We kindly inform you that, as long as the subject affiliation of our 300.000+ articles is in progress, you might get unsufficient or no results on your third level or second level search. In this case, please broaden your search criteria.
Subject of the report appears the appeal before the Commission on protection of competition of actions and inactions of the contracting authority upon providing clarifications on the conditions of the procedure in the course of the awarding process. The most commonly seen defects are violation of the term for submission of clarifications, repetition of information, which is contained in the documentation for public procurement, decision or announcement instead of giving answer on the raised question, lack of particular clarifications. The substantive and procedural rights of the parties in the procedure on appeal are examined.
More...
The aim of this study is to gather sufficient evidence and arguments in order to prove to society that during the process of change in thinking and especially of effective practical implementation of management models high levels of efficiency can be achieved on all hierarchical levels in systems key for the society and the state.
More...
Security is a degree of resistance or harm. Security is applied to everything that is valuable and at the same time vulnerable it may be an object a computer system, a room, a person, a group, a community, a nation or an organization.Security is the functional state of a system which ensures that it neutralizes and counteracts external and internal factors that affect or may have a detrimental effect on the system (deteriorating the organizational state of the system or impossibility of its functioning and development). The typically organized attacks on the security system are the result of a conspiracy.
More...
Looking at the most significant events in the past 3-5 years in the field of security and defense, we can come to a somewhat unexpected conclusion, namely that they are a kind of prologue for far greater transformations. Many of them are connected, directly or indirectly, to each other, but to each of them individually, we can draw some conclusions. Looking at these conclusions, we can assume the direction in which the Common Security and Defense Policy (CSDP) should develop in the future and whether or not the creation of a single European armed forces is needed.
More...
By asking the question of the creation of a single European army, we must say that the political will to integrate EU security and defense action is a primary factor. If Member States really want to guarantee the security of their citizens, to protect their humanitarian values in a global context, they have to have a huge political desire and not just "written documents".
More...
The paper gives a short overview on military bases, interprets their establishment and their empolyment in a historical context. The essay talks about the types of overseas bases, which types represent different levels, measures of installations, furthermore gives a review on their attributes, considerations of their establishment putting the focus on air base specific issues. The last chapter shows, from the percpective of the statement that Air Power is an inherently offensive entity this is why its overseas employment is fundamental and obvious, that how air bases supported geotrategic endeavours conducted by Air Power during the 20th century and which tendecy can be expected. Finally, the paper highlights which are the basic attributes and requirements of air bases in the morror of the employed warfighting assets and organisation method, and interprets the basic properties of the bases of other services than Air Force.
More...
The actions of assault and helicopters are considered, with particular attention paid to the tactics used in various military conflicts.
More...
This essay tries to answer the question about the role and place of cybersecurity in the most crucial strategic documents of Great Britain in the period between 2009 and 2011. Cyberspace plays an important role for the states and their societies and because of this fact setting an efficient strategy in this domain is inevitably crucial. This article presents acomprehensive analysis of national security strategies as well as the cyberstrategies. The most important priorities, the methods and tools of achieving them and the role of the crucial bodies responsible for Great Britain cybersecurity are described. The analysis of the national security strategies allows to highlight the role of the cybersecurity in these documents.
More...
In this article are discussed the forms of the social traditionalism depicted in the important Radomir Konstantinović’s work Filosofija palanke (1969) – as the example of the timeless negative attitudes towards modernization and tolerance. The reality of Serbia in the phase of transition from traditionalist to modern society here is only one of the possible specifications of the described universal situation which possesses its characteristic features: among others – endeavour to restoring of the tribal community, authoritative and normative pedagogy, sentimental-sarcastic language, masochistic determinism, empirisation of the religion, utilitarianism of the death, loftiness of the banality, cultural infantilism or exclusion of every different character. Analysis of these and another categories, as well as history of the reception of this book, indicate that connection between conservatism, ethnic homogenization and fanaticism on behalf of tradition is close and independent from the ethnocultural and historical realities.
More...