Search results for "National security"
showing 10 items of 62 documents
Stakeholders, contradictions and salience: An empirical study of a Norwegian G2G effort
2006
Author's version of a chapter in Proceedings of the 39th Annual Hawaii International Conference on Systems Sciences. Also available from the publisher at http://dx.doi.org/10.1109/HICSS.2006.436 Previous studies indicate that the expected effects of e-Government are slower to realize than initially expected. Several authors argue that e-Government involves particularly complex settings, consisting of a variety of stakeholders promoting different and often conflicting objectives. Yet, few studies have explicitly addressed the inherent challenges of this complexity. This study focuses on the extent to which contradictory stakeholder objectives can help explain the relatively slow progress of …
Migration Trends in the World and in Poland versus National Security
2020
Purpose: The aim of the paper is to analyse migration trends in the world from 1990 to the present day and economic migration in Poland in the years 2015-2019. Aspects related to national security in the context of the scale of crimes committed by economic migrants residing in Poland will also be discussed. Design/Methodology/Approach: In the research implementation process, data, and sources analysis, as well as a modeling method to show extrapolation of migration trends. Findings: The methodology used allowed the authors to determine that international migration processes have permanently entered the order of functioning of countries around the world. Practical Implications: According to …
Is Democracy Exportable?
2017
Among many aspects to the question of whether democracy is exportable, this contribution focuses on the role of the people, understood not as a unitary actor but as a heterogeneous set: the citizens. The people matter, in a different way, both in the countries to which democracy might be exported and in the democratic countries in which the question is about promoting democracy elsewhere. The mechanisms or characteristics involved in the discussion include yardstick competition, differences among citizens in the intensity of their preferences, differences among autocracies regarding intrusion into private life, citizens’ assessments of future regime change, and responsiveness of elected inc…
Beyond the notion of security community: What role for the African regional organizations in peace and security?
2005
African regional organizations' increasing activity in security policy is usually approached through the concept of ‘security community’, which can only partially clarify their difficult situation. A multi-level governance model is suggested as a more useful approach in a situation where economic cooperation is weak, member states' principles of governance diverge, and they themselves might be part of security problems. A security community is not a necessary condition for a regional organization to play a role in the field of security. Through new intra-regional and cross-level relationships with the international community and civil society, regional organizations can become important sec…
Cyber Situational Awareness in Critical Infrastructure Organizations
2021
The capability related to cybersecurity plays an ever-growing role on overall national security and securing the functions vital to society. The national cyber capability is mainly composed by resilience of companies running critical infrastructures and their cyber situational awareness (CSA). According to a common view, components of critical infrastructures become more complex and interdependent on each other and, as a consequence, ramifications of incidents multiply. In practice, the actions relate to developing better CSA and understanding of a critical infrastructure organization. The aim is to prepare for incidents and their management in a whole-of-society approach. The arrangement i…
Terroryzm w obliczu bezpieczeństwa państwa
2018
TERRORISM IN THE FACE OF STATE SECURITYThe article focuses on the issue of the threat of terrorism. Terrorism plays a vital role in the environment, gradually becoming a major threat to any conflict affecting the functioning of the state. Experience has shown that in the fight against terrorism, the key to victory is the exchange of intelligence and new techniques and procedures for action. Anti-terrorism methods are continually evolving as a result of new trends and ways in which terrorist activities are carried out.
Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise
2015
Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes …
The Preservation of Art and Culture in Times of War
2022
Conflict over cultural heritage has increasingly become a standard part of war. Today, systematic exploitation, manipulation, attacks, and destruction of cultural heritage by state and non-state actors form part of most violent conflicts across the world. Such acts are often intentional and based on well-planned strategies for inflicting harm on groups of people and communities. With this increasing awareness of the role cultural heritage plays in war, scholars and practitioners have progressed from seeing conflict-related destruction of cultural heritage as a cultural tragedy to understanding it as a vital national security issue. There is also a shift from the desire to protect cultural p…
Ekspansja militarna Rosji w regionie zagrożeniem dla grupy państw nadbałtyckich : Litwy, Łotwy i Estonii
2015
The authors of this article introduce the issue of the threat of the Baltic States from Russia. Consideration of the potential hazard of the Baltic States by the Russian Federation, manifested increasingly imperialistic aspirations, we want to identify the main causes that underlie such a policy of Russia. Membership in the Baltic states of NATO and the European Union gives hope for the unity of the members of NATO and the EU, these countries will be effectively defended against growing Russian militarism.
Foreign and Security Policy
2015
In early 2014 the foreign and security policy discourse in the Baltic region was transformed as a resurgent and assertive Russia annexed Crimea and launched covert operations in eastern Ukraine.1 Observers were quick to point out that events in Ukraine eerily paralleled the 1940 occupation of the Baltic states. The traditional security concerns about Russian intentions in the region that the Baltic states had increasingly suppressed over the previous 20 years once again rushed to the surface. The post-existential era of Baltic foreign and security policy that had marked the decade that followed accession to the EU and NATO seemed to have come to an end.