Cookies help us deliver our services. By using our services, you agree to our use of cookies. Learn more.
  • Log In
  • Register
CEEOL Logo
Advanced Search
  • Home
  • SUBJECT AREAS
  • PUBLISHERS
  • JOURNALS
  • eBooks
  • GREY LITERATURE
  • CEEOL-DIGITS
  • INDIVIDUAL ACCOUNT
  • Help
  • Contact
  • for LIBRARIANS
  • for PUBLISHERS

Content Type

Subjects

Languages

Legend

  • Journal
  • Article
  • Book
  • Chapter
  • Open Access
  • Politics / Political Sciences
  • Politics
  • Penal Policy

We kindly inform you that, as long as the subject affiliation of our 300.000+ articles is in progress, you might get unsufficient or no results on your third level or second level search. In this case, please broaden your search criteria.

Result 1481-1500 of 1817
  • Prev
  • 1
  • 2
  • 3
  • ...
  • 74
  • 75
  • 76
  • ...
  • 89
  • 90
  • 91
  • Next

Nowoczesne technologie kontroli bezpieczeństwa stosowane w portach lotniczych

Author(s): Marek Magniszewski / Language(s): Polish Issue: 1/2020

The subject of the article concerns security at airports using modern technologies. The most advanced safety inspection devices were discussed in the study. A very important aspect affecting airport security was discussed, such as procedures and organization of work at security checkpoints. The challenges faced by modern security control operators have been taken into account. The latest generation devices have been described, including 3D X-ray scanners, magnetic gates with hazardous objects location, and manual metal detectors.

More...

Percepcja zagrożeń terrorystycznych w Polsce oraz w Wielkiej Brytanii w XXI wieku na tle analizy orzecznictwa sądów i trybunałów

Author(s): Cezary Golędzinowski / Language(s): Polish Issue: 1/2020

The subject of the article is the assessment of statistical data on the operational activity of British and Polish secret services against the background of perception of terrorist threats and current case law of courts and tribunals. The purpose of the article is to present a socially important problem, which is the correlation between the perception of terrorist threats by citizens and their awareness of the degree of violation of human and civil rights and freedoms in the name of combating terrorism. The main research methods used in this work include the dogmatic and legal methods and statistical data analysis. The conclusions of the conducted research are observations of changes in the perception of terrorist threats, which result to a large extent from the problem of the migration crisis and from the experience of a given country in carrying out terrorist attacks on their territory. The article, through the analysis of domestic and international case law, indicates the need for further development of research on limiting the rights and freedoms of the individual in order to ensure security.

More...
RUSSIA AND COVID-19: RUSSIAN ADAPTIVE AUTHORITARIANISM DURING THE PANDEMIC

RUSSIA AND COVID-19: RUSSIAN ADAPTIVE AUTHORITARIANISM DURING THE PANDEMIC

Author(s): Aram Terzyan / Language(s): English Issue: 3/2021

This paper explores Russia’s response to Covid-19, with a focus on its implications for political freedoms and human rights across the country. It investigates the relationship between the pandemic and reinforcing authoritarianism in Russia. This paper is an in-depth case analysis that uses policy analysis and process tracing to examine Russia’s response to Covid-19 and its effects on Russian domestic politics. The study concludes that the Russian authorities have considerably abused Covid-19-related restrictive measures, not least through curtailing the freedom of assembly and expression. In doing so the Russian authorities have conveniently shielded themselves from mass protests amid constitutional amendments and upcoming legislative elections. Nevertheless, while the authoritarian practices that the Kremlin resorted to during the pandemic are not much different from those of other authoritarian regimes, they proved insufficient in curbing anti-regime dissent. This study inquires into the political repercussions of crisis management in authoritarian regimes and concludes that their authoritarian reactions lead to further crackdowns on civil liberties and political freedoms.

More...
Specyfika bezpieczeństwa Chin w „Nowej Erze”

Specyfika bezpieczeństwa Chin w „Nowej Erze”

Author(s): Rafał Kwieciński / Language(s): Polish Issue: 1/2021

The article examines of evolution of Chinese security policy in the light of the white papers on defense. It hypothesized that the goal of the Chinese strategy is to ensure the security of the state, and not to maximize its power. The theory of neoclassical realism was adopted as the theoretical basis for the analysis. The distribution of power in the international system was adopted as the independent variable in the study, and the Chinese security policy as the dependent variable. China's Grand Strategy was recognized as an intervening variable. The study used elements of the qualitative method in line with the recommendations of the neoclassical realism program, emphasizing causal relationships in the process of evolution of China's strategy being followed. As a result of the research, the following conclusions were drawn: 1) China perceives security holistically; that is, it considers both internal and external security. A particularly important aspect is also security at the seas and in new domains: space, cyber and electromagnetic space; 2) The security threats to China are primarily of an internal nature, and the most important threat is the possible declaration of independence by Taiwan. 3) The armed forces are the most important means of countering potential threats. The Chinese strategy assumes the future conflict as a people's war, consisting of the total mobilization of the nation's and state's resources. The army’s main task is to win information wars; 4) The most important supporting objective in China's security strategy is to protect China's "overseas interests"; 5) The security strategy is evolving, and its scope grows with the growth of China's global interests. The Chinese plan goes far beyond the primary goal of ensuring the security of the state. It is therefore also expansive.

More...
Główne narracje polskiej skrajnej prawicy w pierwszym roku pandemii COVID-19 – analiza narracyjna

Główne narracje polskiej skrajnej prawicy w pierwszym roku pandemii COVID-19 – analiza narracyjna

Author(s): Przemysław Witkowski / Language(s): Polish Issue: 1/2021

The COVID-19 pandemic is an opportunity for many marginal political groups to increase their popularity and enter the mainstream with their narrative. This is also the case with the Polish far-right. The research discussed in the following text concerned the message of the Polish extreme right during the first year of the COVID-19 pandemic (2020), both what changed in this message and what remained unchanged. Using data from social media, online and offline publications, reports from events, and interviews with key informants, the author sought to understand how COVID-19 has changed the behaviour and narratives of far-right groups in Poland. The analysis was structured around two meta-narratives: one anti-liberal and the other geopolitical, each containing several sub-narratives. As a result of this analysis PiS and its closest allies from the world of politics and media turned out to be one of the leading promoters of various anti-liberal concepts and social and systemic solutions, especially those concerning reproductive and LGBT rights created in the far-right circles. PiS politicians often drew their slogans and ideas from the ideological resources of the far-right, directly copying their language and rhetoric and often even immediate solutions.

More...
Ruch Supraciu a rządy Aleksandra Łukaszenki – charakterystyka i metody działania

Ruch Supraciu a rządy Aleksandra Łukaszenki – charakterystyka i metody działania

Author(s): Aleksander Kazak / Language(s): Polish Issue: 1/2022

The article presents the methods of influencing particular groups of the revolutionary “Supraciu” movement in Belarus. The subject of the research is to verify the goals of the "Supraciu" movement as an opposition to the Belarusian regime and to define its status in the structure of national liberation organizations. The main research method is the analysis of materials from various media, including social media. The study aims to evaluate the effectiveness of the activities of these groups. The adopted thesis is that the "Supraciu" movement is a national liberation movement that uses terror to weaken the dictatorial regime of Alexander Lukashenka. Following this assumption, the methods and effectiveness of group members of the "Supraciu" movement were presented, and the prospects for the development of this movement in Belarus were assessed.

More...
VIOLATIONS OF THE RELIGIOUS FREEDOMS IN THE EUROPEAN UNION MEMBER STATES IN 2015-2019: SELF-DEFENCE UNDER A NEO-MILITANT DEMOCRACY RULE?
4.50 €
Preview

VIOLATIONS OF THE RELIGIOUS FREEDOMS IN THE EUROPEAN UNION MEMBER STATES IN 2015-2019: SELF-DEFENCE UNDER A NEO-MILITANT DEMOCRACY RULE?

Author(s): Kamila Rezmer-Płotka / Language(s): English Issue: 2/2022

In 2015, a serious crisis called the “refugee crisis” took place. Migrations had already taken place before, primarily in connection with armed conflicts, but the largest number of asylum applications was received in 2015 and was therefore described as the beginning of the crisis. One of the apprehensions in the European Union Member States about the reception of migrants was cultural differences and religion. The purpose of this study is to determine violations of various types of religious freedoms in all the EU Member States. The period 2015-2019 was considered in connection with the largest influx of refugees and before the next crisis on a huge scale, i.e., the coronavirus pandemic. The study will provide an answer to the question: what religious freedoms were violated in the years 2015-2019 in the EU Member States? In connection with increased migrations, were there more violations of the types of religious freedom related to refugees? The source analysis of the United States Department of State reports was used for the study. An assessment of restrictions on religious freedom will be made at the level of what extent and against whom were supposed to protect political nations. On this basis, it will be possible to compare all countries in terms of solutions characteristic of neo-militant democracies regarding respect for religious freedom.

More...
ELECTORAL BONDS: A PERIL TO DEMOCRACY AND TRANSPARENT ELECTIONS IN INDIA

ELECTORAL BONDS: A PERIL TO DEMOCRACY AND TRANSPARENT ELECTIONS IN INDIA

Author(s): D. Ananda / Language(s): English Issue: 1/2023

A democracy is built on free and fair elections. India is one of the world's most populous democratic countries. In 2018, the Indian government launched a new electoral bonds scheme to fund elections. Electoral bonds influence election funding and make it easier for corporate entities to conceal political donations by concealing the bond’s buyer and beneficiary details. The new electoral bonds scheme lures companies and facilitates money laundering. The present article critically evaluates the electoral bonds scheme by analyzing the various acts and statutes. However, the Indian judiciary evaded its role as guardian of the constitution and final interpreter of the constitution by not deciding the cases pending in court. The scheme provides an unfair advantage to the ruling party. Anonymity and secrecy harm accountability in a democracy. The new election funding scheme undermines transparency and fair elections. This new election funding scheme has exacerbated the situation in Indian democracy. This new mechanism of election funding keeps voters in the dark about whether the governing party favors corporate donations.

More...
ASSESSING THE SCOPE OF LEGAL IMMUNITY IN MODERN LEGAL SCIENCE: THE NEED FOR QUESTIONING UNDER UKRAINIAN LAW

ASSESSING THE SCOPE OF LEGAL IMMUNITY IN MODERN LEGAL SCIENCE: THE NEED FOR QUESTIONING UNDER UKRAINIAN LAW

Author(s): Valerii Sokurenko,Oleksandr Morhunov,Serhii Ablamskyi / Language(s): English Issue: 1/2023

Everyone is born equal and expects to be treated similarly before the law in cases involving criminal activity and other obligations. It is problematic to have some people immune to legal consequences because they enjoyed special treatment in the eyes of the legislation meant to protect them. The issue we must bring up is crucial, as there is always the need to conduct a thorough investigation into the commission of crimes to secure justice. However, the tendency is that as far as immunity is on the individual concerned, this would frustrate the prosecution process. In this vein, it was proposed that this study investigate how immunity relates to today’s state of the law. We will look at an analytical approach to determine if immunity’s status has changed due to the rise of modern legal science. The paper overviews the legal framework adopted in Ukraine concerning immunity given to certain public servants.

More...
FACTORS AFFECTING CORRUPTION IN THE PUBLIC SECTOR: EVIDENCE FROM VIETNAM

FACTORS AFFECTING CORRUPTION IN THE PUBLIC SECTOR: EVIDENCE FROM VIETNAM

Author(s): Hoa Nguyen Thi Thu,Thuy Nguyen Thi,Thanh Nguyen Nghi / Language(s): English Issue: 2/2023

This research utilizes a structural equation modeling (SEM) technique to comprehensively examine the intricate interactions among various factors influencing corruption in Vietnam’s public sector. The findings reveal that certain factors, including inadequate anti-corruption policies and enforcement, a lack of accountability and transparency in anti-corruption endeavors, and significant income disparities between public officials and anti-corruption measures, significantly and positively impact the cultural and social norms associated with anti-corruption. Additionally, insufficient cultural and social standards exert a notable and positive influence on the level of corruption in the public sector. The outcomes of this study provide valuable insights for developing effective policies and strategies that promote accountability, transparency, and good governance to combat corruption in Vietnam’s public sector.

More...
COMBATING CROSS-BORDER ORGANIZED CRIME IN THE BORDER REGION OF THE STATE: STRATEGY DEVELOPMENT METHODOLOGY

COMBATING CROSS-BORDER ORGANIZED CRIME IN THE BORDER REGION OF THE STATE: STRATEGY DEVELOPMENT METHODOLOGY

Author(s): Oleh Farion,Dmytro Kupriyenko,Yurii Demianiuk,Andrii Nikitiuk / Language(s): English Issue: 2/2023

The article describes the methodology for the following successive stages: data collection on cross-border organized crime; analysis of the impact of PEST factors of the border region on the number of cross-border crimes committed by organized criminal groups; generalization and analysis of parameters for assessing the capabilities of organized criminal groups; assessment of the level of capabilities of organized criminal groups to commit cross-border crimes; passporting of organized criminal groups specializing in cross-border crimes; modeling of scenarios of the development of organized criminal groups illegal activities by types of cross-border crimes; selection of options for fighting cross-border organized crime by the targeted impact on organized criminal groups. The strategy envisages a complex of the following measures: rapid (operational) interventions in critical situations; anti-crisis measures of the border guard operation to neutralize threats; other regime and control measures to strengthen the protection of the state border; standard planned and preventive measures; measures of sustainable development of the border security system. Implementing the methodology in practice enables the development of a strategic approach to effectively utilize the resources of state law enforcement agencies in combating cross-border crime.

More...
THE REGIONAL DIMENSION OF CORRUPTION RISKS IN THE CZECH REPUBLIC IN THE LIGHT OF DECENTRALIZATION

THE REGIONAL DIMENSION OF CORRUPTION RISKS IN THE CZECH REPUBLIC IN THE LIGHT OF DECENTRALIZATION

Author(s): Yevheniy Haydanka / Language(s): English Issue: 2/2023

The article elucidates the relationship between decentralization and corruption risks in the Czech Republic. Economic inequality in the regions inevitably leads to corruption risks. The unemployment rate and the wage level determined the fragmentation of the Czech regions. Most Czech regions (8 out of 14) have an average unemployment rate (of 3-5%). The capital Prague (44 thousand korunas), as well as the Central Bohemian Region (35 thousand korunas), significantly differ from the rest of the Czech regions in wage level (within 31-32 thousand korunas). If the Czech regions are similar in the unemployment rate, there is a noticeable stratification between the capital and other regions. The findings of an expert survey among civil servants and deputies of regional Assemblies identified corruption and anti-corruption measures in the regions. The sphere of public administration is the most corrupt. Partially corrupt is the provision of administrative services. The greatest corruption risks result from the employees’ influence on funding sources (grants, subsidies and grants). On a 10-point scale, the average corruption in the regions is 5,8. More research prospects derive from studying corruption risks at the regional rather than national levels and expanding the geographical framework of the transition countries under research.

More...
Post-Conflict Security and Peacebuilding in Rwanda: an Economic Development Approach

Post-Conflict Security and Peacebuilding in Rwanda: an Economic Development Approach

Author(s): Khedidja Ziani,Amira Berhail Boudouda / Language(s): English Issue: 2/2023

This text analyzes the governance strategies employed in post-civil war and genocide Rwanda for peacebuilding within the context of economic development. Rwanda, with the assistance of the international community, aimed at reconciliation and democracy. Despite challenging circumstances following the conflict, the government achieved stability and initiated internal reforms, particularly in the security sector, since the mid-1990s. The persistent power structure of the Rwandan National Front prompts an exploration into the extent to which an economic development-based approach has contributed to security and peacebuilding in Rwanda. We hypothesize that such measures play a key role in establishing resilient societies capable of preventing the recurrence of intractable conflicts through the attainment of inclusive economic development. The theory of human needs advocates for the utilization of interoperability as a conflict resolution mechanism, applicable to Rwanda as well. It posits that lasting peace is only achievable when various facets of human economic needs are systematically addressed. This article seeks to critically assess how post-genocide economic reform measures in Rwanda have contributed to achieving security and peace. Furthermore, it explores how effective leadership and engagement policies contribute to economic security in Rwanda. The article argues that post-conflict security management and peacebuilding processes require the implementation of effective economic development policies, including resource redistribution, as a critical component of a comprehensive development strategy.

More...
Non-State Actors in Nation-State Cyber Operations

Non-State Actors in Nation-State Cyber Operations

Author(s): Agata Małecka / Language(s): English Issue: 1/2024

Since cyberspace has become another dimension of state competition, the number of nation-state cyber operations has increased significantly. In the recent past, they were associated with cyber espionage (political and industrial), and this is still in use. Many of them have taken the form of ransomware attacks, blocking access to data. Over a period of several years, there were numerous instances of cyber operations aimed at manipulating the interpretation of information. These operations utilized social media to influence election outcomes in democratic political systems by shaping voter behavior. One of the biggest problems in the analysis of nation-state cyber operations is attribution. Nevertheless, the actors conducting cyber operations are becoming better known. One of them is a category of Advanced Persistent Threat (APT). The main aim of the article is to identify the direction of the development of nation-state cyber operations, which is increasingly determined by non-state actors’ behavior. This requires highlighting the implications in terms of international law and the security strategies used by specific states – in both cases, in the process of ongoing creation. The main research problem was defined as the following question: How do states use APT to conduct cyber operations, and what are and could be the effects of the APT activities (an attempt to identify the characteristics of contemporary and future nation-state cyber operations based on an analysis of nation-state cyber operations in recent years)? In order to achieve the defined goal, the author primarily used qualitative methods: content analysis – in particular, institutional analysis and statistical data analysis.

More...
The Impact of the Abraham Accords on the Arab Peace Initiative of 2002

The Impact of the Abraham Accords on the Arab Peace Initiative of 2002

Author(s): Rafał Soroczyński / Language(s): English Issue: 1/2024

The Arab Peace Initiative, adopted by the Council of the League of Arab States in 2002, expressed a common opinion of the League’s member states regarding the conditions for bringing the Middle Eastern conflict to an end and continuing the normalization of Arab-Israeli relations, making the latter dependent on prior fulfilment of these conditions (i.e., Israel’s withdrawal from the occupied Arab territories, finding a just solution to the Palestinian refugee problem, and Israel’s acceptance of an independent Palestinian state within the pre-1967 borders). The conclusion of the 2020 Abraham Accords marked a departure from this principle. This, along with the reactions from other League members, indicated that Israel’s compliance with the Initiative’s requirements was no longer unanimously considered by the Arab states as a prerequisite for further normalization of bilateral Arab-Israeli relations. This had a negative impact on the position of the Palestinian authorities in the Israeli-Palestinian peace process, especially since it was reasonable to expect other Arab states to also make similar agreements with Israel. Today, in light of the tragedy in the Gaza Strip following Israel’s response to the Hamas attack in October 2023, while further development of the idea of the Abraham Accords is arguably still not out of the question, a scenario is also possible that the normalization process will not resume without a resolution to the Palestinian question as envisioned by the Initiative, or at least significant Israeli concessions to the Palestinians.

More...
Zagraniczni bojownicy terrorystyczni z Azji Środkowej w szeregach ugrupowań dżihadystycznych na Bliskim Wschodzie

Zagraniczni bojownicy terrorystyczni z Azji Środkowej w szeregach ugrupowań dżihadystycznych na Bliskim Wschodzie

Author(s): Tomasz W. Grabowski / Language(s): Polish Issue: 1/2024

The aim of the article is to explain the phenomenon of radicalization and mobilization of foreign terrorist fighters (FTF) from Central Asia fighting after 2011 on the territory of Syria and Iraq. The author tries to answer the following questions: (1) What is the level of terrorist threat in the Central Asian countries? (2) What are the reasons for the mobilization of the Central Asian FTF? (3) What kind of threats do the Central Asian FTFs pose after the destruction of the Islamic State?

More...
Recenzja książki: Safjański, T. (2023). Tak zwany Interpol. Studium uwarunkowań skuteczności zwalczania przestępczości transgranicznej i terroryzmu w ramach globalnej współpracy policyjnej. Difin. (ss. 503).

Recenzja książki: Safjański, T. (2023). Tak zwany Interpol. Studium uwarunkowań skuteczności zwalczania przestępczości transgranicznej i terroryzmu w ramach globalnej współpracy policyjnej. Difin. (ss. 503).

Author(s): Adrian Szumski / Language(s): Polish Issue: 1/2024

The reviewed monograph concerns determinants of Interpol’s effectiveness in combating cross-border crime and terrorism. The author focused primarily on a comprehensive analysis of the operational aspects of Interpol’s functioning, indicating both strengths and weaknesses of this organization that affect the effectiveness of international police cooperation. He also touched on legal, organizational and political issues concerning Interpol’s activities in the field of security. The results of research made it possible to confront the mechanisms of cooperation functioning within Interpol with the practice of their use. In this respect, the opinions of law enforcement officers of various member states of this organization who deal with instruments offered by Interpol in their activities, were also analyzed. The entirety of considerations contained in respective chapters made it possible to the Author to formulate and present accurate postulates that could eliminate existing shortcomings and increase the effectiveness of Interpol as a global entity organizing policecooperation in combating crime. The reviewed study is an extremely reliable source of knowledge about the opportunities offered to the member states by the Interpol and its limitations. The monograph expands, systematizes and deepens knowledge about operational activities of Interpol, and the recommendations contained therein are undoubtedly a valuable material for discussion on possible changes in this organization. Thus, the monograph is a valuable material not only from the point of view of its scientific value, but also contains important content, concerning practical dimension of international police cooperation

More...
Recenzja książki: Bezpieczeństwo publiczne. (2023). (red.) Tomasz Grabowski. Seria: Słowniki Społeczne. Wydawnictwo Naukowe Uniwersytetu Ignatianum w Krakowie. (ss. 392).

Recenzja książki: Bezpieczeństwo publiczne. (2023). (red.) Tomasz Grabowski. Seria: Słowniki Społeczne. Wydawnictwo Naukowe Uniwersytetu Ignatianum w Krakowie. (ss. 392).

Author(s): Tomasz Pawłuszko / Language(s): Polish Issue: 1/2024

More...
Bezpieczeństwo medyczne w czasie konfliktów prowadzonych na wodach śródlądowych z wykorzystaniem jednostek szpitalnych w XX i XXI wieku

Bezpieczeństwo medyczne w czasie konfliktów prowadzonych na wodach śródlądowych z wykorzystaniem jednostek szpitalnych w XX i XXI wieku

Author(s): Krzysztof Rokiciński / Language(s): Polish Issue: 2/2024

The paper presents an insight into the issues related to the specifics of using hospital vessels in inland waters. It provides a conceptual basis in terms of inland waters as a field of operation, as well as the legal framework for the use of hospital vessels, which are characterised by their organisation and function. Experiences resulting from the use of hospital vessels on inland waters from the First World War to the present day are discussed, primarily in the context of specific events illustrating the various dimensions of their activities. On this basis, postulates relating to their future use were formulated.

More...
ANALYSIS OF THE CONCEPT OF CYBERTERRORISM IN THE CONTEXT OF POLITICAL SCIENCE
4.50 €
Preview

ANALYSIS OF THE CONCEPT OF CYBERTERRORISM IN THE CONTEXT OF POLITICAL SCIENCE

Author(s): Cristina Ejova / Language(s): English Issue: 2/2024

This paper examines the concept of cyberterrorism through the lens of political science, focusing on its origins, development, and impact on global security. With the exponential growth of information technology, cyberterrorism has emerged as a significant threat, utilizing advanced technological means to destabilize political and social frameworks. The rapid increase in internet access has introduced new opportunities for both communication and crime, including the use of digital platforms for extremist and terrorist activities. The study emphasizes the complex methodologies required for analyzing cyberterrorism, including systemic, institutional, and comparative approaches, each contributing to a nuanced understanding of this phenomenon. Based on a systemic approach, the specifics of various definitions of the phenomenon of “cyberterrorism” will be revealed. It is argued that modern cyberterrorism, aimed at creating threats to international and national security, serves as one of the effective tools for achieving political goals on the global stage. Utilizing theories such as the information society and network society, the article underscores the importance of international cooperation in combating cyberterrorism.

More...
Result 1481-1500 of 1817
  • Prev
  • 1
  • 2
  • 3
  • ...
  • 74
  • 75
  • 76
  • ...
  • 89
  • 90
  • 91
  • Next

About

CEEOL is a leading provider of academic eJournals, eBooks and Grey Literature documents in Humanities and Social Sciences from and about Central, East and Southeast Europe. In the rapidly changing digital sphere CEEOL is a reliable source of adjusting expertise trusted by scholars, researchers, publishers, and librarians. CEEOL offers various services to subscribing institutions and their patrons to make access to its content as easy as possible. CEEOL supports publishers to reach new audiences and disseminate the scientific achievements to a broad readership worldwide. Un-affiliated scholars have the possibility to access the repository by creating their personal user account.

Contact Us

Central and Eastern European Online Library GmbH
Basaltstrasse 9
60487 Frankfurt am Main
Germany
Amtsgericht Frankfurt am Main HRB 102056
VAT number: DE300273105
Phone: +49 (0)69-20026820
Email: info@ceeol.com

Connect with CEEOL

  • Join our Facebook page
  • Follow us on Twitter
CEEOL Logo Footer
2025 © CEEOL. ALL Rights Reserved. Privacy Policy | Terms & Conditions of use | Accessibility
ver2.0.428
Toggle Accessibility Mode

Login CEEOL

{{forgottenPasswordMessage.Message}}

Enter your Username (Email) below.

Institutional Login