Full Issue

Archive

object(Publication)#697 (6) { ["_data"]=> array(29) { ["id"]=> int(2035) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-12-31" ["lastModified"]=> string(19) "2022-01-07 15:10:48" ["sectionId"]=> int(38) ["seq"]=> int(0) ["submissionId"]=> int(1916) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(144) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "265-279" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.4.1" ["abstract"]=> array(2) { ["en_US"]=> string(488) "

During the 20th century, the United Nations led several peacekeeping missions into Africa, where civil wars and armed conflicts among states have followed each other. These conflicts differed in many aspects from each other, and the UN tried to give several answers to heal the conflicts. This essay attempts to present and compare these conflicts and the UN missions through the case of three states and a colony, Angola, Namibia, the Central African Republic, and Western Sahara.

" ["hu_HU"]=> string(488) "

During the 20th century, the United Nations led several peacekeeping missions into Africa, where civil wars and armed conflicts among states have followed each other. These conflicts differed in many aspects from each other, and the UN tried to give several answers to heal the conflicts. This essay attempts to present and compare these conflicts and the UN missions through the case of three states and a colony, Angola, Namibia, the Central African Republic, and Western Sahara.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(187) "Four Conflicts – Four Mandates Comparative Analysis of the Conflicts and Mandates of United Nations Peacekeeping Missions in Western Sahara, Angola, Namibia and Central African Republic" ["hu_HU"]=> string(187) "Four Conflicts – Four Mandates Comparative Analysis of the Conflicts and Mandates of United Nations Peacekeeping Missions in Western Sahara, Angola, Namibia and Central African Republic" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#732 (6) { ["_data"]=> array(15) { ["id"]=> int(2220) ["email"]=> string(25) "harkai.istvan89@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2035) ["seq"]=> int(0) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Harkai" ["hu_HU"]=> string(6) "Harkai" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "István" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(8) { [0]=> string(14) "Uti possidetis" [1]=> string(6) "Angola" [2]=> string(7) "Namibia" [3]=> string(24) "Central African Republic" [4]=> string(14) "Western Sahara" [5]=> string(10) "UN mandate" [6]=> string(12) "peacekeeping" [7]=> string(12) "human rights" } ["en_US"]=> array(8) { [0]=> string(14) "Uti possidetis" [1]=> string(6) "Angola" [2]=> string(7) "Namibia" [3]=> string(24) "Central African Republic" [4]=> string(14) "Western Sahara" [5]=> string(10) "UN mandate" [6]=> string(12) "peacekeeping" [7]=> string(12) "human rights" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#745 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21265) ["id"]=> int(1202) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2035) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#121 (6) { ["_data"]=> array(29) { ["id"]=> int(2041) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-12-31" ["lastModified"]=> string(19) "2022-01-07 15:11:41" ["sectionId"]=> int(38) ["seq"]=> int(1) ["submissionId"]=> int(1922) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(144) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "281-289" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.4.2" ["abstract"]=> array(2) { ["en_US"]=> string(768) "

Information security has an emerging importance, even in people’s daily life, even in country-level policymaking, but these two are inseparable. National information security strategy, applied legal regulation and the actual awareness of citizens are interconnected. The article shows the legal regulation of the last decades in Hungary, the relevant laws and their impact on information security, based on the legal aspects of cybersecurity and cyberterrorism. The focal points in the legisla- tion are the Act on Electronic Public Service of 2009 and the Information Security Act of 2013. The paper points to the advancing interest on the cybersecurity by the side of the government and therefore the more and more detailed legal regulation implied by that.

" ["hu_HU"]=> string(768) "

Information security has an emerging importance, even in people’s daily life, even in country-level policymaking, but these two are inseparable. National information security strategy, applied legal regulation and the actual awareness of citizens are interconnected. The article shows the legal regulation of the last decades in Hungary, the relevant laws and their impact on information security, based on the legal aspects of cybersecurity and cyberterrorism. The focal points in the legisla- tion are the Act on Electronic Public Service of 2009 and the Information Security Act of 2013. The paper points to the advancing interest on the cybersecurity by the side of the government and therefore the more and more detailed legal regulation implied by that.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(48) "Information Security Law and Strategy in Hungary" ["hu_HU"]=> string(48) "Information Security Law and Strategy in Hungary" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(2226) ["email"]=> string(26) "szadeczky.tamas@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2041) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Szádeczky" ["hu_HU"]=> string(10) "Szádeczky" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Tamás" ["hu_HU"]=> string(6) "Tamás" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(2) { [0]=> string(24) "information security act" [1]=> string(14) "cyber strategy" } ["en_US"]=> array(2) { [0]=> string(24) "information security act" [1]=> string(14) "cyber strategy" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#761 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21266) ["id"]=> int(1209) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2041) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(29) { ["id"]=> int(2044) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-12-31" ["lastModified"]=> string(19) "2022-01-07 15:12:37" ["sectionId"]=> int(38) ["seq"]=> int(2) ["submissionId"]=> int(1925) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(144) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "291-297" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.4.3" ["abstract"]=> array(2) { ["en_US"]=> string(269) "

Which is the most appropriate military device for the army based on user interest? This is a frequently asked question. In this paper I will show two methods that can help to select the best one based on the Decision Maker or the user interest and point of view.

" ["hu_HU"]=> string(269) "

Which is the most appropriate military device for the army based on user interest? This is a frequently asked question. In this paper I will show two methods that can help to select the best one based on the Decision Maker or the user interest and point of view.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(54) "Military Application of Multi-Criteria Decision Making" ["hu_HU"]=> string(54) "Military Application of Multi-Criteria Decision Making" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#765 (6) { ["_data"]=> array(15) { ["id"]=> int(2228) ["email"]=> string(26) "gyarmati.jozsef@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2044) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Gyarmati" ["hu_HU"]=> string(8) "Gyarmati" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "József" ["hu_HU"]=> string(7) "József" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(2) { [0]=> string(15) "military device" [1]=> string(15) "decision theory" } ["en_US"]=> array(2) { [0]=> string(15) "military device" [1]=> string(15) "decision theory" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#740 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21267) ["id"]=> int(1211) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2044) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#189 (6) { ["_data"]=> array(27) { ["id"]=> int(2046) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-12-31" ["lastModified"]=> string(19) "2021-11-22 13:50:40" ["sectionId"]=> int(38) ["seq"]=> int(3) ["submissionId"]=> int(1927) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(144) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "299-305" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.4.4" ["abstract"]=> array(2) { ["en_US"]=> string(796) "

Extreme weather events are demonstrating their effects more and more increasingly in Hungary due to global climate change. To be able to lessen damages and implement effective preventive measures, or eventually perform defense and a fast, complete relief project, we need to study these phenomena and explore their effects. Another important task is the scientific investigation of direct impact on environmental factors and humans, analysis of the results, using gained experience for preventative or if needed, remedial activities. With this article our aim is to draw attention to the importance of being aware of the extreme weather events and its effects. With this comprehensive knowledge, disaster management can elaborate appropriate responses for preventive and rescue challenges.

" ["hu_HU"]=> string(796) "

Extreme weather events are demonstrating their effects more and more increasingly in Hungary due to global climate change. To be able to lessen damages and implement effective preventive measures, or eventually perform defense and a fast, complete relief project, we need to study these phenomena and explore their effects. Another important task is the scientific investigation of direct impact on environmental factors and humans, analysis of the results, using gained experience for preventative or if needed, remedial activities. With this article our aim is to draw attention to the importance of being aware of the extreme weather events and its effects. With this comprehensive knowledge, disaster management can elaborate appropriate responses for preventive and rescue challenges.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(52) "Weather Extremities, Challenges and Risks in Hungary" ["hu_HU"]=> string(52) "Weather Extremities, Challenges and Risks in Hungary" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#763 (6) { ["_data"]=> array(15) { ["id"]=> int(2230) ["email"]=> string(23) "kutirajmund@t-online.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2046) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Kuti" ["hu_HU"]=> string(4) "Kuti" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Rajmund" ["hu_HU"]=> string(7) "Rajmund" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#769 (6) { ["_data"]=> array(15) { ["id"]=> int(2231) ["email"]=> string(25) "agnes.nagy.keki@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2046) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Nagy" ["hu_HU"]=> string(4) "Nagy" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Ágnes" ["hu_HU"]=> string(6) "Ágnes" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(14) "global warming" [1]=> string(14) "climate change" [2]=> string(22) "extreme weather events" [3]=> string(17) "preventive action" [4]=> string(11) "remediation" } ["en_US"]=> array(5) { [0]=> string(14) "global warming" [1]=> string(14) "climate change" [2]=> string(22) "extreme weather events" [3]=> string(17) "preventive action" [4]=> string(11) "remediation" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#746 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20422) ["id"]=> int(1213) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2046) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#118 (6) { ["_data"]=> array(29) { ["id"]=> int(2048) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-12-31" ["lastModified"]=> string(19) "2021-11-22 13:52:10" ["sectionId"]=> int(38) ["seq"]=> int(4) ["submissionId"]=> int(1929) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(144) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "307-316" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.4.5" ["abstract"]=> array(2) { ["en_US"]=> string(327) "

The development of the Hungarian system for industrial safety has a history of 15 years. The aim of this article is to overview the measures related to the develop- ment of the legislative area for industrial safety in the field of dangerous goods transportation and draw upon the potential experiences of this progress.

" ["hu_HU"]=> string(327) "

The development of the Hungarian system for industrial safety has a history of 15 years. The aim of this article is to overview the measures related to the develop- ment of the legislative area for industrial safety in the field of dangerous goods transportation and draw upon the potential experiences of this progress.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(107) "Analysis of the Legal and Institution-Building Experiences Related to the Supervision of Dangerous Shipment" ["hu_HU"]=> string(107) "Analysis of the Legal and Institution-Building Experiences Related to the Supervision of Dangerous Shipment" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#773 (6) { ["_data"]=> array(15) { ["id"]=> int(2235) ["email"]=> string(22) "katai.lajos@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2048) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(13) "Kátai-Urbán" ["hu_HU"]=> string(13) "Kátai-Urbán" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Lajos" ["hu_HU"]=> string(5) "Lajos" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(17) "industrial safety" [1]=> string(19) "transport accidents" [2]=> string(33) "transportation of dangerous goods" [3]=> string(19) "disaster management" } ["en_US"]=> array(4) { [0]=> string(17) "industrial safety" [1]=> string(19) "transport accidents" [2]=> string(33) "transportation of dangerous goods" [3]=> string(19) "disaster management" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#775 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20423) ["id"]=> int(1217) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2048) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#115 (6) { ["_data"]=> array(27) { ["id"]=> int(2051) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-12-31" ["lastModified"]=> string(19) "2021-11-22 13:53:17" ["sectionId"]=> int(38) ["seq"]=> int(5) ["submissionId"]=> int(1932) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(144) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "317-330" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.4.6" ["abstract"]=> array(2) { ["en_US"]=> string(1237) "

After achieving the Vienna State Treaty, Austria had to develop its security policy missing fundamental documents. The first main document was the constitutional law on neutrality, which was passed by the Austrian parliament on 26th October, 1955. Even before that, the Austrian defence law was approved on 5th September, 1955. Although Austria promised in the Moscow Memorandum to pursue a neutrality policy like Switzerland, the Austrian policy left this line by becoming a member of the UN in 1955. So the Austrian security policy started to walk a tightrope between neutrality and international solidarity because of her UN membership and membership in other organisations like EU or NATO Partnership for Peace (PfP) later on. This essay emphasizes the steps of amendments, which were made in the Austrian constitution and her policy during almost 60 years with respect to international security policy and Austrian participation in international operations. The aim of this essay is to point out the new understanding of international solidarity of “neutral” Austrian policy.
But it is necessary to stress the main points of neutrality and what that meant in international security policy from a legal point of view.

" ["hu_HU"]=> string(1237) "

After achieving the Vienna State Treaty, Austria had to develop its security policy missing fundamental documents. The first main document was the constitutional law on neutrality, which was passed by the Austrian parliament on 26th October, 1955. Even before that, the Austrian defence law was approved on 5th September, 1955. Although Austria promised in the Moscow Memorandum to pursue a neutrality policy like Switzerland, the Austrian policy left this line by becoming a member of the UN in 1955. So the Austrian security policy started to walk a tightrope between neutrality and international solidarity because of her UN membership and membership in other organisations like EU or NATO Partnership for Peace (PfP) later on. This essay emphasizes the steps of amendments, which were made in the Austrian constitution and her policy during almost 60 years with respect to international security policy and Austrian participation in international operations. The aim of this essay is to point out the new understanding of international solidarity of “neutral” Austrian policy.
But it is necessary to stress the main points of neutrality and what that meant in international security policy from a legal point of view.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(108) "Austrian Security Policy Documents – a Walk on a Tightrope between Neutrality and International Solidarity" ["hu_HU"]=> string(108) "Austrian Security Policy Documents – a Walk on a Tightrope between Neutrality and International Solidarity" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#766 (6) { ["_data"]=> array(15) { ["id"]=> int(2236) ["email"]=> string(26) "wolfgang.zecha@bmlvs.gv.at" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2051) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "AT" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Zecha" ["hu_HU"]=> string(5) "Zecha" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Wolfgang" ["hu_HU"]=> string(8) "Wolfgang" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(7) "Austria" [1]=> string(32) "neutral Austrian Security Policy" [2]=> string(37) "Austrian contribution to peacekeeping" } ["en_US"]=> array(3) { [0]=> string(7) "Austria" [1]=> string(32) "neutral Austrian Security Policy" [2]=> string(37) "Austrian contribution to peacekeeping" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#771 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20424) ["id"]=> int(1218) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2051) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#762 (6) { ["_data"]=> array(29) { ["id"]=> int(2052) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-12-31" ["lastModified"]=> string(19) "2022-01-07 15:13:23" ["sectionId"]=> int(38) ["seq"]=> int(6) ["submissionId"]=> int(1933) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(144) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "331-340" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.4.7" ["abstract"]=> array(2) { ["en_US"]=> string(436) "

In my essay I present the conceptual appearance of the levels of the control of the air, from the early 2000s until present day. As a result, from present day on we can be familiar with some new ideas about the possession of the airspace and we may use new concepts. I submit the framework of fighting and achieving control of the air and demonstrate through some questions the problematic ideas and thoughts about air dominance.

" ["hu_HU"]=> string(436) "

In my essay I present the conceptual appearance of the levels of the control of the air, from the early 2000s until present day. As a result, from present day on we can be familiar with some new ideas about the possession of the airspace and we may use new concepts. I submit the framework of fighting and achieving control of the air and demonstrate through some questions the problematic ideas and thoughts about air dominance.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(72) "One of the Basic Questions of Warfare: The Levels of Control of Airspace" ["hu_HU"]=> string(72) "One of the Basic Questions of Warfare: The Levels of Control of Airspace" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#777 (6) { ["_data"]=> array(15) { ["id"]=> int(2239) ["email"]=> string(26) "csengerij.janos@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2052) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Csengeri" ["hu_HU"]=> string(8) "Csengeri" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "János" ["hu_HU"]=> string(6) "János" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(18) "control of the air" [1]=> string(13) "air dominance" [2]=> string(15) "air superiority" [3]=> string(13) "air supremacy" [4]=> string(22) "counter-air operations" } ["en_US"]=> array(5) { [0]=> string(18) "control of the air" [1]=> string(13) "air dominance" [2]=> string(15) "air superiority" [3]=> string(13) "air supremacy" [4]=> string(22) "counter-air operations" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#776 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21268) ["id"]=> int(1221) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2052) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF

Derivation of the Fundamental Missile Guidance Equations

Papp István, Szilvássy László, Óvári Gyula
doi: 10.32565/aarms.2015.4.8
341-348.
object(Publication)#743 (6) { ["_data"]=> array(29) { ["id"]=> int(2055) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-12-31" ["lastModified"]=> string(19) "2022-01-07 15:14:10" ["sectionId"]=> int(38) ["seq"]=> int(7) ["submissionId"]=> int(1936) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(144) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "341-348" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.4.8" ["abstract"]=> array(2) { ["en_US"]=> string(695) "

In order to guide itself to a successful target intercept, the missile must obtain information about the target. The prelaunch and post launch information too, must be gathered. Before a missile is launched, that is, during the prelaunch phase, the missile needs to know where to go. It knows that it is supposed to go to the target, but it must be told where the target is. The missile is told where the target is by electrical signals entering through the umbilical from the launcher. These signals are head aimed (to point the missile head at the target), English bias (to point the missile at the intercept point), and an estimate of true target Doppler on the simulated Doppler line.

" ["hu_HU"]=> string(695) "

In order to guide itself to a successful target intercept, the missile must obtain information about the target. The prelaunch and post launch information too, must be gathered. Before a missile is launched, that is, during the prelaunch phase, the missile needs to know where to go. It knows that it is supposed to go to the target, but it must be told where the target is. The missile is told where the target is by electrical signals entering through the umbilical from the launcher. These signals are head aimed (to point the missile head at the target), English bias (to point the missile at the intercept point), and an estimate of true target Doppler on the simulated Doppler line.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(56) "Derivation of the Fundamental Missile Guidance Equations" ["hu_HU"]=> string(56) "Derivation of the Fundamental Missile Guidance Equations" } ["locale"]=> string(5) "en_US" ["authors"]=> array(3) { [0]=> object(Author)#781 (6) { ["_data"]=> array(15) { ["id"]=> int(2240) ["email"]=> string(16) "pappi@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2055) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Papp" ["hu_HU"]=> string(4) "Papp" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "István" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#772 (6) { ["_data"]=> array(15) { ["id"]=> int(2241) ["email"]=> string(27) "szilvassy.laszlo@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2055) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Szilvássy" ["hu_HU"]=> string(10) "Szilvássy" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "László" ["hu_HU"]=> string(8) "László" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#786 (6) { ["_data"]=> array(15) { ["id"]=> int(2242) ["email"]=> string(22) "ovary.gyula@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2055) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Óvári" ["hu_HU"]=> string(7) "Óvári" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Gyula" ["hu_HU"]=> string(5) "Gyula" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(7) "missile" [1]=> string(19) "equations of motion" [2]=> string(8) "guidance" [3]=> string(10) "derivation" } ["en_US"]=> array(4) { [0]=> string(7) "missile" [1]=> string(19) "equations of motion" [2]=> string(8) "guidance" [3]=> string(10) "derivation" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#780 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21269) ["id"]=> int(1222) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2055) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#767 (6) { ["_data"]=> array(27) { ["id"]=> int(2056) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-12-31" ["lastModified"]=> string(19) "2022-01-07 15:14:49" ["sectionId"]=> int(38) ["seq"]=> int(8) ["submissionId"]=> int(1937) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(144) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "349-361" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.4.9" ["abstract"]=> array(2) { ["en_US"]=> string(1095) "

The Darfur Operation is much disputed, often times it is called unsuccessful. The operation started ten years ago, and in addition to other donors, the EU took an important role in the advocacy, not to mention the fact that it launched its own support operation. This was the second operation of the EU in Africa. It worked with less people than the Artemis Operation did, but it lasted for nearly three years. Although the operation had to face several challenges, it can be called effective from the perspective of the European Union and its member states. They could utilize the lessons learned from the mission related to further operations. However, several pieces of research have been made on the European Union’s activity in Darfur, but the participants of the mission did not share their experiences except for one or two conferences and articles. I (the author) served for six months in the operation in 2005. After coming home, I followed the events in the area. This research is based on my subjective experiences, other peacekeeper’s knowledge, archived and open sources.

" ["hu_HU"]=> string(1095) "

The Darfur Operation is much disputed, often times it is called unsuccessful. The operation started ten years ago, and in addition to other donors, the EU took an important role in the advocacy, not to mention the fact that it launched its own support operation. This was the second operation of the EU in Africa. It worked with less people than the Artemis Operation did, but it lasted for nearly three years. Although the operation had to face several challenges, it can be called effective from the perspective of the European Union and its member states. They could utilize the lessons learned from the mission related to further operations. However, several pieces of research have been made on the European Union’s activity in Darfur, but the participants of the mission did not share their experiences except for one or two conferences and articles. I (the author) served for six months in the operation in 2005. After coming home, I followed the events in the area. This research is based on my subjective experiences, other peacekeeper’s knowledge, archived and open sources.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(79) "The European Union’s First Support Operation on the African Continent: Darfur" ["hu_HU"]=> string(79) "The European Union’s First Support Operation on the African Continent: Darfur" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#783 (6) { ["_data"]=> array(15) { ["id"]=> int(2245) ["email"]=> string(23) "besenyo.janos@hm.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2056) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Besenyő" ["hu_HU"]=> string(8) "Besenyő" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "János" ["hu_HU"]=> string(6) "János" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(10) { [0]=> string(4) "AMIS" [1]=> string(13) "African Union" [2]=> string(14) "European Union" [3]=> string(6) "Darfur" [4]=> string(7) "Arabian" [5]=> string(7) "African" [6]=> string(20) "Cease Fire Committee" [7]=> string(17) "EU Military Stock" [8]=> string(9) "observers" [9]=> string(17) "logistic advisors" } ["en_US"]=> array(10) { [0]=> string(4) "AMIS" [1]=> string(13) "African Union" [2]=> string(14) "European Union" [3]=> string(6) "Darfur" [4]=> string(7) "Arabian" [5]=> string(7) "African" [6]=> string(20) "Cease Fire Committee" [7]=> string(17) "EU Military Stock" [8]=> string(9) "observers" [9]=> string(17) "logistic advisors" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#789 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21270) ["id"]=> int(1225) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2056) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#791 (6) { ["_data"]=> array(27) { ["id"]=> int(2060) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-12-31" ["lastModified"]=> string(19) "2021-11-22 13:58:37" ["sectionId"]=> int(38) ["seq"]=> int(9) ["submissionId"]=> int(1941) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(144) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "363-378" ["pub-id::doi"]=> string(24) "10.32565/aarms.2015.4.10" ["abstract"]=> array(2) { ["en_US"]=> string(876) "

Europe and Hungary, currently faces multiple national threats in an environment of growing disorder. ISIS, the “State of Terror”, is executing a sophisticated strat- egy that involves simultaneous efforts and attacks in Iraq and Syria, the Middle East and North Africa, and the wider world. Civil wars are intensifying in Ukraine, Yemen, and Libya, causing massive migration waves. The recent terrorist attack in Paris has shown that ISIS supported homegrown terrorism is an increasing threat. This article discusses the development and internal issues of the most dangerous terrorist organization. Although it was not a purpose to analyze the international consequences of the recent ISIS attack in Paris, the authors express their hope that ISIS might make a strategic mistake. On 13rd November, 2015 can be a turning point in the fight against the Islamic State.

" ["hu_HU"]=> string(876) "

Europe and Hungary, currently faces multiple national threats in an environment of growing disorder. ISIS, the “State of Terror”, is executing a sophisticated strat- egy that involves simultaneous efforts and attacks in Iraq and Syria, the Middle East and North Africa, and the wider world. Civil wars are intensifying in Ukraine, Yemen, and Libya, causing massive migration waves. The recent terrorist attack in Paris has shown that ISIS supported homegrown terrorism is an increasing threat. This article discusses the development and internal issues of the most dangerous terrorist organization. Although it was not a purpose to analyze the international consequences of the recent ISIS attack in Paris, the authors express their hope that ISIS might make a strategic mistake. On 13rd November, 2015 can be a turning point in the fight against the Islamic State.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(50) "The Rise of Islamic State of Iraq and Syria (ISIS)" ["hu_HU"]=> string(50) "The Rise of Islamic State of Iraq and Syria (ISIS)" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#792 (6) { ["_data"]=> array(15) { ["id"]=> int(2249) ["email"]=> string(22) "shamia.luna@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2060) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Shamieh" ["hu_HU"]=> string(7) "Shamieh" } ["givenName"]=> array(2) { ["en_US"]=> string(4) "Luna" ["hu_HU"]=> string(4) "Luna" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#790 (6) { ["_data"]=> array(15) { ["id"]=> int(2250) ["email"]=> string(24) "szenes.zoltan@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2060) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Szenes" ["hu_HU"]=> string(6) "Szenes" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Zoltán" ["hu_HU"]=> string(7) "Zoltán" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(8) { [0]=> string(4) "ISIS" [1]=> string(43) "Islamic State of Iraq and the Levant (ISIL)" [2]=> string(39) "DAESH – the Arabic equivalent of ISIL" [3]=> string(13) "Islamic State" [4]=> string(9) "terrorism" [5]=> string(8) "jihadist" [6]=> string(4) "Iraq" [7]=> string(5) "Syria" } ["en_US"]=> array(8) { [0]=> string(4) "ISIS" [1]=> string(43) "Islamic State of Iraq and the Levant (ISIL)" [2]=> string(39) "DAESH – the Arabic equivalent of ISIL" [3]=> string(13) "Islamic State" [4]=> string(9) "terrorism" [5]=> string(8) "jihadist" [6]=> string(4) "Iraq" [7]=> string(5) "Syria" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#794 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20428) ["id"]=> int(1228) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2060) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF