We kindly inform you that, as long as the subject affiliation of our 300.000+ articles is in progress, you might get unsufficient or no results on your third level or second level search. In this case, please broaden your search criteria.
Boomul tehnologic, înregistrat la finele mileniului II și începutul mileniului III, a determinat mutații majore, fără precedent în modul în care oamenii comunică, interrelaționează și interacționează pe toate palierele vieții personale, sociale sau profesionale. Invențiile tehnologice și gadgeturile s-au infiltrat subtil, insesizabil, dar indispensabil în realitatea cotidiană. Articolul își propune să analizeze în ce măsură aplicații, softuri, site-uri web, special create pentru realizarea și diseminarea de conținut (în format audio, video, text etc.) social media între membrii unor grupuri sociale, pot reprezenta provocări sau oportunități pentru procesele specifice de intelligence.
More...
Reason(s) for writing and research problem(s): The need to improve prevention of spectator violence in Bosnia and Herzegovina. Aims of the paper (scientific and/or social): To examine the shortcomings of current legislation regulating alcohol intoxication among sport spectators and offer recommendations to overcome them. Methodology/Design: A review of legislation at different administrative levels in BiH regulating the control of alcohol intoxication among sport spectators, and an analysis of their implications in light of well-established facts about the relationship between alcohol and violence. Research/paper limitations: Paper does not review empirical evidence on the effectiveness of existing measures due to absence of research on the subject. Results/Findings: Due to reliance on spatial and/or temporal limitations for alcohol consumption, and the subjective assessment of alcohol intoxication, existing measures provide inadequate mechanisms for the prevention of alcohol intoxication and resulting behaviors among sport spectators. General conclusion: Current legislation does not provide adequate measures for the control of alcohol intoxication among sport spectators. Introducing blood alcohol concentration testing for sport spectators may significantly improve the prevention of spectator violence. Research/paper validity: Paper identifies the shortcomings of the existing legislation regulating prevention of alcohol intoxication among sport spectators, and offers scientifically based recommendations to overcome them.
More...
In modern society, mass media communication institutions take the role for constructing conflicting paradigms, by conducting not only informative but, in addition, a certain security, psychological as well as propaganda features and tasks. Risks, crises, disasters, revolutions, violence and conflicts are becoming part of the global everyday life, but media information of their intensity, such as depth, goals, causes and consequences, define the character of interventions and determine the methodology of a particular activity. European environment clearly emphasizes the cognitive-institutional approach that focuses on the security analysis activities of many individuals, groups, networks and institutions, sensual perception and cognition of people who are primarily engaged with the crisis, as well as the group and institutional framework within which decisions are made. By the analysis of media statements and sources, those related to the prevention and public preparation for the crisis, identification of the actors of crisis management, crisis perception and management, political and organizational cooperation, crisis communications (collection and information processing, digital information transfer systems, communication with the public and the role of the emerging media in crisis management), the internationalization of the crisis, time effects and costs of the crisis, as well as gaining the publicity and public agreement are observed. Statistical data analysis, deduction and comparison in accordance with the analytical stages, topics, variables and indicators, allow the creation of complete overview of the crisis nature, resolving risks and the action priorities.
More...
An interview with Linas Linkevičius, a Lithuanian politician and diplomat and former foreign minister (2012 – 2020). Interviewers: Adam Reichardt and Maciej Makulski.
More...
Russian police detained Dmitry Gliuz, aged 30, on Sennaya Square, in the centre of St Petersburg, shortly after he came out from the metro. “I wasn’t doing anything wrong, just standing and looking at my phone, when suddenly policemen grabbed me and punched me in the stomach”. Gliuz was among the thousands of people detained on January 31st during the nationwide protests in support of Russian opposition leader, Alexei Navalny. Gliuz, who is affected by a severe eye disease, was kept for 13 hours in a St Petersburg police station, despite the fact that, according to Russian law, people with disabilities cannot be detained for more than three hours. “I have always been opposing the arbitrariness of law enforcement and what happened that day reinforced my conviction even more,” Gliuz says.
More...
The state capacity for the fight against terrorism can not be discussed without taking into consideration changes in the contemporary society and the politics. Considering its global presence, the terorism is also a subject to the international law. Therefore, when it comes to prevention and reaction to the terrorism, the countries around the world have to abide by the terms of the international law. Concerning terrorism and other forms of violence, the countries should continously work on developing and upgrading its prevention systems. The premise is that, every country already has such a system in place, however, in order to bring the fight against terrorism to the next level, it also has to search for possible causes of terrorism. The paper discusses some of the key functional mechanisms of prevention such as border police, the customs, control of money and goods flow, yet it does not overlook direct and indirect effect of indoctrination via educational institutions. Conclusion is that, spreading of terrorism ideology can be stopped by developing and strenghtening democratic values, in spite of poverty and societal differences.
More...
Terrorism is as old as human history. Over time, terrorism has acquired different forms and has developed a series of strategies to achieve its goals. Islamist terrorism started to develop from the 80s of the twentieth century. Al-Qaeda emerged during the time of the war in Afghanistan (1979-1989) and during the 90s its development took place. In the beginning, ISIS was al-Qaeda's branch in Irak. After the September 2001 attacks, the image of international terrorism started to be associated with the jihadist movements. Nowadays al-Qaeda and ISIS are two of the most iconic jihadist movements. Although they share common values and principles, since 2011 the tensions between them began to intensify, and in 2014 the two organizations broke up. The separation of the two organizations caused a breakdown in the global jihadist movement and, at the same time, an ongoing struggle for supremacy emerged. This article analyzes the causes that led to the separation of the two organizations. The analysis of the causes and motivations that influenced the fracture between al-Qaeda and ISIS was made with process tracing. Process tracing is one of the most used research methodologies in social sciences, and it focuses on analyzing the causes that led to the materialization of an event, and not just to their description. Our findings show that there were multiple causes which led to the fracture between al-Qaeda and ISIS. These include the lack of subordination of ISIS to al-Qaeda, the degree of violence used in the strategies of the two organizations, or the inability to identify which enemy should be eliminated first. Our analysis shows that divergent opinions, different strategies and personal ambitions can distract attention from reaching a common ideal. The split between the two organizations does not increase al-Qaeda and ISIS's chances of achieving their goals.
More...
The present study analyses the advantages and disadvantages of using data which is obtained from social media to recruit for the military profession. People disseminate a lot of personal data on social media, which is why social media has become an important tool for recruitment. The more information people transfer from their private lives on social media, the more their lives become a public space that can be used by anyone. All changes in society through the development of technology have also led to people's erroneous approaches to what the right to privacy means in the use of social media. Thus, social media users provide personal data, without realizing that this data can be accessed by any other user. In order to determine the advantages and disadvantages of the use of data provided by social media users in recruitment, an analysis of the literature was carried out. The conclusions highlight the importance of social media in the 21st century and the need to realize that the data provided on social media becomes public and accessible to any other user.
More...
Deterrence is both a theoretical branch of the theory of international relations and security studies, and a practical strategy used by states (and sometimes non-state actors) to manage conflicts and crises. Given the special role it plays in regional and international security issues, military, and politics, deterrence has long been an object of interest to scholars as well as the military, politicians, and diplomats. To analyse deterrence in regional conflicts, one must begin with a brief typology of the elements and mechanism of deterrence in general, and only then see how they can be applied to regional conflicts. Deterrence can rely on conventional weapons or weapons of mass destruction (WMD). In regional conflicts without direct involvement of nuclear superpowers, the most applicable scenario is that of deterrence with conventional weapons, i.e. conventional deterrence. However, the use of conventional deterrence in regional conflicts has not been covered by political science in great detail. Therefore, from academic and practical perspectives, it is important to clarify the conceptual aspects for a more precise theoretical understanding and subsequent discussions applicable to some regional conflicts, including the Nagorno-Karabakh conflict.
More...
Rumiyah is a classic example of the effects of that globalization has and of the relationship that appears between mass media and terrorism. Terrorist groups have always been concerned about the degree of loyalty of its members, on the one hand, and attracting new supporters, on the other. In this direction they have developed successful editorial projects. One of these editorial projects is Rumiyah magazine. Using the content analysis method, this article is a monographic analysis of the twelve issues of Rumiyah magazine. The main purpose of this approach is to understand the narrative discourse of the terrorist group and the way its identity is constructed.
More...
We note, therefore, that one of the notable problems we are currently facing is of an economic nature, of major importance, with real possibilities to destabilize local, national or international security. If a state has enough leverage to cushion the bad impact of sudden changes / threats, a private company cannot do the same. At the same time, a weak management leads to the bankruptcy and disappearance of a firm on the market, which cannot happen with a state (in the sense that it can go bankrupt but does not disappear, and the economic crisis turns into a political one), as Barry Buzan et al. State (2010, pp. 154-160). From another perspective, however, one of the principles of economic security is that we go into any analysis on the assumption that economic agents work more competitively on an uncertain market. It goes without saying that in the economic environment we cannot speak of perfect safety and balance. So uncertainty increases competitiveness, stimulates creative spirit, analytical and predictive capabilities. The aim of this contribution is to investigate the capacity of the business environment to absorb shocks and to set sustainable goals translated into its agenda setting. After the economic crisis of 2008-2014, the vast majority of business have assessed their mechanism of equilibrium bringing forward a new strategy to deal with complex macro-systemic problems.
More...
The collection of information has evolved continuously throughout history, undergoing a series of transformations closely related to the development of the information sources. Over the last decades, these evolutions have been observed not only at the level of the intelligence community, but also at the level of the business environment, with the development and implementation of the competitive intelligence functions within the companies, on a larger scale. It is a known fact that many competitive intelligence professionals claim that they use HUMINT in their daily activity, often without clearly explaining what they are referring to. With regard to this topic, we believe that more transparency is needed, due to the fact that HUMINT is being also used by the government intelligence agencies to designate the secret human sources. This paper briefly analyses how business information should be collected by the competitive intelligence professionals, the types of sources with which they operate, as well as the way in which HUMINT must be approached in competitive intelligence, in order to align with the applicable Romanian legislation and the SCIP Code of Ethics.
More...
In the past few years, the Russian Federation has become a central point on the security agenda of the most important international actors due to its aggressive foreign policy, proven by its latest actions (the illegitimate annexation of Crimea, the actions conducted in Syria and so on). However, by comparison with the Cold War era, Russia has developed new mechanisms to gain power and influence on regional and international level, demonstrating that it can and has the willingness to become the powerful actor that used to be before the Cold War and the fall of the Communist Block by building an empire able to stop the expansion of the North-Atlantic Treaty Organization. Thus, the aim of this paper is to analyse (through instruments like discourse and content analysis and literature review) the methods used by the Russian state to conduct remote wars, without taking responsibility for its actions. Moreover, the article will try to identify the role of the Russian propaganda machine in developing Kremlin’s foreign policy, as well as in defining the concept of hybrid warfare as a new form of confrontation.
More...
In an age where information means power, combat with weapons from the battlefields seems to have moved online. The main tools that actors use in the information battle are the same as those used hundreds of years ago - propaganda and disinformation, but the place in which they are promoted have been transformed due to technological developments. Now, the virtual environment and especially social media have become extremely attractive areas for those who want to promote fake messages in order to influence or mislead the opponent. Since 2011, with the anti-government protests in Russia, the Kremlin has invested heavily in the social media area, transforming it into an essential component of its information campaigns for the control, monitoring and influence of the virtual environment. Among the favorite targets of the actions subordinated to the information operations commanded from Moscow are the states in the immediate vicinity of the Russian colossus, respectively the states of Central Asia, the Caucasus, the Baltic states and Belarus, the Republic of Moldova and Ukraine, as well as the former communist states of Central Europe and of the East, including Romania. In the Romanian media, Sputnik Moldova-Romania is seen as the symbol of Russian propaganda. Not few were the cases in which journalists and Romanian experts proved how texts published on the news platform were created or cosmetized in order to mislead or generate favorable feelings for Moscow among readers. The Sputnik news agency, respectively its platform in Romanian, is one of the main promoters of Kremlin propaganda messages in the public space in Romania. This paper analyzes the way in which the most important representative of Russian propaganda in the local media acts in relation to Romanian online communities on the Twitter micro-blogging platform. In this regard, the activity of the Russian news agency's account has been assessed from a dual point of view: network analysis - how users coagulate around it and what are the characteristics of its ecosystem; content analysis – what are the main lines and messages diffused on the Twitter platform.
More...
One element of any organization’s success is its organizational culture that manifests itself through the creation of a value system and emphasis on the well-being of employees. In this context, mobbing is a phenomenon understood as psychological stress experienced by individuals at work as a result of certain actions by another person leading to negative consequences for the individual, the organization and society. Given the fact that mobbing in statutory organizations or in organisations involved in their activities has hardly been studied, this article aims to reveal the peculiarities of mobbing in the Ministry of National Defence of Lithuania and its institutions through the organizational environment and employees’ relationships. Two hundred and one participants responded to the questionnaire. It was found that mobbing exists in the Ministry of National Defence and its institutions, but the number of employees experiencing workplace bullying corresponds to the general trend established by scientific research. The results also revealed that mobbing does not depend on the employee’s length of service, it is most commonly expressed through verbal communication and women experience it more often than men. It can be stated that the prevention of mobbing in the institutions under analysis is very weak and conflicts are solved in a time-consuming manner, concentrating only on local measures.
More...
The sources of the process of “money laundering” and its influence on economic and law system of the country, the general sources of the capital obtained by criminal actions and the ways of its legalization are analyzed in the article. The rules of criminal capital in the Criminal Code of Lithuanian Republic or legalization of the capital, object, subject, objective and subjective aspects are reviewed. Having analyzed academic literature, also having used the personal and other specialists’ experience the concept of “money laundering” and its influence on the state economy are defined. International experience of the fight against “money laundering” is used in the article. The aim of the article is to study the conception of the process of “money laundering” on economic and juridical aspects. It is also important to envisage possible measures and methods which can help to fight with money laundering and disclose the connection between money laundering and financial support of terrorism. Besides, an assessment of the process of money laundering economically is offered in the article, and the general sources of illegal income are analyzed. It is pointed what influence is possible or takes place legalizing illegal money. Financial support of terrorism is one of the most important aims while using illegal money nowadays. Possible sources of financial support of terrorism and ways to conceal the real origin of illegal money, sources and organizers are found. Undoubtedly, the use of offshore companies is a concurrent of the process of money laundering. The bounds of possible amenability for money laundering are stated. To fight against financial support of terrorism Lithuanian Republic passed the law on the prevention of financial support of terrorism. The purpose of the law is to find out the remedies to prevent money laundering and (or) financial support of terrorism as well as institutions, which are responsible for these preventive measures realization. The law is passed with reference to European Union juridical acts and their ensured practice. Negative and positive aspects of the strategy of prevention of terrorism directed to fighting against terrorism are accentuated.
More...
During 1941–1944 the German occupation and intelligence services created an extensive network of training centers (schools and courses) in the occupied territories of the USSR. Mostly Soviet prisoners of war were involved in reconnaissance and sabotage work, although a significant number of agents were recruited from the civilian (non-military) population. First, people who were in active or passive opposition to the Soviet regime were attracted: former emigrants, those repressed or dispossessed, ideological opponents, criminals, and others. At the same time, a significant number of agents were recruited from the civilian population who remained in the occupied territories, especially from its most vulnerable categories (women and children). The recruited agents were used to carry out reconnaissance and sabotage missions, both in the rear of the USSR and in parts of the Red Army, and against the resistance movement. On the territory of the BSSR occupied by the Germans, sixteen training centers were opened where saboteur children were trained, and more than twenty were opened to train “agents in skirts”. Similar schools and courses were opened in Russia, Ukraine, and the Baltic states. The Soviet secret services and partisan counterintelligence bodies were well informed about such work of the German secret organs. The performance of agents trained from among the civilian population was low. There were some tactical successes and actions by enemy agents (especially on the eve and during the period of punitive operations), but strategically this work by the Germans actually failed.
More...
The article discusses the limited intelligence capabilities of the gendarmerie departments of the Warsaw Governor General (Lomzinska, Warsaw, Kielce, Lublin, and Radom provinces) in the fight against German and Austrian spies in the second half of 1914 and the first half of 1915. One reason for the secret police’s lack of readiness is the reluctance of the gendarmerie-police authorities to organize counter-response work on an appropriate basis. The rare, fragmentary, and not always valuable information received by agents of the investigating authorities did not allow the gendarmes to organize full-scale and successful operational work on a subordinate territory to identify hidden enemies of the state. The low potential, and, in some cases, the complete uselessness of secret service personnel for the interests of the military wanted list led to the fact that most politically disloyal persons were accidentally identified by other special services. In most cases, spies were detected either due to information from army intelligence and counterintelligence agencies, or due to the vigilance of military personnel of the advanced units of the Russian army. The authors conclude that the gendarmerie departments were unable to organize a systematic operational escort of military personnel of the Russian armies deployed in the Warsaw Military District. Despite the fact that the duty of the gendarmerie police included not only criminal procedures, but also operational searches, there was no qualified identification of spies with the help of secret officers.
More...
The article presents changes in the Polish legal order in the aspect of ensuring the security of ICT systems and system tools with which data processing and remote services are performed. The issues related to potential threats to the proper functioning of the network and the obligations of public administration bodies in the field of cybersecurity were analyzed. Particular attention was paid to the administrative authority of entities, thanks to which they can apply appropriate protective measures. In addition, EU law is presented in relation to the Digital Single Market Strategy for Europe. The aim of the work will be to identify potential threats to cyberspace and to try to counteract them, on the example of regulations adopted by Poland. In the first part of the thesis, the matter of network security threats will be discussed, in the second—obligations of entities in the field of cybersecurity arising from legal acts. Research methods include the analysis of legal acts using the literature on the subject.
More...