The alliance faces the most complex and unpredictable security environment since the end of the Cold War, with growing geo-political challenges, more sophisticated and disruptive cyber and hybrid ...threats, and exponential technological changes that are rapidly transforming the way wars are fought and won. NATO continues to adapt and prepare for the future, strengthening its position of deterrence and defense, projecting stability and combating terrorism, investing more in defense and modernizing the Alliance՚s structures.
O nouă paradigmă: resursa forestieră din perspectiva securităţii energetice GOLEA, Daniela Georgiana; PETCU, Ioana; TIRLA, Alexandru Marius
Revista română de informatică și automatică = Romanian journal of information technology and automatic control,
12/2023, Letnik:
29, Številka:
4
Journal Article
Recenzirano
Odprti dostop
In recent years the global energy crisis, though officially unrecognized, has made its presence increasingly felt, especially by worsening the conflict taking place at global or regional level. Not ...incidentally, the conflict zones are exactly those with important fossil energy resources. For example, the Black Sea region and the so-called "Extended Black Sea Region". The problem of access to the fossil resources in this region has made the American and Russian interests clash in a more brutal manner than before, the regional and global consequences of this phenomenon being still unpredictable, to a certain extent. Against this background of insecurity, it becomes more important to find easily applicable technological solutions which would make it possible to satisfy the global or regional energy security needs without relying on the traditional fossil resources. One such approach is the processing and use of “dead plant” materials, including some waste products from urban areas, in order to turn them into fuel.
With the emergence of the notion of multi-domain, all the elements that until now have been associated with the notion of joint, be it battle, operation or formation (in the sense of structure) have ...become associated with this new fashionable notion, which seems that it tends to replace the older notion of joint. However, we appreciate that the notion of joint should lose neither the importance it has had up to now, in the sense of a concept that has been applied and proved functional, shaping to a large extent the development of the military instrument of power, nor the possible evolutions of this concept, given the solid ground on which are now those who have implemented a joint mode of operation. Thus, in this article we aim at highlighting the main reasoning that have led to the emergence and application of this concept (joint) until now, then describing the current security environment and its implications on the operational level; later we will propose a completion of the joint operations, so that it can be applied under current and future threats.
Nuclear proliferation literature typically differentiates supply-side and demand-side factors influencing the spread of nuclear weapons. These distinct approaches to the proliferation puzzle raise ...the following empirical questions: Does nuclear supply stimulate states’ demand for nuclear weapons? Conversely, does the demand for nuclear weapons really facilitate the acquisition of nuclear supply? If such endogeneity exists between the demand-side and supply-side determinants, how would it cause empirical bias in the estimation of their effects on nuclear proliferation? This article aims to unpack endogenous mechanisms of nuclear demand and nuclear supply over the course of nuclear proliferation. In particular, it examines two potential sources of endogeneity: (1) simultaneous interactions between states’ nuclear development decisions and nuclear technological capability and (2) selection bias in nuclear development. To address each source of endogeneity, simultaneous equation models and the duration models with selection are estimated, respectively. Contrary to what recent supply-side literature suggests, the empirical analyses reveal that states’ nuclear demand is primarily driven by external security threats instead of their existing nuclear technology, and that their successful acquisition of nuclear technology mainly follows as the result of nuclear development efforts but does not necessarily depend on individual supply-side factors. This article addresses the typical inference issues in nuclear proliferation research and contributes to our synthetic understanding of proliferation mechanisms.
METHODOLOGY FOR DEVELOPING A SECURITY ENVIRONMENT Oleh Borovyk; Dmytro Kupriienko; Artem Bratko ...
Journal of Liberty and International Affairs (Bitola),
12/2023, Letnik:
9, Številka:
3
Journal Article
Recenzirano
Odprti dostop
The research conducted in this article is a substantiation of the method for strategic management of the development of the Ukrainian border security environment. The essence of the method is to ...determine the phases for the current state and the projected period for particular sectors of the state border, depending on their inherent characteristics, further selecting the concept of border security on this basis, establishing the type of barriers and criteria for ensuring border security that are appropriate for use. Further application of the methodology involves conducting a SWOT analysis for particular sectors of the state border, which identifies the strengths and weaknesses of the internal environment, opportunities and threats inherent in the external environment, and the formation of possible strategies for ensuring border security in three variants of organizing activities (in the conditions of day-to-day activities, a complication of the situation and martial law). Based on the results of the analysis and the illustrative example, it can be concluded that the proposed method for strategic management of the development of Ukraine’s border security environment is one of the possible effective mechanisms in the activities of the subjects ensuring Ukraine’s border security.
The recognition of two new operational environments/domains, the cyber environment and the space environment, has led to the imagining of several “asymmetric” possibilities of engaging an adversary, ...with the aim of creating multiple dilemmas for the adversary, which it must take into account. This approach to military operations is currently associated with the new concept of multi-domain operations. However, it should be noted that not only the recognition of the two new environments, in addition to the three classic environments, constitutes multi-domain operations, but also the future operating environment as a whole is a triggering factor. Thus, in this article, my aim is to identify the extent to which the two new operational environments contribute to the development of the new multi-domain operations concept, with the aim of highlighting possible ways forward in terms of implementing the multi-domain operation concept anddeveloping specific actions in and from the cyber and space environments. Following the analysis carried out, it was noticed that the cyber and space domains are gradually losing relevance within the phases of the multi-domain operation, while the actions are being fragmented and decentralized. This fact must be takeninto account in the development of multi-domain formations.
Fossil fuel resources are decreasing daily. As a renewable energy, biodiesel has been receiving increasing attention because of the relevance it gains from the rising petroleum price and its ...environmental advantages. This review highlights some of the perspectives for the biodiesel industry to thrive as an alternative fuel, while discussing opportunities and challenges of biodiesel. This review is divided in three parts. First overview is given on developments of biodiesel in past and present, especially for the different feedstocks and the conversion technologies of biodiesel industry. More specifically, an overview is given on possible environmental and social impacts associated with biodiesel production, such as food security, land change and water source. Further emphasis is given on the need for government’s incentives and public awareness for the use and benefits of biodiesel, while promoting policies that will not only endorse the industry, but also promote effective land management.
Nowadays, there is a continuous and significant change of the international security environment. More and more complex and diversified types of threats are present and the regional security and ...safety are in danger. The technological evolution from the last decade produced what security experts call the Revolution in Military Affairs. At the same time, it also allowed opponents to use a wide range and diversified means of action. The use of technology offers advantages and disadvantages on both sides. In this regard, it is everyone’s responsibility to identify possible threats or vulnerabilities. It is also everyone’s responsibility to prevent, limit or eliminate the negative impact. Proper establishment of an appropiate security culture, and, at the same time an effective security education, in accordance with the existing threats, are essential for the state, in its effort of creating and maintaining a stable and secure environment for its citizens. Starting from the research hypothesis that there appear to be new threats in the contemporary security environment, I have developed three directions on which I focused my research effort. I intended to use a deductive approach and I aimed to identify the positive aspects that can be maintained, but also other measures and actions that can be integrated into security education so that the individual as part of the state, to achieve the appropriate level of security. For this I have applied multiple research methods specific to the security field, such as the theoretical analysis, comparative analysis, observation, longitudinal method, and also the case study.
Nowadays, there is a legitimization of enhancing managerial processes in professional environment. Efficiently managing resources, processes, and practices is fundamental. Entrepreneurs and public ...institution managers are actively seeking innovative solutions to achieve organizational goals swiftly, utilizing fewer resources, and minimizing or eradicating human errors. Given the challenging security environment, this paper aims to ascertain whether the public administration can leverage the advantages of Agile Culture implementation within the organizational framework of Romanian Administration. This study embarks on a structured literature review focusing on three pivotal pillars: organizational culture, Agile Culture, and Romanian public administration. It scrutinizes the feasibility of implementing Agile Culture within the organizational landscape of the Romanian Public Sector, situated within an integrative framework delineated by the current security context.