INTERNATIONAL SCIENTIFIC CONFERENCE STRATEGIES XXI. The Complex and Dynamic Nature of the Security Environment - Volume 2
INTERNATIONAL SCIENTIFIC CONFERENCE STRATEGIES XXI. The Complex and Dynamic Nature of the Security Environment - Volume 2
Contributor(s): Florian CÎRCIUMARU (Editor), Mirela Atanasiu (Editor)
Subject(s): Politics / Political Sciences, Politics, Political Theory, Political Sciences, Civil Society, Governance, Public Administration, Public Law, Geopolitics, Corruption - Transparency - Anti-Corruption
ISSN: 2285-9896
Published by: Carol I National Defence University Publishing House
Keywords: power relations; security transformation; strategic theory; national security system;
Summary/Abstract: The conference provides the appropriate academic exchange of ideas, opinions and communication of the latest results of scientific research in the field of security and strategy.
- Page Count: 334
- Publication Year: 2018
- Language: English
GEOSPATIAL SUPPORT ARCHITECTURE FOR THE ROMANIAN ARMED FORCES
GEOSPATIAL SUPPORT ARCHITECTURE FOR THE ROMANIAN ARMED FORCES
(GEOSPATIAL SUPPORT ARCHITECTURE FOR THE ROMANIAN ARMED FORCES)
- Author(s):Dan Pomîrleanu
- Language:English
- Subject(s):Politics / Political Sciences, Geopolitics
- Page Range:7-15
- No. of Pages:9
- Keywords:geospatial; enterprise; technology; information; architecture;
- Summary/Abstract:The technological advance witnessed in the last decades, the widening of the threats spectrum against national security as well as the development of unconventional means of operations ask to redefine some processes to support the availability of information in short time where is needed. Privileged beneficiary of the technical evolutions in areas like sensors, analysis methods, automated processing and communication, the geo spatial domain has the potential to significantly contribute to the best decision making for a large variety of missions. In this article a geospatial support architecture for the Romanian Armed Forces,adapted to the new realities, is proposed. Thus, in the first part of the paper, the factors that influence the geospatial support are analyzed. Then, a method to describe the geospatial support architecture is setup. Finally, based on a holistic framework for enterprise architectures documented in academic literature, the eight perspectives of the geospatial support architecture are presented.
CONSIDERATIONS ON THE MODERN FACE OF WAR
CONSIDERATIONS ON THE MODERN FACE OF WAR
(CONSIDERATIONS ON THE MODERN FACE OF WAR)
- Author(s):Ilie ANGIU
- Language:English
- Subject(s):Security and defense, Military policy, Political behavior, Comparative politics
- Page Range:16-22
- No. of Pages:7
- Keywords:war; armed struggle; technology; modern forces;
- Summary/Abstract:The specific means of war is the armed struggle, which is destructive. By triggering a war, politics pursues its aims, but uses other means, the means of armed struggle. Armies are closely linked to technological developments. They are the first beneficiaries of technical and scientific progress. Contemporary military conflicts have highlighted new orientations and concepts of military action, characterized by complexity,mobility, dynamism, the use of high technology and almost totally professional forces,integrated actions of all categories of forces and arms genres. The space for the armedstruggle in its terrestrial, aerial, maritime and cosmic dimension tends to becomeincreasingly integrated, completely cybernetic, with increasing tendencies to expand into theelectromagnetic environment based on spectacular developments in the technical-scientificfield.
MULTIDIMENSIONAL JOB ANALYSIS IN THE MILITARY ORGANIZATIONS
MULTIDIMENSIONAL JOB ANALYSIS IN THE MILITARY ORGANIZATIONS
(MULTIDIMENSIONAL JOB ANALYSIS IN THE MILITARY ORGANIZATIONS)
- Author(s):Corneliu Axente, Costache Rusu
- Language:English
- Subject(s):Government/Political systems, Military policy, Comparative politics, Politics and Identity
- Page Range:23-32
- No. of Pages:10
- Keywords:job analysis; key competencies and abilities; job description;
- Summary/Abstract:The officers’ advancement in the military career is represented by the translation from execution posts to command posts. Commitment to a command post involves an exponential increase of the task diversity and analyses information flow. Also there’s a need for continuous skills development in leadership and resource managing. Under these circumstances, the occupied command post involves a mix of various challenges in managing simultaneously and synchronously human, material, and time resources available within the organization.This paper proposes a classification used for analyzing the management positions within the military organizations, thus obtaining a way of expressing their complexity and their value, as well as identifying the coordinates needed to be achieved by the military organizations managers from the point of view of different skills or managerial types imposed by the specifics of the occupied post.
TRAINING, FROM NATIONAL TO ALLIANCE REQUIREMENTS
TRAINING, FROM NATIONAL TO ALLIANCE REQUIREMENTS
(TRAINING, FROM NATIONAL TO ALLIANCE REQUIREMENTS)
- Author(s):Nicu Chirea
- Language:English
- Subject(s):Governance, Government/Political systems, International relations/trade
- Page Range:33-39
- No. of Pages:7
- Keywords:education; training; exercises; evaluation; standardization; interoperability;
- Summary/Abstract:Nowadays training is running standardized, following very clear rules,norms and principles established at national and allied levels. Given that the environment weare experiencing is changing very rapidly, anticipation and planning over longer horizonsbecomes very difficult, perhaps even impossible. I think there is a need for a new type oftraining to generate perfectly adaptable soldiers, capable of making quick decisions underuncertainty, as in the period ahead, those who will invest in quality training will be far aheadof others.
A FAILED STATE’S LONG WAY BACK
A FAILED STATE’S LONG WAY BACK
(A FAILED STATE’S LONG WAY BACK)
- Author(s):Dragos Calcan
- Language:English
- Subject(s):Civil Society, International relations/trade, Political behavior, Comparative politics, Politics and Identity
- Page Range:40-47
- No. of Pages:8
- Keywords:failed state; civil war; piracy; terrorism; military intervention; humanitarian intervention; Somalia;
- Summary/Abstract:This paper will analyze the causes that led Somalia to become a failed state and the slow pace of recovery discovered by Mogadishu in the recent years. The study is based on qualitative research, analyzing documents which depict the particular history of Somalia and the causes that led to the civil war, as well as quantitative data, when analyzing the number of casualties and refugees that resulted following the unfolding of the Somali conflict. Examining also the rise of the terrorist group Al-Shabaab and the ways in which such organizations manage to replace the role of the state, the paper concludes that the task of rebuilding a failed state is a long and arduous process, in which the international community should adapt its measures to the local specificity of the concerned area. However,as the recent developments show, there is room for hope for the Somali state and people.
THEORETICAL CONSIDERATIONS ON NATO’S APPROACH ON HOST NATION SUPPORT. CASE STUDY ON ROMANIA
THEORETICAL CONSIDERATIONS ON NATO’S APPROACH
ON HOST NATION SUPPORT. CASE STUDY ON ROMANIA
(THEORETICAL CONSIDERATIONS ON NATO’S APPROACH
ON HOST NATION SUPPORT. CASE STUDY ON ROMANIA)
- Author(s):Stefan-Daniel Cotiga
- Language:English
- Subject(s):International relations/trade, Security and defense, Military policy, Comparative politics, Politics and Identity
- Page Range:48-54
- No. of Pages:7
- Keywords:Host Nation Support; North Atlantic Treaty Organization; Romania; logistics; resources; planning; providing;
- Summary/Abstract:The HNS is both a category of logistic support applicable to Article 5 and Non-Article 5 scenarios type and a choice that must be carefully planned and organized to reduce the dependence of NATO missions on their logistical side. Thus, with the accession of local resources, it is obvious that the elimination of time necessary to bring these resources from other places is achieved, which reduces the time necessary for the deployment of troops participating in military activities in Joint Operation Area (JOA) and gives the fighting actions a much greater flexibility. In NATO doctrine, it is considered that the Host Nation Support plays an essential role in gaining decisive advantages over the opponents’ forces.The main purposes of this paper is to present how Host Nation Support (HNS) concept is understood and implemented by NATO member countries, also when our country can provide this type of logistical support, responsibilities assumed in terms of planning and providing HNS and the HNS management system of Romania.
DIRECT PARTICIPATION IN HOSTILITIES IN INTERNATIONAL LAW
DIRECT PARTICIPATION IN HOSTILITIES IN INTERNATIONAL LAW
(DIRECT PARTICIPATION IN HOSTILITIES IN INTERNATIONAL LAW)
- Author(s):Adrian Băncilă
- Language:English
- Subject(s):Politics / Political Sciences, International relations/trade, Military policy, Peace and Conflict Studies
- Page Range:55-64
- No. of Pages:10
- Keywords:Direct participation in hostilities; Geneva Conventions and Additional Protocols; international humanitarian law; civilian; protection;
- Summary/Abstract:Direct participation in hostilities is not limited to the personnel of the armed forces; as such, numerous dispositions of international military law refer to the possibility that civilians be attracted in the sphere of military operations. In this case the civilians lose their protection as civilians and eventually gain the protection reserved to war prisoners as combatants. Such civilians could include the persons that accompany the armed forces,without being a part of these forces (e.g. civilian military crew members, war correspondents,commercial navy or aviation crew members as well as the population which spontaneously takes up arms to repel an invading enemy). The ambiguity of the expression „direct participants to hostilities” as well as the apparition of new categories of combatants such as members of private military and security companies have led to the emergence of doctrinal and jurisprudential specifications in this field.
CIVIL AND MILITARY COOPERATION –A STAKEHOLDER AMONG WORLD PEACE ACTORS
CIVIL AND MILITARY COOPERATION –A STAKEHOLDER AMONG WORLD PEACE ACTORS
(CIVIL AND MILITARY COOPERATION –A STAKEHOLDER AMONG WORLD PEACE ACTORS)
- Author(s):Ciprian Popescu
- Language:English
- Subject(s):Civil Society, Governance, Military policy
- Page Range:65-77
- No. of Pages:13
- Keywords:civil-military cooperation; civilian actors; NGOs; local authorities;
- Summary/Abstract:Civilian-military cooperation is and will remain a reference instrument of building world’s peace. Cooperation with civilians represents a challenge for all military personnel, both due to the differences in organizational culture of them, the more active military involvement in humanitarian projects and processes in support of the local population, and the political problems in working with government officials.In order to involve various entities in such cooperation, it is imperative to be proceeded personnel’ training programs conducted both before and after the actions in theatres of operation. Knowing these aspects mentioned above, cooperation between military and civilians could lead to increased confidence, as well as the safety of local population and military force involved. Therefore, CIMIC specialized mission is to continuously grow as much as the number of those who understand that the multinational troops, in general, and Romanian troops, in particular, are there in their country (Iraq, Afghanistan, Kosovo) to bring peace and stability and to help in keeping the host population hope for a better future.Therefore, the paper will present some elements supporting the main assumption,namely, CIMIC structures and personnel promoting peace and stability in the areas of operations.
THE USE OF SPECIAL OPERATIONS FORCES IN THE CONTEXT OF CONTEMPORARY WARS: CONCEPTUAL, OPERATIONAL AND TACTICAL HIGHLIGHTS
THE USE OF SPECIAL OPERATIONS FORCES IN THE CONTEXT OF CONTEMPORARY WARS: CONCEPTUAL, OPERATIONAL AND TACTICAL HIGHLIGHTS
(THE USE OF SPECIAL OPERATIONS FORCES IN THE CONTEXT OF CONTEMPORARY WARS: CONCEPTUAL, OPERATIONAL AND TACTICAL HIGHLIGHTS)
- Author(s):Octavian Dacin
- Language:English
- Subject(s):Government/Political systems, International relations/trade, Security and defense, Welfare systems, Political behavior
- Page Range:78-84
- No. of Pages:7
- Keywords:Special Forces, special operation forces; special operations; hybrid warfare; unconventional warfare; army; area of operations;
- Summary/Abstract:Special operations forces (SOF) are considered highly capable, elite forces that are trained and maintained to address critical national security objectives. SOF’s versatility, speed of deployment, and capabilities make SOF ideally suited for today’s security environment, where significant dangers are created by regional conflicts, the proliferation of weapons of mass destruction, and transnational threats. Thus, it is important for the Department of Defense to ensure that SOF are ready to perform their intended missions and are used in ways that capitalize on their unique capabilities.
USE OF CBRN DEFENCE STRUCTURES IN CBRN CONSEQUENCES MANAGEMENT
USE OF CBRN DEFENCE STRUCTURES IN CBRN CONSEQUENCES MANAGEMENT
(USE OF CBRN DEFENCE STRUCTURES IN CBRN CONSEQUENCES MANAGEMENT)
- Author(s):Alexandru Herciu
- Language:English
- Subject(s):Politics, Security and defense, Military policy, Welfare systems
- Page Range:93-105
- No. of Pages:13
- Keywords:consequences management; CBRN incident; CBRN dangers; risks, threats; CBRN defence command and control; CBRN support;
- Summary/Abstract:Military operations are planned, prepared and conducted in conditions of CBRN hazards, risks and threats existence. Today’s hybrid conflict - characterized by complex operating environment security risks - CBRN range is enhanced by the possibility of executing attacks by unconventional and asymmetric forces, not only in dealing with conventional forces but also on the civilian population in the conflict zone, in order to achieve the ultimate goal which is to cause withdrawal of joint, integrated multinational extra regional force. Based on these considerations, the forces engaged in hybrid conflict,supported by CBRN defense forces, must be able to manage possible incidents in the area of operations by applying appropriate measures in order to limit the consequences of CBRN incidents, to save the life of military personnel and civilians and to limit the effects and restoring affected environmental factors.
NATO EUROPEAN MISSILE DEFENSE FROM DESIRE TO REALITY
NATO EUROPEAN MISSILE DEFENSE FROM DESIRE TO REALITY
(NATO EUROPEAN MISSILE DEFENSE FROM DESIRE TO REALITY)
- Author(s):Florentin-Gabriel Giuvară
- Language:English
- Subject(s):International relations/trade, Security and defense, Military policy, Welfare systems
- Page Range:85-92
- No. of Pages:8
- Keywords:NATO missile defence; European phased adaptive approach; active layered theatre ballistic missile defence;
- Summary/Abstract:The current global security environment is dangerous and unpredictable,bringing instability and security challenges, from the Middle East to North Africa and towardEastern Europe, as well as newer threats such as cyber-attacks and ballistic missiles. NATOhas begun to adapt its deterrence and defence posture to the security coordinates of the 21stcentury, and Missile Defence will play an important role in this process. At the 2010 NATOSummit in Lisbon, Heads of State and Government committed themselves to maintaining anappropriate mix of conventional, nuclear and missile defence assets in order to strengthendefence against the full range of risks and threats to the Alliance. The Allies’ objectiveremains, however, achievement of a Ballistic Missile Defence (BMD) capability that canprovide full coverage and protection to NATO European populations, forces and territory, inaccordance with the principles of indivisibility of Allies’ security and NATO solidarity.
MILITARY MOBILITY – AN OPERATIONAL TARGET AS EFFECT OF THE HYBRID WAR BREAKDOWN OF THE BORDERS
MILITARY MOBILITY – AN OPERATIONAL TARGET AS EFFECT OF THE HYBRID WAR BREAKDOWN OF THE BORDERS
(MILITARY MOBILITY – AN OPERATIONAL TARGET AS EFFECT OF THE HYBRID WAR BREAKDOWN OF THE BORDERS)
- Author(s):Dorin Ionita, Ion Anghel
- Language:English
- Subject(s):Politics, Security and defense, Military policy, Welfare systems, Peace and Conflict Studies
- Page Range:106-113
- No. of Pages:8
- Keywords:freedom of movement; military mobility; operational target; hybrid war; hybrid warfare;
- Summary/Abstract:The freedom of movement of forces and means became an operational target, as a result of the ever-widening hybrid warfare on the elimination of frontiers. In recent years, it has come to light that it is very difficult to transport military equipment and forces on national territory, but also on the European continent, as there are a multitude of restrictions. Therefore, ensuring effective military mobility raises wide-ranging debates at both national and EU / NATO levels, as it requires a systematic approach to several economic, military and political issues. The article presents a review of these concerns,which have the ultimate goal of ensuring that the freedom of movement of forces and mean scan be viewed as an investment process that involves, both military and economic, short-term costs and long-term benefits.
THE ROLE OF SOCIAL NETWORKS IN RUSSIAN FEDERATION’S PUBLIC DIPLOMACY
THE ROLE OF SOCIAL NETWORKS IN RUSSIAN FEDERATION’S PUBLIC DIPLOMACY
(THE ROLE OF SOCIAL NETWORKS IN RUSSIAN FEDERATION’S PUBLIC DIPLOMACY)
- Author(s):Andreia Mariana Pop
- Language:English
- Subject(s):International relations/trade, Political behavior, Politics and society
- Page Range:114-120
- No. of Pages:7
- Keywords:Social Influence; Social Strategy; Russia; Social Media; Public Diplomacy; International Relations;
- Summary/Abstract:The social networks generated an environment which empowers both citizens and politicians and puts diplomats under public scrutiny in a way that the main stream media was unable to do previously. Social media is being used in ways that shape politics,business, world culture, international relations, education, careers, innovation, and more.One of the ways that social media has transformed politics is the sheer speed at which news,poll results and rumors are shared. Political campaigns are now influenced by every story,whether true or not, that gets spread around social media. It’s getting more and more difficult to separate actual news from fake news online. Social media makes this distinction especially confusing. The constant stream of links and rumors about political leaders and candidates is a mixture of truth, lies, satire and speculation. As part of this worldwide campaign, states disseminate their influence according to their objectives. For instance, Russian social media posts have a visible influence in Baltics, Ukraine, and other nearby states through a variety of means, including traditional and social media. The purpose of this paper is to get a better understanding of the nature and effectiveness of pro-Russia outreach on social media and identify counter-messaging opportunities. There are other more nuanced questions about the role of social media and online communities in International Relations whose effects are not so easily apparent. International Relations as a discipline has only recently begun to engage with the growth of social media and its implications for global politics. But if the current climate is anything to go by, social media is well on the way to disrupt the traditional channels and methods of diplomacy.
PERSPECTIVES ON THE ACCESSIBILITY OF PUBLIC INFORMATION
PERSPECTIVES ON THE ACCESSIBILITY OF PUBLIC INFORMATION
(PERSPECTIVES ON THE ACCESSIBILITY OF PUBLIC INFORMATION)
- Author(s):Lavinia Nicoleta Ghisa, Teodor Frunzeti
- Language:English
- Subject(s):Civil Society, Governance, Government/Political systems
- Page Range:121-127
- No. of Pages:7
- Keywords:public information; secretive information; national security;
- Summary/Abstract:The digital society has experienced exponential growth over the last decade and new communication technologies have enlarged the access of social entities to various types of information. These pieces of information have become an essential resource to which civil society members relate in different ways, within the same legislative framework.However, the perceptions of their value and utility are most diverse and often related to the interests of each individual or organization in a highly competitive social environment. In this context, activities aimed at obtaining information, regardless of the accessibility level, have become increasingly prominent.
DEVELOPMENT TRENDS FOR A 21ST CENTURY EFFECTIVE SMALL NAVY
DEVELOPMENT TRENDS FOR A 21ST CENTURY EFFECTIVE SMALL NAVY
(DEVELOPMENT TRENDS FOR A 21ST CENTURY EFFECTIVE SMALL NAVY)
- Author(s):Alexandru Cristian Hudisteanu
- Language:English
- Subject(s):Government/Political systems, Military policy, Developing nations, Politics and Identity
- Page Range:128-137
- No. of Pages:10
- Keywords:small navy; development trend; effective; maritime security; solution;
- Summary/Abstract:Small navies have always been in a race to keep up with a dynamic security environment. They have to overcome not only the specific problems of adapting to emerging threats and assuming new responsibilities in the maritime domain, but doing so with a limited number of assets – both in number and capabilities –, threatened by budgetary cuts or insufficient funding – with effects that prove the more sever the smaller the navy. All this happens under close scrutiny of public opinion concerning military spending and their usefulness – small navies being in general national income consumers, rather than wealth generators –, and most of the time overstretching personnel and assets to honor a full range of domestic and international commitments. This paper will highlight some development trends that allow a small navy to keep up with an ever changing security environment in and effective and efficient manner.
LOGISTIC EXECUTION UNIT/INFANTRY DIVISION STRUCTURE, ROLE, TASKS
LOGISTIC EXECUTION UNIT/INFANTRY DIVISION STRUCTURE, ROLE, TASKS
(LOGISTIC EXECUTION UNIT/INFANTRY DIVISION -STRUCTURE, ROLE, TASKS)
- Author(s):Nicolae Nicoara
- Language:English
- Subject(s):Security and defense, Military policy
- Page Range:138-146
- No. of Pages:9
- Keywords:logistics; infantry division; mobility; support;
- Summary/Abstract:Tactical logistic support should be configured as a functional system which has to be able to achieve its goal in a simple, continuous and sufficient way. Among the tactical logistical support structures, logistic execution unit/infantry division was designed as a complex structure. Logistic execution unit acts in an infantry division, it is constituted and is operationalized from a logistics base, but the logistics base is a new concept. They function only for fifteen years and did not have a strong tradition. From that point of view, we consider necessary to define, think and research about all the processes that involve the logistics base and its mobile structure: logistic execution unit.
NATIONAL INTELLECTUAL CAPITAL AS A CRITICAL INFRASTRUCTURE
NATIONAL INTELLECTUAL CAPITAL AS A CRITICAL INFRASTRUCTURE
(NATIONAL INTELLECTUAL CAPITAL AS A CRITICAL INFRASTRUCTURE)
- Author(s):Ovidiu Georgescu
- Language:English
- Subject(s):Governance, Government/Political systems, Politics and society
- Page Range:147-155
- No. of Pages:9
- Keywords:critical infrastructure protection; national intellectual capital; protecting intangible assets; knowledge infrastructure; security studies;
- Summary/Abstract:The security environment, in its search for raising the degree of security and to attain and maintain the prosperity of its citizens, has tried to establish standards at the level of existing infrastructure through the concept of critical infrastructures. Current critical infrastructure concepts however, seem to have overlooked one infrastructure essential to human development and currently one of the most important resource for value creation:knowledge. Knowledge was an engine of development for human civilization since ancient times and I believe it is essential for any state that wants a high degree of security and prosperity.The concept of national intellectual capital is an important tool in value creation for a state and under specific conditions can be considered a critical infrastructure for the state. It is important to give consideration to the idea of a critical national intellectual capital infrastructure not only to protect a state’s assets but also for value creation and attaining that which I and many others consider to be the most important goal of any modern state:attaining and maintaining prosperity.
AUTONOMOUS UNDERWATER SYSTEMS –A FEASIBLE TOOL TO INCREASE THE RESILIENCE OF MARITIME CRITICAL INFRASTRUCTURE
AUTONOMOUS UNDERWATER SYSTEMS –A FEASIBLE TOOL TO INCREASE THE RESILIENCE OF MARITIME CRITICAL INFRASTRUCTURE
(AUTONOMOUS UNDERWATER SYSTEMS –A FEASIBLE TOOL TO INCREASE THE RESILIENCE OF MARITIME CRITICAL INFRASTRUCTURE)
- Author(s):Daniel-Cornel Tanasescu
- Language:English
- Subject(s):Environmental and Energy policy, International relations/trade, Security and defense, Military policy, Welfare systems
- Page Range:156-165
- No. of Pages:10
- Keywords:port infrastructure security; terrorist threats; resilience; autonomous technological solutions;
- Summary/Abstract:It is considered that in the field of safety and port infrastructure security,vulnerable objectives and considered as targets from the perspective of the terrorist threat are represented by: operating platforms and equipment, ships, oil and chemical terminals,bridges and inland access ways, transport facilities, industrial processing capabilities in the proximity area. A comprehensive and realistic approach to setting up measures to increase the resilience of such a complex system includes: the dimension of information security,common operating rules and procedures between inter-institutional actors, the implementation of autonomous technological solutions with high effectiveness and minimum risk to the human factor.
THE CONTRIBUTION OF GEOPOLITICIANS WITH GEOGRAPHIC ROOTS TO THE DELINEATION AND DEFINITION OF THE ROMANIAN NATIONAL STATE
THE CONTRIBUTION OF GEOPOLITICIANS WITH GEOGRAPHIC ROOTS TO THE DELINEATION AND DEFINITION OF THE ROMANIAN NATIONAL STATE
(THE CONTRIBUTION OF GEOPOLITICIANS WITH GEOGRAPHIC ROOTS TO THE DELINEATION AND DEFINITION OF THE ROMANIAN NATIONAL STATE)
- Author(s):Silviu Neguţ, Marius-Cristian Neacşu
- Language:English
- Subject(s):Civil Society, Governance, Environmental and Energy policy, History and theory of political science
- Page Range:166-179
- No. of Pages:14
- Keywords:state; nation; nation-state; unitary national state; geopolitical games; essential natural components; the Carpathians; the Danube; the Black Sea;
- Summary/Abstract:This study is dedicated to the 100th anniversary of the establishment of Romanian unitary national state, Great Romania, a much longer and complex process than it seems at first glance. Along with historical events, the geographic space and the population have played an essential role in the coagulation process of the Romanian national state. The merit of seizing and explaining these assets lies with great geopolitical-geographers such as Simion Mehedinți, Ion Conea (both were teachers at the Upper School of War, the ”Carol I” NDU precursor), Nicolae Al. Rădulescu, Vintilă Mihăilescu, Victor Tufescu and so on. These alone or in collaboration with specialists in fields such as history (Nicolae Iorga, Gheorghe Brătianu, Constantin Daicoviciu), demography and statistics (Anton Golopenția, Sabin Mănuilă), sociology (Dimitrie Gusti, Mircea Vulcănescu – the latter being also aphilosopher) have demonstrated the perfect logic of the constitution of the Romanian unitary national state. They also leaned on the essential natural components of the Romanian state,the well-known trio Carpathians - the Danube - the Black Sea, resuming the significant elements without which it would have been impossible to achieve the Great Romania.
ALTERNATIVE NATIONAL DEFENCE AND SECURITY STRUCTURES DURING THE COLD WAR PERIOD. CASE STUDY – ROMANIA AND THE BALKANS
ALTERNATIVE NATIONAL DEFENCE AND SECURITY
STRUCTURES DURING THE COLD WAR PERIOD.
CASE STUDY – ROMANIA AND THE BALKANS
(ALTERNATIVE NATIONAL DEFENCE AND SECURITY
STRUCTURES DURING THE COLD WAR PERIOD.
CASE STUDY – ROMANIA AND THE BALKANS)
- Author(s):Diana Cristiana Lupu, Gligor Vaidean
- Language:English
- Subject(s):Politics / Political Sciences, History, Civil Society, Security and defense, Developing nations, Politics and society, Politics and Identity
- Page Range:180-190
- No. of Pages:11
- Keywords:patriotic guards; people’s militia; combat groups of the working classș
- Summary/Abstract:The paper presents the alternative national defence and security structures,be they considered public security organisations, official governmental paramilitary structures or militias, existing in some countries during the Cold War period, focusing on the situation in Romania and the Balkans. The presentation is contextualised, taking into account the tensions between the Eastern Bloc (the Soviet Union and its satellite states) and the Western Bloc (the United States of America and its allies), divided along ideological lines after the end of the World War II, the existence of the two main political-military alliances(the Warsaw Pact and NATO), as well as the main crises and phases in the Cold War, in general, and in the Warsaw Pact, in particular. In the mentioned context, in some countries,certain structures other than the regular military were established to provide additional defence in the event of outside attack, the emergence, organisation and role of the ones related to the Eastern Bloc, especially those in Romania and the Balkans, being presented in the paper.
RISKS AND THREATS TO THE SECURITY OF ROMANIA
RISKS AND THREATS TO THE SECURITY OF ROMANIA
(RISKS AND THREATS TO THE SECURITY OF ROMANIA)
- Author(s):Ilie ANGIU
- Language:English
- Subject(s):Civil Society, Security and defense, Military policy, Welfare systems, Corruption - Transparency - Anti-Corruption
- Page Range:191-199
- No. of Pages:9
- Keywords:security; risks; threats; state actors; non-state actors; environment, space;
- Summary/Abstract:The diversification of threats to the international security environment has led to essential changes in their physiognomy and characteristics. Threats to Romania’s security in the current security context manifest and will manifest, both by conventional and non-conventional means, in the military and civilian spheres that makes them sometimes difficult to be predicted. The complexity and dynamics of the current international security environment has entailed Romania to take measures to defend and counteract new types of threats. This was made internally as well as in the framework of the alliances, coalitions,partnerships to which Romania is part. The main goal of these measures was to involve itself in providing the security of its own citizens as well as contributing to the achievement of regional stability, in order to integrate the Southeastern European space in the continental and Euro-Atlantic security architecture.
THE BRAND AND IMAGE OF A NATION IN INTERNATIONAL POLITICS
THE BRAND AND IMAGE OF A NATION IN INTERNATIONAL POLITICS
(THE BRAND AND IMAGE OF A NATION IN INTERNATIONAL POLITICS)
- Author(s):Ciprian Pripoae-Serbănescu, Ecaterina Hlihor
- Language:English
- Subject(s):Government/Political systems, International relations/trade, Politics and society
- Page Range:200-209
- No. of Pages:10
- Keywords:branding; public diplomacy; country image; competitive identity; societal security; Introduction;
- Summary/Abstract:Our study has as a central idea the fact that the public diplomacy and branding of a nation must be seen in complementarity. In the context of the current globalization and extended mediatization, companies and nation-states alike are involved in an effort to establish images and symbolic representations in order to differentiate themselves among the others. By building a visible and attractive country brand that is representative for its people and society, a state (re)builds its credibility in international politics, increases its influence in international organizations and institutions, improves its image in order to build durable economic, cultural and security partnerships.
A POSSIBLE ROMANIAN-AMERICAN NAVAL STRATEGIC PARTNERSHIP
A POSSIBLE ROMANIAN-AMERICAN NAVAL STRATEGIC PARTNERSHIP
(A POSSIBLE ROMANIAN-AMERICAN NAVAL STRATEGIC PARTNERSHIP)
- Author(s):Ioan Crăciun, Auraș Liviu COMAN
- Language:English
- Subject(s):International relations/trade, Security and defense, Military policy, Welfare systems
- Page Range:210-219
- No. of Pages:10
- Keywords:Montreux Convention; freedom of navigation; strategic partnership;
- Summary/Abstract:How can the United States increase the responsiveness of US forces to reinforce the South-Eastern NATO flank in the Black Sea? Geopolitical changes have led to calls for the necessity to update the Montreux Convention. These restrictions can be avoided in this situation if the US would rent or lease at a reasonable price warships to the Romanian Navy that fly the Romanian flag, and are operated by a Romanian-American crew. Montreux Convention rules may be avoided by building an innovative partnership, a solid and reliable agreement between US Navy and Romanian Navy. Subsequently, a Multinational Task Group composed of American, Romanian, and Black Sea littoral countries’ ships can be consolidated. The result will be beneficial to the US, NATO, EU, and Black Sea countries.This naval partnership has to be created to support Aegis Ashore Missile Defense System Deveselu, to rebuild a military and security power in the region, and change the balance of power.
CONTINUOUS GENERATION OF MILITARY CAPACITIES – AN ESENTIAL CONDITION IN ORDER TO ENSURE NATIONAL AND EUROATLANTIC SECURITY
CONTINUOUS GENERATION OF MILITARY CAPACITIES –
AN ESENTIAL CONDITION IN ORDER TO ENSURE NATIONAL AND EUROATLANTIC SECURITY
(CONTINUOUS GENERATION OF MILITARY CAPACITIES –
AN ESENTIAL CONDITION IN ORDER TO ENSURE NATIONAL AND EUROATLANTIC SECURITY)
- Author(s):Robert-Mihai Poenaru
- Language:English
- Subject(s):International relations/trade, Security and defense, Welfare systems, Methodology and research technology
- Page Range:220-226
- No. of Pages:7
- Keywords:european union deterrence Initiative; european army; military capabilities; military budget; smart defense; pooling and sharing;
- Summary/Abstract:At a global level, we are witnessing an arms race that has not been seen since the Iron Curtain was lifted. The threats to our country are mainly coming from the East,where Russia exercises its status as a regional power and tends to change the world order by redefining the power poles and redefining the spheres of influence. At this point, Romania can assume the position of guarantor of security at the level of the eastern part of NATO and of the European Union, which generates stability in the region, including in the Balkans. But in order to achieve these goals, besides a very well-established diplomacy, there is a need for military capabilities that can lead to discouragement.
THE IMPORTANCE OF COMPETITIVE INTELLIGENCE IN DEVELOPMENT OF THE BUSINESS ENVIRONMENT
THE IMPORTANCE OF COMPETITIVE INTELLIGENCE
IN DEVELOPMENT OF THE BUSINESS ENVIRONMENT
(THE IMPORTANCE OF COMPETITIVE INTELLIGENCE
IN DEVELOPMENT OF THE BUSINESS ENVIRONMENT)
- Author(s):Adina MIHĂESCU
- Language:English
- Subject(s):Civil Society, Security and defense, Welfare systems, Political economy
- Page Range:227-233
- No. of Pages:7
- Keywords:competitive intelligence; information; business environment; business competition; economic forecasts;
- Summary/Abstract:The business environment and specific environments of intelligence activities share an important common feature: lack of certainty. Although supposedly digitization and technological progress should ease the manager’s decision-making (through easier access to information), in practice, he is overwhelmed by the large amount of data he has at his disposal. The difference is made by those going from the “curiosity” to the“verified information” stage.Making this detailed process of collecting relevant data is extremely important. And this activity is characteristic of Competitive Intelligence (CI) structures. The raw data is then transformed into intelligence, and only now it can form the basis of strategies and action plans (or analyses, forecasts, etc.). This is one of the main strengths that a company can have,namely performance in anticipation.Romania has significant potential for economic development, which is also encouraged, for example through the Start-up Nation Government Program. According to data released by the Ministry of Business, Commerce and Entrepreneurship, the aforementioned program finances ten thousand companies annually. They suddenly create competition across several economic sectors in different areas. To resist the market, both emerging and senior firms are forced to adapt quickly and understand the direction and magnitude of the changes that have taken place. Thus, the CI can help these changes to be of lesser magnitude and, perhaps most importantly, to converge towards the creation of a sustainable, coherent and without major destabilization economic environment.
GENERAL CONSIDERATIONS REGARDING THE CIMIC DOCTRINE IN ROMANIA
GENERAL CONSIDERATIONS REGARDING THE CIMIC DOCTRINE IN ROMANIA
(GENERAL CONSIDERATIONS REGARDING THE CIMIC DOCTRINE IN ROMANIA)
- Author(s):Eugen Popescu
- Language:English
- Subject(s):Security and defense, Military policy, Welfare systems, Developing nations
- Page Range:234-240
- No. of Pages:7
- Keywords:Civil-Military Co-operation; doctrine; operations; NATO;
- Summary/Abstract:Contemporary military operations take place in complex environments populated by different civilian and humanitarian institutions and a challenging array of issues that are not precisely „military” in nature. This has increased the importance of managing the civil-military interface, particularly that between the military and the humanitarian community. This process of management is described in Civil-Military Cooperation Doctrine. The report examines the evolution of Civil-Military Co-operation Doctrine in the Romanian Armed Forces.
HORIZONS WITH(OUT) FRONTIERS
HORIZONS WITH(OUT) FRONTIERS
(HORIZONS WITH(OUT) FRONTIERS)
- Author(s):Viorica Ionela Trîncu
- Language:English
- Subject(s):Civil Society, International relations/trade, Politics and Identity
- Page Range:241-247
- No. of Pages:7
- Keywords:migration; media; civil society; freedom of expression; hate speech;
- Summary/Abstract:There is no doubt that the 21st Century will be the century of migration, in particular raising concerns about illegal migration, transnational threats and loss of national identity in the host countries. That is why the author argues that the coming decades will constitute of mix of challenges and opportunities. In order to face these challenges and take advantage of these opportunities, the main purpose of this paper is to respond to two broad questions: What does the influx of refugees mean for European economies, media and security and how should Europe respond to the influx?
DEFENSIVE STRATEGY OF SMALL COUNTRIES. THE CASE OF ROMANIA
DEFENSIVE STRATEGY OF SMALL COUNTRIES. THE CASE OF ROMANIA
(DEFENSIVE STRATEGY OF SMALL COUNTRIES. THE CASE OF ROMANIA)
- Author(s):Marian Tuca
- Language:English
- Subject(s):Civil Society, Security and defense, Welfare systems, Developing nations
- Page Range:248-253
- No. of Pages:6
- Keywords:small country; strategy; energy resources; geopolitical silence; energy aggression;
- Summary/Abstract:After World War I and the Great Union of 1918, Romanian leaders were required to act for the recognition of the new frontiers by the great powers, counteracting the revisionist states and building regional alliances alongside the traditional alliance with the Western powers to guarantee stability in the region. Along the same line, the Royal Romanian House engages in the same strategy through matrimonial alliances with the royal houses of Greece and Yugoslavia. Romania adopts a security strategy characteristic for small countries, suitable to respond to the threats of revisionist states.In the post-war period, Romania enters the sphere of Soviet influence and is part of the Warsaw Treaty organization for continental security. After the collapse of the communist system and the security organization, Romania is making every effort to join NATO and the EU in order to ensure national security.
GEOSPATIAL INFORMATION SYSTEMS (GIS) IN MILITARY OPERATIONS
GEOSPATIAL INFORMATION SYSTEMS (GIS) IN MILITARY OPERATIONS
(GEOSPATIAL INFORMATION SYSTEMS (GIS) IN MILITARY OPERATIONS)
- Author(s):Ciprian Tudor
- Language:English
- Subject(s):Security and defense, Military policy, Welfare systems, Geopolitics, Peace and Conflict Studies
- Page Range:254-261
- No. of Pages:8
- Keywords:GIS; geospatial; imagery; remote sensing; intelligence; military operations; terrain analysis;
- Summary/Abstract:The way in which the military plans, functions and operates has been revolutionized by the usage of GIS applications in military operations. From home security to operations around the globe, military depends on reliable, accurate spatial mapping and tools. Military forces use GIS in a variety of applications including cartography, intelligence,terrain analysis, battlefield management, remote sensing, military installation, management and monitoring of possible terrorist activity. The concept of Command, Control,Communication and Coordination in military operations is largely dependent on the availability of accurate, spatial information in order to take quick decisions for operational orders. In the present digital era, GIS is an excellent tool for military commanders in operations.
A POSSIBLE EURO-ATLANTIC COMPREHENSIVE MARITIME SECURITY MODEL
A POSSIBLE EURO-ATLANTIC COMPREHENSIVE MARITIME SECURITY MODEL
(A POSSIBLE EURO-ATLANTIC COMPREHENSIVE MARITIME SECURITY MODEL)
- Author(s):Valentin Catalin Vlad
- Language:English
- Subject(s):International relations/trade, Security and defense, Military policy, Welfare systems, EU-Accession / EU-DEvelopment
- Page Range:262-270
- No. of Pages:9
- Keywords:maritime security; cooperative security; security communities; collective security; regional security;
- Summary/Abstract:This article aims to identify the existence, relevance and opportunity of a theoretical security through cooperation model based on the main concepts and theories of the security communities and the appreciation of universally recognized individual and collective values and freedom, in order ultimately to prove the relevance and opportunity of such a comprehensive maritime security model that could be adopted and developed at Euro-Atlantic maritime space as part of the complex process of ensuring regional and international maritime security.The adoption of a comprehensive maritime security through cooperation model centered on ensuring individual and collective security, stability and prosperity is the key element for the legitimacy, credibility and efficiency of the Euro-Atlantic maritime strategies in relation to international treaties, challenges and threats to international maritime security and last but not least with the peculiarities and characteristics of international maritime basins.
CRYPTOCURRENCIES, A NEW REALITY FOR ECONOMY AND SECURITY
CRYPTOCURRENCIES, A NEW REALITY FOR ECONOMY AND SECURITY
(CRYPTOCURRENCIES, A NEW REALITY FOR ECONOMY AND SECURITY)
- Author(s):Dragos Dantis
- Language:English
- Subject(s):Economic policy, International relations/trade, Security and defense, Welfare systems
- Page Range:271-277
- No. of Pages:7
- Summary/Abstract:Current paper has the role to present a new reality symbolized by the cryptocurrencies. The analysis will focus on different aspects at national and international level, with impact on economy and on security. The economical view will detail the links with national economies, financial-banking system, stock exchange market, commercial international flows and the utilization of the general ledger technology as factor of innovation in the development of business environment. The security view will analyze the risks with possibility of manifestation in the fields of money laundering, terrorism financing,information and communication technology.
OPEN-SOURCE STACKS AND SOLUTIONS FOR WORKFLOW MANAGEMENT IN PUBLIC INSTITUTIONS
OPEN-SOURCE STACKS AND SOLUTIONS FOR WORKFLOW MANAGEMENT IN PUBLIC INSTITUTIONS
(OPEN-SOURCE STACKS AND SOLUTIONS FOR WORKFLOW MANAGEMENT IN PUBLIC INSTITUTIONS)
- Author(s):Alexandru Caranica, Dragos Draghinescu, Octavian Fratu
- Language:English
- Subject(s):Economic policy, Government/Political systems, Welfare systems, Fiscal Politics / Budgeting
- Page Range:278-287
- No. of Pages:10
- Keywords:bpm; workflow management; public institution; standard procedures; activity management;
- Summary/Abstract:Workflow and activity management, also commonly referred to as Business Process Management (BPM), is without a doubt every bit as important as the introduction of a workflow in itself. Standard operations and procedures, inside a public institution, has multiple benefits, ranging from faster operations and increased productivity, to lowering the errors an employee can make.A workflow has to be properly planned and accordingly managed, otherwise employees might find themselves struggling to achieve the levels of effectiveness a manager would have hoped, in the long run. As such, this paper offers an overview of stacks and open-source projects for BPM and Document management, evaluating pros and cons of each solution, with a current focus on module sand ideas that can be implemented for document and resources management, in Romanian national defense institutions.
BLOCKCHAIN MALWARE IMPACT ON ORGANIZATIONAL SECURITY
BLOCKCHAIN MALWARE IMPACT ON ORGANIZATIONAL SECURITY
(BLOCKCHAIN MALWARE IMPACT ON ORGANIZATIONAL SECURITY)
- Author(s):Dragos Draghinescu, Alexandru Caranica, Octavian Fratu
- Language:English
- Subject(s):Government/Political systems, International relations/trade, Security and defense, Welfare systems
- Page Range:288-293
- No. of Pages:6
- Keywords:Malware; blockchain; cryptojacking; monero; bitcoin; attack; crypto coin; energy consumption;
- Summary/Abstract:Ever since the launch of Bitcoin block chain system, the world has witnessed a new type of asset: the data asset. The power of value distribution and lack of transaction tracking comes with the price of enhancing data theft capabilities of black hat hackers. This work will attempt to expose the type of attacks that use virtual currency, as well as the impact it produces in an organization. We consider two well-known types of malware involving cryptocurrencies: mining-based and ransomware. The attacker damage is in the resource consumption, whether that is money extortion, electrical power or device wearing.
THE IMPORTANCE OF IT MANAGEMENT IN INSTITUTIONAL PROJECTS
THE IMPORTANCE OF IT MANAGEMENT IN INSTITUTIONAL PROJECTS
(THE IMPORTANCE OF IT MANAGEMENT IN INSTITUTIONAL PROJECTS)
- Author(s):Ionica Serban, Ştefan-Antonio DAN-ȘUTEU
- Language:English
- Subject(s):Economic policy, Government/Political systems, Welfare systems, Fiscal Politics / Budgeting
- Page Range:294-299
- No. of Pages:6
- Keywords:project management software; project, program; Microsoft Office Project Professional; Spider; Primavera Project Planner for Enterprise; Charisma Enterprise;
- Summary/Abstract:The complexity of identification and implementation of actions geared towards the attainment of quality objectives, cost and time has created the need for an uniform administration. At this point, the request for qualifications as Project Manager is growing due to its applicability in various fields of economic environment. The particularly complex character of projects imposed since from the very beginning the use of IT programs and applications. In the field of project management, those applications were developed continuously and they constitute important elements in the information systems of many businesses. In recent years, also on the Romanian market, such computer programs started to appear, provided by some large corporations in the field of information technology, and even by some national industry software producers.
INFORMATION SYSTEMS REQUIREMENTS FOR EFFICIENT WORKFLOW MANAGEMENT IN PUBLIC INSTITUTIONS
INFORMATION SYSTEMS REQUIREMENTS FOR EFFICIENT
WORKFLOW MANAGEMENT IN PUBLIC INSTITUTIONS
(INFORMATION SYSTEMS REQUIREMENTS FOR EFFICIENT
WORKFLOW MANAGEMENT IN PUBLIC INSTITUTIONS)
- Author(s):Ştefan-Antonio DAN-ȘUTEU
- Language:English
- Subject(s):Economic policy, Government/Political systems, Welfare systems, Fiscal Politics / Budgeting
- Page Range:300-306
- No. of Pages:7
- Keywords:workflow management; information system; operational requirements; information security;
- Summary/Abstract:The rapid development and implementation of ICT applications, as one of the main characteristic of the informational society, continues to determine changes on multiple levels. Numerous observations indicate that the vast majority of human existence elements are more and more infused with a cyber component, form day-to-day, routine activities, up to critical processes which can impact the national security and defense.Determined by the specific way used for the collection, processing, storage and dissemination of information, the systems and applications based on information and communication technology can determine the optimization of workflow management processes and activities within public and private organizations and enterprises.
INFORMATION SECURITY MANAGEMENT IN PUBLIC ENTITIES WITHIN THE ENERGY SECTOR
INFORMATION SECURITY MANAGEMENT IN PUBLIC ENTITIES WITHIN THE ENERGY SECTOR
(INFORMATION SECURITY MANAGEMENT IN PUBLIC ENTITIES WITHIN THE ENERGY SECTOR)
- Author(s):Cristian Marinescu, Victor Adrian VEVERA, Adriana Meda Udroiu
- Language:English
- Subject(s):Economic policy, Environmental and Energy policy, Government/Political systems, Welfare systems
- Page Range:307-314
- No. of Pages:8
- Keywords:evaluation criteria; risk; inventory of resources; indicators;
- Summary/Abstract:This paper shows how the ISO 2700 family procedures are applied within an institution providing public services in the energy sector.SR EN ISO / IEC 27001 establishes the requirements for the assessment and treatment of information security risks and the organization adapts the requirements of its own needs.In this context, we present an analysis of the indicators characterizing an information security management system. The needs analysis within the institution leads us to conclude that there are four (4) indicators (or assessment criteria) for the energy sector in question in line with the objectives of the Information Security Policy. For these indicators, we have developed the calculation formulas required for the risk analysis we are making.
THE DESIGN OF A CYBER SECURITY PLAN FOR CRITICAL INFRASTRUCTURES
THE DESIGN OF A CYBER SECURITY PLAN FOR CRITICAL INFRASTRUCTURES
(THE DESIGN OF A CYBER SECURITY PLAN FOR CRITICAL INFRASTRUCTURES)
- Author(s):Victor Adrian VEVERA, Adriana Meda Udroiu
- Language:English
- Subject(s):Economic policy, Government/Political systems, Security and defense, Welfare systems
- Page Range:315-323
- No. of Pages:9
- Keywords:cybersecurity plan; critical infrastructure; critical sectors;
- Summary/Abstract:Cyber security for critical infrastructures was not a priority all the time. At the beginning the focus was on other aspects of critical infrastructures like physical reliability and redundancy. Nowadays, however with the fast-growing digital world and the multitude of threats continuously evolving, cyber security became a top priority. The first part of the paper will present the critical sectors of modern society, the cyber security problem and the inter dependencies that are between critical infrastructures. The second part illustrates how critical infrastructures can be modelled and simulated in order to better understand them and discover unknown vulnerabilities. Finally, the third part will have as purpose to analyze the sources of vulnerabilities, and to bring in our attention twomodels for increasing cybersecurity in infrastructures, used in present
USING BLOCKCHAIN TECHNOLOGY IN DESIGNING CYBER-SECURITY SOLUTIONS
USING BLOCKCHAIN TECHNOLOGY IN DESIGNING
CYBER-SECURITY SOLUTIONS
(USING BLOCKCHAIN TECHNOLOGY IN DESIGNING
CYBER-SECURITY SOLUTIONS)
- Author(s):Adriana Meda Udroiu, Victor Adrian VEVERA
- Language:English
- Subject(s):Economic policy, Government/Political systems, Security and defense, Welfare systems, Peace and Conflict Studies
- Page Range:324-332
- No. of Pages:9
- Keywords:blockchain; cybersecurity; cyber transactions;
- Summary/Abstract:In this paper we aim to analyze the impact of Blockchain technology in the current context of cyber-security, especially in the area of financial transactions. For this, we will first describe the current state of cyber-security and the problems it faces. Because blockchain technology only addresses part of the cyber-security matters, we will explain the response of this technology to each of the domain-specific issues. It is equally well-known that blockchain technology is the basis of many current applications (Bitcoin, Ethereum,Hyperledger Fabric).