We kindly inform you that, as long as the subject affiliation of our 300.000+ articles is in progress, you might get unsufficient or no results on your third level or second level search. In this case, please broaden your search criteria.
Reason for writing and research problem (s): The technical technological development of human civilization has led to the invention of the Internet and social networks. However, these inventions were unfortunately abused and became a means and method for the execution of various felonies in the field of cyber crime. Software is the center of this form of crime and the main mean of carrying out the crime. The normative framework in the fight against cyber crime consists of international documents and harmonized national legislation. The organizational framework consists of state institutions whose jurisdiction is the prevention and combating of this form of crime and specialized services of the police, the prosecution, the court, the ministry of finance, and others. Due to the specific manner of execution, the characteristics of the perpetrator, the absence of the crime scene and the time and place of the occurrence of the consequences of the cyber crime, the work on detection and proofing requires specific knowledge, skills and training. The primary role in proving this form of crime has specific cyber forensics in order to obtain relevant evidence in order to clarify and arrest the perpetrator. The paper also analyzes certain felonies committed in the field of cyber crime in the Republic of Serbia and provides significant results in the detection and proving of these felonies. The authors in the concluding remarks, in order to improve the legal and institutional framework for the suppression of cyber crime, have submitted de lege ferenda proposals. Aims of the paper (scientific and/ or social): To point out potential new emerging forms of cybercrime and their modus operandi and to present the proposal de lege ferenda for the improvement of the normative framework, practice and state cooperation. Methodology/ Design: The work is based on normative and comparative-legal methods. Research/ Paper limitations: Potential dark number of committed felonies of cybercrime. Results/ Findings: General conclusion: Multidisciplinary and multi-agency approach and international operational cooperation of the police, especially in the Western Balkans, which is of great importance for the detection and fight against cyber crime. Research/ Paper validity: The justification of research is affected by an enormous social danger from the most serious forms of cyber crime, due to the specific way of execution, the characteristics of the perpetrator, the absence of the crime scene, and the time and place of the occurrence of the consequences.
More...
Reason (s) for writing and research problem (s): Necessity of improving the prevention of privacy protection on the Internet and violation of the right to privacy and legal regulation of the same. Aims of the paper (scientific and/or social): To raise awareness of the consequences and rights of those whose right to privacy has been violated, as well as the effective determination of the severity of the violations committed. Methodology/Design: Review of existing literature. Review of internet sources. Review of the case law. Research/paper limitations: Do not exist. Results/Findings: Courts in BiH in procedures of violation of the right to privacy do not have sufficient experience yet, and there is no case law or the ability of the Supreme Court to align differences in the judgments of lower courts. General conclusion: With the rapid development of modern computer technologies through the abuse of computers, moral law is being violated more and more, thereby violating someone's reputation. Research/paper validity: The paper found that computer crime as a major negative social phenomenon increasingly leads to violation of the right to privacy and that the injured parties do not show sufficient interest in non-property forms of reparation, and that the same should certainly be changed.
More...
Reason for writing and research problem (s): Observed from the aspect of the time to which we belong, and in the time that high-tech crime is facing us every day, it is more pronounced, and it is one of the most dangerous types of crime in general. There are many reasons for supporting this high degree of social danger. Of particular importance to them is the following: every day, his growing presence, even in the most sensitive institutions of society as a whole; the consequences that it entails; its international character; its connection with the most difficult forms of crime (the case of organized crime and terrorism, where it is not only the powerful lever of their planning, but also the key means of execution); difficulty in discovering clarification and proof. Aims of the paper (scientific and/or social): Criminal investigation is of operational character, which is often associated with the experience of a criminal investigator, very little attention is paid to professional and scientific investigation of criminal offenses in general, especially criminal offenses of high-tech criminality. This perception suggests that the crimes mentioned above are criminal areas that are very complex for detection, clarification and proofing. The general aim of criminology as a science is to try to create models and foundations for successful detection, clarification and proofing based on concrete actions of certain criminal offenses. The theoretical basis, set by the subject research, should serve to improve the detective activities of the competent authorities in the area of these crimes. On the basis of the aforementioned findings, the interaction between criminal and criminal process investigation activities will be established, which ultimately should contribute to more efficient detection, clarification and demonstration of criminal offenses of high-tech criminality, and in particular through the strengthening of scientific and professional approach in combating crime in general. Methodology/Design: During the research, relevant scientific research methods and techniques will be used, which can provide the highest quality results in the field of investigation of the relevance and efficiency of criminal and criminal procedural actions in the detection of criminal phenomena, with special emphasis on crimes of high-tech criminality. In addition, efforts will be made to promote research that is significant in order to measure the quality and effectiveness of the investigation of the above-mentioned crimes. Research/Paper limitation: The work is part of a wider scientific-professional activity aimed at affirmation and application of modern criminal and criminal procedural methods, which can contribute to more efficient detection, clarification and proving of criminal acts of high-tech criminality.
More...
Reason for writing and research problem (s): The very role of hackers while dealing with illegal activities within surroundings of the invisible part of the World Wide Web motivated the author to analyze relations between this special kind of offenders and hidden areas of modern informatics sphere. Aims of the paper (scientific and/or social): The author focused his attention to establishing of link that, very possible, connects hackers to the potential opportunities of the Deep Web zone. Methodology/Design: Analyze of terms hacker and invisible Web, done through their phenomenological mutuality, prevailed the author’s methodological efforts in this research. Research/Paper limitation: Actual forms of exposing basic terms in the paper are probable limitation to have them presented completely, because of technical lack of the author's capability to make the full-scaled overview of their existing modalities. Results/Findings: According to the author’s opinion, the link between hacker and the Deep Web exists in the various types of criminal activities having hackers’ attacks and terrorism as highlighted in the paper. General Conclusion: Invisible part of Web and its dark zone so-called the Darknet, especially, make specific suitability for hacker’s activity ante delictum, just as post delictum, having at the same time optimal informatics surroundings enabled for the data exchanging as ground of illegal activities preparation and likewise of getting profit out of damage committed by hacker’s attack. Research/Paper Validity: By pointing out on existing of connection between hacker and hidden part of the World Wide Web, the author tends to get caution heightened and to enhance protection considering hackers’ attacks by defining preventive proceedings that can come in handy in exchanging personal data of every user of Internet global communication network.
More...
Reason for writing and research problem (s): Nowadays global communication possibilities have inspired the authors to pay attention to having parts of world informatics network suitable enough to be exposed criminally. Aims of the paper (scientific and/or social): Subsequently, the article’s goal sticks to research of the criminal potential of a zone hidden within the World Wide Web. Methodology/Design: Following the methodological model of establishing the phenomenological determinants from general through special to unique, the authors try to define terminological range of the most inscrutable bit within the hidden Web by doing distinction among the terms of the World Wide Web, the surface Web and the Deep Web with scoping their relation. Finally, at unique stage, the authors show the Darknet phenomenon and particularity of its relation to the Deep Web. Research/Paper limitation: The authors are fully aware of the exploration limits that could be supportive to the arbitrary clues on global communication as necessary mode of human rights and freedoms being exposed socialized like. Results/Findings: The criminal potential of the Darknet is to be established by the authors through influences of criminal hubs, criminal markets and poly-criminality being presented intensively as much as internationally. General Conclusion: Pointing to the Darknet existence and its criminal potential, as the authors deem, creates essential ground to further researching of clandestine ways to communicate globally and their criminalization. Research/Paper Validity: Thus, the authors intend undoubtedly to show in the article clearly the criminal danger of hidden zones of possibility to communicate globally and its devastating influence to the values of modern society.
More...
Changes that are taking place in the contemporary post-modern world also concern nation states. They include the area of sovereignty, in both the internal and external dimension, as well as the scope of power and role of the state. The interdependence of states is growing and, at the same time, the capability of state governments to control economic, social and even political processes is becoming more and more limited. The need for security remains the fundamental part of the collective interest of any community and the basic role of the state. This function cannot be fulfilled by any supranational or international institution, no matter how effective it is. Since the beginning of the 1990s we can observe a process of movement of the centre of state government upwards, toward supranational structures, as well as downwards, to the level of regional and local communities. Undoubtedly, this poses a challenge for the autonomy of the state, statehood and nationality. Nowadays, sovereignty consists rather in the right of the sovereign to decide about the way in which the power coming from him/her is executed, as well as if, and to what extent, it is executed in his/her interest.This has a key significance in the context of the future, in which the ultimate socioeconomic configuration may by created not by states, but by regions. A fundamental change in the understanding and defining of security that has taken place contemporarily consists in shifting the focus of subjective security from the nation state to the human being (human security), who has become the basic subject of security.
More...
National defence has a special feature that regulates vital (main) national interests and therefore requires a detailed and transparent law. The body of law creates legal standards that define the relationships between the elements of the defence system of the state. These standards govern the relationship of the system with the environment. All of these relations were defined as the defence law. This paper presents the complexities of the legal rules governing the issue of the defence of a state and indicates the reasons for the negative perception of the defence law. The author emphasizes the dynamics of the law , which evolves with the changes of society. He is referring to the importance of the problem for the correct functioning of the state not only from a legal but also from a social point of view.
More...
The aim of the following article is to present two fundamentally important mechanisms in countering threats to national security, those being state of war and martial law. It shows in detail the differences and relations between state of war and martial law as well as the understanding and definitions of the two in terms of the law and the study of international relations. The article discusses laws and regulations concerning emergency states, the circumstances and conditions of the introduction of martial law in accordance with the Polish legislation. The article also includes the description of a new mechanism to respond to terrorist threats that has implemented solutions for crisis management system in Poland.
More...
In the fierce struggle for supremacy, the secret services have played an important role in dividing areas of global influence, where information and misinformation have played, play and will play a crucial role in gaining territories, natural, human and logistical resources, as well as in imposing the ideologies agreed by the great players of the times, in one form or another. By using Pakistan, the Islamic country, as the link, the US has taken great care not to disclose that the main and ultimate goal of jihad was the destruction of Russia. Despite its anti-American ideology, Islamic fundamentalism has largely served American strategic interests in the former Soviet Union. At the same time, the Islamist missionaries established themselves in both the Central Asian Soviet republics and in Russia, propagating against the secular (secular) state institutions. Terrorist attacks, increasingly widespread, have led to another reason why millions of people have left their homes, and we are witnessing the largest exodus of the Middle Eastern population..
More...
The facts and implications of the gendarmes in Romanian social life represent an unresearched segment that leaves open the way to the realization of a brief study. Social work is one of the prerequisites for ensuring the smooth running of democratic society, as it is a specific model of social protection for people and their rights. The present paper is in fact the result of thorough investigations of periodicals, documents from archival funds such as the General Inspectorate of the Gendarmerie, as well as other funds in the field of public order and safety held by the Central National Historical Archives and specialized works in the field of social work. The paper highlights the legislative framework that established the role of gendarmes in social life, captures moments from which the qualities of the gendarmes such as human value and dignity, honesty, courage, empathy and so on, values that shape the profile of a gendarme dedicated to the people and the nation. Through this paper we note that in fact the public order institutions, the Gendarmerie in this case, supported the local social work system.
More...
In the spring of 1918, the leadership of Romanian Army decided to set up a Historical Office whose task was to elaborate a large monograph to describe in detail the battles of the Romanian Army in First World War. Due to the complexity of this task, in 1920 the office was transformed into a section, which, in January 1928, became the Historical Service of the Romanian General Staff. This study describes the activity of these structures, ranging from the difficulties inherent of the pioneering period to the remarkable achievements in the field of military historiography and archiving in the years leading up to World War II.
More...
Publications Received at the Editorial Office: Constantin Chiper, Omagiu eroilor şi veteranilor de război prahoveni, Editura Karta-Graphic, Ploiești, 2020. (Cerasela Moldoveanu)
More...
The present article briefly addresses the way in which the terrorist phenomenon have evolved and manifested itself under variousdifferent forms at national level starting with the '70s, when, in the context of the increasing number of terrorist attacks on the European continent. During this time period different terrorist organizations have also targeted foreign citizens and diplomats on Romanian territory. At the same time, in parallel with the evolution of terrorist phenomenon, the article intends to present the main terrorist actions undertaken by members of various terrorist organizations, using published references of the main Romanian intelligence agency, as well as the measures taken by the judicial institutions and intelligence agencies in the field of prevention and counteracting terrorism.The efforts to combat terrorist acts are inextricably linked to the evolution of the structures responsible for combating this scourge and with the legal framework on which the activity of this institutions is based uppon. Also of major importance for understanding the role and necessity of this institutions is to establish the main timeframes that have marked their existence and activity, to present the legal framework regulating their activity and also to highlight some of the operational achievements.
More...
The actuality of the choice of this theme lies, first of all, from the fact that the terrorist phenomenon represents a real and concrete threat to human society, being present at the level of the whole planet, and the effects of this scourge create at the psychological level a state of insecurity with negative effects in all societal areas. A big problem is also that at the level of combating the terrorist phenomenon it is necessary to ensure the necessary measures to respect citizens' rights and freedoms, even if there are reasonable suspicions that certain persons are suspected of terrorism or activities subsumed thereof (e.g. financing of terrorist actions). This scientific paper aims to analyze the main legislative and regulatory instruments existing at international level and the European Council, with a focus on highlighting how the terrorist phenomenon can be effectively countered to ensure a climate of security at the societal level. The terrorist phenomenon, by the magnitude of its implications, constitutes a global threat that has social, economic, political and security implications.
More...
Under the Treaty of Bucharest, Romania experienced significant territorial losses and the country’s natural resources were practically surrendered to Germany and Austria-Hungary in the long run. Militarily, the treaty imposed not only the demobilization of the Romanian army, which was understandable given that Romania was no longer a belligerent country, but also a substantial reduction in the stocks of weapons, ammunition, horses and equipment, something that significantly decreased the combat capacity of the Romanian army, despite the fact that the First World War was still in full swing. In addition, the treaty called for the demobilization of the army to take place as soon as possible, hindering Romania’s plans for an eventual reentry into war.
More...
Scientific Life: Masa rotundă: „Investigating Military, War and Peace. New Perspectives in Military History”, 10-11 martie 2020, Cercul Militar Național // Round Table: “Investigating Military, War and Peace. New Perspectives in Military History”, March 10-11, 2020, National Military Club (Sorin-Vasile Negoiță)
More...
The review of: Shadow State. Murder, Mayhem and Russia’s Remaking of the West. By: Luke Harding. Publisher: Guardian Faber, London, 2020.
More...
Review of: Dr. Roko Uscilos „Dinaminio saugumo koncepcija laisvės atėmimo vietose“. Review by: Raimundas Kalesnykas
More...