Search Results

1 - 7 of 7 items

  • Author: Laviniu Bojor x
Clear All Modify Search
Cross-Cultural Competence in the Time of Cross-Border Migration

Abstract

The waves of migrants that are trying to escape from the violence of their home state become a real threat for the security environment of the European countries. Our national security forces, like police and army personnel, should take into consideration future missions that consist in face to face interrelation actions with people from other cultures. Achieving knowledge and developing cross-cultural interrelation skills, with the help of which we can overcome some barriers in communication, can make the difference as long as the force power, in its entirety, no longer represents the sole and sufficient condition to solve actual multicultural crises situations.

Open access
Security and Privacy in Smart Devices Era

Abstract

Today, more than ever, our society has become obsessed with technology and people surround themselves with smart devices designed to improve their lifestyle. Communications have benefited of this rise of the gadgets the most, and reality shows that most adults in the urban environment own a smartphone with the help of which they can connect to the Internet. We would be tempted to state that the World Wide Web will change in the future into Human World Wide Web, but connecting to the Internet does not stop here. Vehicles, TV sets and other electronic devices or appliances have already started to be connected to the Internet, which makes it easier to believe that, in the future, we will live in a society where most devices around us will be interconnected to a global or even spatial network. This concept, which the academic world embraced as the Internet of Things, should be understood and accepted by society not only from the perspective of the deprivation of privacy it generates, but especially from the perspective of the insecurity, a possible result of this dependence on software and programs that can be remotely accessed and controlled.

Open access
Irregular Warfare. Understanding the Role of People

Abstract

The time of conventional conflicts and warfare between states or regular armies has come to an end. The recent theatres of operations have shown us that the Irregular Warfare, marked by the concealment of combatants among the civilian population, has captured the way of conducting military actions. The paper identifies the role of local communities in conflict zones, and their influence in the outcome of armed confrontations.

Open access
Training Military Leaders for Urban Irregular Warfare

Abstract

The operational environments of future armed conflicts will be marked by military actions taken in densely populated areas. Skyscraper buildings, interconnected basements, blocked access ways, close range strikes, or lacks of combat support are some of the challenges that future military leaders have to face in future military conflicts. The paper aims to explore the challenges of large urban agglomerations where military leaders will conduct land forces actions by analyzing elements of combat power.

Open access
The Search for Classified Information – The Real Fight in the Cold War

Abstract

The effort to get classified information from inside the adverse camp was the main objective of both super powers involved in the Cold War. Both the USA and the USSR tried, by all means at their disposal, to be one step ahead of the opponent by knowing their capabilities and adverse plans. This paper approaches the manner in which intelligence-gathering specialized structures from both camps were involved in collecting data and intelligence to win the information battle during the Cold War

Open access
The Superiority of Information and the Power of the Nation State

Abstract

Access to valuable information has been, is and will continue to be the focus of all the nation states. The benefits of access to information cannot be questioned, but the volatile nature of this Power Information has shown over time that a state's inability to keep its secrets leads to the loss of this power. The present paper captures historical milestones of information gathering activity that have greatly changed the balance of power between the state actors involved

Open access
Afghanistan after NATO Withdrawal

Abstract

The conclusion of a conflict, called by some American analysts as “America’s Longest War”, after the withdrawal of the majority of NATO military forces, requires a careful analysis of the conditions and security environment that ISAF mission, International Security Afghan Forces, leaves as legacy to the Afghan military forces. The transfer of authority towards a strong government, recognized by most Afghan provinces, and benefiting from the support of national military forces able to cope with terrorist and insurgent threats on its own, are the minimum and necessary conditions leading the country towards a stable and secure environment and towards a sustainable development. Given these realities, any approach on the consequences of the transition towards self-sustainable governance becomes interesting and timely for any military political study. These are the prospects that we propose in our paper.

Open access