Browse

81 - 90 of 850 items :

  • Engineering, other x
Clear All
Militarization of Information in Current Conflicts

Abstract

The information technologies used in the contemporary conflicts and the overall availability of social nets generate a number of usable information for their actors. This information environment breeds the chance of conducting the sophisticated and targeted operation of disinformation and effective impact on the actors involved as well as regional or global ones. While the information and propaganda dimension is not a completely new phenomenon, technological development has greatly strengthened its importance in the contemporary world. The development of modern media and communication tools in the 20th century have significantly influenced the very limited means of providing the information to society while the development of the Internet has made far more effective targeting of information on selected social groups than at any time in the past. The phenomenon of information warfare is therefore becoming increasingly frequent, and it is also possible to talk about the new character that conflicts gain through the information dimension. The paper tries to characterize and analyze the importance of the information environment in the current conflicts. Attention is focused on existing and new forms of propaganda, strategic communication and information operations on the social network.

Open access
Mission Command & Manoeuvrist Approach – Basic Principles of Nato Urban Operations

Abstract

Analyzing the recent confrontations, as those from Syria, Ukraine, Iraq, and so on, we have found that most of the military operations, at least the decisive ones, have taken place predominantly in urban environments whose fundamental characteristics are given, especially by the density of buildings and population. Carrying out operations in such environments, particularly offensive, requires the military forces to deal with the most complex and difficult situations, because in addition to engaging a very diverse typology of adversaries, it is also necessary to apply control measures in order to limit the losses and collateral damage among own forces and local populations. As a result, this context has imposed an operational adaptation of military forces, whose principles consist in manoeuvrist approach and mission command, which, correlated and applied coherently, finally led to the desired end states.

Open access
Missions and Actions Specific to Cyberspace Operations

Abstract

Currently, the digitization of society has become a major phenomenon worldwide, making its mark in everyday life of people and the activities of most organizations. Significant contributions to the emergence of this phenomenon consisted of the continued availability of services offered by the global Internet network, the diversity, the number and the usefulness of digital devices and digital competence development of people. Thus, cyberspace has become a good opportunity for malicious people. Today, cyber-attacks are very complex and sophisticated, supported and used, by state actors in their own economic, political, military or informational interest. Military organizations are targeted by cybercriminals to get as much information as possible, and the more valuable is the information, the more the attacker’s interest is increased. Investments in such actions are supported by state actors themselves. These actions are lasting, well organized and with an increased effort of human, financial and informational resources. In this context, cyberspace is identified as a domain of operations, recognized by NATO since 2016. With this accreditation, the world’s states, whether or not they are members of the alliance, have changed their approach to cyber security, by getting involved both in the content of strategies, doctrines, procedures or other regulations, and in the establishment and development of specialized structures, having qualified personnel, technique and proper equipment meant to meet the current safety standards. Missions and actions specific to cyberspace operations involve special attention from government institutions accredited in the fields of country defence and national security. When taking into account elements related to cyber defence in the strategic planning process, an effective inter-institutional cooperation must be developed.

Open access
Mobile Applications - (in) Security Overview

Abstract

Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the growing importance of smartphones, it is important to assess the privacy and security risks of these devices in order to mitigate them. However, as we know, in modern mobile security architecture, applications represent the most critical elements. In this paper we review common mobile applications flaws involving network communications, data storage, user input handling and also exploring a number of vulnerabilities. While applications provide amazing features and benefits for users, they also represent the main attraction for cyber criminals. In order to have a true picture of the mobile security threat spectrum, this article presents the means of how mobile applications can impact systems security, stability and compromise personal data if they are not handled properly.

Open access
Modelling of Artillery Fire and Simulation of its Efficiency

Abstract

The aim of the paper is to describe the basic principles of the solution of one of the most difficult military issue. Those are the theoretical and practical issues of the firing activities on various objects. In both, in general and specific point of view, it has a fruitful reference not only for artillery specialist, but also for wider group of another branches and specialization officers.

Open access
National Security and Critical Infrastructure Protection

Abstract

The link between national security and the protection of critical infrastructure is vital to the progress of any society and its proper social functioning. The term critical infrastructure was developed by the United States in the 1990s and it has evolved in time; nowadays, most of the current definitions include the security dimension in their content. Along with its many benefits, the technological advancement has brought with it the diversification of threats that could lead to the malfunctioning of critical infrastructures. The new weapons of the 21st century and the new asymmetric threats constitute real dangers to the good functioning of every critical infrastructure. Once they may be interrupted, the normal functioning of the whole society would be endangered because of the domino effects it causes. In this article we will look at how the link between critical infrastructure and national security is reflected in national regulations and crisis scenarios, highlighting the main strengths and the existing legislative gaps along with discussing their applicability.

Open access
The Need for Determining and Assessing Risk in Economic Activity

Abstract

In modern terms, risk management is a concept applicable to economic agents, which represent a factor that generates economic and financial performance. In this respect, I appreciate that it is obvious that risk management is a necessity in the activity of any organization regardless of the field of activity or its objectives. Additionally, observing the procedural elements specific to the identification, analysis, quantification and assessment of the economic risk will lead to the company being correctly diagnosed and facilitates the identification of solutions for its elimination, or mitigation within the parameters of a controllable area.

Open access
Numerical Models for the Analysis of the Acoustic Wave Propagation

Abstract

This paper presents some authors’ results regarding numerical modelling of the acoustic wave propagation, using the Ansys program. The acoustic wave propagation is studied under conditions of existence of acoustic absorbing panels. Different materials are taken into account (aluminium, foam, oak, polystyrene) for considered acoustic absorbing panels. Also, different dimensions and different cases for fixing the panels were considered. The acoustic wave propagation was studied in stationary conditions and in dynamic conditions at different values of sound frequencies. A comparative analysis is performed regarding the influence of different conditions upon acoustic wave propagation. Our studies presented in this paper are referring to the acoustic propagation in an open space, like on airports or around the acoustic sources placed in open space. The aim of this paper is to offer our experience in this field for a numerical analysis of the ways for sound level reduction. Also the facilities of the Ansys program for the solving of such problems are presented in a practical manner of use.

Open access
“Open” Category Unmanned Aerial Systems Harmonized Standards and Requirements Complex

Abstract

The steadily increasing use of unmanned aerial systems (UAS) is an important factor for the military and civil aviation safety on a global scale. One of the critical conditions for the efficient functioning of the European aviation safety system is the establishment and implementation in practice of a comprehensive regulatory framework for the use of unmanned systems in the Common European Airspace. The aviation authorities and industry strive to introduce a set of rules and requirements that adequately and flexibly guarantee a high level of safety without limiting the development of the UAS market. This article proposes a set of standards that should be met by “Open” category UAS with the intention to execute operations in the European airspace.

Open access
Organizational Behavior in the Central Public Institutions

Abstract

Redefining recruitment systems and evaluating civil servants to take into account a number of general macroeconomic issues. Professionalization of the public function in order to identify future practical solutions to recruitment and evaluation processes is necessary to make a decision on several fundamental aspects of the public service system. Analysis of the relationship between the available human resources and the probable evolution of the quantitative and qualitative analysis of the existing resources as well as the design of future resources.

Open access