Full Issue

Archive

Tunisia’s Security Concerns

Besenyő János, Prantner Zoltán
doi: 10.32565/aarms.2015.1.1
5-21.
object(Publication)#697 (6) { ["_data"]=> array(29) { ["id"]=> int(2267) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-03-31" ["lastModified"]=> string(19) "2021-11-22 11:21:32" ["sectionId"]=> int(38) ["seq"]=> int(0) ["submissionId"]=> int(2148) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(168) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(4) "5-21" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.1.1" ["abstract"]=> array(2) { ["en_US"]=> string(829) "

Ansar al-Sharia, established in April 2011, is the most prominent Salafist jihadist organization in Tunisia. At the beginning the movement, which sympathizes with the ideology of al-Qaeda, focused its attention on humanitarian and missionary works. Later it did not balk at using violence to enforce religious norms. The conflict between the Ennahda Government and the organization culminated between May and July, 2013. At the end of August the Government finally designated Ansar al-Sharia a terrorist-organization. According official reports, the organization is responsible for planning several unsuccessful attacks during the intervening months. Additionally, Okba bin Nafaa, the military wing of Ansar al-Sharia, has been fighting an open war with the Tunisian Army in the Algerian border region since December 2012.

" ["hu_HU"]=> string(829) "

Ansar al-Sharia, established in April 2011, is the most prominent Salafist jihadist organization in Tunisia. At the beginning the movement, which sympathizes with the ideology of al-Qaeda, focused its attention on humanitarian and missionary works. Later it did not balk at using violence to enforce religious norms. The conflict between the Ennahda Government and the organization culminated between May and July, 2013. At the end of August the Government finally designated Ansar al-Sharia a terrorist-organization. According official reports, the organization is responsible for planning several unsuccessful attacks during the intervening months. Additionally, Okba bin Nafaa, the military wing of Ansar al-Sharia, has been fighting an open war with the Tunisian Army in the Algerian border region since December 2012.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(29) "Tunisia’s Security Concerns" ["hu_HU"]=> string(29) "Tunisia’s Security Concerns" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#734 (6) { ["_data"]=> array(15) { ["id"]=> int(2476) ["email"]=> string(23) "besenyo.janos@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2267) ["seq"]=> int(0) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Besenyő" ["hu_HU"]=> string(8) "Besenyő" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "János" ["hu_HU"]=> string(6) "János" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#712 (6) { ["_data"]=> array(15) { ["id"]=> int(2477) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2267) ["seq"]=> int(0) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Prantner" ["hu_HU"]=> string(8) "Prantner" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Zoltán" ["hu_HU"]=> string(7) "Zoltán" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(11) { [0]=> string(15) "Ansar al-Sharia" [1]=> string(7) "Tunesia" [2]=> string(8) "salafist" [3]=> string(5) "Jihad" [4]=> string(7) "Ennahda" [5]=> string(22) "Okba bin Nafaa Brigada" [6]=> string(11) "Arab Spring" [7]=> string(7) "Ben Ali" [8]=> string(4) "dawa" [9]=> string(8) "Al-Qaeda" [10]=> string(8) "Islamist" } ["en_US"]=> array(11) { [0]=> string(15) "Ansar al-Sharia" [1]=> string(7) "Tunesia" [2]=> string(8) "salafist" [3]=> string(5) "Jihad" [4]=> string(7) "Ennahda" [5]=> string(22) "Okba bin Nafaa Brigada" [6]=> string(11) "Arab Spring" [7]=> string(7) "Ben Ali" [8]=> string(4) "dawa" [9]=> string(8) "Al-Qaeda" [10]=> string(8) "Islamist" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#746 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20372) ["id"]=> int(1418) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2267) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#121 (6) { ["_data"]=> array(27) { ["id"]=> int(2269) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-03-30" ["lastModified"]=> string(19) "2021-11-22 11:22:44" ["sectionId"]=> int(38) ["seq"]=> int(1) ["submissionId"]=> int(2150) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(168) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "23-33" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.1.2" ["abstract"]=> array(2) { ["en_US"]=> string(1428) "

The Medical Service of the Hungarian Defence Forces (HDF) has been playing and taking an important role in the elimination and medical stabilization of several regional crisis areas since 1991. These medical protection and “back-ups” literally mean the medical support of our military forces take part in different tasks besides this fulfilling the special tasks of preventive medicine. The medical data collected from the different tasks and missions have been gathered systematically in order to be informative. From 2008 on we manage data collection with a real-time surveillance report system, the so called EPIHUN (Hungarian Epidemiological and Patient Turnover Report), which have been collected from different aspects and analysed from force health protection aspects. With the DNBI data from the system the authors are analysing the preventable diseases morbidity state and tendencies of the EUFOR (European Union Force), KFOR (Kosovo Force), MFO (Multinational Force and Observers) and UNFICYP (United Nations Peacekeeping Force in Cyprus) missions on a 2013 data base. It could be surprising that the morbidity data are very similar to the values seen among military collectives living in barracks during the conscription era of the armed forces. Most DNBI are acute respiratory diseases and diseases of the digestive system, which is important information in medical preparation training before deployment.

" ["hu_HU"]=> string(1428) "

The Medical Service of the Hungarian Defence Forces (HDF) has been playing and taking an important role in the elimination and medical stabilization of several regional crisis areas since 1991. These medical protection and “back-ups” literally mean the medical support of our military forces take part in different tasks besides this fulfilling the special tasks of preventive medicine. The medical data collected from the different tasks and missions have been gathered systematically in order to be informative. From 2008 on we manage data collection with a real-time surveillance report system, the so called EPIHUN (Hungarian Epidemiological and Patient Turnover Report), which have been collected from different aspects and analysed from force health protection aspects. With the DNBI data from the system the authors are analysing the preventable diseases morbidity state and tendencies of the EUFOR (European Union Force), KFOR (Kosovo Force), MFO (Multinational Force and Observers) and UNFICYP (United Nations Peacekeeping Force in Cyprus) missions on a 2013 data base. It could be surprising that the morbidity data are very similar to the values seen among military collectives living in barracks during the conscription era of the armed forces. Most DNBI are acute respiratory diseases and diseases of the digestive system, which is important information in medical preparation training before deployment.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(79) "Diseases and Non-Battle Injuries (DNBI) in HUN Missions Based on EPIHUN Reports" ["hu_HU"]=> string(79) "Diseases and Non-Battle Injuries (DNBI) in HUN Missions Based on EPIHUN Reports" } ["locale"]=> string(5) "en_US" ["authors"]=> array(3) { [0]=> object(Author)#742 (6) { ["_data"]=> array(15) { ["id"]=> int(2480) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2269) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Svéd" ["hu_HU"]=> string(5) "Svéd" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "László" ["hu_HU"]=> string(8) "László" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#765 (6) { ["_data"]=> array(15) { ["id"]=> int(2481) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2269) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Sótér" ["hu_HU"]=> string(7) "Sótér" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Andrea" ["hu_HU"]=> string(6) "Andrea" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(2482) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2269) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Vekerdi" ["hu_HU"]=> string(7) "Vekerdi" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Zoltán" ["hu_HU"]=> string(7) "Zoltán" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(23) "Force health protection" [1]=> string(53) "Hungarian epidemiological and patient turnover report" [2]=> string(15) "medical service" [3]=> string(24) "Hungarian Defence Forces" [4]=> string(42) "analysis of preventable diseases morbidity" } ["en_US"]=> array(5) { [0]=> string(23) "Force health protection" [1]=> string(53) "Hungarian epidemiological and patient turnover report" [2]=> string(15) "medical service" [3]=> string(24) "Hungarian Defence Forces" [4]=> string(42) "analysis of preventable diseases morbidity" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#762 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20374) ["id"]=> int(1420) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2269) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(29) { ["id"]=> int(2271) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-03-31" ["lastModified"]=> string(19) "2021-11-22 11:23:59" ["sectionId"]=> int(38) ["seq"]=> int(2) ["submissionId"]=> int(2152) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(168) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "35-44" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.1.3" ["abstract"]=> array(2) { ["en_US"]=> string(311) "

The Government’s goal was partly to replace conscripts with volunteer defence and volunteer operational reserves, and contracted servicemembers, however, the differences between the two systems are very pronounced. The author outlines the consequences of these changes on our military higher education.

" ["hu_HU"]=> string(311) "

The Government’s goal was partly to replace conscripts with volunteer defence and volunteer operational reserves, and contracted servicemembers, however, the differences between the two systems are very pronounced. The author outlines the consequences of these changes on our military higher education.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(67) "The Impact of the All-Volunteer Force on Hungarian Officer Training" ["hu_HU"]=> string(67) "The Impact of the All-Volunteer Force on Hungarian Officer Training" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#743 (6) { ["_data"]=> array(15) { ["id"]=> int(2483) ["email"]=> string(26) "petruska.ferenc@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2271) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Petruska" ["hu_HU"]=> string(8) "Petruska" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Ferenc" ["hu_HU"]=> string(6) "Ferenc" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(8) { [0]=> string(37) "National University of Public Service" [1]=> string(49) "Faculty of Military Sciences and Officer Training" [2]=> string(6) "salary" [3]=> string(14) "military force" [4]=> string(9) "education" [5]=> string(14) "common modules" [6]=> string(7) "officer" [7]=> string(19) "all-volunteer force" } ["en_US"]=> array(8) { [0]=> string(37) "National University of Public Service" [1]=> string(49) "Faculty of Military Sciences and Officer Training" [2]=> string(6) "salary" [3]=> string(14) "military force" [4]=> string(9) "education" [5]=> string(14) "common modules" [6]=> string(7) "officer" [7]=> string(19) "all-volunteer force" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#764 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20375) ["id"]=> int(1422) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2271) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#189 (6) { ["_data"]=> array(29) { ["id"]=> int(2272) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-03-31" ["lastModified"]=> string(19) "2021-11-22 11:28:20" ["sectionId"]=> int(38) ["seq"]=> int(3) ["submissionId"]=> int(2153) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(168) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "45-52" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.1.4" ["abstract"]=> array(2) { ["en_US"]=> string(690) "

The welfare state is one of the most frequently used social scence terms that causes arguments or political discussions. The role of the state in the development of its social role has changed through time, and parallel with this, the term welfare state has changed too, as well as theories regarding the welfare state. In this study, the author’s main goal is to summarise the different theories of the welfare state. Following this, a special approach will be shown in terms of the categorization of the welfare state to show its role in a special welfare: i.e. in what ways does it supports families. This view has not received much attention in detail in the literature so far.

" ["hu_HU"]=> string(690) "

The welfare state is one of the most frequently used social scence terms that causes arguments or political discussions. The role of the state in the development of its social role has changed through time, and parallel with this, the term welfare state has changed too, as well as theories regarding the welfare state. In this study, the author’s main goal is to summarise the different theories of the welfare state. Following this, a special approach will be shown in terms of the categorization of the welfare state to show its role in a special welfare: i.e. in what ways does it supports families. This view has not received much attention in detail in the literature so far.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(35) "Welfare Theories in Family Politics" ["hu_HU"]=> string(35) "Welfare Theories in Family Politics" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#772 (6) { ["_data"]=> array(15) { ["id"]=> int(2484) ["email"]=> string(25) "kristo.katalin@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2272) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Kristó" ["hu_HU"]=> string(7) "Kristó" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Katalin" ["hu_HU"]=> string(7) "Katalin" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(13) "welfare state" [1]=> string(15) "family politics" [2]=> string(15) "social politics" } ["en_US"]=> array(3) { [0]=> string(13) "welfare state" [1]=> string(15) "family politics" [2]=> string(15) "social politics" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#747 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20377) ["id"]=> int(1423) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2272) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#118 (6) { ["_data"]=> array(29) { ["id"]=> int(2273) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-03-31" ["lastModified"]=> string(19) "2021-11-22 11:29:26" ["sectionId"]=> int(38) ["seq"]=> int(4) ["submissionId"]=> int(2154) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(168) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "53-61" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.1.5" ["abstract"]=> array(2) { ["en_US"]=> string(530) "

The purpose of the authors of this article is to present the information connection system of a sampling group which supports the professional activity of a deployable rapid diagnostic laboratory. Considering the above, the authors of the article investigate the applicable technologies, the possible technical devices and give suggestions for the implementation. This article follows the article published in AARMS. [1] The article is made with the support of project TGYDGL09 “Deployable Rapid Diagnostic Laboratory”.

" ["hu_HU"]=> string(530) "

The purpose of the authors of this article is to present the information connection system of a sampling group which supports the professional activity of a deployable rapid diagnostic laboratory. Considering the above, the authors of the article investigate the applicable technologies, the possible technical devices and give suggestions for the implementation. This article follows the article published in AARMS. [1] The article is made with the support of project TGYDGL09 “Deployable Rapid Diagnostic Laboratory”.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(121) "The Info-Communication System Requirements of the Deployable Rapid Diagnostic Laboratory Support “Sampling Group” II." ["hu_HU"]=> string(121) "The Info-Communication System Requirements of the Deployable Rapid Diagnostic Laboratory Support “Sampling Group” II." } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#768 (6) { ["_data"]=> array(15) { ["id"]=> int(2485) ["email"]=> string(23) "farkas.tibor@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2273) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Farkas" ["hu_HU"]=> string(6) "Farkas" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Tibor" ["hu_HU"]=> string(5) "Tibor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#771 (6) { ["_data"]=> array(15) { ["id"]=> int(2486) ["email"]=> string(24) "hronyecz.erika@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2273) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Hronyecz" ["hu_HU"]=> string(8) "Hronyecz" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Erika" ["hu_HU"]=> string(5) "Erika" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(21) "biological laboratory" [1]=> string(20) "communication system" [2]=> string(12) "land warrior" [3]=> string(21) "communication network" } ["en_US"]=> array(4) { [0]=> string(21) "biological laboratory" [1]=> string(20) "communication system" [2]=> string(12) "land warrior" [3]=> string(21) "communication network" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#770 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20378) ["id"]=> int(1424) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2273) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#115 (6) { ["_data"]=> array(27) { ["id"]=> int(2274) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-03-31" ["lastModified"]=> string(19) "2021-11-22 11:30:36" ["sectionId"]=> int(38) ["seq"]=> int(5) ["submissionId"]=> int(2155) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(168) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "63-78" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.1.6" ["abstract"]=> array(2) { ["en_US"]=> string(1412) "

Information security awareness is part of organizational culture, a way of thinking and behavior which ensures that the employees of the organizations are committed to acknowledging the legitimacy of security measures, they abide by them and they also make them known to others and enforce their application. After collecting empirical data from 280 Austrian and 470 Hungarian employees of different companies we concluded that the level of information security awareness of managers and employees in the Austrian and Hungarian business sector depends on company size. The level of this type of awareness can be regarded as good in the case of corporations both in Austria and Hungary. A good level of information security awareness was observed among the Austrian medium-sized enterprises. However, in a fifth of their Hungarian counterparts, the employees need further trainings in this area. Security problems can be traced back to poor organization at a fifth of the Austrian small-sized enterprises, a third of the Austrian microenterprises, and three-quarters of the Hungarian microenterprises. In 20% of the Austrian and Hungarian enterprises, employees have distressing gaps in their knowledge in this area, furthermore, it can also be concluded that employees with higher digital literacy have a higher level of information security awareness in Austria compared to the Hungarian business sector.

" ["hu_HU"]=> string(1412) "

Information security awareness is part of organizational culture, a way of thinking and behavior which ensures that the employees of the organizations are committed to acknowledging the legitimacy of security measures, they abide by them and they also make them known to others and enforce their application. After collecting empirical data from 280 Austrian and 470 Hungarian employees of different companies we concluded that the level of information security awareness of managers and employees in the Austrian and Hungarian business sector depends on company size. The level of this type of awareness can be regarded as good in the case of corporations both in Austria and Hungary. A good level of information security awareness was observed among the Austrian medium-sized enterprises. However, in a fifth of their Hungarian counterparts, the employees need further trainings in this area. Security problems can be traced back to poor organization at a fifth of the Austrian small-sized enterprises, a third of the Austrian microenterprises, and three-quarters of the Hungarian microenterprises. In 20% of the Austrian and Hungarian enterprises, employees have distressing gaps in their knowledge in this area, furthermore, it can also be concluded that employees with higher digital literacy have a higher level of information security awareness in Austria compared to the Hungarian business sector.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(132) "Old Monarchy in the New Cyberspace: Empirical Examination of Information Security Awareness among Austrian and Hungarian Enterprises" ["hu_HU"]=> string(132) "Old Monarchy in the New Cyberspace: Empirical Examination of Information Security Awareness among Austrian and Hungarian Enterprises" } ["locale"]=> string(5) "en_US" ["authors"]=> array(3) { [0]=> object(Author)#780 (6) { ["_data"]=> array(15) { ["id"]=> int(2488) ["email"]=> string(24) "sasvari.peter@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2274) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Sasvári" ["hu_HU"]=> string(8) "Sasvári" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Péter" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#779 (6) { ["_data"]=> array(15) { ["id"]=> int(2489) ["email"]=> string(27) "nemeslaki.andras@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2274) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Nemeslaki" ["hu_HU"]=> string(9) "Nemeslaki" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "András" ["hu_HU"]=> string(7) "András" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#769 (6) { ["_data"]=> array(15) { ["id"]=> int(2490) ["email"]=> string(22) "wolf.rauch@uni-graz.at" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2274) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "AT" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Rauch" ["hu_HU"]=> string(5) "Rauch" } ["givenName"]=> array(2) { ["en_US"]=> string(4) "Wolf" ["hu_HU"]=> string(4) "Wolf" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(30) "Information security awareness" [1]=> string(7) "Austria" [2]=> string(7) "Hungary" [3]=> string(15) "Business sector" [4]=> string(11) "enterprises" } ["en_US"]=> array(5) { [0]=> string(30) "Information security awareness" [1]=> string(7) "Austria" [2]=> string(7) "Hungary" [3]=> string(15) "Business sector" [4]=> string(11) "enterprises" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#782 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20379) ["id"]=> int(1426) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2274) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#744 (6) { ["_data"]=> array(29) { ["id"]=> int(2276) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-03-31" ["lastModified"]=> string(19) "2021-11-22 11:34:10" ["sectionId"]=> int(38) ["seq"]=> int(6) ["submissionId"]=> int(2157) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(168) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "79-90" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.1.7" ["abstract"]=> array(2) { ["en_US"]=> string(475) "

On the surface, Western Sahara is one of the most uninteresting regions of Africa, but anyone interested in international law, can easily find many exciting issues to explore. After a brief historical review, the author will try to examine the abuse of human rights and, the infringement of international humanitarian law which were committed by the parties during the fight for freedom of the Sahrawi people. The essay also analyses the circumstances of the refugees.

" ["hu_HU"]=> string(475) "

On the surface, Western Sahara is one of the most uninteresting regions of Africa, but anyone interested in international law, can easily find many exciting issues to explore. After a brief historical review, the author will try to examine the abuse of human rights and, the infringement of international humanitarian law which were committed by the parties during the fight for freedom of the Sahrawi people. The essay also analyses the circumstances of the refugees.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(97) "Violation of Humanitarian Law and Infringement of Human Rights in the Last “Colony” of Africa" ["hu_HU"]=> string(97) "Violation of Humanitarian Law and Infringement of Human Rights in the Last “Colony” of Africa" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#774 (6) { ["_data"]=> array(15) { ["id"]=> int(2491) ["email"]=> string(25) "harkai.istvan89@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2276) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Harkai" ["hu_HU"]=> string(6) "Harkai" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "István" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(14) "Western Sahara" [1]=> string(8) "Sahrawis" [2]=> string(9) "Polisario" [3]=> string(16) "humanitarian law" [4]=> string(12) "human rights" [5]=> string(18) "status of refugees" } ["en_US"]=> array(6) { [0]=> string(14) "Western Sahara" [1]=> string(8) "Sahrawis" [2]=> string(9) "Polisario" [3]=> string(16) "humanitarian law" [4]=> string(12) "human rights" [5]=> string(18) "status of refugees" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#784 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20380) ["id"]=> int(1427) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2276) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#776 (6) { ["_data"]=> array(29) { ["id"]=> int(2277) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-03-31" ["lastModified"]=> string(19) "2021-11-22 11:32:36" ["sectionId"]=> int(38) ["seq"]=> int(7) ["submissionId"]=> int(2158) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(168) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "91-99" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.1.8" ["abstract"]=> array(2) { ["en_US"]=> string(755) "

Despite the advances made in social and industrial life hundreds of millions of people world-wide live in social groups that can be described as tribes. These groups translate into segments of societies that have little to do with political entities. Enemies with tribal identity are difficult to defeat, which is due to the inherent dynamics of primitive or tribal warfare that feature a strong similarity with biological evolution. In the case favourable conditions exist, these dynamics can accumulate into victory of the weaker and defeat of the stronger. In order to support this statement the authors use the Arab Revolt (1916–18) as an example, which is excellently explained in the “Seven Pillars of Wisdom” written by T. E. Lawrence.

" ["hu_HU"]=> string(755) "

Despite the advances made in social and industrial life hundreds of millions of people world-wide live in social groups that can be described as tribes. These groups translate into segments of societies that have little to do with political entities. Enemies with tribal identity are difficult to defeat, which is due to the inherent dynamics of primitive or tribal warfare that feature a strong similarity with biological evolution. In the case favourable conditions exist, these dynamics can accumulate into victory of the weaker and defeat of the stronger. In order to support this statement the authors use the Arab Revolt (1916–18) as an example, which is excellently explained in the “Seven Pillars of Wisdom” written by T. E. Lawrence.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(99) "Explaining the Evolutionary Dynamics of an Insurgency: T. E. Lawrence and the Art of Tribal Warfare" ["hu_HU"]=> string(99) "Explaining the Evolutionary Dynamics of an Insurgency: T. E. Lawrence and the Art of Tribal Warfare" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#781 (6) { ["_data"]=> array(15) { ["id"]=> int(2493) ["email"]=> string(25) "Jobbagy.Zoltan@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2277) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Jobbágy" ["hu_HU"]=> string(8) "Jobbágy" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Zoltán" ["hu_HU"]=> string(7) "Zoltán" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#778 (6) { ["_data"]=> array(15) { ["id"]=> int(2494) ["email"]=> string(29) "Bakos.Csaba.Attila@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2277) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Bakos" ["hu_HU"]=> string(5) "Bakos" } ["givenName"]=> array(2) { ["en_US"]=> string(12) "Csaba Attila" ["hu_HU"]=> string(12) "Csaba Attila" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(9) "evolution" [1]=> string(14) "tribal warfare" [2]=> string(10) "insurgency" [3]=> string(11) "Arab Revolt" [4]=> string(14) "T. E. Lawrence" } ["en_US"]=> array(5) { [0]=> string(9) "evolution" [1]=> string(14) "tribal warfare" [2]=> string(10) "insurgency" [3]=> string(11) "Arab Revolt" [4]=> string(14) "T. E. Lawrence" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#783 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20382) ["id"]=> int(1429) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2277) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#766 (6) { ["_data"]=> array(29) { ["id"]=> int(2279) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-03-31" ["lastModified"]=> string(19) "2021-11-22 11:33:48" ["sectionId"]=> int(38) ["seq"]=> int(8) ["submissionId"]=> int(2160) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(168) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "101-106" ["pub-id::doi"]=> string(23) "10.32565/aarms.2015.1.9" ["abstract"]=> array(2) { ["en_US"]=> string(794) "

The laws, related to disaster management order the operators of dangerous establishments to prepare an internal emergency plan as the part of their safety documents. In this plan they describe the measures and resources for the protection against a possible industrial accident. Although the internal emergency plans of dangerous establishments are prepared mostly by the rules in effect, experiences show that lesser or greater problems may occur by preparing internal emergency plans, the inventory of the forces and resources is often not adequately detailed.
The aim of this article is to present the problems related to force and resources calculations, respectively to give recommendations on the making of these calculations in a form which is easier to judge by the authority.

" ["hu_HU"]=> string(794) "

The laws, related to disaster management order the operators of dangerous establishments to prepare an internal emergency plan as the part of their safety documents. In this plan they describe the measures and resources for the protection against a possible industrial accident. Although the internal emergency plans of dangerous establishments are prepared mostly by the rules in effect, experiences show that lesser or greater problems may occur by preparing internal emergency plans, the inventory of the forces and resources is often not adequately detailed.
The aim of this article is to present the problems related to force and resources calculations, respectively to give recommendations on the making of these calculations in a form which is easier to judge by the authority.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(91) "The Problems Related to the Stocktaking of Forces and Resources in Internal Emergency Plans" ["hu_HU"]=> string(91) "The Problems Related to the Stocktaking of Forces and Resources in Internal Emergency Plans" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#795 (6) { ["_data"]=> array(15) { ["id"]=> int(2495) ["email"]=> string(27) "rebeka.szendi@katved.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2279) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Szendi" ["hu_HU"]=> string(6) "Szendi" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Rebeka" ["hu_HU"]=> string(6) "Rebeka" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(23) "dangerous establishment" [1]=> string(23) "internal emergency plan" [2]=> string(19) "industrial accident" [3]=> string(19) "protection measures" [4]=> string(29) "averting industrial accidents" } ["en_US"]=> array(5) { [0]=> string(23) "dangerous establishment" [1]=> string(23) "internal emergency plan" [2]=> string(19) "industrial accident" [3]=> string(19) "protection measures" [4]=> string(29) "averting industrial accidents" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#797 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20383) ["id"]=> int(1430) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2279) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#777 (6) { ["_data"]=> array(29) { ["id"]=> int(2280) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-03-31" ["lastModified"]=> string(19) "2021-11-22 11:35:37" ["sectionId"]=> int(38) ["seq"]=> int(9) ["submissionId"]=> int(2161) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(168) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "107-120" ["pub-id::doi"]=> string(24) "10.32565/aarms.2015.1.10" ["abstract"]=> array(2) { ["en_US"]=> string(894) "

Since August 1945 atomic weapons have become significant factors in international relations, every state with great ambitions has aspired to get atomic secrets. The primary goal of the North Atlantic Treaty Organization (NATO) created in 1949 was – possessing the United States’, a nuclear power’s, security guarantee – to deter the Soviet agression. The first strategic documents of the Alliance were written with this very purpose. However, in the 1950s there was a shift in the allied nations’ policies, which influenced NATO’s strategic thinking as well, so in 1957 a real different strategic concept was adopted. Gaining technological superiority became the most important goal, which led to development and intense production of nuclear weapons. This article examines the emerging role of nuclear weapons and the changing strategy of the Alliance between 1949 and 1957.

" ["hu_HU"]=> string(894) "

Since August 1945 atomic weapons have become significant factors in international relations, every state with great ambitions has aspired to get atomic secrets. The primary goal of the North Atlantic Treaty Organization (NATO) created in 1949 was – possessing the United States’, a nuclear power’s, security guarantee – to deter the Soviet agression. The first strategic documents of the Alliance were written with this very purpose. However, in the 1950s there was a shift in the allied nations’ policies, which influenced NATO’s strategic thinking as well, so in 1957 a real different strategic concept was adopted. Gaining technological superiority became the most important goal, which led to development and intense production of nuclear weapons. This article examines the emerging role of nuclear weapons and the changing strategy of the Alliance between 1949 and 1957.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(79) "The Role of Nuclear Weapons in NATO’s Early Cold War Strategies (1949–1957)" ["hu_HU"]=> string(79) "The Role of Nuclear Weapons in NATO’s Early Cold War Strategies (1949–1957)" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#800 (6) { ["_data"]=> array(15) { ["id"]=> int(2497) ["email"]=> string(21) "kiss.petra@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2280) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Kiss" ["hu_HU"]=> string(4) "Kiss" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Petra" ["hu_HU"]=> string(5) "Petra" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(4) "NATO" [1]=> string(17) "strategic concept" [2]=> string(15) "nuclear weapons" [3]=> string(10) "deterrence" [4]=> string(19) "massive retaliation" [5]=> string(8) "Cold War" } ["en_US"]=> array(6) { [0]=> string(4) "NATO" [1]=> string(17) "strategic concept" [2]=> string(15) "nuclear weapons" [3]=> string(10) "deterrence" [4]=> string(19) "massive retaliation" [5]=> string(8) "Cold War" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#793 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20386) ["id"]=> int(1432) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2280) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#792 (6) { ["_data"]=> array(27) { ["id"]=> int(2282) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2015-03-31" ["lastModified"]=> string(19) "2021-11-22 11:36:37" ["sectionId"]=> int(38) ["seq"]=> int(10) ["submissionId"]=> int(2163) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(168) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "121-132" ["pub-id::doi"]=> string(24) "10.32565/aarms.2015.1.11" ["abstract"]=> array(2) { ["en_US"]=> string(1187) "

In June 2003, the EU launched Operation “Artemis”, its first military mission outside Europe and independent of NATO, to the Democratic Republic of Congo. While it ultimately received an EU badge, its origin, command and control were French. The objective of Operation “Artemis” was to contribute to the stabilisation of the security conditions in Bunia, capital of Ituri, to improve the humanitarian situation, and to ensure the protection of displaced persons in the refugee camps in Bunia. Its mandate was to provide a short-term interim force for three months until the transition to the reinforced United Nations Mission in the Democratic Republic of Congo (MONUC – Mission de l’Organisation des Nations Unies en République Démocratique du Congo; English: United Nations Organization Stabilization Mission in the Democratic Republic of the Congo). Although the EU can be said to have passed the first “test” of the European Security and Defence Policy (ESDP) mechanisms for the conduct of an autonomous operation, this test was a limited one. Operational constraints were caused by inadequate strategic lift capabilities and the lack of a strategic reserve.

" ["hu_HU"]=> string(1187) "

In June 2003, the EU launched Operation “Artemis”, its first military mission outside Europe and independent of NATO, to the Democratic Republic of Congo. While it ultimately received an EU badge, its origin, command and control were French. The objective of Operation “Artemis” was to contribute to the stabilisation of the security conditions in Bunia, capital of Ituri, to improve the humanitarian situation, and to ensure the protection of displaced persons in the refugee camps in Bunia. Its mandate was to provide a short-term interim force for three months until the transition to the reinforced United Nations Mission in the Democratic Republic of Congo (MONUC – Mission de l’Organisation des Nations Unies en République Démocratique du Congo; English: United Nations Organization Stabilization Mission in the Democratic Republic of the Congo). Although the EU can be said to have passed the first “test” of the European Security and Defence Policy (ESDP) mechanisms for the conduct of an autonomous operation, this test was a limited one. Operational constraints were caused by inadequate strategic lift capabilities and the lack of a strategic reserve.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(62) "Operation “Artemis”: The First Autonomous EU-led Operation" ["hu_HU"]=> string(62) "Operation “Artemis”: The First Autonomous EU-led Operation" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#794 (6) { ["_data"]=> array(15) { ["id"]=> int(2498) ["email"]=> string(20) "tomolyaj@hotmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(2282) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Tomolya" ["hu_HU"]=> string(7) "Tomolya" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "János" ["hu_HU"]=> string(6) "János" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(10) { [0]=> string(28) "Democratic Republic of Congo" [1]=> string(5) "Ituri" [2]=> string(5) "Bunia" [3]=> string(5) "MONUC" [4]=> string(15) "poor governance" [5]=> string(17) "inefficient state" [6]=> string(9) "civil war" [7]=> string(6) "rebels" [8]=> string(11) "anti-rebels" [9]=> string(19) "humanitarian crisis" } ["en_US"]=> array(10) { [0]=> string(28) "Democratic Republic of Congo" [1]=> string(5) "Ituri" [2]=> string(5) "Bunia" [3]=> string(5) "MONUC" [4]=> string(15) "poor governance" [5]=> string(17) "inefficient state" [6]=> string(9) "civil war" [7]=> string(6) "rebels" [8]=> string(11) "anti-rebels" [9]=> string(19) "humanitarian crisis" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#802 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20387) ["id"]=> int(1433) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(2282) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF