Journal articles on the topic 'Improving Defence and Security'

To see the other types of publications on this topic, follow the link: Improving Defence and Security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Improving Defence and Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Saragih, Herlina JR, Rayanda Barnas, and Purwanto Purwanto. "Defense Management concepts improving Indonesian Maritime Security." Jurnal Pertahanan 2, no. 3 (September 29, 2016): 257. http://dx.doi.org/10.33172/jp.v2i3.104.

Full text
Abstract:
This study aimed to analyze the concept of Indonesian Defence Management in the 21st century in the context of Indonesian Maritime Security and to determine the readiness of defence management capabilities in facing threats. Research method used is descriptive qualitative with data collection methods through in-depth interview and documentation. The results showed that in order to improve maritime security in Indonesia has not been implemented in a structured and comprehensive defense in accordance with the management perspective of the countries more advanced, especially on defense preparedness in logistics management such as the management and alutsista availability owned Indonesia
APA, Harvard, Vancouver, ISO, and other styles
2

Dorosh, Lesia, and Vasyl Romanyk. "PESCO, CARD, EDF: Strategy, Analysis, and Financing in the European Union Security Guaratee." Humanitarian vision 6, no. 2 (November 25, 2020): 1–7. http://dx.doi.org/10.23939/shv2020.02.001.

Full text
Abstract:
In the article the authors analyze the institutional basis for strengthening the EU security and the implementation of specific projects designed to expand cooperation between the Member States in the defence and security sectors. The point at issue is about Permanent Structured Cooperation (PESCO); the Coordinated Annual Review on Defence (CARD) and the European Defence Fund (EDF). The relevance of the comprehensive study of PESCO, CARD, EDF, which activities are aimed at ensuring the strategic component of cooperation, the analysis of the defence sector and funding priorities in the security sphere of the Union have been proved. The authors claim that PESCO has become a key strategic initiative of the EU, CARD allows coordinating the development of military capabilities in the Member States; the EDF was created to coordinate, increase investment and improve defence interoperability between EU member states. The challenges faced within the functioning of these initiatives have been analyzed. It is alleged that a key challenge for the CARD is the unwillingness of Member countries to share national defence plans, as well as the available and potential coordination and harmonization of defence planning within NATO’s Defence Planning. The peculiarities of specific projects financed within the European Defense Fund (“Ocean 2020”, “Eurodrone”, “SPIDER”, “EuroSWARM”, “TRAWA”, “ACAMSII”, “Gossra”, “Vestlife”) have been analyzed. There is continued progress in the field of the EU security and defence: numerous defence projects have been initiated under PESCO; there is a synchronization of defence planning through the CARD; the investments in defence are stimulated by financing the defence research projects through the EDF, the improving military mobility is continuing; coordination of the EU-NATO cooperation is improving, etc.
APA, Harvard, Vancouver, ISO, and other styles
3

Zaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 5 (November 17, 2021): 42–68. http://dx.doi.org/10.33731/52021.244518.

Full text
Abstract:
Keywords: defense capability, intellectual property, regulatory support The conceptual issues of the legislation of Ukraine,which determine the state policy in the field of national security and defence, regardingthe settlement of issues related to ensuring the state defence capabilities are considered.The scientific publications on actual questions in this sphere concerningproblems and prospects of increase of defence capability of Ukraine are analysed.The role of intellectual property in all components of Ukraine's defence system hasbeen studied, and it has been noted that unresolved problems in the field of intellectualproperty management pose an increasing threat to Ukraine's national security.The importance of ensuring the protection of intellectual property in the process ofimplementing measures to improve the defence capabilities of the state and the needto improve legislation in this area is defined. Recommendations for improving the regulatory framework for national securityand defence in order to address the problematic issues of intellectual property in thisarea are submitted.State defence capability is the ability of state to defend itself in the event of armedaggression or armed conflict. It consists of material and immaterial elements and is aset of military, economic, social and moral and political potential in the field of defenceand appropriate conditions for its implementation.Resolving the issues of reforming not only the Armed Forces of Ukraine, but firstthe entire state, modernization and rearmament of the Ukrainian army has become avital necessity. Only the solution of this issue will allow to raise the defence capabilityof our state to the proper level for the preservation of independent Ukraine.Ensuring the military security of Ukraine largely depends on equipping the ArmedForces of Ukraine with modern types and models of weapons and military equipment,developed on the basis of intellectual property rights.It is the military-technical sphere where the objects of intellectual property rightsbelonging to the sphere of national security and defence are created, and the state isobliged to ensure their protection. This will increase the competitiveness of the domesticdefence industry and make claims impossible for anyone in the mass productionof weapons and military equipment for their own needs and for exports, which directlyaffects defence capabilities.And this requires proper protection of intellectual property rights both in theprocess of own production of weapons and military equipment, as well as in militarytechnicalcooperation.
APA, Harvard, Vancouver, ISO, and other styles
4

Zaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 4 (October 25, 2021): 33–53. http://dx.doi.org/10.33731/42021.243120.

Full text
Abstract:
Keywords: defense capability, intellectual property, regulatory support The conceptual issues of the legislation of Ukraine,which determine the state policy in the field of national security and defence, regardingthe settlement of issues related to ensuring the state defence capabilities are considered.The scientific publications on actual questions in this sphere concerningproblems and prospects of increase of defence capability of Ukraine are analysed.The role of intellectual property in all components of Ukraine's defence system hasbeen studied, and it has been noted that unresolved problems in the field of intellectualproperty management pose an increasing threat to Ukraine's national security.The importance of ensuring the protection of intellectual property in the process ofimplementing measures to improve the defence capabilities of the state and the needto improve legislation in this area is defined.Recommendations for improving the regulatory framework for national securityand defence in order to address the problematic issues of intellectual property in thisarea are submitted.State defence capability is the ability of state to defend itself in the event of armedaggression or armed conflict. It consists of material and immaterial elements and is aset of military, economic, social and moral and political potential in the field of defenceand appropriate conditions for its implementation.Resolving the issues of reforming not only the Armed Forces of Ukraine, but firstthe entire state, modernization and rearmament of the Ukrainian army has become avital necessity. Only the solution of this issue will allow to raise the defence capabilityof our state to the proper level for the preservation of independent Ukraine.Ensuring the military security of Ukraine largely depends on equipping the ArmedForces of Ukraine with modern types and models of weapons and military equipment,developed on the basis of intellectual property rights.It is the military-technical sphere where the objects of intellectual property rightsbelonging to the sphere of national security and defence are created, and the state isobliged to ensure their protection. This will increase the competitiveness of the domesticdefence industry and make claims impossible for anyone in the mass productionof weapons and military equipment for their own needs and for exports, which directlyaffects defence capabilities.And this requires proper protection of intellectual property rights both in theprocess of own production of weapons and military equipment, as well as in militarytechnicalcooperation.
APA, Harvard, Vancouver, ISO, and other styles
5

Fiott, Daniel. "Improving CSDP Planning and Capability Development: Could there be a ‘Frontex Formula’?" European Foreign Affairs Review 18, Issue 1 (February 1, 2013): 47–62. http://dx.doi.org/10.54648/eerr2013003.

Full text
Abstract:
The newly agreed operational rules for Frontex allows the Agency to, among other things, buy or lease its own equipment for missions and/or to do so in co-ownership with the Member States and to request national seconded staff for its operations. The new rules are a major step forward in further developing Frontex's resources. Yet this progress has not been matched, despite the Lisbon treaty's protocol on Permanent Structured Cooperation, and in light of the defence budget cuts being made in many European Union (EU) Member States, when it comes to the Common Security and Defence Policy (CSDP). This article asks why, given that each policy area is ultimately aimed at the defence and security of the EU, are the innovations that have been agreed for Frontex not equally applicable to CSDP? Why have Member States increased cooperation under Frontex without equivalent or similar progress under the CSDP? This article aims to shed light on the differences and similarities of the two policy domains in order to see if a 'Frontex formula' could be applicable to the CSDP
APA, Harvard, Vancouver, ISO, and other styles
6

BROŽIČ, LILIANA. "SECURITY AS AN IMPERATIVE." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2017, ISSUE 19/1 (May 15, 2017): 11–13. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.19.1.00.

Full text
Abstract:
In 2017, the publication Contemporary Military Challenges entered its nineteenth year of existence, which reminds us of an important anniversary coming up in 2018. The first issue was published in September 1999 under the name of Bulletin of the Slovenian Armed Forces. From then until the end of last year, 18 volumes of the publication included 438 articles by 564 authors. There were 289 authors from the Slovenian Armed Forces and 48 authors from the administrative part of the Ministry of Defence; 161 authors were from different institutions and 66 authors from abroad. This year, we will focus on topical issues, which will, hopefully, be of interest to our readers and will motivate you to open discussions, reflect upon and perhaps even write about your views on the emergence of new security as an imperative for the future. This year's second issue titled Veteran organizations – are they even needed will be released in English. Since this topic has never before been discussed in our publication, it is perhaps time that we speak about it and share experiences of different countries. This year’s third issue titled Migrations and security on the Old Continent will also be published in English. It will be dedicated to the unstable Middle East, terrorism in Europe and national experiences with migration. Special focus will be put on the migration flows from autumn 2015 to spring 2016 as well as to the Europe's response to them. The title of the fourth issue will be Security forces of the future. It will focus on the way forward in ensuring safety. Some of the topical issues will certainly include the new old ways of manning the armed forces, achieving capability targets and international operations and missions. This year also marks 20 years since members of the Slovenian Armed Forces have joined an international operation for the first time. It was Operation Alba in Albania. Since then, they have participated in numerous operations and missions throughout the world. The 2017 will undoubtedly also be marked by the findings of the 2016 Strategic Defence Review, and the tasks arising from it. The chapter referring to the strengthening of the defence capability and resilience defines the primary objective of further development of the defence system and defence capacity of the Republic of Slovenia, which arises from the findings of the strategic review. The authors of the document classified them as follows: provision of the country’s defence capabilities, enhancing the resilience of the state and society to security threats, improving the preparedness and sustainability of the Slovenian Armed Forces, and achieving of common goals and commitments in the framework of the EU and NATO. It is our firm belief that the articles in this issue of the Contemporary Military Challenges titled Security as an imperative can contribute to the goals set out in the Strategic Defence Review.
APA, Harvard, Vancouver, ISO, and other styles
7

POPIEL, Henryk, Bogusław ROGOWSKI, and Krzysztof WALCZAK. "POLISH DEFENSE STANDARDS WITHIN THE EUROPEAN RANGE." National Security Studies 5, no. 1 (May 15, 2014): 311–20. http://dx.doi.org/10.37055/sbn/135200.

Full text
Abstract:
The article is an account of activities conducted in the field of standardization related to State defence and security for the development of military standards in the area of water supply for forces in field conditions. This adheres to the level of European defence standardization procesess. Thus, a type of summary has been presented of this not so popular case, when – for the very first time in the history of Polish military standardization – national defence standards have become the standards within the European range. What has been pointed out in this aspect is the importance and the need to promote – in a similar way – the achievements of military standardization in other areas of social and economic life, especially in the field of State defence and security, as well as anywhere where Poland has a potential and considerable achievements on a global scale. Such actions – except for a considerable contribution to improving a positive image of Poland in international relations – may be one of the ways to gain a more effective access to information and markets, education and development.
APA, Harvard, Vancouver, ISO, and other styles
8

NEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.

Full text
Abstract:
Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing. Software analysis has been successful in tackling many such concerns, albeit on other platforms, such as desktop and server. To fill this gap, he have developed infrastructural tools that permit a wide range of software analyses for the Android smartphone platform. Developing these tools has required surmounting many challenges unique to the smartphone platform: dealing with input non-determinism in sensor-oriented apps, non-standard control ow, low-overhead yet high-fidelity record-and-replay. Our tools can analyze substantial, widely-popular apps running directly on smartphones, and do not require access to the app’s source code. We will first present two tools (automated exploration, record-and-replay) that increase Android app reliability by allowing apps to be explored automatically, and bugs replayed or isolated. Next, we present several security applications of our infrastructure: a permission evolution study on the Android ecosystem; understanding and quantifying the risk posed by URL accesses in benign and malicious apps; app profiling to summarize app behavior; and Moving Target Defense for thwarting attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Zaikivskyi, Oleksandr, and Oleksandr Onistrat. "Regulatory and legal support of intellectual property protection in the defense sphere (in the development of armaments and military equipment; in the implementation of international military- technical cooperation)." Theory and Practice of Intellectual Property, no. 6 (December 27, 2021): 49–67. http://dx.doi.org/10.33731/62021.248981.

Full text
Abstract:
Keywords: defence capability, intellectual property, regulatory and legal support,armament and military equipment, military-technical cooperation The condition of regulatory and legal support of defencecapability of Ukraine and problems concerning protection of intellectual propertyand protection of state interests in this sphere are investigated. The importance ofprotection of intellectual property rights to ensure the enhancement of the state's defencecapabilities is noted.Ensuring Ukraine’s defence capability largely depends on equipping the ArmedForces of Ukraine with modern types and models of armaments and military equipmentdeveloped on the basis of the intellectual property rights.It is the military-technical sphere where the objects of intellectual property rightsbelonging to the sphere of national security and defence are created, and the state isobliged to ensure their protection. This will increase the competitiveness of the domesticdefence industry and make it impossible for anyone in the mass production ofarmaments and military equipment for their own needs and for exports, that directlyaffects defence capabilities.This requires proper protection of intellectual property rights both in the processof own production of weapons and military equipment, and in military-technical cooperation.The legislation of Ukraine on national security and defence determines the need touse scientific and technical achievements and the introduction of new technologies toincrease the state's defence capabilities. However, the issue of intellectual property,which is the basis of these achievements and technologies, is not raised. It is notedonly that the acquisition, security, protection of intellectual property rights to scientificand technical (applied) results are carried out in accordance with the law, and incase of infringement of intellectual property rights is protected in the manner prescribedby administrative, civil and criminal law.Thus, all issues related to the defence and protection of intellectual property rightsmust be resolved within the framework of special legislation on intellectual property.Recommendations for improving the regulatory and legal support of Ukraine's defencecapabilities with a purpose of solution of intellectual property issues in this areaand compliance with national interests and security of the state on intellectual propertyrights in the development of armaments and military equipment, as well as internationalmilitary-technical cooperation were submitted.
APA, Harvard, Vancouver, ISO, and other styles
10

Kosmacz-chorodowska, Anna. "Improving management in favour of defence and security on the basis of e-economy tools." Scientific Papers of Silesian University of Technology. Organization and Management Series 2018, no. 128 (2018): 231–42. http://dx.doi.org/10.29119/1641-3466.2018.128.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Davis Cross, Mai’a K. "The European Defence Agency and the Member States: Public and Hidden Transcripts." European Foreign Affairs Review 20, Special Issue (July 1, 2015): 83–102. http://dx.doi.org/10.54648/eerr2015026.

Full text
Abstract:
The European Defence Agency (EDA) was founded in 2004 with the aim of improving the EU’s defence capabilities through promoting collaboration, common initiatives, and innovative solutions to the EU’s security needs. This article examines the nature of the relationship between European Union Member States and the EDA a decade after its founding. The agency has solidified a clear body of norms that it seeks Member States to implement. To a surprising extent, Member States have publically embraced these norms as necessary for the future viability of European security. But they at the same time resist implementing these norms in certain fundamental ways. Building upon the framework article of this special issue, the author applies the concepts of ‘public’ and ‘hidden’ transcripts to shed light on how Member States simultaneously embrace and resist norms in a climate of supranational pressure.
APA, Harvard, Vancouver, ISO, and other styles
12

Bogdanov, Plamen. "Perspectives and development of the Bulgarian military-educational system." Scientific Journal of the Military University of Land Forces 197, no. 3 (September 11, 2020): 489–500. http://dx.doi.org/10.5604/01.3001.0014.3921.

Full text
Abstract:
The report presents all the current challenges which the Bulgarian military-educational system is facing in the context of the basic features of the security environment and trends for the first half of the 21th century by identifying the main problem areas in its functioning. The status and capabilities of the military-educational system of the Republic of Bulgaria are discussed on the basis of an analysis of key strategic documents in the sectors of education, security and defence, as well as the current state of military and civil education and the inherent activities of the training institutions. Outlined are the basic principles of construction and operation of military-educational systems and the fundamental strategic goals and tasks according to modern strategic security environment and dynamically changing conditions in NATO and the EU. Described are the main elements of the military-educational system as a complex, adaptive and flexible system that develops in unity and complementarity with the system of civil education in Bulgaria. Guidelines are formulated for improving the military educational system in relation to its contribution to strengthening national security and defence of the country in three directions – conceptual, organizational and technological improvement.
APA, Harvard, Vancouver, ISO, and other styles
13

D'Almeida, Irina Bratosin, Rebekka Haffner, and Corinna Hörst. "Women in the CSDP: Strengthening the EU's Effectiveness as an International Player." European View 16, no. 2 (December 2017): 313–24. http://dx.doi.org/10.1007/s12290-017-0467-1.

Full text
Abstract:
Security and defence cooperation in the EU is being upgraded, and therefore the importance of the civilian missions and military operations launched in the framework of the Union's Common Security and Defence Policy (CSDP) is likely to increase. This article argues that much can be gained by improving the gender balance in CSDP missions and operations. The participation of female personnel in crisis management has a positive effect on operational effectiveness and contributes to the acceptance of the mission by the local population. Moreover, women deployed abroad play an important role in overcoming gender stereotypes and demonstrating the EU's commitment to gender equality. This article explores the reasons for the low number of women in CSDP missions and operations. It suggests ways to improve the gender balance at the national and EU levels, which would increase the EU's chances of resolving foreign affairs issues abroad.
APA, Harvard, Vancouver, ISO, and other styles
14

Thomson, Catarina P., and David Blagden. "A Very British National Security State: Formal and informal institutions in the design of UK security policy." British Journal of Politics and International Relations 20, no. 3 (July 6, 2018): 573–93. http://dx.doi.org/10.1177/1369148118784722.

Full text
Abstract:
What are the roles of government institutions in the design and implementation of effective national security policy? Using the case of post-2010 reform to Britain’s central government security policy machinery, we find that formal institutions can help the informal strategy-making institutions on their periphery to function better. Through interviews with 25 senior officials, we find that Britain’s National Security Council and quinquennial Strategic Defence and Security Reviews – both instituted in 2010 with the intention of improving UK security policymaking – remain limited as formal makers of national strategy. But the networks of individuals and ideas they support, by absolving some decision-makers of audience costs while immersing others in creative yet coherent strategy-development communities, have improved the overall quality of UK security policymaking compared to its pre-2010 condition. This finding also carries implications for other contexts and thus represents a promising avenue for future research. (Final version accepted 20 June 2018.)
APA, Harvard, Vancouver, ISO, and other styles
15

Gabrielyan, Hakob. "Gender-Sensitive Approaches in Confidence- and Security-Building Measures." Journal of Political Science: Bulletin of Yerevan University 1, no. 3 (December 29, 2022): 51–59. http://dx.doi.org/10.46991/jops/2022.1.3.051.

Full text
Abstract:
The paper examines the existing issues and proposes new outlook on the solutions for incorporating gender-sensitive approaches in the sphere of arms control and confidence- and security-building measures in Europe (CSBMs). Based on a thorough consideration of the current practices and relevant documentation, the notion of gender-positive approach is introduced, while a set of particular measures for improving gender mainstreaming in the security sector is suggested. To assess adequately the degree of streamlining the OSCE’s gender-related principles at local level and underline the existing gaps between theory and practice, short interviews were conducted with former and current female officers and specialists, engaged in human rights promotion in the defence and security structures. The paper concludes with the diagram offering interconnected steps to the efficient engagement of women in CSBMs.
APA, Harvard, Vancouver, ISO, and other styles
16

BROŽIČ, LILIANA. "VARNOST KOT IMPERATIV." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2017, ISSUE 19/1 (May 15, 2017): 7–9. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.19.1.0.

Full text
Abstract:
In 2017, the publication Contemporary Military Challenges entered its nineteenth year of existence, which reminds us of an important anniversary coming up in 2018. The first issue was published in September 1999 under the name of Bulletin of the Slovenian Armed Forces. From then until the end of last year, 18 volumes of the publication included 438 articles by 564 authors. There were 289 authors from the Slovenian Armed Forces and 48 authors from the administrative part of the Ministry of Defence; 161 authors were from different institutions and 66 authors from abroad. This year, we will focus on topical issues, which will, hopefully, be of interest to our readers and will motivate you to open discussions, reflect upon and perhaps even write about your views on the emergence of new security as an imperative for the future. This year's second issue titled Veteran organizations – are they even needed will be released in English. Since this topic has never before been discussed in our publication, it is perhaps time that we speak about it and share experiences of different countries. This year’s third issue titled Migrations and security on the Old Continent will also be published in English. It will be dedicated to the unstable Middle East, terrorism in Europe and national experiences with migration. Special focus will be put on the migration flows from autumn 2015 to spring 2016 as well as to the Europe's response to them. The title of the fourth issue will be Security forces of the future. It will focus on the way forward in ensuring safety. Some of the topical issues will certainly include the new old ways of manning the armed forces, achieving capability targets and international operations and missions. This year also marks 20 years since members of the Slovenian Armed Forces have joined an international operation for the first time. It was Operation Alba in Albania. Since then, they have participated in numerous operations and missions throughout the world. The 2017 will undoubtedly also be marked by the findings of the 2016 Strategic Defence Review, and the tasks arising from it. The chapter referring to the strengthening of the defence capability and resilience defines the primary objective of further development of the defence system and defence capacity of the Republic of Slovenia, which arises from the findings of the strategic review. The authors of the document classified them as follows: provision of the country’s defence capabilities, enhancing the resilience of the state and society to security threats, improving the preparedness and sustainability of the Slovenian Armed Forces, and achieving of common goals and commitments in the framework of the EU and NATO. It is our firm belief that the articles in this issue of the Contemporary Military Challenges titled Security as an imperative can contribute to the goals set out in the Strategic Defence Review. Defence planning – vital policy instrument in supporting a nation's defence needs is the title of the article written by Pavel Vuk. In the final part of the article, the author writes that the main question of the politics when discussing future defence needs of a county from the perspective of limited economic ability should always focus on defence planning. It should primarily attempt to find the answer to the fundamental question of whether the proposed plan will offer adequate answers to the future national defence needs.
APA, Harvard, Vancouver, ISO, and other styles
17

Dumić, Aleksandar, and Mitar Kovač. "The impact of the common security and defence policy of the European Union on the security of the Republic of Serbia." Vojno delo 73, no. 2 (2021): 18–30. http://dx.doi.org/10.5937/vojdelo2102018d.

Full text
Abstract:
The answer to transnational and asymmetric threats that are a topical issue on the world geopolitical stage can be found in the integration of national security systems, strengthening multilateral forms of security and the collective system of international security, as the key factors in providing peace, stability and democratic development of modern countries. In such circumstances, the need for a cooperative approach in preserving and improving security, based on cooperation and pooling of security capacities of nation states, is strengthening. This paper views the current achievements of the European Union (hereinafter EU) in terms of implementing its own security policy, primarily in the Western Balkans, in a broader sense, and the specific impact of such a policy on the security of the Republic of Serbia, in a narrower sense. Having in mind the extensive and complex context of the discussed topic, the paper considers, in the authors' opinion, an essential part of this issue, through the analysis of the position of the Republic of Serbia in such context, reviewing the genesis of the EU-Serbia relations and identifying current issues in these relations, and also through the possibilities of progress of cooperation and greater involvement of the capacities of our country in the current EU security policy in this region and beyond.
APA, Harvard, Vancouver, ISO, and other styles
18

Lipka, Mirosław. "Civilian CSPD Missions as European Union's Response to International Crises: Selected Aspects of Crisis Management." Security Dimensions 36, no. 36 (July 19, 2021): 64–93. http://dx.doi.org/10.5604/01.3001.0015.0487.

Full text
Abstract:
This article provides an overview of EU Common Security and Defence Policy (CSDP) missions’ crisis management achievements and challenges since 2003, in connection with the European External Action Service (EEAS), the Civilian Planning and Conduct Capability (CPCC) Directorate, and their respective roles. The analysis describes and evaluates the changes in the overall political and security context and the EU’s approach, suggesting some of the consequences in the launch and implementation of civilian CSDP Missions. The article also discusses the evolution of the EU’s integrated approach to external conflict and crises, and its cooperation with other security actors. The concluding remarks compare achievements and shortcomings of ongoing missions against their mandates and objectives, outlining some selected EU initiatives which aim at improving the EU’s performance in crisis management situations.
APA, Harvard, Vancouver, ISO, and other styles
19

Lisovenko, D., and G. Belous. "MILITARY FORCES OF THE ARMED FORCES OF UKRAINE AND NATO AS THE BASIS OF SECURITY AND STABILITY IN THE BLACK SEA REGION." Collection of scientific works of Odesa Military Academy 2, no. 14 (January 25, 2021): 51–58. http://dx.doi.org/10.37129/2313-7509.2020.14.2.51-58.

Full text
Abstract:
The article considers the issue of Cooperation of Ukraine with the North Atlantic Treaty Organization (NATO). Beginning in 2014, Ukraine is actually improving control with the use of international assistance in the security industry and the relevant reporting on operational and tactical levels. General activities of Ukraine and the Alliance in the direction of security and defence, objectives: transformation and strengthening of the national security and defence sector, in relation to the performance of inherent tasks, according to the interests of the country. To ensure regional, large-scale and stable security; to facilitate and improve the development of the Armed Forces of Ukraine; to involve Ukraine in the performance of tasks in accordance with the requirements of the state defence and participation in international operations; to achieve effective compatibility of the Armed Forces of Ukraine in the context of other component parts of defence and security to ensure the performance of tasks in international operations and exercises. After the annexation of the Crimea by the Russian Federation, the Armed Forces of Ukraine received significant assistance in 2014. The priority of joint activities with NATO is primarily to guarantee the alliance of the principle of collective defence, to preserve and strengthen peace and to ensure the prospect of future security. The Alliance's ability to perform strategic tasks depends on a high degree of coordination and planning of compatible actions at the political level of the defence sector. Analysis of the participation of the Naval Forces of Ukraine and the Alliance during joint international exercises and operations, the events of the war in 2014, the military aggression of the Russian Federation, the construction of relations between Ukraine and the United States during the armed conflict, adaptation of NATO standards and principles – a number of issues for the need for rapid solution in turbo mode. Based on the analysis, the authors conclude that it is legitimate and expedient to use and gain experience in the context of the concept of development of the Navy of the Armed Forces of Ukraine. Involvement and participation in multinational military exercises is a set of measures in the context of international military cooperation, which is allowed in conditions as close as possible to combat and real. Comprehensive improvement of the level of combat training of units of the Navy of the Armed Forces of Ukraine during the increase of the level of professionalism, combat readiness and combat ability. The necessity of introduction and application of compatible measures for performance of peacekeeping, humanitarian, search and rescue and other special tasks is the priority of the concept of modern Ukraine. Constant improvement of the combat readiness level in modern conditions is achieved during the international exercises for the necessity and possibility to strengthen the professional experience of partnership, which always fundamentally affects the quality of combat tasks ahead of the number of participants involved in joint activities. Keywords: NATO, Alliance, Ukrainian Navy, Armed Forces of Ukraine, standards, training, security, Charter.
APA, Harvard, Vancouver, ISO, and other styles
20

Kárász, Balázs, and Imre Négyesi. "Information Security Responsibilities of Critical (Information) Infrastructures in the Aspect of Human Risk Factors." Hadtudományi Szemle 13, no. 3 (2020): 71–86. http://dx.doi.org/10.32563/hsz.2020.3.6.

Full text
Abstract:
With regard to the threats of information society nowadays, the digital asset management and the safety of the related information systems as well as critical infrastructure elements became highly important. The defence of cyberspace itself evolved as a social necessity. This paper aims to provide an overview of how each of the occurring human risk factors influence the effectuation of information security purposes of firms and/or organisations operating critical infrastructure or critical information infrastructure, as well as the engineering of their data processing and data analytics procedures. Moreover, the helpful role of the possible methodological toolset (connected to HR, management and risk management) is also assessed in the context of managing and improving information security awareness.
APA, Harvard, Vancouver, ISO, and other styles
21

Sokurenko, V. V. "Personnel training for the security and defense sector as a prerequisite for ensuring the national security of Ukraine." Law and Safety 82, no. 3 (September 29, 2021): 209–18. http://dx.doi.org/10.32631/pb.2021.3.24.

Full text
Abstract:
It has been established that one of the necessary steps in the direction of ensuring national security and citizens’ protection of rights and freedoms is strengthening the institutional, defense and security capabilities of bodies belonging to the security and defense sector. In this regard, it has been argued that a necessary prerequisite for national security is to ensure quality training of specialists for the security and defense sector, which will be able to respond in a timely manner to various crises. The current state of such personnel training has been characterized. The range of problematic issues on the agenda of the security and defense sector in the direction of improving the efficiency of its operation and improving education has been identified. It has been established that due to the fact that training for security and defense sector bodies is carried out in higher education institutions with specific training conditions subordinated to the relevant central executive bodies, a situation of double subordination arises: these higher education institutions are simultaneously subordinated to the Ministry of Education and Science of Ukraine, as well as they must comply with the requirements of the National Agency for Quality Assurance in Higher Education. The attention has been focused on the discussion that arises in connection with such subordination. In this regard, it has been argued the need to develop a Concept of personnel training for the security and defense sector of Ukraine and outlined the range of issues that should be reflected in it. Emphasis has been placed on the need to update the approaches to personnel preparation for the security and defense sector through the introduction of an integrated education system for security and defense staff, within which the principles of specialization and individualization of the personnel training aimed at improving the professional level of specialists should be observed and the introduction of a qualitatively new culture of personnel safety based on the principles and standards of the European Union and NATO. It has been emphasized that special attention during training for the security and defense sector staff should be paid to the study of possible scenarios of internal and external threats to national security. It has been argued that to ensure quality personnel training for the security and defense sector, it is important to form a quality system of recruitment and staffing of security and defense forces with professional staff, updating approaches to the selection procedure (both professional and psychological, moral) of candidates for service in the security and defense sector; improving the quality of training of scientific personnel who have special knowledge, skills, abilities and methods necessary to solve problems related to the functioning of the security and defense sector; strengthening practical training, in particular conducting trainings focused on providing practical skills and abilities to resolve conflicts without the use of special tools and weapons; improving the quality and intensity of joint training of defense forces to conduct strategic actions.
APA, Harvard, Vancouver, ISO, and other styles
22

Okhrimenko, Ivan M., Nina V. Lyhun, Viktoriia P. Pryimak, Yaroslav I. Korol, and Mykhailo S. Myroshnychenko. "NEGATIVE FACTORS OF MANAGEMENT ACTIVITIES OF THE SECURITY AND DEFENCE SECTOR REPRESENTATIVES AND DIRECTIONS OF THEIR OVERCOMING." Wiadomości Lekarskie 74, no. 4 (2021): 891–95. http://dx.doi.org/10.36740/wlek202104115.

Full text
Abstract:
The aim is to substantiate the expediency of performing physical exercises by representatives of the security and defence sector to reduce the negative impact of management activities factors on their state of health. Materials and methods: The peculiarities of professional activities of 82 officers of the National Police and the Armed Forces of Ukraine, who had military and special ranks of “lieutenant colonel”, “colonel” and held senior positions (heads of faculties, departments, divisions, services and other units) were studied. Research methods: theoretical analysis and generalization of literature sources, pedagogical observation, interviews, questionnaires. Results: It was found that management activities are characterized by a number of negative factors, which negatively affect the body of management level officers. With systematic interference, they significantly worsen the state of officers’ health and negatively affect the effectiveness of their management activities. Conclusions: Physical education has significant potential in improving the efficiency of professional activities of management level officers, strengthening their health and enhancing working ability. The direction of improving physical training of management level personnel is determined as increasing the amount of general physical training, conducting classes with different orientations taking into account the age group, service load and training within the working time pattern.
APA, Harvard, Vancouver, ISO, and other styles
23

Zaikivskyi, Oleksandr, and Oleksandr Onistrat. "State national security policy and intellectual property issues." Theory and Practice of Intellectual Property, no. 3 (September 7, 2021): 19–33. http://dx.doi.org/10.33731/32021.239573.

Full text
Abstract:
Keywords: state policy, national security, intellectual property National security (“NS”) of Ukraine is achieved through a balancedstate policy in accordance with accepted doctrines, strategies, concepts and programsin such areas as political, economic, social, military, environmental, scientific andtechnological, information, etc.However, many theoretical and practical issues concerning the definition of thecontent, challenges, tasks and mechanisms of implementation of effective functions ofpublic policy and management decisions for the further development of social processesstill remain insufficiently studied. Therefore, the main tasks of the NS system subjectsare constant monitoring of the impact on NS of processes taking place in variousfields (including intellectual property), forecasting, identifying and assessing possiblethreats, destabilizing factors and conflicts, their causes and occurrence consequences.In particular, the impact on NS (especially on defence capabilities) of the significantdevelopment of intellectual property and the full use of intellectual property rights isnot taken into account at all.State NS policy should include measures to prevent the emergence and neutralizationof sources of threats to NS under the influence of the development of intellectualproperty.Theoretical aspects of the state policy of National Security and Defence of Ukraine(“NSDU”) development are considered. The necessity of current problems definition inthis sphere and the inclusion of intellectual property questions in these processes isinvestigated. It is determined that the effective implementation of the state NS policyis impossible without a comprehensive analysis of intellectual property issues impacton the sphere of the NSDU. The importance of further research on the development ofa unified approach to improving the protection of intellectual property and its determinationas a component of NSDU, the development of appropriate recommendationsto address issues of intellectual property in this area and to neutralize sources ofthreats under the influence of intellectual property in the structure of NSDU.
APA, Harvard, Vancouver, ISO, and other styles
24

Vatamanyuk-Zelinska, Uliana, Victoria Bednarchuk, and Alina Mlintsova. "Financing the needs of the defence sector in Ukraine." INNOVATIVE ECONOMY, no. 7-8 (November 2020): 22–27. http://dx.doi.org/10.37332/2309-1533.2020.7-8.3.

Full text
Abstract:
Purpose. The aim of the article is to comprehensive study of the financing of expenditures for the needs of the defence sector in Ukraine, practical study and analysis of their composition and dynamics for the national security and defence of the state in the ongoing aggression of the Russian Federation. Methodology of research. A set of general scientific research methods was used to achieve the defined goal and objectives, which made it possible to present directions for improving the process of financing the expenditures of the State Budget of Ukraine for the needs of the defence sector. The scientific literature, normative and legislative documents on the topic of scientific research are considered. Thus, descriptive statistics were used in the analysis of data on the amount of financial support for military expenditures from the state budget. A method of comparison was used to identify trends and patterns in the financing of expenditures for the needs of the defence sector of the state. It allowed to identify the dynamics of defence expenditures on their functional basis. With the help of a systematic approach it was possible to study the patterns of financing the expenditures of the Ministry of Defence of Ukraine and to identify the need to provide budget funds for innovative developments and capital investments in the production of military equipment and military education. Methods of classification (typology) were identified to systematize the factors that have a significant impact on strengthening the defence and national security of Ukraine, and thus on the social and economic development of our state. Findings. The main reasons for the reduction of funding for expenditures for the needs of the defence sector in Ukraine are identified, which are primarily: the lack of budget requests from the Ministry of Defence of Ukraine, which are not registered by the State Treasury Service of Ukraine; imperfection of the legal and regulatory framework in the field of financing military expenditures in relation to their ratio to GDP; lack of financial component in the strategic plans for the development of the defence complex of Ukraine. This is accompanied by negative social and economic phenomena and a tense political situation in the country due to hostilities in the East. The main directions of solving problems in the field of financing defence expenditures in Ukraine are substantiated, which include: bringing in line with the provisions of certain regulations governing the relationship between expenditures for the needs of the defence industry and GDP; establishing the projected amounts of expenditures for the medium and long term, providing for their mandatory amounts in the financial component of the documents on the strategic planning of the development of the defence-industrial complex of Ukraine; increase in capital transfers of the special fund of the State Budget of Ukraine to finance the needs of the state defence sphere, taking into account the need for innovative developments and capital investments in the production of military equipment; formation of the state order for the industrial enterprises of machine-building branch, capable to make accessories for needs of a defence industrial complex; reducing corruption by ensuring greater transparency in the governance of military authorities and the implementation of NATO procedures, principles and standards. Originality. The directions of improvement of practical approaches in the field of management of budgetary funds directed on financing of the defence sphere in Ukraine are singled out. Practical value. The results of scientific research can be implemented in the activities of public administration in terms of the use of measures of operational management of public expenditures on defence and national security in a military conflict. Key words: state budget, expenditures, budget request, functional classification of expenditures, military activity, national security.
APA, Harvard, Vancouver, ISO, and other styles
25

Gupta, Sanjay Mohan, Vandana Pandey, Ankur Agarwal, Basant Ballabh, and Madhu Bala. "Role of DIBER DRDO Technologies in Improving Livelihood Opportunities and Curtailing Migration in Uttarakhand." Defence Life Science Journal 6, no. 2 (June 3, 2021): 187–95. http://dx.doi.org/10.14429/dlsj.6.16229.

Full text
Abstract:
Migration of local population of Uttarakhand (UK) border areas is presently serious issues for national security since; this State is sharing international border (~650 km) with China/Tibet and Nepal. Among the various factors reported for migration, few notables are search for better livelihood, unemployment, difficult remote terrain and poor land connectivity, less productivity from agriculture due to abiotic and biotic stresses etc. Hence, measures to increase the livelihood opportunities in these border areas to curb the problem of migration through intervention of modern agro-animal technologies are essentially required. In this attempt, Defence Institute of Bio Energy Research (DIBER) has already developed various agro-animal mature technologies, in terms of high yielding and genuine quality seed/seedlings, protected cultivation technology, soil-less cultivation technology, angora farming, mushroom cultivation, medicinal and aromatic plants (MAPs) cultivation technology, hydro-fodder, etc that shown great promise and impact in increasing the farm income and livelihood opportunities for civil inhabitants of these marginal regions. This article highlights the DIBER outreach extension efforts for ensuring better livelihood opportunities to farmers of border area and also to curtail migration that will in turn increase strategic support to Army and paramilitary defence forces deployed in three border Distts (Uttarkashi, Chamoli and Pithoragarh) of UK.
APA, Harvard, Vancouver, ISO, and other styles
26

Chernysheva, Galina N., Nikolay V. Rogov, and Maria Vyacheslavovna Tkacheva. "Methods for ensuring the reliable fulfilment of state defence orders." Vestnik Voronezhskogo gosudarstvennogo universiteta. Ser.: Ekonomika i upravlenie = Proceedings of Voronezh State University. Series: Economics and Management, no. 3 (September 30, 2021): 94–108. http://dx.doi.org/10.17308/econ.2021.3/3621.

Full text
Abstract:
Introduction. The national security of the Russian Federation, both within the country and externally, is ensured by the development of its military-technical potential. The military-technical potential is viewed as an ability of the state to maintain the armed forces and to provide the army with modern and competitive military equipment. This is performed through state defence orders (SDOs). Taking into account both internal and external factors, it is impossible to fulfil SDOs without a reliable system of contract liabilities. To ensure proper fulfilment of SDOs, it is necessary to consider the following measures: 1) to retain all the liabilities of contracts for the duration of the contracts, i.e. the liabilities of the customer with regard to the financing of SDOs, and the liabilities of the contractor with regard to the production of the military equipment of high quality; 2) to prevent unauthorised use of the financing provided for the SDOs. Purpose. The purpose of our study was to analyse the factors preventing the fulfilment of SDOs and suggest measures for improving the system for managing SDOs and the economic security of defence industry enterprises. Methodology. In our study we used general scientific methods and specific economic analysis methods: systems analysis, time series analysis, modelling, and expert evaluation methods. The analysis was based on Russian and international sources, as well as the regulatory and legal framework concerning SDOs. Results. In our study, we listed and classified the factors preventing the fulfilment of SDOs, and suggested a SDO model in the form of a system of financial relations between entities. To ensure the fulfilment of SDOs, we suggest a series of measures to control the compliance of financial flows and the economic security of defence industry enterprises. Conclusions. The article presents a specific study of financial flows between the key participants of SDOs. The determined problems and suggested measures will help to reduce the risks and ensure the proper fulfilment of SDOs.
APA, Harvard, Vancouver, ISO, and other styles
27

Zhuravel, Valery. "NORWAY’s ARCTIC STRATEGY AND SECURITY ISSUES." Scientific and Analytical Herald of IE RAS 23, no. 5 (October 31, 2021): 23–30. http://dx.doi.org/10.15211/vestnikieran520212330.

Full text
Abstract:
The article examines Norway’s Arctic strategy and the country’s policy in the field of defence and security. It is noted that Oslo, among the countries of the Arctic Council, is the leader in the development and further improvement of strategies in the Arctic, taking into account the peculiarities of the country and its northern territories. The country is implementing one of the most innovative economic strategies in the region, developing high-tech sectors of the economy, reducing its dependence on the export of hydrocarbon raw materials, improving the administrative-territorial division of the country in the interests of developing the northern provinces. Attention is paid to the development of the industrial sector of the economy, transport (primarily port) infrastructure, scientific and educational complexes, Arctic tourism and recreational business, migration policy and support of the indigenous population. The author pays special attention to Norway’s place in NATO, noting that the North of Norway is becoming one of Scandinavia’s most militarised regions. It is emphasised that this greatly hinders international cooperation with the closest neighbours, primarily with Russia. It is necessary to seek to improve relations between our countries, even in the face of the current friction at the interstate level in matters of security and severe contradictions in the area of the Spitsbergen archipelago.
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Ping, Maurice Dawson, and Kenneth L. Williams. "Improving Cyber Defense Education through National Standard Alignment." International Journal of Hyperconnectivity and the Internet of Things 2, no. 1 (January 2018): 12–28. http://dx.doi.org/10.4018/ijhiot.2018010102.

Full text
Abstract:
There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national standard with specific criteria for maintaining the quality of cybersecurity education. This article explains the CAE-CDE program criteria and requirements and discusses the important role of the special designation in improving cyber defense education and workforce development. This article illustrates the educational value and quality impact of the CAE-CDE program with three case studies: (1) University of Missouri – St. Louis; (2) American Public University; and (3) Robert Morris University.
APA, Harvard, Vancouver, ISO, and other styles
29

Miraglia, Armando, and Matteo Casenove. "Fight fire with fire: the ultimate active defence." Information & Computer Security 24, no. 3 (July 11, 2016): 288–96. http://dx.doi.org/10.1108/ics-01-2015-0004.

Full text
Abstract:
Purpose This paper proposes an approach to deal with malware and botnets, which in recent years have become one of the major threats in the cyber world. These malicious pieces of software can cause harm not only to the infected victims but also to actors at a much larger scale. For this reason, defenders, namely, security researchers and analysts, and law enforcement have fought back and contained the spreading infections. However, the fight is fundamentally asymmetric. Design/methodology/approach In this paper, the authors argue the need to equip defenders with more powerful active defence tools such as malware and botnets, called antidotes, which must be used as last resort to mitigate malware epidemics. Additionally, the authors argue the validity of this approach by considering the ethical and legal concerns of leveraging sane and compromised hosts to mitigate malware epidemics. Finally, the authors further provide evidence of the possible success of these practices by applying their approach to Hlux, Sality and Zeus malware families. Findings Although attackers have neither ethical nor legal constraints, defenders are required to follow much stricter rules and develop significantly more intricate tools. Additionally, attackers have been improving their malware to make them more resilient to takeovers. Originality/value By combining existing research, the authors provide an analysis and possible implication of a more intrusive yet effective solution for fighting the spreading of malware.
APA, Harvard, Vancouver, ISO, and other styles
30

M., Raymond, and Ibyingibo S. "National Defence Expenditure and Its Implications on Economic Development in Nigeria." African Journal of Economics and Sustainable Development 4, no. 1 (May 7, 2021): 17–31. http://dx.doi.org/10.52589/ajesd-4iwkvnsi.

Full text
Abstract:
The issue of security is presently a critical challenge for the Nigeria State: biggest democracy in Africa as reports of killings are plastered on a daily basis on both print and social media. This is unpalatable for a developing country like Nigeria that has its eyes set on improving the lot of its citizens and becoming a force to reckon with in the global economy. It is on this backdrop that this study set sail to examine the association between national defence expenditure and economic development in Nigeria. The study adopted Ex-post facto research design as the variables- Misery Index, CDEX and RDEX: cannot be manipulated as they are annual time series data sourced from the World Development Indicator and the Central Bank of Nigeria annual report from a period of 38 years covering from 1981 to 2018, which were in turn analyzed using the error correction model (ECM) method of estimation. The result of the Johansen cointegration test revealed that government capital spending on defence, recurrent spending on defence, foreign direct investment and misery index have common trends in the long run. The outcome of the normalized cointegration disclosed a negative and significant relationship between government capital spending on defence and misery index, while a positive and significant long run relationship exists between government recurrent spending on defence and misery index. The short run analysis pointed to a positive and significant relationship between previous year’s misery index and current year’s misery index. The study thus recommended that government defence spending be reassessed to make it development oriented and proper monitoring of defence spending be carried out.
APA, Harvard, Vancouver, ISO, and other styles
31

Houry, M. P., and O. Faucon. "Defense plans: Economic solutions for improving the security of power systems." Control Engineering Practice 7, no. 5 (May 1999): 635–40. http://dx.doi.org/10.1016/s0967-0661(98)00179-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Houry, M. P., and O. Faucon. "Defense Plans: Economic Solutions for Improving the Security of Power Systems." IFAC Proceedings Volumes 30, no. 17 (August 1997): 621–26. http://dx.doi.org/10.1016/s1474-6670(17)46474-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Grover, Atul, Lekha Charan Meher, Ranjit Singh, Abhinav Singh, Sudhanshu Tiwari, Sanjai Kumar Dwivedi, and Madhu Bala. "Biofuels for Defence Use: Past, Present And Future." Defence Life Science Journal 4, no. 1 (December 31, 2018): 3–11. http://dx.doi.org/10.14429/dlsj.4.12366.

Full text
Abstract:
Defence sector desires to attain energy self-sufficiency and security. In recent years, emergence of biofuel as an alternative source has raised the hopes of Defence. Ethanol and bio-diesel are currently being used as blends in different parts of the world. While, bio-diesel is mostly being blended in 2-20% in different parts of the world, ethanol blending has reached upto 85%. Owing to the sustainability reasons, the choice of feedstock for ethanol production is gradually changing from corn to lignocelluloses biomass. Jatropha curcas, is still the choice feedstockfor bio-diesel in most third world countries. This institute has put in rigrous efforts to identify high yielding varieties of Jatropha, improving its yield, standardizing trans-esterification to obtain high quality bio-diesel and its trials and testing in various vehicles and equipment. Second generation biofuels using biomass such as farm and forest wastes as feedstocks are promising in terms of their overall sustainability and volume produced. They can be used as drop in fuels. However, time is required to utilize their potential fully. Algae, the third generation biofuel feedstock still needs extensive R&D to make it economically sustainable. Whatever, the technology used, defence forces will accept any biofuel, which should be available constantly and priced below the existing petroleum fuels. The scope of producing by-products and finding a lucarative market for these products can ensure that prices ofbiofuels remain lower than the petroleum fuels
APA, Harvard, Vancouver, ISO, and other styles
34

Shopina, І. "Problems of improving the activities of public administrations in the security and defense sector." Visnyk Taras Shevchenko National University of Kyiv. Military-Special Sciences, no. 2(50) (2022): 104–7. http://dx.doi.org/10.17721/1728-2217.2022.50.104-107.

Full text
Abstract:
The purpose of the article is to determine, based on the analysis of approaches to the effectiveness of public administrations in the security and defense sector, areas for improving the activities of these bodies. It has been established that the full-scale armed aggression of the Russian Federation against Ukraine, which caused the introduction of the legal regime of martial law, exacerbated the problems existing in the field of public administration in the security and defense sector. It is argued that public administration under the conditions of the legal regime of martial law has its own differences related to the emergence of new types of public administrations (military administrations), the restriction of certain rights and freedoms of man and citizen, and the expansion of the competence of military authorities. Particular attention is paid to the essence and characteristics of civilian democratic control over the security and defense sector. It has been determined that assessment within the framework of public supervision as an integral part of democratic civil control allows, on the one hand, to maintain objectivity due to the absence of disciplinary and other administrative ties between the subject and object of supervision. It is argued that democratic civil control should be carried out taking into account the restrictions existing in the conditions of the legal regime of wartime, related both to public activity and access to certain types of information. It has been established that the effectiveness of public administration in the civil sector and the security and defense sector has its general criteria for the quality and speed of their implementation of administrative procedures within their competence. At the same time, the subjects of assessment will differ: if in the civilian sector such subjects will be general, then in the security and defense sector they will be special. It is concluded that the directions for improving the activities of public administrations in the security and defense sector should include: a) clarifying the legal status of military administrations, the grounds and procedure for their creation; b) standardization of procedures for the transformation of military-civilian administrations into military administrations; c) establishment and normative consolidation of requirements for the educational level and professional experience of the heads of military and military-civilian administrations.
APA, Harvard, Vancouver, ISO, and other styles
35

Gajic, Dejan. "Development of armed forces in the European Union." Medjunarodni problemi 55, no. 3-4 (2003): 339–53. http://dx.doi.org/10.2298/medjp0304339g.

Full text
Abstract:
After the end of World War II leaders of the West European countries had realised the necessity to create new security frameworks, thus making the security of the continent the concern of the Europeans themselves. However, immediately after it had been formed the North Atlantic Alliance, as a trans-Atlantic defence shield against the danger from the "communist East", became the central security component in Europe. Just after the end of the Cold War and disappearance of the "danger from the East" the European leaders initiated the process of creation of the new European defence system. The system would be designed in such a way not to jeopardise the position of the NATO, improving at the same time the security and stability in the continent. In the first part of the article the author considers the course of European integration in the second half of the last century that proceeded through creation of institutions preceding the establishment of the European Union. During the period of creation of this specific form of action performed by the European states at the internal and international levels, the deficiency of integration in the military field was notable. In that regard, the author stresses the role of the Western European Union as an alliance for collective defence of West European countries. The second part of the paper discusses the shaping of the EU security component through the provisions on the Common Foreign and Security Policy, which are included in the EU agreements. The Maastricht Treaty defined the Common Foreign and Security Policy as an instrument to reach agreement by member states in the defence field. The Amsterdam Treaty confirmed the role of this mechanism expanding the authorities resulting from it. The Treaty of Nice supplements the existing mechanism by a new military and political structure that should help implement the decisions made by the European Union institutions in the military field. In the third part of the article, the author presents the facts concerning the establishment and internal organisation of the Eurocorps. The creation of this military formation took place in early 1990s and was initiated by the two states of "the old Europe" - Germany and France. The authors also emphasises that the establishment of this formation is the first step towards creation of the armed forces in Europe. The fourth part of the paper treats the Rapid Reaction Force that was established by the Helsinki Agreement (1999). It became operative in early 2003 and its basic aim is to prevent the outbreak of crises in the region and to improve stability in Europe. In spite of the opinions that the establishment of such a force is the skeleton for creation of the European armed forces, the author thinks that, at least in the near future, they will not be a rival to the NATO. In his opinion, their possible military missions will be carried out only when the alliance takes no interest in being engaged in them.
APA, Harvard, Vancouver, ISO, and other styles
36

Baker, Brenda M. "Improving our Practice of Sentencing." Utilitas 9, no. 1 (March 1997): 99–114. http://dx.doi.org/10.1017/s095382080000515x.

Full text
Abstract:
Restorative justice should have greater weight as a criterion in criminal justice sentencing practice. It permits a realistic recognition of the kinds of harm and damage caused by offences, and encourages individualized non-custodial sentencing options as ways of addressing these harms. Non-custodial sentences have proven more effective than incarceration in securing social reconciliation and preventing recidivism, and they avoid the serious social and personal costs of imprisonment. This paper argues in support of restorative justice as a guiding idea in sentencing. As part of this defence, it considers whether the use of the idea of restorative justice will conflate criminal law with civil law or displace the authority of the criminal courts, and whether the sentences it recommends are best thought of as punishments or alternatives to punishment.
APA, Harvard, Vancouver, ISO, and other styles
37

Xing, Jingyu, and Zheng Zhang. "Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments." Security and Communication Networks 2022 (March 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/6783223.

Full text
Abstract:
This paper presents an in-depth study and analysis of hierarchical network security measurement and optimal active defense in the cloud computing environment. All the cloud platform security-related data collected through cloud platform monitoring is collected, and then the relevant security data is summarized and analyzed, so that the specific security posture index of the cloud platform can be derived, thus providing a reference for cloud platform managers to judge the security risks of the cloud platform. It provides a reference for cloud platform managers to judge the security risks of cloud platforms. Through the cloud platform security situation awareness system, we mainly study the construction of cloud platform, the construction of security situation awareness system, and the calculation of security situation value and use, thus greatly improving the stability, security, and reliability of the cloud platform. The application of the method avoids the drawbacks of traditional network security management, which relies entirely on past data and cannot sense changes in the security state of the system in real time. At the same time, the predicted results are added to the input of the fuzzy decision-making system, improving the accuracy of the assessment. The method improves the real-time and effectiveness of network security posture prediction, increases the convergence speed and prediction accuracy of the algorithm, and avoids the occurrence of overfitting. Simulation experiments based on the internet network security posture dataset show that this research method has less prediction error than the traditional machine learning methods and other deep learning methods, has higher learning efficiency, and is more rapid, accurate, and effective in predicting the trend of network security posture in the big data environment in the future period.
APA, Harvard, Vancouver, ISO, and other styles
38

RZAYEVA, GULNAZ AYDIN, and AYTAKIN NAZIM IBRAHIMOVA. "Organization of Information Security in E-Goverment as Means of Information Rights Protection." Право України, no. 2020/04 (2020): 225. http://dx.doi.org/10.33498/louu-2020-04-225.

Full text
Abstract:
As a concept, electronic government is directed to improving the efficiency of the activity of the state institutions and improving the living standards of citizens. Formation of the electronic state determines the pace of development of human rights and freedoms in accordance with the requirements of the time, among which the rights of information are of particular importance. However, in a situation where the completeness, accessibility and confidentiality of information is not fully ensured, there are obstacles to the realization of information rights. Therefore, the organization of information security is one of the means of guaranteeing information rights. In this regard, information security should be analyzed not only from technical aspect but also from human rights law. These highlights confirm the relevance of the topic of the article. The article’s objective is to analyze the notions “e-government”, “e-parliament” and “e-court”, to list priorities of e-state from aspect of human rights and freedoms provision, to determine the legal, theoretical and technical approaches to the information security in various models of e-government, to define difference between electronic security or information security, to research the importance of e-governance from the human rights aspect and to put forward suggestions about protection of information rights violated in cyberspace. The authors conclude that, full access to information, in new society ensures information and other rights and freedoms. Therefore, the lack of information security or low level of information security prevents the e-government from benefiting its citizens. One such barrier is considered an electronic divide or digital divide. Due to the global nature of cyberspace and information society, these problems should be solved not only at national level but also internationally. Above all, security should not be taken from the technical aspect. This prevents problems from being solved. Information security should also be analyzed as a legal institution, and the distinction between the terms “information protection” and “information defence” should be clarified. The legal aspect of the matter should be expressed. Thus, the authors conclude with an optimistic approach that elimination the problems arising during the formation of e-government will serve both to promote basic human rights and freedoms, and to make every citizen an active member of the digital society.
APA, Harvard, Vancouver, ISO, and other styles
39

Rogatin, S. I. "Directions for improving the economic regulation of the State Defense Order." Administrative Consulting, no. 7 (October 11, 2022): 128–36. http://dx.doi.org/10.22394/1726-1139-2022-7-128-136.

Full text
Abstract:
Since February 2022, the Russian economy has been developing in the changed external political and economic conditions, determined by sanctions pressure from the “collective West”. The purpose of imposing sanctions is to weaken the Russian economy and force the political leadership of our country to make decisions in the military, social and economic spheres that do not reflect the national interests of the Russian Federation. The negative impact of sanctions on the national economy and new threats to national security, including in the military sphere, are today forcing us to reconsider approaches to regulating the activities of enterprises in the military-industrial complex, which are the economic basis for ensuring Russia’s military security. The author proposes to do this through the institutional modernization of the State Defense Order system, considering existing experience and decisions already made during 2022. The article discusses some of the most significant (according to the author) directions for improving the regulation of economic relations in Russia in the field of the State Defense Order and proposes adjustments to the rules for regulating economic activity in military-economic relations.
APA, Harvard, Vancouver, ISO, and other styles
40

Markina, Iryna, Valeriya Lenʹ, and Vitaly Shapka. "Cost management as a factor for improving enterprise economic security." Actual problems of innovative economy, no. 3 (May 30, 2019): 83–88. http://dx.doi.org/10.36887/2524-0455-2019-3-12.

Full text
Abstract:
Introduction. Modern enterprises operate in conditions of political and economic instability. This requires enterpris-es to build an integrated system for ensuring economic security. In Ukraine, the issue of economic security is relevant. But not fully understood. Need to clarify issues related to improving cost management. This is a factor in improving the econom-ic security of the enterprise. The purpose of the study is the theoretical and practical justification of cost management. Results. One of the the main goal of the enterprise is maximum profit. A factor in the success of enterprises is to re-duce production costs. Business security is a prerequisite for stable sustainable development and effective operation of the enterprise. Economic security depends on many factors: the actions of competitors, unsuccessful state policies, changing market conditions, and crisis phenomena. Object of enterprise security: personnel (managers, structural divisions, share-holders and employees), financial, economic, material and intellectual capital of the enterprise; specifics of activity. The head of the enterprise makes a decision. The decisions concern the price of the product, the amount of expenses. Costs - a decrease in the volume of material assets, cash. Cost management involves functions: forecasting, planning, rationing, organization, calculation, motivation and stimulation, accounting, analysis, regulation and control of expenses. Conclusions. We consider the “Cost-Volume-Profit” (CVP- analysis) analysis to be successful. It allows you to iden-tify changes in costs. The dependence of changes in production volumes and incomes on sales is studied; expenses and net profit. It’s substantiated that cost and profit planning using CVP analysis has limitations. Marginal income (profit) – the difference between sales revenue and variable costs. The higher the marginal income level, the faster fixed costs are reim-bursed. The average marginal income is an “indicator” of the contribution of a unit of production to covering fixed costs. The purpose of break-even analysis (CVP-analysis) is to predict financial results. Break-even analysis of economic activity is an indicator of the brink of effective and inefficient management. The same is the condition for maximizing profits. The main thing is an effective defense mechanism of the enterprise. Provides economic security of the enterprise from the threat of bankruptcy. Keywords: economic security, cost management, profit, costs, cost-volume-profit analysis.
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Cheng Jiong. "The Study of Access Mechanism for the Security of Linux." Applied Mechanics and Materials 422 (September 2013): 176–80. http://dx.doi.org/10.4028/www.scientific.net/amm.422.176.

Full text
Abstract:
TCSEC standard is defined by the U.S. Department of Defense as the operating system security evaluation criteria. Under this standard, Linux system has a higher security level, but there are still some dangers, such as the coarseness of file access granularity. In this paper, we have studied the file access mechanism of Linux, analyzed the security module of LinuxLSM, and then designed the file access mechanism ACL, achieved fine-grained access to files, thus improving the system security level of Linux.
APA, Harvard, Vancouver, ISO, and other styles
42

Santhosh Kumar, S. V. N., M. Selvi, and A. Kannan. "A Comprehensive Survey on Machine Learning-Based Intrusion Detection Systems for Secure Communication in Internet of Things." Computational Intelligence and Neuroscience 2023 (January 27, 2023): 1–24. http://dx.doi.org/10.1155/2023/8981988.

Full text
Abstract:
The Internet of Things (IoT) is a distributed system which is made up of the connections of smart objects (things) that can continuously sense the events in their sensing domain and transmit the data via the Internet. IoT is considered as the next revolution of the Internet since it has provided vast improvements in day-to-day activities of humans including the provision of efficient healthcare services and development of smart cities and intelligent transport systems. The IoT environment, by the application of suitable security mechanisms through efficient security management techniques, intrusion detection systems provide a wall of defence against the attacks on the Internet and on the devices connected with Internet by effective monitoring of the Internet traffic. Therefore, the intrusion detection system (IDS) is a resolution proposed by the researchers to monitor and secure the IoT communication. In this work, a meticulous analysis of the security of IoT networks based on quality-of-service metrics is performed for deploying intrusion detection systems by carrying out experiments on secured communication and measuring the network’s performance based on comparing them with the existing security metrics. Finally, we propose a new and effective IDS using a deep learning-based classification approach, namely, fuzzy CNN, for improving the security of communication. The major and foremost advantages of this system include an upsurge in detection accuracy, the accurate detection of denial of service (DoS) attacks more efficiently, and the reduction of false positive rates.
APA, Harvard, Vancouver, ISO, and other styles
43

Vergolyas, O. O. "Directions for improving the legal support of special information operations." Uzhhorod National University Herald. Series: Law, no. 65 (October 25, 2021): 215–21. http://dx.doi.org/10.24144/2307-3322.2021.65.39.

Full text
Abstract:
The article is devoted to the definition of problematic aspects and prospects for improving the information and legal support of special information operations (hereinafter - SIO), because currently there is no sufficient legal basis for the development of methodological principles for their implementation. SIOs have a special place in the system of means of counteracting threats to the national security of Ukraine as an independent means of implementing information and psychological measures and as an auxiliary tool in the implementation of political, economic, military and other measures. At the same time, SIOs can be implemented while providing not only information, but also other components of national security, which is a complex and multifaceted phenomenon. As special operations in general, including SIOs, are now considered under Ukrainian law as a form of hostilities, it is virtually impossible to conduct SIOs of a protective nature, including counterintelligence SIOs on the territory of Ukraine. Thus, the current legislation does not provide for conducting SIOs against citizens of Ukraine (except for those who are members of terrorist groups and illegal armed groups), as well as conducting SIOs in Ukraine outside the territory where martial law is imposed, outside the area of anti-terrorist operations or other places (areas) of training and use of the Armed Forces. However, both the intelligence and counterintelligence aspects of SIO are manifested at all stages of SIO, regardless of their direction, offensive or defensive nature. Therefore, the issue of urgent need is to provide the authority to conduct the SIO to the Security Service of Ukraine while depriving it of the status of a military formation, which will ensure compliance with the requirements of Art. 17 of the Constitution of Ukraine, as well as the effective conduct of SIO in the interests not only of defense but also of anti-terrorist, anti-criminal, information and other components of national security of Ukraine. Similar powers should also be given to the intelligence agencies of Ukraine, as well as to other entities of the security and defense sector in accordance with their competence. No less important is the actual normative consolidation of the definition of SIO at the level of law and the construction of a modern model of SIO and the formation of the algorithm for conducting SIO.
APA, Harvard, Vancouver, ISO, and other styles
44

Stankin, Alexey. "Military security: problems of legal regulation." Legal Science and Practice: Journal of Nizhny Novgorod Academy of the Ministry of Internal Affairs of Russia 2022, no. 1 (March 30, 2022): 109–12. http://dx.doi.org/10.36511/2078-5356-2022-1-109-112.

Full text
Abstract:
The purpose of the work is to study the problems of legal regulation in the field of military security. The subject of the study is the normative legal acts regulating the military security of the Russian Federation. In the course of the research, the following methods were applied: dialectical, logical, systematic, formal and legal. Some problems of legal regulation in the field of military security are identified, in particular, the dissonance between the provisions of the federal laws “On Security” and “On Defense”, the problems of “narrow” and “broad” understanding of legislation in this area. The study can serve as an impetus for improving legislation in the relevant field, as well as a basis for further scientific research.
APA, Harvard, Vancouver, ISO, and other styles
45

Risal, Semuel, Irawanto Irawanto, Putri Hergianasari, Anita Ade Rahma, and Ika Devy Pramudiana. "Border Development Model on the Human Development Aspects for Sustainable Community." Jurnal Borneo Administrator 18, no. 2 (August 25, 2022): 125–38. http://dx.doi.org/10.24258/jba.v18i2.971.

Full text
Abstract:
The Indonesian government has implemented a border development policy. Still, it has not been able to answer the complexity of the problems that occur in border areas, especially in North Kalimantan. The development of border areas is closely related to the mission of national development, defence and state security to improve the Welfare of the people in the border areas, especially to ensure the integrity and sovereignty of the state. However, the condition of border communities in North Kalimantan is increasingly marginalized, where poverty and regional isolation trigger the high demands of local people to become border crossers to Malaysia. This study will examine the factors causing the economic backwardness of border communities in North Kalimantan, poverty and isolation of border communities, and security issues at the border. The results show that the border area needs to be closely monitored because it is a security-prone area. This makes the border development paradigm in Kaltara prioritize a security approach rather than Welfare. This causes the border areas in North Kalimantan to be scarcely touched by the dynamics of development. Therefore, border development needs to be placed in a people centre of development-oriented to people's economic development for sustainable communities through accelerating economic growth, improving the quality of human resources, and strengthening institutional capacity for border area development. Thus, border communities can enjoy prosperity by protecting and maintaining state sovereignty at the border.
APA, Harvard, Vancouver, ISO, and other styles
46

Liu, Yongli, Weifang Zhai, and Song Ji. "Research on Campus Network Security Problem and Protection Strategy." International Journal of Advanced Pervasive and Ubiquitous Computing 9, no. 3 (July 2017): 15–31. http://dx.doi.org/10.4018/ijapuc.2017070102.

Full text
Abstract:
With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.
APA, Harvard, Vancouver, ISO, and other styles
47

Thomas, Jason Earl, and Gordon C. Galligher. "Improving Backup System Evaluations in Information Security Risk Assessments to Combat Ransomware." Computer and Information Science 11, no. 1 (January 2, 2018): 14. http://dx.doi.org/10.5539/cis.v11n1p14.

Full text
Abstract:
Ransomware is the fastest growing malware threat and accounts for the majority of extortion based malware threats causing billions of dollars in losses for organizations around the world. Ransomware is a global epidemic that afflicts all types of organizations that utilize computing infrastructure. Once systems are infected and storage is encrypted, victims have little choice but to pay the ransom and hope their data is released or start over and rebuild their systems. Either remedy can be costly and time consuming. However, backups can be used to restore data and systems to a known good state prior to ransomware infection. This makes backups the last line of defense and most effective remedy in combating ransomware. Accordingly, information security risk assessments should evaluate backup systems and their ability to address ransomware threats. Yet, NIST SP-800-30 does not list ransomware as a specific threat. This study reviews the ransomware process, functional backup architecture paradigms, their ability to address ransomware attacks, and provides suggestions to improve the guidance in NIST SP-800-30 and information security risk assessments to better address ransomware threats.
APA, Harvard, Vancouver, ISO, and other styles
48

Babiński, Aleksander, and Janusz Falecki. "Joint Operations of the Polish Armed Forces and the Police." Internal Security 9, no. 1 (December 29, 2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7464.

Full text
Abstract:
Task performance in the area of counteraction and removal of contemporary threats results requires a state to use all of its possible sources and resources. Main entities that carry out those tasks are Armed Forces of the Republic of Poland and Polish Police. Important areas of Polish Armed Forces and Police activities include tasks in the field of crisis management, security and public order maintenance, as well as country’s defence. An effective task performance in particular areas is highly reliant on the quality of joint operations of the entities. Different legislative acts only slightly define powers to organize joint operations by Armed Forces and Police, however, the rules of such operations are described in detail in the agreements concluded between them. The area of joint operations of Polish Armed Forces and Police which should be of much attention is a good organization of joint training courses and field exercises. Such undertakings would significantly improve the effectiveness of joint operations of the entities, consequently reducing the number of victims and material loss, improving the protection of natural environment and providing the state security at a high level.
APA, Harvard, Vancouver, ISO, and other styles
49

Ushakova, K. O., and V. G. Isaev. "The influence of the state policy of import substitution on improving the quality of products of the military-industrial complex." Voprosy regionalnoj ekonomiki 40, no. 3 (September 30, 2019): 131–38. http://dx.doi.org/10.21499/2078-4023-2019-40-3-131-138.

Full text
Abstract:
In 2014, Russian Federation was restricted in importing of foreign equipment and component parts by countries that were NATO members. In that situation, the importance of national security issues increased. To deal with those issues, a range of different measures such as economical, organizational and legal were to be applied. After a long time, once again Russian Federation faced the problems concerning import substitution. National security issues are strategically important, solving these issues effects national economics defense potential. Russian Federation followed the import substitution strategy and started to support domestic producers. According to the Russian Federation President Decree of 13.05.2017 № 208, Russian Federation Economic Security Strategy was approved up to 2030. That Strategy is to oppose to economic security threats, to prevent any slump in resource and raw materials sphere, production sphere, scientific and technological spheres as well as in financial sphere. Also, the Strategy is to avoid decrease in quality of life. Import substitution is one of the main factors of economic security of any state.
APA, Harvard, Vancouver, ISO, and other styles
50

Razqi, Afrizal. "AIR DEFENCE IDENTIFICATION ZONE: UPAYA MENJAGA KEDAULATAN WILAYAH UDARA INDONESIA." Media Keadilan: Jurnal Ilmu Hukum 12, no. 1 (April 29, 2021): 76. http://dx.doi.org/10.31764/jmk.v12i1.4265.

Full text
Abstract:
ABSTRACTAir is an inseparable part of a country, a country's sovereignty over land and sea also means sovereignty over airspace. As an international community, it is only natural that Indonesia's airspace is used for the common interest of supporting population mobility and economic improvement. However, Indonesian sovereignty over airspace is still being violated by foreign aircraft. Air Defence Identification Zone (ADIZ) is a zone for identification of foreign aircraft before entering the airspace. The determination of ADIZ Indonesia needs to be accompanied by various preparations including improving positive laws regarding airspace security, completing air defense system infrastructure, and building an understanding of the concept of ADIZ Indonesia with neighboring countries directly bordering Indonesia. This paper uses a normative legal research method using a descriptive analysis approach, a legal material search technique uses a secondary data source obtained through a literature study, and a study analysis uses qualitative analysis. The results of the writing show that there are legal gaps and gaps in the determination of administrative sanctions fines, the lack of the number of radars belonging to the Indonesian Air Force under the National Defense Force in protecting Indonesian airspace, and the heavy-duty of the Ministry of Foreign Affairs to build the trust of neighboring countries amid the dynamics of the South China Sea territorial conflict if the government determines ADIZ Indonesia.Keywords: Airspace; Sovereignty; ADIZ. ABSTRAKUdara merupakan bagian yang tidak terpisahkan dari suatu negara, kedaulatan suatu negara akan daratan dan lautan juga berarti kedaulatan akan wilayah udara. Sebagai masyarakat Internasional, sudah sewajarnya wilayah udara Indonesia dimanfaatkan untuk kepentingan bersama guna mendukung mobilitas penduduk sampai peningkatan ekonomi. Namun kedaulatan Indonesia akan wilayah udara masih marak dilanggar oleh pesawat udara asing. Air Defence Identification Zone (ADIZ) merupakan zona identifikasi pesawat udara asing sebelum memasuki wilayah udara. Penetapan ADIZ Indonesia perlu dibarengi dengan pelbagai kesiapan meliputi penyempurnaan hukum positif mengenai pengamanan wilayah udara, melengkapi infrastruktur sistem pertahanan udara, dan membangun kesepahaman konsep ADIZ Indonesia dengan negara tetangga yang berbatasan langsung dengan Indonesia. Menggunakan metode penelitian hukum normatif dengan menggunakan pendekatan deskriptif analisis. Teknik penelusuran bahan hukum menggunakan sumber data sekunder yang didapat melalui studi kepustakaan. Analisis kajian menggunakan analisis kualitatif. Hasil penulisan menunjukan bahwa ada celah dan kekosongan hukum dalam penetapan denda sanksi administratif, kurangnya jumlah radar milik TNI AU dibawah Kohanudnas dalam melindungi wilayah udara Indonesia, dan tugas berat Kementerian Luar Negeri untuk membangun kepercayaan negara tetangga ditengah dinamika konflik teritorial Laut China Selatan apabila pemerintah menetapkan ADIZ Indonesia.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography