Full Issue

object(Publication)#697 (6) { ["_data"]=> array(29) { ["id"]=> int(597) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2021-05-13" ["lastModified"]=> string(19) "2021-05-13 16:25:03" ["primaryContactId"]=> int(856) ["sectionId"]=> int(5) ["seq"]=> int(1) ["submissionId"]=> int(740) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2021) ["issueId"]=> int(413) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(6) "5–17" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.2.1" ["abstract"]=> array(2) { ["en_US"]=> string(732) "

Since the onset of the Arab Spring, there has been a growing interest in the changing balance of power of the Middle East. The balance of power theory in global context has been extensively studied. However, little research has been dedicated to the theory’s  applicability solely at the regional level, especially with the contemporary Middle East in focus, while the region is suffering from armed conflicts involving virtually all the regional states as well as the great powers and many different non-state actors. This paper is an  attempt to shed light on the applicability of the balance of power concept and the theory of omnibalancing in relation to the Middle  East through reviewing the relevant literature. 

" ["hu_HU"]=> string(0) "" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" ["hu_HU"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" } ["title"]=> array(2) { ["en_US"]=> string(46) "The Balance of Power System of the Middle East" ["hu_HU"]=> string(42) "Közel-Kelet hatalmi egyensúlyi rendszere" } ["prefix"]=> array(1) { ["hu_HU"]=> string(1) "A" } ["subtitle"]=> array(1) { ["hu_HU"]=> string(0) "" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#732 (6) { ["_data"]=> array(15) { ["id"]=> int(856) ["email"]=> string(15) "peter@seljan.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(597) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-9470-9509" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(1) { ["en_US"]=> string(7) "Selján" } ["givenName"]=> array(1) { ["en_US"]=> string(6) "Péter" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(16) "balance of power" [1]=> string(11) "Middle East" [2]=> string(13) "omnibalancing" [3]=> string(20) "foreign intervention" [4]=> string(9) "proxy war" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#745 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(17017) ["id"]=> int(4394) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(597) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#121 (6) { ["_data"]=> array(29) { ["id"]=> int(1546) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2021-05-13" ["lastModified"]=> string(19) "2021-05-13 16:25:03" ["primaryContactId"]=> int(1623) ["sectionId"]=> int(5) ["seq"]=> int(3) ["submissionId"]=> int(1429) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2021) ["issueId"]=> int(413) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "19–28" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.2.2" ["abstract"]=> array(2) { ["en_US"]=> string(593) "

The aim of this article is to give an overview of the state of artificial intelligence regarding malware attacks, its uses in the military and views regarding if it should be classified as a dual-use technology. As an emerging technology, with a wide variety of use and capabilities, more could be done to overview its uses, and some form of control over it. While the classical exports control might be counterproductive, a more closed approach towards critical information dissemination might be advisable until the full range of capabilities of artificial intelligence will be known.

" ["hu_HU"]=> string(0) "" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" ["hu_HU"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" } ["title"]=> array(2) { ["en_US"]=> string(48) "Artificial Intelligence as a Dual-use Technology" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(1) { ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(1) { ["hu_HU"]=> string(0) "" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(1623) ["email"]=> string(27) "ambrus.eva.eszter@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1546) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-8354-1296" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Ambrus" ["hu_HU"]=> string(6) "Ambrus" } ["givenName"]=> array(2) { ["en_US"]=> string(4) "Éva" ["hu_HU"]=> string(4) "Éva" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(1) { [0]=> string(67) "artificial intelligence, dual use technology, military use, malware" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#761 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(17018) ["id"]=> int(4395) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1546) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(29) { ["id"]=> int(547) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2021-05-13" ["lastModified"]=> string(19) "2021-05-13 16:25:03" ["primaryContactId"]=> int(782) ["sectionId"]=> int(5) ["seq"]=> int(4) ["submissionId"]=> int(674) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2021) ["issueId"]=> int(413) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "29–47" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.2.3" ["abstract"]=> array(2) { ["en_US"]=> string(1518) "

The occurrence of weather phenomena associated with extreme precipitation, temperatures and winds are not unusual in the history of meteorology in Hungary. However, in view of the characteristics of damages, it can be ascertained that they are usually witnessed at local (settlement) level; they damage the natural and built environment, jeopardise the safety of people and their financial resources.  This greatly burdens the human resources of forces designated to respond to these anomalies, also their deployments, logistics and  the management system of their equipment. The current Disaster Management Act created a resolution to this tension between  damage prevention, response and rescue by declaring the possibilities of involving the voluntarism of citizens in organised and  regulated frameworks. It means: in order to increase the country’s safety, central, territorial, later district and settlement-level  voluntary rescue organisations and teams may be established. These units, considering their capabilities, are able to effectively and  efficiently manage the impacts of anomalies due to the weather. In this publication, the author attempts to present Hungary’s  vulnerability due to weather extremities with the help of the disaster management classification of settlements, to analyse the  deployment possibilities of voluntary rescue organisations and rescue teams, taking into account their capabilities established in the  framework of the national classification system. 

" ["hu_HU"]=> string(1571) "

Az időjárási jelenségek szélsőséges csapadékkal, hőmérséklettel, széllel kapcsolatos megnyilvánulásai nem szokatlanok a hazai meteorológiai jellegű események történetében. Azonban a károkat érintő jellemzőiket tekintve az elmondható, hogy általában települési (helyi) szinten jelentkeznek, rongálják a természetes és épített környezetet, veszélyeztetik az emberek és az anyagi javaik biztonságát. Nagymértékben leterheli a reagálásra eleve kijelölt erők humánerőforrásait, technikai eszközparkjainak alkalmazásait, logisztikáját, irányítási rendszerét. Ennek a kárelhárítási-kárfelszámolási-mentési feszültségnek megoldását teremtette meg a hatályos katasztrófavédelmi törvény azzal, hogy az állampolgárok önkéntességének szervezetszerű, szabályozott keretű behívásának lehetőségeit deklarálta, mely azt jelenti, hogy az ország biztonságának növelésére központi, területi később járási, illetve a települési önkéntes mentőszervezetek, mentőcsoportok alakíthatóak meg, melyek képességeiket tekintve alkalmasak az időjárásból adódó anomáliák hatásainak hatékony, eredményes kezelésére.

Jelen publikációban a szerző kísérletet tesz arra, hogy bemutassa a hazai időjárási veszélyeztetettséget a települések katasztrófavédelmi besorolásán keresztül, elemezze az önkéntes mentőszervezetek, mentőcsoportok alkalmazási lehetőségeit, figyelembe véve a nemzeti minősítő rendszer által kialakított képességeket.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" ["hu_HU"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" } ["title"]=> array(2) { ["en_US"]=> string(61) "Tasks of Voluntary Rescue Teams in Extreme Weather Situations" ["hu_HU"]=> string(100) "Az önkéntes mentőszervezetek beavatkozási tapasztalatai szélsőséges időjárási helyzetekben" } ["prefix"]=> array(1) { ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(1) { ["hu_HU"]=> string(0) "" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#766 (6) { ["_data"]=> array(15) { ["id"]=> int(782) ["email"]=> string(24) "teknos.laszlo@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(547) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-0759-5871" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(16) "

adjunktus

" } ["familyName"]=> array(1) { ["en_US"]=> string(7) "Teknős" } ["givenName"]=> array(1) { ["en_US"]=> string(8) "László" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(7) { [0]=> string(19) "Disaster Management" [1]=> string(12) "Volunteering" [2]=> string(29) "Volunteer Rescue Organisation" [3]=> string(15) "Extreme Weather" [4]=> string(5) "Storm" [5]=> string(49) "Disaster Management Classification of Settlements" [6]=> string(23) "National Classification" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#746 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(17019) ["id"]=> int(4396) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(547) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#189 (6) { ["_data"]=> array(29) { ["id"]=> int(1920) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2021-05-13" ["lastModified"]=> string(19) "2021-05-13 16:25:03" ["primaryContactId"]=> int(2090) ["sectionId"]=> int(5) ["seq"]=> int(5) ["submissionId"]=> int(1801) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2021) ["issueId"]=> int(413) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "49–63" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.2.4" ["abstract"]=> array(2) { ["en_US"]=> string(626) "

The theory of regional security complex is one of the main theories of the regional approach of the international security system. The international organisations, the different strategies and concepts use many different definitions for the Sahel region. However, the  ongoing changes of the global and the regional security and the complexity of the crisis of the Sahel region bring up the question  whether the Sahel region is a unit based on the Regional Security Complex Theory or not? Which countries are part of the Sahel? Can it be treated as a region? In this article I will give my answer to that question. 

" ["hu_HU"]=> string(704) "

A regionális biztonsági komplexum elmélete az egyik legfontosabb elmélet a nemzetközi biztonság regionális megközelítésében. A Száhel-övezet területének meghatározásában jelenleg jelentős eltérések mutatkoznak a nemzetközi szervezetek különböző stratégiáiban és koncepcióiban. A globális és regionális biztonság folyamatos változása mellett ugyanakkor fel kell tenni a kérdést, vajon értelmezhető-e regionális egységként a Száhel-övezet a regionális biztonsági komplexumok elmélete alapján? Alkothat-e önálló biztonsági komplexumot? Ha igen, mely országok tartoznak ehhez az egységhez? Jelen tanulmányban ezekre a kérdésekre adok választ.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" ["hu_HU"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" } ["title"]=> array(2) { ["en_US"]=> string(72) "The Place of the Sahel Region in the Theory of Regional Security Complex" ["hu_HU"]=> string(73) "A Száhel-övezet a regionális biztonsági komplexumok elmélete szerint" } ["prefix"]=> array(1) { ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(1) { ["hu_HU"]=> string(0) "" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#769 (6) { ["_data"]=> array(15) { ["id"]=> int(2090) ["email"]=> string(23) "varga.marton1@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1920) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-1201-5018" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(61) "Nemzeti Közszolgálati Egyetem, Hadtudományi Doktori Iskola" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(19) "

doktorandusz

" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Varga" ["hu_HU"]=> string(5) "Varga" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Márton" ["hu_HU"]=> string(7) "Márton" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(32) "Regional Security Complex Theory" [1]=> string(17) "regional security" [2]=> string(12) "Sahel region" [3]=> string(16) "African security" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#765 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(17020) ["id"]=> int(4397) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1920) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#118 (6) { ["_data"]=> array(29) { ["id"]=> int(4783) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2021-05-13" ["lastModified"]=> string(19) "2021-05-13 16:25:02" ["primaryContactId"]=> int(5581) ["sectionId"]=> int(5) ["seq"]=> int(6) ["submissionId"]=> int(4662) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2021) ["issueId"]=> int(413) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "65–78" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.2.5" ["abstract"]=> array(2) { ["en_US"]=> string(1216) "

This article considers the problem of conciliation of military authority and peacekeepers’ autonomy. At first glance there is a tension  between authority and autonomy in many areas of human life like religion, political life, national soldiering and even peacekeeping  missions. The core of this tension is the practical contradiction between authority, which implies reason for controlling the behaviour  of others, and the autonomy of the others, which involves reason for self-governing. This article proposes a distinction in  peacekeepers’ autonomy between professional and moral autonomy, and suggests a way of explaining away the tension. The  essential part of the solution is the claim that peacekeepers’ professional autonomy involves ‘building the moral community’ between  the formerly hostile sides of a conflict within the confines of international military hierarchy. From this claim I draw the conclusions  that the concept of military authority is part of the concept of peacekeepers’ professional autonomy, and that due to the content of  peacekeepers’ professional autonomy, peacekeepers’ special moral autonomy is extended as compared to civilian moral autonomy. 

" ["hu_HU"]=> string(0) "" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" ["hu_HU"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" } ["title"]=> array(2) { ["en_US"]=> string(47) "Peacekeepers’ Autonomy and Military Authority" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(1) { ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(1) { ["hu_HU"]=> string(0) "" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#773 (6) { ["_data"]=> array(15) { ["id"]=> int(5581) ["email"]=> string(22) "Boda.Mihaly@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4783) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-3037-3644" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(60) "Hadtörténelmi, Filozófiai és Kultúrtörténeti Tanszék" } ["biography"]=> array(1) { ["en_US"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Boda" ["hu_HU"]=> string(4) "Boda" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Mihály" ["hu_HU"]=> string(7) "Mihály" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(3) { [0]=> string(22) "ethics of peacekeeping" [1]=> string(14) "moral autonomy" [2]=> string(18) "military authority" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#768 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(17021) ["id"]=> int(4398) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4783) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#742 (6) { ["_data"]=> array(29) { ["id"]=> int(4853) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2021-05-13" ["lastModified"]=> string(19) "2021-05-13 16:25:02" ["primaryContactId"]=> int(5668) ["sectionId"]=> int(5) ["seq"]=> int(7) ["submissionId"]=> int(4732) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2021) ["issueId"]=> int(413) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "79–91" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.2.6" ["abstract"]=> array(2) { ["en_US"]=> string(936) "

This paper aims to introduce the main aspects arising in the organisational context related to leadership roles when information security awareness is being engineered and developed according to purposes set within. Achieving these development purposes is  connected to the commanding function of leadership, while being influenced by key human risk factors such as: leadership  commitment and example setting, leadership quality, the state of being motivated and above all, the ability of responsible decision- making on a professional basis. In order to improve the effectiveness of putting the implementation into practice, a methodological  toolset needs to be elaborated for the disposal of the leader, thanks to which, besides taking on a transactional leadership style and a  cyclic program management, the continuous monitoring and tailoring to the organisation of the development purposes all become  facilitated. 

" ["hu_HU"]=> string(941) "

Jelen közlemény célja, hogy bemutassa azokat a főbb aspektusokat, amelyek a vezetői szerepek vonatkozásában akkor mutatkoznak a szervezetben, ha az információbiztonság-tudatosság a szervezetben meghatározott fejlesztési célok mentén kerül tervezésre és fejlesztésre. E fejlesztési törekvések elérése a vezetés irányítási funkciójához kapcsolódik, továbbá olyan kulcs humán kockázati tényezők befolyásolják, mint a vezetői elkötelezettség és példamutatás, a vezetés minősége, motiváltság, és legfőképpen a szakmai alapú felelős döntésképesség. A mindennapi gyakorlatba átültethető megvalósítás hatékonysága érdekében a vezető rendelkezésére álló módszertani eszköztár kialakítása szükséges, amelynél fogva ciklikus problémamenedzsment, ezáltal pedig a fejlesztési törekvések folyamatos utókövetése és szervezethez igazítása válik lehetővé.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" ["hu_HU"]=> string(81) "AARMS – Academic and Applied Research in Military and Public Management Science" } ["title"]=> array(2) { ["en_US"]=> string(73) "Leadership Responsibilities in Information Security Awareness Development" ["hu_HU"]=> string(73) "Az információbiztonság-tudatosság fejlesztésének vezetői feladatai" } ["prefix"]=> array(1) { ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(1) { ["hu_HU"]=> string(0) "" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#743 (6) { ["_data"]=> array(15) { ["id"]=> int(5668) ["email"]=> string(17) "karaszb@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4853) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-2065-4928" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(19) "

doktorandusz

" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Kárász" ["hu_HU"]=> string(8) "Kárász" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Balázs" ["hu_HU"]=> string(7) "Balázs" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#774 (6) { ["_data"]=> array(15) { ["id"]=> int(6848) ["email"]=> string(23) "kollar.csaba@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4853) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-0981-2385" ["url"]=> string(0) "" ["affiliation"]=> array(1) { ["en_US"]=> string(0) "" } ["biography"]=> array(1) { ["en_US"]=> string(0) "" } ["familyName"]=> array(1) { ["en_US"]=> string(7) "Kollár" } ["givenName"]=> array(1) { ["en_US"]=> string(5) "Csaba" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(20) "information security" [1]=> string(18) "security awareness" [2]=> string(21) "manager communication" [3]=> string(21) "leadership commitment" [4]=> string(19) "leadership skillset" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#775 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(17022) ["id"]=> int(4399) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4853) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF