Search Results

1 - 10 of 72 items :

  • "security threats" x
Clear All
The Czech Armed Forces Chemical Corps Specialists’ Protection In Relation To Security Threats And Their Impacts On Some Trends Of Decontamination Development

Abstract

Current decontamination mixtures which are established within the Czech Armed Forces are designated for decontamination of all types of surfaces and they are very often prepared by specialists with practically no knowledge related to their destructive properties. The Czech Armed Forces Chemical Corps specialists are challenged to relatively new security threats concerning fight Chemical Warfare Agents and Toxic Industrial Materials in all type of military operations. The aim of the article is to discuss some security threats and some new trends within decontamination and point to the some influences on the Czech Armed Forces Chemical Corps specialists´ personnel protection.

Open access
Information Warfare on Social Media: A Brand Management Perspective

Abstract

Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms) a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

Open access
Securitization and Lithuania’s National Security Change

Abstract

The paper addresses the security threat perception and securitization of existential threats in Lithuania. It focuses upon the securitization theory and its ability to explain the change of national security agendas as affected by the changes in national identity and existential security threats. It takes into account the internal and external factors that are shaping the objective and subjective national threat perception. The paper applies O. Waever’s securitization theory with an aim to explain how the national security threats are being addressed and perceived in Lithuania. Moreover, the paper is developed against the backdrop of the most recent developments in securitization theory and evolution of its theoretical perceptions of identity, existential threats, and legitimacy. It also discusses the possibility of inclusion of hybrid security threats into an analysis of securitization. The empirical part of the article assesses the most recent security challenges, provides evaluation of changes in national security perception, and portrays the dynamics of national security threats as defined in the National Security Strategies and the Military Doctrine. The paper focuses upon the most recent dynamics in security policy of Lithuania. It also takes into account the hybrid nature of security threats and the reaction to hybrid security elements such as: cyber security, information security, and international terrorism.

Open access
Social Networks Security in Universities: Challenges and Solutions

Abstract

Nowadays, information flows are powerfully augmented by Social Media. This situation brings along the adjustment of the traditional information security threats to this new environment, as well as the emergence of new characteristic dangers. The purpose of this study is to learn about Generation Y students’ attitude to risks and security measures when using Social Networks (SN). The correct identification of their behavior is, in our opinion, essential for the academic community. Firstly, we need to understand what their real knowledge in the field is. Then, a serious and consistent adaptation of our courses in Information Security and other subjects and a redefinition of universities’ security policies and procedures is necessary. On this basis, in an empirical study, we try to determine how much our students know about security threats and subsequent protection measures in SN.

Open access
“This is a Controlled Invasion”: The Czech President Miloš Zeman’s Populist Perception of Islam and Immigration as Security Threats

issue of Islam and migration as security threats. For >20 years, Miloš Zeman has without doubt been one of the most prominent figures in Czech politics. In the first half of the 1990s, he became Chairman of the Social Democratic Party, which he built up from a party with minimal preferences to one of the strongest political actors in the country and a party that repeatedly won elections at the end of the 1990s and beginning of the 2000s. Thanks to these successes, Miloš Zeman also became the head of the Czech Government from 1998 to 2002. After his failed candidacy

Open access
The Determinants of the Israeli Strategic Culture

Abstract

The notion of strategic culture concentrates on intangible aspects that shape foreign and security policies of every state. The article presents the determinants of Israeli strategic culture considering both Israeli geopolitical situation, and the factors modeling its social landscape.

Open access
Pension Payment as A Critical Infrastructure

Abstract

Today, the state, its organizations and its citizens have become vulnerable to the complexity of complex electronic information systems in the cyberspace of Hungary, without which state operations and the provision and use of different services become unworkable. In addition to the modern economic system, society is not prepared to operate without lost infrastructure, assets or services, so they must clearly be protected especially because the information used and generated in their operation and the data managed represent significant assets.

Open access
The Security Environment of the V4 Countries

Abstract

State security policy is not created in a vacuum. In general, policy‑making is affected by external and internal variables and influences on the security environment as well as by responses to all these factors. Political decision‑making is another significant intervening variable. The aim of this study is to define the security environment of the Visegrad countries in both its narrow and broader senses. To this end, I consider common factors that have affected - and continue to influence - all four countries in order to reveal and evaluate the policy development processes in these states up to the present day. My methodology relies on case studies that trace the security policies of each of the Visegrad countries since the end of the bipolar standoff. The comparison in my conclusion highlights significant challenges now affecting the security policies of all these countries including defence budgets, the crisis in Ukraine, the position of EU member states and growing nationalism and extremism.

Open access
Network Threat Identification and Analysis Based on a State Transition Graph

Computer Security Applications Conference, Tucson, AZ, 2005, 160-169. 9. Martel, S. A New Model for Computer Network Security Risk Analysis. Ph D Paper, Department of System Computer Engineering, Carleton University, Ottawa, Ontario, May 2002. 10. Wang, C., G. Huan g. Network Threat Analysis Based on Vulnerability Relation Model. - Journal of Computer Applications, Vol. 30, 2010, No 11, 3046-3050. 11. Chen, Y., B. Boeh m, L. Sheppard. Value Driven Security Threat Modelling Based on Attack Path Analysis. - In: 40th Hawaii

Open access