Cookies help us deliver our services. By using our services, you agree to our use of cookies. Learn more.
  • Log In
  • Register
CEEOL Logo
Advanced Search
  • Home
  • SUBJECT AREAS
  • PUBLISHERS
  • JOURNALS
  • eBooks
  • GREY LITERATURE
  • CEEOL-DIGITS
  • INDIVIDUAL ACCOUNT
  • Help
  • Contact
  • for LIBRARIANS
  • for PUBLISHERS

Content Type

Subjects

Languages

Legend

  • Journal
  • Article
  • Book
  • Chapter
  • Open Access
  • Politics / Political Sciences

We kindly inform you that, as long as the subject affiliation of our 300.000+ articles is in progress, you might get unsufficient or no results on your third level or second level search. In this case, please broaden your search criteria.

Result 66741-66760 of 69149
  • Prev
  • 1
  • 2
  • 3
  • ...
  • 3337
  • 3338
  • 3339
  • ...
  • 3456
  • 3457
  • 3458
  • Next
FAILED STATES – CONFLICT AND INSTABILITY – GENERATING
ACTORS IN THE REGIONAL SECURITY ENVIRONMENT

FAILED STATES – CONFLICT AND INSTABILITY – GENERATING ACTORS IN THE REGIONAL SECURITY ENVIRONMENT

Author(s): Marius Vasile MANGA / Language(s): English Publication Year: 0

The role of states in shaping the security environment, regional or global, is essential and defining. Wherever fragile societies, ethnic and religious rifts or an eroded sovereignty concept occur, conflict-generating processes affect the whole region.States with such problems often follow an easy-to-understand path: they are becoming weaker, fail to operate at optimal institutional parameters, and then collapse.In these cases, the role of the international community through international organizations is crucial. They need to find short-term solutions towards the rapid humanitarian recovery, but also to identify those mechanisms that erode the state at the institutional level in order to be able to correct them.

More...
TERRORISM AS THE OPPOSITE OF CIVILIZATION AFTER THE END OF THE COLD WAR

TERRORISM AS THE OPPOSITE OF CIVILIZATION AFTER THE END OF THE COLD WAR

Author(s): Alexandru MUNTEANU-LUCINESCU-CASELLA / Language(s): English Publication Year: 0

The terrorist attacks from 9/11 marked the return of the term barbarianconceived in civilizational terms and that of the sharp divide between barbarians and civilization in the forefront of political and international relations scholarly discourse with terrorists being portrayed as the new barbarians. This paper explores in its first section how journalists, academics and politicians linked terrorists with barbarians in the aftermath of the bringing down of the Twin Towers and to this purpose it indicates the connections then established between the Barbary War fought by the US at the beginning of the 19th century and the War on Terror launched by George Bush, pointing out how the linking of these two events was grounded on the evaluative use of the term civilization. In the second section it is described the present day standard of civilization by some landmarks of the beginning of the scholarly reflection of it and by identifying and specifying its constituents. The last section of the paper provides an explanation for the association made between terrorists and barbarians, arguing that some constituents of the contemporary standard of civilization operates as the assumption underpinning it.

More...
EU APPROACH TO COUNTERING DISINFORMATION AND FAKE NEWS

EU APPROACH TO COUNTERING DISINFORMATION AND FAKE NEWS

Author(s): Daniela Răpan / Language(s): English Publication Year: 0

Fake news, disinformation and propaganda are not new phenomena but, in the last years, they have acquired an enhanced dimension, in the context of the information war between Russia and the West. That is why the present paper investigates the way in which international organisations, and in particular, the EU, approach these phenomena. In this respect, we are going to overview the steps taken in this direction and analyse the Report of the Independent High level Group on Fake News and Online Disinformation published in March 2018, under the aegis of European Commission.

More...
BIOLOGICAL WARFARE – THE REAL PANDORA’S BOX.
LEARNING FROM THE PAST

BIOLOGICAL WARFARE – THE REAL PANDORA’S BOX. LEARNING FROM THE PAST

Author(s): Alexandru Herciu / Language(s): English Publication Year: 0

It is necessary to assess the risks generated by various microorganisms that can be used as biological weapons and to understand the process of their development and the use of biological agents over time. Biological agents used for military purposes may be more powerful than conventional weapons and chemical weapons. Over the past century,advances in biotechnology and biochemistry have simplified the development and production of such weapons, and genetic engineering probably holds the most dangerous potential for making biological weapons. Ease of production, broad availability of biological agents and technical knowledge have led to the proliferation of biological weapons and a growing desire among developing countries to hold them.

More...
TRENDS IN SECURITY ENVIRONMENT –DEFENCE EXPENDITURE IN THE BLACK SEA REGION

TRENDS IN SECURITY ENVIRONMENT –DEFENCE EXPENDITURE IN THE BLACK SEA REGION

Author(s): Cristian Băhnăreanu / Language(s): English Publication Year: 0

Over the past ten years, the dynamics of defence expenditure in the Black Sea region has been directly influenced by two major events with diametrically opposed effects.Firstly, the financial crisis triggered in 2008 and the spread of its economic negative effects until 2012-2013, led to a drastic decrease in military budgets in the area. Secondly, the annexation of the Crimea by Russian Federation in 2014 and the subsequent Ukrainian crisis had the effect of increasing the military spending of the riparian states. Nowadays, the Black Sea region - the NATO member countries, on the one hand, and the Russian Federation, on the other - is the scene of some military developments that seem to maintain the state of instability of the regional security environment. The aim of this paper is to analyse the security trends in the Black Sea region based on one of the most important indicators, namely the defence expenditure.

More...
REFERENCES FOR A COMPREHENSIVE AND PERMANENT NAVAL CYBER SECURITY STRATEGY

REFERENCES FOR A COMPREHENSIVE AND PERMANENT NAVAL CYBER SECURITY STRATEGY

Author(s): Sebastian Popescu / Language(s): English Publication Year: 0

The evolution of computer systems and technologies, the data networks interconnections, has generated the need to deliver distributed and integrated services, which has irreversibly conducted to the emergence of cyberspace as a field of battle with further connotations as a war domain. The military actions in the cyberspace domain are not very strictly identified and treated in international laws and norms, well known as the Law of Armed Conflict (LOAC) as the preoccupations of developing and internationally recognizing a set of regulations for the cybernetic domain are far from being decided, and the level of understanding and the knowledge within the military frame as considering the implications and application of LOAC for cyberspace is unclear. A complementary development is identified by the different levels of threat to computer security that generates a severity ofi mpact proportional to technical evolution and complexity. In this context, hacktivism, cyber crime,cyber espionage, cyber-terrorism and cyber-war are defined by the motivation, the actors and the targets for each of them, and are obviously related to the associated vulnerabilities.Cyber security is widely used term, whose definitions differ greatly and are often subjectively outlined. Thus, computer security involves the protection of computer networks and the information they include against penetration and against the impairment or interruption of data access. The same problem encounters the Navy in operating their informatics systems along the pursued sea operations.In the era of the information conflict, cyber-operations policies and the ship’s cybernetic systems’ availability are correlated with the Navy’s cybernetic capabilities and with the possibilities of using information associated with cybernetic scenarios applied by adverse forces.

More...
RECENT STRATEGICALLY SIGNIFICANT EVOLUTIONS
IN THE INDO-PACIFIC REGION

RECENT STRATEGICALLY SIGNIFICANT EVOLUTIONS IN THE INDO-PACIFIC REGION

Author(s): Florin Diaconu / Language(s): English Publication Year: 0

The Indo-Pacific region (the Indian and Pacific Oceans, plus all the countries on their shores) is to be regarded as immensely important on the world arena because of several interconnected reasons: it has a really huge size (quite clearly, the largest region in the world); the important number of really significant political actors of the world arena on its shores; the number and importance of major oceanic trade routes crossing the region; the impressive size and pace of evolution of the military capabilities of the countries in the region; and the intense political-strategic competition and conflict potential in the region. The study explores, with some details, using an important number of open sources,three major topics: the sharp increase of the Chinese naval capabilities of all sorts, directly threatening, in the long run, the stability of the regional and global balance of power; the efforts of the USA aimed at preserving and consolidating its global role; and the efforts made by many large and medium-sized states in the region in order to balance, as much as possible,the sharp increase of the more and more assertive Chinese power.

More...
THE CONNECTION OF PUBLIC ADMINISTRATION WITH THE SOCIAL SYSTEM AND ITS SUBORDINATION WITH REGARD TO THE POLITICAL SYSTEM

THE CONNECTION OF PUBLIC ADMINISTRATION WITH THE SOCIAL SYSTEM AND ITS SUBORDINATION WITH REGARD TO THE POLITICAL SYSTEM

Author(s): Andreea Cîrciumaru,David Ungureanu / Language(s): English Publication Year: 0

For the organization and functioning of a state, it is necessary that the administration and the political power cooperate, the state administration being one of the fundamental forms of achieving political power. State administration is one of the most important activities of contemporary society, and it has to be at the heart of the concerns of the political factors. Between the system of public administration and the political parties as elements of the political system there are differentiated relations from one state to another,depending on the system of government.Another issue concerns the relation between the public administration system and the pressure groups using certain constraints on the system of public administration, when its component bodies make certain decisions affecting the interests of these organizations.

More...
THE ROLE OF PUBLIC DIPLOMACY IN SOLVING INTERNATIONAL CONFLICTS AND COMBATING TERRORIST THREATS

THE ROLE OF PUBLIC DIPLOMACY IN SOLVING INTERNATIONAL CONFLICTS AND COMBATING TERRORIST THREATS

Author(s): Tudor SÂRBU,Ecaterina Hlihor / Language(s): English Publication Year: 0

The study offers a perspective of the relation between activities specific to public diplomacy and the image of a state in international politics. In a more and more interdependent and complex world, the means of public diplomacy, perceived as a dialogue oriented towards engaging the public, can lead to a better understanding between peoples by bringing forth what unites them and by eliminating the discording factors. The means specific to soft power can be more effective in managing crises and international conflicts.

More...
THE GEOSTRATEGIC CHOKE POINT IN THE CONTEXT OF WORLD GEOPOLITICS

THE GEOSTRATEGIC CHOKE POINT IN THE CONTEXT OF WORLD GEOPOLITICS

Author(s): Dragos-Ionut Pala / Language(s): English Publication Year: 0

Considering that the current geopolitical global context is full of uncertainties, the world’s states need strategic anchors in order to constantly assess their position. This necessity is met by the geostrategic field of study, namely the field that studies the geostrategic choke points of all categories and offers an action plan based on the abilities of the respective state. The analysis of how they can be used in the new geopolitical, economic and technological context represents a vital area of study for determining the advantages thata state holds, as well as its vulnerabilities so that a geopolitical plan of action can beelaborated in a close connection with the real situation in the field.As a result, the present article proposes a brief presentation of the geopolitical theoryrelated to geostrategic choke points, the different categories of geostrategic choke points, howthey influence the geopolitical situation in the field, as well as their identification on theglobal map and the exemplification of the geopolitical theory. Such an analysis also offer anexplanation of the motivation of geopolitical and geostrategic maneuvers throughout history.

More...
FROM THE JUST WAR TO THE CRIME OF AGGRESSION

FROM THE JUST WAR TO THE CRIME OF AGGRESSION

Author(s): David Ungureanu,Andreea Cîrciumaru / Language(s): English Publication Year: 0

As between individuals, there are conflicts between the actors of the international scene, the solving of which is possible either by force or by diplomacy, both methods being used throughout history, sometimes even in a congruent way. At first, a few thousand years later, war prevailed due to the possibility of achieving faster and more lasting effects than through diplomacy.However, because generalized violence sometimes had catastrophic consequences for those endowed with sense and reason, they sought justifications for the recourse to the armed force, which materialized in the theory of warfare based on the idea of legitimate defense, but also on the formalization of the hostilities and the establishment of rules of warfare. Only in our time the idea that the shift to use of the armed force without any motivation is a crime of aggression prevailed, so that a return to diplomacy is considered possible, the choice between these two modalities remaining a politics attribute.Keywords:

More...
DIRECT PARTICIPATION IN HOSTILITIES IN INTERNATIONAL LAW

DIRECT PARTICIPATION IN HOSTILITIES IN INTERNATIONAL LAW

Author(s): Adrian Băncilă / Language(s): English Publication Year: 0

Direct participation in hostilities is not limited to the personnel of the armed forces; as such, numerous dispositions of international military law refer to the possibility that civilians be attracted in the sphere of military operations. In this case the civilians lose their protection as civilians and eventually gain the protection reserved to war prisoners as combatants. Such civilians could include the persons that accompany the armed forces,without being a part of these forces (e.g. civilian military crew members, war correspondents,commercial navy or aviation crew members as well as the population which spontaneously takes up arms to repel an invading enemy). The ambiguity of the expression „direct participants to hostilities” as well as the apparition of new categories of combatants such as members of private military and security companies have led to the emergence of doctrinal and jurisprudential specifications in this field.

More...
AN ASSESSMENT OF UN RESPONSE
TO THE CHALLENGE OF FOREIGN TERRORIST FIGHTERS

AN ASSESSMENT OF UN RESPONSE TO THE CHALLENGE OF FOREIGN TERRORIST FIGHTERS

Author(s): Iffat NAHEED / Language(s): English Publication Year: 0

The phenomenon of “Foreign Terrorist Fighters” (FTFs) is considered to be a growing threat to international security and the gravest challenge to UN counter terrorism efforts. FTFs travel on call of terrorist organizations harm the states of origin, transit and destination along with the neighbouring zones.This paper is focussed on an assessment of UN’s overall efforts to combat the challenge of FTFs that are aimed on addressing the underlying causal factors that contribute towards the growth of FTFs. The issues pertaining to prevention of radicalization, recruitment, travel, and financial aspects of FTFs also constitute the primary concerns of the UN’s efforts towards combating FTFs. For its aforementioned objectives, the institutional framework of the UN has launched a capacity building implementation plan to resist the flow of FTFs in compliance with the UN Security Council Resolution 2178.The paper however concludes that despite its capacity building programmes, the scorecard of the UN and its institutional framework has remained less than impressive on account of combating FTFs. One of the main reasons for such limited success rate of UN’s counter FTF efforts is owing to a lack of focus on tailor made and customized regional solutions when it pertains to countering FTFs. This inter alia necessitates a deeper understanding of the needs of the Member States and the concerned countries’ legal and administrative systems.

More...
ISIS AND WOMEN

ISIS AND WOMEN

Author(s): Raluca Codruţa Luţai / Language(s): English Publication Year: 0

The status of the woman in the Islamic religion is very special. In the social sphere their status is minimal or almost non-existent. The terrorist organization known as Islamic State in Iraq and Syria (ISIS, Dae’sh) has paid special attention to the woman’s status and roles in the society. This can be seen by analysing the group’s latest production, “Rumiyah” magazine.Women are considered an important part of the struggle the Islamic State is taking against“unbelievers”1. They are the ones who nurture and grow future soldiers and are responsible for taking care of the household. They can, at the will of their husbands, leave their homes and join military operations.

More...
U.S. SPACE FORCE: POSSIBLE IMPLICATIONS FOR ROMANIA

U.S. SPACE FORCE: POSSIBLE IMPLICATIONS FOR ROMANIA

Author(s): Ulpia Elena BOTEZATU / Language(s): English Publication Year: 0

Recently, outer space gained attention with President’s Trump creation of Space Force. However, the need for a centralized unit to protect American interests in the so-called“next war-fighting domain“ raises critical questions about the involvement and the positioning of other state actors on this matter, as well as on the ways in which NATO will react and incorporate space into their future strategies and operations. Consequently, this paper attempts to investigate the problematic of space warfighting capabilities in relation to Romania’s geopolitical posture. It argues that Romania should adopt a more assertive attitude, especially in the light of its fresh membership to the European Union Consortium of Space Surveillance and Tracking (EU_SST).

More...
COOPERATION ACTIONS IN PESCO FRAMEWORK

COOPERATION ACTIONS IN PESCO FRAMEWORK

Author(s): Ion Anghel / Language(s): English Publication Year: 0

Participation in European cooperation projects in the Permanent Structured Cooperation (PESCO) framework can be not only a multiplier factor for achieving military capabilities, but also a way of developing high-tech industrial sectors within the national economy. The article highlights the cooperation actions in the PESCO framework, in the context of their influence on the development of national military capabilities. The proposed theme will have a great applicability in the pragmatic and coherent approach of Romania’s involvement in European military cooperation programs for the development of needed capabilities. Thus, the initiative will contribute to the development of a national vision in the field of international cooperation, by focusing on relevant PESCO projects, developed in a multiannual financial framework.

More...
DEVELOPING A MORE STABLE AND SUSTAINABLE BUSINESS ENVIRONMENT THROUGH COMPETITIVE INTELLIGENCE

DEVELOPING A MORE STABLE AND SUSTAINABLE BUSINESS ENVIRONMENT THROUGH COMPETITIVE INTELLIGENCE

Author(s): Adina Mihăescu / Language(s): English Publication Year: 0

After the economic crisis of 2008-2014, the vast majority of business have assessed their mechanism of equilibrium bringing forward a new strategy to deal with complex macrosystemic problems. For the period 2021-2027, the European Commission intend to double the budget for the social sector, entrepreneurship and infrastructure in order to develop a sustainable economy that achieves its environmental and social goals. We, therefore, see a sharp increase in interest in the development of entrepreneurship, and this increases competition in all markets. A company’s competitors are those organizations that can have an adverse effect on sales through their own success in winning business. Using Competitive Intelligence techniques, companies inform themselves about every aspect of their rivals’ activities and performance. This helps small firms, on the one hand, to keep up with the movements of the big players on the market and to anticipate their next endeavors more easily;and, on the other hand, it helps large companies to enter new markets, to make acquisitions and strategic investments easier. As it is well known, no competitive environment is static. Anticipating fluctuations is the key to the harmonious development of the business environment.

More...
CYBERSECURITY IS A WAY OF LIFE

CYBERSECURITY IS A WAY OF LIFE

Author(s): Octavian Fratu,Maria-Mădălina Andronache / Language(s): English Publication Year: 0

In today's industry, there are numerous cyber security incidents, such as leaks,ransomware, viruses, etc. The problem is the existence of a constant evolution in the area of cyber threats for which the employees of companies do not develop a preventive culture. The technology continues to develop and adopt advanced software for detection and/or prevention, but most of the problems are still caused by human vulnerabilities. This article aims to develop measures to raise awareness of the need for cyber security for individuals with their own PCs, but also for employees of an organization.

More...
INTELLIGENT THREAT DETECTION IN IOT

INTELLIGENT THREAT DETECTION IN IOT

Author(s): Octavian Fratu,Iulia Alexandra GUDOVAN / Language(s): English Publication Year: 0

Connected devices are now present in agriculture, factories (Industry 4.0), power grids, military, healthcare, transport, education, entertainment and homes. The number of such devices will grow in the near future. Because IoT devices present various vulnerabilities and can be exposed to a great number of threats, the need for IoT security and threat modeling increases. In this paper, we provide an overview of the main threats to IoT devices and networks, and the ways in which machine learning can improve IoT security.

More...
CRITICAL INFRASTRUCTURE MODELING AND SIMULATION

CRITICAL INFRASTRUCTURE MODELING AND SIMULATION

Author(s): Meda UDROIU / Language(s): English Publication Year: 0

Cybersecurity for critical infrastructures was not a priority all the time. At the beginning the focus was on other aspects of critical infrastructures like physical reliability and redundancy. Nowadays, however with the fast-growing digital world and the multitude of threats continuously evolving, cybersecurity became a top priority. The first part of the paper will present the critical sectors of modern society, the cyber security problem and the interdependencies that are between critical infrastructures. The second part illustrates how critical infrastructures can be modeled and simulated in order to better understand them and discover unknown vulnerabilities. Finally, the third part will have as purpose to analyze the sources of vulnerabilities, and to bring in our attention two models for increasing cybersecurity in infrastructures, used in present.

More...
Result 66741-66760 of 69149
  • Prev
  • 1
  • 2
  • 3
  • ...
  • 3337
  • 3338
  • 3339
  • ...
  • 3456
  • 3457
  • 3458
  • Next

About

CEEOL is a leading provider of academic eJournals, eBooks and Grey Literature documents in Humanities and Social Sciences from and about Central, East and Southeast Europe. In the rapidly changing digital sphere CEEOL is a reliable source of adjusting expertise trusted by scholars, researchers, publishers, and librarians. CEEOL offers various services to subscribing institutions and their patrons to make access to its content as easy as possible. CEEOL supports publishers to reach new audiences and disseminate the scientific achievements to a broad readership worldwide. Un-affiliated scholars have the possibility to access the repository by creating their personal user account.

Contact Us

Central and Eastern European Online Library GmbH
Basaltstrasse 9
60487 Frankfurt am Main
Germany
Amtsgericht Frankfurt am Main HRB 102056
VAT number: DE300273105
Phone: +49 (0)69-20026820
Email: info@ceeol.com

Connect with CEEOL

  • Join our Facebook page
  • Follow us on Twitter
CEEOL Logo Footer
2025 © CEEOL. ALL Rights Reserved. Privacy Policy | Terms & Conditions of use | Accessibility
ver2.0.428
Toggle Accessibility Mode

Login CEEOL

{{forgottenPasswordMessage.Message}}

Enter your Username (Email) below.

Institutional Login