gert Vermeulen. "TOWARDS MINIMUM PROCEDURAL GUARANTEES FOR THE DEFENCE IN CRIMINAL PROCEEDINGS IN THE EU." International and Comparative Law Quarterly 60, no. 4 (October 2011): 1017–38. http://dx.doi.org/10.1017/s0020589311000479.

Full text
Abstract:
A critical observer would not deny that the practice of European Union (‘EU’) policy making in the field of criminal law in the past decade since the implementation of the Tampere Programme has been mainly repressive and prosecution-oriented.1 The idea of introducing a set of common (minimum) rules, guaranteeing the rights of defence at a EU-wide level, has not been accorded the same attention as the introduction of instruments aimed at improving the effectiveness of crime-fighting. What does this mean for the future of EU criminal policy? Will the EU succeed in the coming years in developing an area where freedom, security and justice are truly balanced? According to several authors, to date the EU has evolved in the opposite direction. As one observer put it:[I]f Procedural Criminal Law arises from the application of Constitutional Law, or indeed if it may be described as “a seismograph of the constitutional system of a State”, then as a consequence the Procedural Criminal Law of the European Union shows the extent of the Democratic Rule of Law, of the existence of a true “Rechtsstaat”, within an integrated Europe. This situation may be qualified as lamentable, as the main plank of the EU's criminal justice policy relates to the simplification and the speeding up of police and judicial cooperation—articles 30 and 31 of the Treaty of the EU—but without at the same time setting an acceptable standard for fundamental rights throughout a united Europe.2
APA, Harvard, Vancouver, ISO, and other styles
37

Magán-Carrión, Roberto, Daniel Urda, Ignacio Díaz-Cano, and Bernabé Dorronsoro. "Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches." Applied Sciences 10, no. 5 (March 4, 2020): 1775. http://dx.doi.org/10.3390/app10051775.

Full text
Abstract:
Presently, we are living in a hyper-connected world where millions of heterogeneous devices are continuously sharing information in different application contexts for wellness, improving communications, digital businesses, etc. However, the bigger the number of devices and connections are, the higher the risk of security threats in this scenario. To counteract against malicious behaviours and preserve essential security services, Network Intrusion Detection Systems (NIDSs) are the most widely used defence line in communications networks. Nevertheless, there is no standard methodology to evaluate and fairly compare NIDSs. Most of the proposals elude mentioning crucial steps regarding NIDSs validation that make their comparison hard or even impossible. This work firstly includes a comprehensive study of recent NIDSs based on machine learning approaches, concluding that almost all of them do not accomplish with what authors of this paper consider mandatory steps for a reliable comparison and evaluation of NIDSs. Secondly, a structured methodology is proposed and assessed on the UGR’16 dataset to test its suitability for addressing network attack detection problems. The guideline and steps recommended will definitively help the research community to fairly assess NIDSs, although the definitive framework is not a trivial task and, therefore, some extra effort should still be made to improve its understandability and usability further.
APA, Harvard, Vancouver, ISO, and other styles
38

AM, Riyad. "Multilevel Intrusion Alert Post-processing for the Elimination of False Positives." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 2458–68. http://dx.doi.org/10.22214/ijraset.2021.37789.

Full text
Abstract:
Abstract: Intrusion detection systems are the last line of defence in the network security domain. Improving the performance of intrusion detection systems always increase false positives. This is a serious problem in the field of intrusion detection. In order to overcome this issue to a great extend, we propose a multi level post processing of intrusion alerts eliminating false positives produced by various intrusion detection systems in the network. For this purpose, the alerts are normalized first. Then, a preliminary alert filtration phase prioritize the alerts and removes irrelevant alerts. The higher priority alerts are then aggregated to fewer numbers of hyper alerts. In the final phase, alert correlation is done and alert correlation graph is constructed for finding the causal relationship among the alerts which further eliminates false positives. Experiments were conducted on LLDOS 1.0 dataset for verifying the approach and measuring the accuracy. Keywords: Intrusion detection system, alert prioritization, alert aggregation, alert correlation, LLDOS 1.0 dataset, alert correlation graph.
APA, Harvard, Vancouver, ISO, and other styles
39

Razqi, Afrizal. "AIR DEFENCE IDENTIFICATION ZONE: UPAYA MENJAGA KEDAULATAN WILAYAH UDARA INDONESIA." Media Keadilan: Jurnal Ilmu Hukum 12, no. 1 (April 29, 2021): 76. http://dx.doi.org/10.31764/jmk.v12i1.4265.

Full text
Abstract:
ABSTRACTAir is an inseparable part of a country, a country's sovereignty over land and sea also means sovereignty over airspace. As an international community, it is only natural that Indonesia's airspace is used for the common interest of supporting population mobility and economic improvement. However, Indonesian sovereignty over airspace is still being violated by foreign aircraft. Air Defence Identification Zone (ADIZ) is a zone for identification of foreign aircraft before entering the airspace. The determination of ADIZ Indonesia needs to be accompanied by various preparations including improving positive laws regarding airspace security, completing air defense system infrastructure, and building an understanding of the concept of ADIZ Indonesia with neighboring countries directly bordering Indonesia. This paper uses a normative legal research method using a descriptive analysis approach, a legal material search technique uses a secondary data source obtained through a literature study, and a study analysis uses qualitative analysis. The results of the writing show that there are legal gaps and gaps in the determination of administrative sanctions fines, the lack of the number of radars belonging to the Indonesian Air Force under the National Defense Force in protecting Indonesian airspace, and the heavy-duty of the Ministry of Foreign Affairs to build the trust of neighboring countries amid the dynamics of the South China Sea territorial conflict if the government determines ADIZ Indonesia.Keywords: Airspace; Sovereignty; ADIZ. ABSTRAKUdara merupakan bagian yang tidak terpisahkan dari suatu negara, kedaulatan suatu negara akan daratan dan lautan juga berarti kedaulatan akan wilayah udara. Sebagai masyarakat Internasional, sudah sewajarnya wilayah udara Indonesia dimanfaatkan untuk kepentingan bersama guna mendukung mobilitas penduduk sampai peningkatan ekonomi. Namun kedaulatan Indonesia akan wilayah udara masih marak dilanggar oleh pesawat udara asing. Air Defence Identification Zone (ADIZ) merupakan zona identifikasi pesawat udara asing sebelum memasuki wilayah udara. Penetapan ADIZ Indonesia perlu dibarengi dengan pelbagai kesiapan meliputi penyempurnaan hukum positif mengenai pengamanan wilayah udara, melengkapi infrastruktur sistem pertahanan udara, dan membangun kesepahaman konsep ADIZ Indonesia dengan negara tetangga yang berbatasan langsung dengan Indonesia. Menggunakan metode penelitian hukum normatif dengan menggunakan pendekatan deskriptif analisis. Teknik penelusuran bahan hukum menggunakan sumber data sekunder yang didapat melalui studi kepustakaan. Analisis kajian menggunakan analisis kualitatif. Hasil penulisan menunjukan bahwa ada celah dan kekosongan hukum dalam penetapan denda sanksi administratif, kurangnya jumlah radar milik TNI AU dibawah Kohanudnas dalam melindungi wilayah udara Indonesia, dan tugas berat Kementerian Luar Negeri untuk membangun kepercayaan negara tetangga ditengah dinamika konflik teritorial Laut China Selatan apabila pemerintah menetapkan ADIZ Indonesia.
APA, Harvard, Vancouver, ISO, and other styles
40

Zhai, Y., J. Chen, L. Liu, and J. Liu. "The Design of Data Disaster Recovery of National Fundamental Geographic Information System." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-4 (April 23, 2014): 353–56. http://dx.doi.org/10.5194/isprsarchives-xl-4-353-2014.

Full text
Abstract:
With the development of information technology, data security of information system is facing more and more challenges. The geographic information of surveying and mapping is fundamental and strategic resource, which is applied in all areas of national economic, defence and social development. It is especially vital to national and social interests when such classified geographic information is directly concerning Chinese sovereignty. Several urgent problems that needs to be resolved for surveying and mapping are how to do well in mass data storage and backup, establishing and improving the disaster backup system especially after sudden natural calamity accident, and ensuring all sectors rapidly restored on information system will operate correctly. For overcoming various disaster risks, protect the security of data and reduce the impact of the disaster, it’s no doubt the effective way is to analysis and research on the features of storage and management and security requirements, as well as to ensure that the design of data disaster recovery system suitable for the surveying and mapping. <br><br> This article analyses the features of fundamental geographic information data and the requirements of storage management, three site disaster recovery system of DBMS plan based on the popular network, storage and backup, data replication and remote switch of application technologies. In LAN that synchronous replication between database management servers and the local storage of backup management systems, simultaneously, remote asynchronous data replication between local storage backup management systems and remote database management servers. The core of the system is resolving local disaster in the remote site, ensuring data security and business continuity of local site. <br><br> This article focuses on the following points: background, the necessity of disaster recovery system, the analysis of the data achievements and data disaster recovery plan. Features of this program is to use a hardware-based data hot backup, and remote online disaster recovery support for Oracle database system. The achievement of this paper is in summarizing and analysing the common characteristics of disaster of surveying and mapping business system requirements, while based on the actual situation of the industry, designed the basic GIS disaster recovery solutions, and we also give the conclusions about key technologies of RTO and RPO.
APA, Harvard, Vancouver, ISO, and other styles
41

Zvozdetska, Oksana. "EU Cybersecurity in the Context of Increasing Cyberthreats in the Modern Globalized World." Mediaforum : Analytics, Forecasts, Information Management, no. 7 (December 23, 2019): 27–46. http://dx.doi.org/10.31861/mediaforum.2019.7.27-46.

Full text
Abstract:
The article is an attempt to analyze the EU’s ever-increasing cybersecurity challenges in today’s globally digitalized world. The researcher remarks that since 2013 the European Union has been pursuing the policy of developing awareness of cyber-attacks targeting and beefing-up restrictive measures. The author underlines that the European Council has adopted the regulation known as the Cybersecurity Act to become more cyber-proof. This is evidenced by a number of studies carried out within the EU as well as that this legal regulation facilitated imposing targeted restrictive measures to deter and respond to cyber-attacks in EU and abroad. Furthermore, the EU cybersecurity market is one of the fastest growing in the ICT sector, providing huge economic opportunities. Underpinning the cybersecurity industry will enable European companies to take advantage of these opportunities and increase citizens and businesses’ confidence in the digital world, while significantly contributing to the goals of the EU Digital Single Market Strategy. Broadly speaking, the problem can be addressed by such strategic priorities for enhancing EU cybersecurity as followed: achieving cyber resilience; dramatically reducing cybercrime; elaborating the common cybersecurity and defence policy; developing industrial and technological resources to ensure cybersecurity; establishing coordination mechanisms to prevent, detect, mitigate and respond to cyber bullying and information security as well as improving engagement with the private sector to enhance cybersecurity. The ultimate goal of the above-mentioned EU strategy appeared to be a Public Private Partnership (cPPP) that was concluded on 5 July, 2016 between the European Commission and the European Cyber Security Organization (ECSO). The objective of such partnership is to ensure awareness and resilience in an increasingly multifaceted cyber threat environment and to foster collaboration between public and private actors in the early stages of the research and innovation process to enable the EU Internet users to access secured innovative and credible European solutions (ICT products, services and software).
APA, Harvard, Vancouver, ISO, and other styles
42

Lysenko, Taras. "Present Status and Leading Trends in the Work of Ukrainian Informative Centres Based on the Analysis of Websites' Content." Ukrainian Journal on Library and Information Science, no. 9 (June 17, 2022): 148–63. http://dx.doi.org/10.31866/2616-7654.9.2022.259195.

Full text
Abstract:
The aim of the article is to consider and highlight the leading trends in IAC work based on the analysis of websites’ content nowadays. The research methodology is based on the application of content analysis was used for revealing in the material of websites some trends and directions of IAC work, systematisation, and categorisation, which help to reconstruct the real situation of IAC in Ukraine and also methods of generalisation, comparative analysis, induction and deduction. The set of issues connected with the Ukrainian informative analytical centres (IAC) functioning on the modern stage, mainly regarding the formation of their net structure, formalisation, and activity coordination in a combination of outer challenges, determines the conceptual frameworks and leading trends in IAC work, highlights and considers the most critical tasks of nowadays. The scientific novelty of the study is the first article-based research of websites of above 50 Ukrainian IAC, mainly that are non-governmental. The article has determined the problematic-thematic directions of their analytical work, such as political-legal and economical; defence-security; international-integrational; social-transformation and cultural; expert and scientific-technical. Conclusions. Based on the websites’ content analysis, it was determined that most pointed informative and research structures concentrate on their analytical work on political-economic problematic that explains the interests of separate stakeholders and sources of financing for the subjects of the information field. It was shown that including modern trends and challenges following the political-economic problematic starts focused on the integration and safety questions and only after them on social-cultural aspects of the Ukrainian lives most in the part of social standards and democratic freedoms. And very little attention in an expert-analytical environment is put on the improving scientific and technical potential and analytical methodology on which the work of all IAC are based.
APA, Harvard, Vancouver, ISO, and other styles
43

Nifakos, Sokratis, Krishna Chandramouli, Charoula Konstantina Nikolaou, Panagiotis Papachristou, Sabine Koch, Emmanouil Panaousis, and Stefano Bonacina. "Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review." Sensors 21, no. 15 (July 28, 2021): 5119. http://dx.doi.org/10.3390/s21155119.

Full text
Abstract:
Background: Cybersecurity is increasingly becoming a prominent concern among healthcare providers in adopting digital technologies for improving the quality of care delivered to patients. The recent reports on cyber attacks, such as ransomware and WannaCry, have brought to life the destructive nature of such attacks upon healthcare. In complement to cyberattacks, which have been targeted against the vulnerabilities of information technology (IT) infrastructures, a new form of cyber attack aims to exploit human vulnerabilities; such attacks are categorised as social engineering attacks. Following an increase in the frequency and ingenuity of attacks launched against hospitals and clinical environments with the intention of causing service disruption, there is a strong need to study the level of awareness programmes and training activities offered to the staff by healthcare organisations. Objective: The objective of this systematic review is to identify commonly encountered factors that cybersecurity postures of a healthcare organisation, resulting from the ignorance of cyber threat to healthcare. The systematic review aims to consolidate the current literature being reported upon human behaviour resulting in security gaps that mitigate the cyber defence strategy adopted by healthcare organisations. Additionally, the paper also reviews the organisational risk assessment methodology implemented and the policies being adopted to strengthen cybersecurity. Methods: The topic of cybersecurity within healthcare and the clinical environment has attracted the interest of several researchers, resulting in a broad range of literature. The inclusion criteria for the articles in the review stem from the scope of the five research questions identified. To this end, we conducted seven search queries across three repositories, namely (i) PubMed®/MED-LINE; (ii) Cumulative Index to Nursing and Allied Health Literature (CINAHL); and (iii) Web of Science (WoS), using key words related to cybersecurity awareness, training, organisation risk assessment methodologies, policies and recommendations adopted as counter measures within health care. These were restricted to around the last 12 years. Results: A total of 70 articles were selected to be included in the review, which addresses the complexity of cybersecurity measures adopted within the healthcare and clinical environments. The articles included in the review highlight the evolving nature of cybersecurity threats stemming from exploiting IT infrastructures to more advanced attacks launched with the intent of exploiting human vulnerability. A steady increase in the literature on the threat of phishing attacks evidences the growing threat of social engineering attacks. As a countermeasure, through the review, we identified articles that provide methodologies resulting from case studies to promote cybersecurity awareness among stakeholders. The articles included highlight the need to adopt cyber hygiene practices among healthcare professionals while accessing social media platforms, which forms an ideal test bed for the attackers to gain insight into the life of healthcare professionals. Additionally, the review also includes articles that present strategies adopted by healthcare organisations in countering the impact of social engineering attacks. The evaluation of the cybersecurity risk assessment of an organisation is another key area of study reported in the literature that recommends the organisation of European and international standards in countering social engineering attacks. Lastly, the review includes articles reporting on national case studies with an overview of the economic and societal impact of service disruptions encountered due to cyberattacks. Discussion: One of the limitations of the review is the subjective ranking of the authors associated to the relevance of literature to each of the research questions identified. We also acknowledge the limited amount of literature that focuses on human factors of cybersecurity in health care in general; therefore, the search queries were formulated using well-established cybersecurity related topics categorised according to the threats, risk assessment and organisational strategies reported in the literature.
APA, Harvard, Vancouver, ISO, and other styles
44

Pyvovar, Iryna, and Yuriy Pyvovar. "Peculiarities of determining propriety of a party in public legal disputes on appealing decisions of medical and social expert commissions and military physician boards by the Ministry of defence of Ukraine." Fundamental and applied researches in practice of leading scientific schools 40, no. 4 (September 30, 2020): 56–67. http://dx.doi.org/10.33531/farplss.2020.4.8.

Full text
Abstract:
In the process of developing a legal democratic state on the way to European integration, the Ukrainian society and the state as a subject of law face the next tasks related to the implementation in national legislation, the state policy of standards and principles of international law, embodied, in particular, in the provisions of international agreements between Ukraine and the European community. One of the significant agreements that contributed to the revision of the conceptional approaches to law-making and enforcement activities in Ukraine is “The Agreement on Association between Ukraine, on the one hand, and the European Union, the European Atomic Energy Community and their Member States, on the other hand”, ratified Verkhovna Rada of Ukraine and the European Parliament on September 16, 2014. Under this Agreement, Ukraine undertook a number of commitments, in particular to increase the level of social protection of the population (Article 420 of the Agreement). In order to achieve this goal, among others an effective system of organizational and legal guarantees (means and measures) for ensuring social rights of citizens should be functioning in the state, which in turn should be based on the close cooperation of Ukraine with the European community in the field of justice, freedom and security with to ensure the rule of law and respect for human rights and fundamental freedoms of states (Article 1 of the Agreement). In accordance with the Regulations of article 14 of the Agreement within the framework of such cooperation, the state should attach particular importance to the establishment of the rule of law and the strengthening of institutions of all levels in the field of administration generally and law enforcement and judicial authorities in particular. Cooperation should be aimed, in particular, at strengthening the judiciary, improving its effectiveness, ensuring its independence and impartiality and fight against corruption, and should be based on the principle of respect for human rights and fundamental freedoms.
APA, Harvard, Vancouver, ISO, and other styles
45

Tsvetkov, Tsvetan, and Anna-Maria Nikolaeva Markova. "PERSPECTIVE FROM THE WESTERN BALKANS AND STRENGTHENING THE NATO’S EASTERN FLANK." KNOWLEDGE - International Journal 47, no. 1 (August 16, 2021): 263–66. http://dx.doi.org/10.35120/kij4701263t.

Full text
Abstract:
A reflection process shall be launched to see if the NATO is ready to face the challenges of tomorrow. The main aim of this paper will be to outline what are the perspectives and challenges according to the Balkan countries and what is the role of NATO in the Eastern Flank. Collecting of views from the region will give some ideas and propositions how to make the Alliance stronger and more effective politically and militarily. The western Balkans is one of the longest lasting and largest investments that NATO has made throughout time. The Western Balkans is the most articulate because of the complexity of the region. As the WB is so articulate and complex and the relationships since the 1990s between NATO and the region of the WB have evolved. The three main pillars of the NATO strategic concept are deterrence and defence crisis management and cooperative security. Now we have two new NATO tools that are helping the region - capacity building to the civil military team (NATO advisory team which support the set up of security force in Kosovo) and enhanced interaction which is a basket of tailored activities (it is not a partnership because there are some of the Allies that do not the declaration of independence of Kosovo) that have been revised by the North Atlantic Council- building integrity and civil emergency planning. The common point between all the countries of the WB which have joined the partnership of peace is the contribution that they give to the security and stability of the region and to this idea of projecting stability. When NATO’s neighbours are stable the Alliance itself will be more stable. The open door policy a cornerstone of the Washington treaty– for many countries of the WB it is a cornerstone for becoming members and to assume the responsibilities and the obligations (and the willingness and ability to assume them) that come with this membership. Political dialogue and practical cooperation are crucial for the countries especially from the region of the Western Balkans to foster the regional understanding and to share common expertise. Speaking about the Geopolitics in the Balkans and in South Eastern Europe, my first point is about the current geopolitical dynamics. SE Europe and even The Balkans are not anymore in the centre of world politics in the role of the trouble maker in the region, like it was in the late 90s of the last and in the beginning of this century. But they continue to be a field for political manoeuvring of the geopolitical players dominated by the desire to confer spheres of interest and to mutually deter each other. We shall not forget that precisely democracy is the element that binds all members and the liberal economic principles are the cornerstone of this common identity. A more equitable burden sharing and ascending defense spending (2% or less currently) is an important benchmark for the future preparedness of the Alliance. The transatlantic relation was a point discussed largely in reflection process. A future goal for the Alliance shall be defining a mutually beneficial strategic and burden sharing equilibrium between North American and European members. An advance in the foreign and security policy objectives of Washington in Asia will be a good addition to this. What can be more is that NATO must continue to deepen and strengthen the already existing relationship. This mainly can be conducted through expanding its roster of partnerships, gaining actionable intelligence, strengthening early warning systems and improving crisis management to be nimbler politically and operationally. B9 Alliances members need to leave their operational comfort zones and look to further their contributions in zones of instability in Africa and Middle East that could spill over to Europe.
APA, Harvard, Vancouver, ISO, and other styles
46

Karczewski, Edward. "SELF-DISCLOSURE IN THE PROCESS OF IMPROVING STATE SECURITY AND DEFENCE." Przegląd Nauk o Obronności, no. 6 (March 11, 2020). http://dx.doi.org/10.37055/pno/118853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

-, Sheikh Abbas Bin Mohd. "Indo-Israel Defence Relationship: Implications on Pakistan’s Security Policies." International Journal For Multidisciplinary Research 4, no. 5 (October 19, 2022). http://dx.doi.org/10.36948/ijfmr.2022.v04i05.888.

Full text
Abstract:
The strategic partnership between India and Israel is well established and improving over time. This defence-based cooperation is escalating the already existing arms competition in the South Asian region resulting in action-reaction dynamics owing to the security competition between India and Pakistan. India-Israel increasing defence collaboration in hi-tech weapon systems including the Air and Ballistic Missile Defence system and serious facelift of the Indian military courtesy of Israeli defence firms is creating a security dilemma leading to greater security concerns for Pakistan in particular and other neighbouring nations in general. The deep-rooted mode of cooperation between India and Israel in the space programme would give the Indian military dominance in information warfare. The counterterrorism and intelligence sharing between the two would help India add network-centric and electronic warfare capabilities and learn modern techniques for the contemporary combat environment. This defence partnership is likely to create a strategic imbalance in the region, compelling neighbouring Pakistan (and others) to look for countermeasures. Resultantly, Pakistan’s counter-effort to secure itself is enhancing arms competition. This paper will highlight the areas of defence cooperation between India and Israel and will signify it’s implication over Pakistan and counter measures required.
APA, Harvard, Vancouver, ISO, and other styles
48

"A Framework for Moving Target Defence with Data Encryption Standard." International Journal of Recent Technology and Engineering 8, no. 3 (September 30, 2019): 8422–27. http://dx.doi.org/10.35940/ijrte.c6523.098319.

Full text
Abstract:
Moving Target Defence (MTD) became an important research area in the wake of increased cyber security threats. As the attackers are gaining knowledge on existing methods, it is essential to have more dynamic approach that can defeat plans of attackers. As improving systems with higher level of security is a never ending process, MTD has got significance in military and other applications where critical digital infrastructure needs to be protected from adversaries. When attack surface is dynamically evolving with mutation strategy, it can lead to realization of MTD. As MTD increases complexity and uses dynamic encryption mechanism, the attack surface evolves from time to time confusing attacker. Traditional approaches like AES and DES alone will have their limitations. However, when they are used along with the concept of MTD strategies, it is possible to provide highly secure environment. In this paper, we proposed a framework with an underlying algorithm which ensures MTD with dynamically evolving attack surface and dynamic encryption standards based on DES. The experimental results revealed that the proposed scheme is effective and shows improved performance over its predecessor.
APA, Harvard, Vancouver, ISO, and other styles
49

Simatupang, Haposan. "Improving The Quality of Service Through Strengthening Organizational Culture, Interpersonal Communication, Pedagogical Competence and Trust (Empirical Research Using Pathway Analysis And Sitorem In Lecturers Indonesia Defence University)." International Journal of Social Science And Human Research 05, no. 03 (March 5, 2022). http://dx.doi.org/10.47191/ijsshr/v5-i3-05.

Full text
Abstract:
Indonesia Defence University as a university that develops one of the new branches of science, defense science, must be able to meet and detect the development of global threats that are happening especially related to defense and security. Defense science emerged about five decades ago, since western countries introduced the concept of managing the defense sector to discuss how to allocate budgets and human resources, utilizing tools such as in the business world for defense purposes. The study sought to clarify efforts to measure service quality based on dominant potential factors. Quality of service is assumed to be an important part in improving the quality of education in a convergent approach derived from external factors of a learner. . In this study, the stages of data analysis techniques begin by conducting descriptive statistical analysis, testing analytical prerequisites, and continued with path analysis. Descriptive statistical analysis aims to describe the data of each variable in a single way. The result is to improve the quality of lecturer services at is trust in Indonesia Defence University to be able to produce superior quality graduates.
APA, Harvard, Vancouver, ISO, and other styles
50

Krelina, Michal. "Quantum technology for military applications." EPJ Quantum Technology 8, no. 1 (November 6, 2021). http://dx.doi.org/10.1140/epjqt/s40507-021-00113-y.

Full text
Abstract:
AbstractQuantum technology is an emergent and potentially disruptive discipline, with the ability to affect many human activities. Quantum technologies are dual-use technologies, and as such are of interest to the defence and security industry and military and governmental actors. This report reviews and maps the possible quantum technology military applications, serving as an entry point for international peace and security assessment, ethics research, military and governmental policy, strategy and decision making. Quantum technologies for military applications introduce new capabilities, improving effectiveness and increasing precision, thus leading to ‘quantum warfare’, wherein new military strategies, doctrines, policies and ethics should be established. This report provides a basic overview of quantum technologies under development, also estimating the expected time scale of delivery or the utilisation impact. Particular military applications of quantum technology are described for various warfare domains (e.g. land, air, space, electronic, cyber and underwater warfare and ISTAR—intelligence, surveillance, target acquisition and reconnaissance), and related issues and challenges are articulated.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography