Full Issue

object(Publication)#705 (6) { ["_data"]=> array(30) { ["id"]=> int(6908) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2023-11-16" ["lastModified"]=> string(19) "2023-11-20 12:36:57" ["primaryContactId"]=> int(8541) ["sectionId"]=> int(5) ["seq"]=> int(1) ["submissionId"]=> int(6784) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(9895) "Allison, Graham – Schmidt, Eric (2022): The US Needs a Million Talents Program to Retain Technology Leadership. Immigration is the United States’ Secret Sauce – Including in Its Competition with China. Foreign Policy, 16 July 2022. Online: https://foreignpolicy.com/2022/07/16/immigration-us-technology-companies-work-visas-china-talentcompetition-universities/ AttackIQ [@AttackIQ] (2020): Think Bad, Do Good: Julia Voo and the National Cyber Power Index. YouTube, 05 October 2020. Online: https://www.youtube.com/watch?v=OESUV5qRfdY Billo, Charles – Chang, Welton (2004): Cyber Warfare – An Analysis of the Means and Motivations of Selected Nation States. Institute for Security Technology Studies at Dartmouth College, 01 November 2004. Online: https://www.researchgate.net/publication/230687826 Blue , Violet (2018): When China Hoards Its Hackers Everyone Loses. Engadget, 16 March 2018. Online: https://www.engadget.com/2018-03-16-chinese-hackers-pwn2own-no-go.html Chawla, Gunjan – Srivastava , Vagisha (2020): What Are ‘Offensive Cyber Capabilities’? The CCG Blog, 07 August 2020. Online: https://ccgnludelhi.wordpress.com/2020/08/07/whatare-offensive-cyber-capabilities/ Chivvis, Christopher S. – Dion-Schwarz, Cynthia: Why It’s So Hard to Stop a Cyberattack – And Even Harder to Fight Back. The RAND Blog, 30 March 2017. Online: https://www.rand.org/blog/2017/03/why-its-so-hard-to-stop-a-cyberattack-andeven-harder.html Çifci, Hasan (2022): Comparison of National-Level Cybersecurity and Cyber Power Indices: A Conceptual Framework. Research Square, 17 October 2022. Online: https://doi.org/10.21203/rs.3.rs-2159915/v1 CSRC (2021): Vulnerability – Glossary. NIST, 2021. Online: https://csrc.nist.gov/glossary/term/vulnerability Demchak, Chris – Kerben, Jason – McArdle, Jennifer – Spidalieri, Francesca (2015): Cyber Readiness Index 2.0. Potomac Institute for Policy Studies, November 2015. Online: https://potomacinstitute.org/images/CRIndex2.0.pdf DeSombre, Winnona – Campobasso, Michele – Allodi, Luca – Shires, James – Work, JD – Mor gus, Robert – O’Neill, Patrick Howell – Herr, Trey (2021a): A Primer on the Proliferation of Offensive Cyber Capabilities. Atlantic Council, 01 March 2021. Online: https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/a-primer-on-theproliferation-of-offensive-cyber-capabilities/ DeSombre, Winnona – Shires, James – Work, JD – Mor gus, Robert – O’Neill, Patrick Howell – Allodi, Luca – Herr, Trey (2021b): Countering Cyber Proliferation: Zeroing in on Access-as-a-Service. Atlantic Council, 01 March 2021. Online: https://www.atlanticcouncil.org/in-depth-research-reports/report/countering-cyber-proliferation-zeroing-in-on-accessas-a-service/ Economist Intelligence Unit (2011): Cyber Power Index. Findings and Methodology. Booz Allen Hamilton, August 2011. Online: https://web.archive.org/web/20151017081309/www.boozallen.com/content/dam/boozallen/media/file/Cyber_Power_Index_Findings_and_Methodology.pdf ENISA (2023): Cybersecurity Higher Education Database: Programmes Location. Online: https://www.enisa.europa.eu/topics/education/cyberhead/#/statistics Feldstein, Steven – Kot, Brian (2023): Why Does the Global Spyware Industry Continue to Thrive? Trends, Explanations, and Responses. Carnegie Endowment for International Peace, 14 March 2023. Online: https://carnegieendowment.org/2023/03/14/why-doesglobal-spyware-industry-continue-to-thrive-trends-explanations-and-responses-pub-89229 IISS (2021): Cyber Capabilities and National Power: A Net Assessment. International Institute for Strategic Studies, 28 June 2021. Online: https://www.iiss.org/blogs/research-paper/2021/06/cyber-capabilities-national-power ITU (2021): Global Cybersecurity Index 2020. International Telecommunication Union, 29 June 2021. Online: https://www.itu.int/epublications/publication/D-STR-GCI.01-2021-HTM-E Joint Chiefs of Staff (2018): Joint Publication 3-12. Cyberspace Operations. Online: https://irp.fas.org/doddir/dod/jp3_12.pdf Kueh l, Daniel T. (2009): From Cyberspace to Cyberpower: Defining the Problem. In Kramer, Franklin D. – Starr , Stuart H. – Wentz, Larry K. (eds.): Cyberpower and National Security. University of Nebraska Press. 24–42. Online: https://doi.org/10.2307/j.ctt1djmhj1.7 Laszka, Aron – Zhao, Mingyi – Malbari, Akash – Grossklags, Jens (2018): The Rules of Engagement for Bug Bounty Programs. In Meiklejohn, Sarah – Sako, Kazue (eds.): Financial Cryptography and Data Security. Berlin–Heidelberg: Springer. 138–159. Online: https://doi.org/10.1007/978-3-662-58387-6_8 Liff, Adam P. (2012): Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War. Journal of Strategic Studies, 35(3), 401–428. Online: https://doi.org/10.1080/01402390.2012.663252 Marczak, Bill – Scott-Railton , John – McKune, Sarah – Razzak, Bahr Abdul – Deibert , Ron (2018): Hide and seek: Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries. Citizen Lab, 18 September 2018. Online: https://citizenlab.ca/2018/09/hideand-seek-tracking-nso-groups-pegasus-spyware-to-operations-in-45-countries/ Minárik, Tomáš (2016): NATO Recognises Cyberspace as a “Domain of Operations” at Warsaw Summit. NATO CCDCOE, 21 July 2016. Online: https://ccdcoe.org/incyder-articles/natorecognises-cyberspace-as-a-domain-of-operations-at-warsaw-summit/ Ministry of Defence (2018): Joint Doctrine Note 1/18. Cyber and Electromagnetic Activities. Online: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/682859/doctrine_uk_cyber_and_electromagnetic_activities_jdn_1_18.pdf Miralis, Dennis (2019): Defining Offensive Cyber Capabilities. NGM Lawyers, 19 March 2019. Online: https://ngm.com.au/defining-offensive-cyber-capabilities/ Miyashita , Lynn – Eckert , Madeline (2022): Microsoft Bug Bounty Programs Year in Review: $13.7M in Rewards. Microsoft Security Response Center, 11 August 2022. Online: https://msrc.microsoft.com/blog/2022/08/microsoft-bug-bounty-programs-year-in-review-13-7-in-rewards/ Murphy, Ben – Creemers, Rogier – Kania, Elsa – Triolo, Paul – Neville, Kevin – Webster, Graham (2021): Xi Jinping: ‘Strive to Become the World’s Primary Center for Science and High Ground for Innovation’. DigiChina at Stanford University, 18 March 2021. Online: https://digichina.stanford.edu/work/xi-jinping-strive-to-become-the-worlds-primarycenter-for-science-and-high-ground-for-innovation/ NATO Standardization Office (2020): Allied Joint Publication-3.20. Allied Joint Doctrine for Cyberspace Operations. Online: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/899678/doctrine_nato_cyberspace_operations_ajp_3_20_1_.pdf Nurse, Jason R. C. – Adamos, Konstantinos – Grammato pou los, Athanasios – Di Franco, Fabio (2022): Addressing the EU Cybersecurity Skills Shortage and Gap through Higher Education. Publications Office of the European Union, 03 January 2022. Online: https://doi.org/10.2824/033355 Sanborn, Howard – Thyne, Clayton L. (2013): Learning Democracy: Education and the Fall of Authoritarian Regimes. British Journal of Political Science, 44(4), 773–797. Online: https://doi.org/10.1017/S0007123413000082 Sarri, Anna – Kyra noud i, Pinelopi – Thirriot, Aude – Charelli, Federico – Dom inique , Yang (2020): National Capabilities Assessment Framework. Publications Office of the European Union, December 2020. Online: https://doi.org/10.2824/590072 Šendelj, Ramo – Ognjanović, Ivana (2015): Cyber Security Education in Montenegro: Current Trends, Challenges, and Open Perspectives. 7th Annual International Conference on Education and New Learning Technologies (EDULEARN15), 08 July 2015. Online: https://ecesm.net/sites/default/files/EDULEARN_Sendlej.Ognjanovic.pdf Shen, Xinmei (2022): China’s Demand for Cybersecurity Talent Will Exceed Supply by over 3 Million in Five Years, Says Education Ministry Report. SCMP, 08 September 2022. Online: https://www.scmp.com/tech/tech-trends/article/3191781/chinas-demandcybersecurity-talent-will-exceed-supply-over-3 The White House (2022): Fact Sheet: Biden–Harris Administration Actions to Attract STEM Talent and Strengthen our Economy and Competitiveness. The White House, 21 January 2022. Online: https://www.whitehouse.gov/briefing-room/statements-releases/2022/01/21/fact-sheet-biden-harris-administration-actions-to-attract-stem-talent-and-strengthen-oureconomy-and-competitiveness/ Trump, Donald J. (2019): America’s Cybersecurity Workforce. The White House, 02 May 2019. Online: https://www.federalregister.gov/documents/2019/05/09/2019-09750/americascybersecurity-workforce Uren, Tom – Hogeveen, Bart – Hanson, Fergus (2018): Defining Offensive Cyber Capabilities. Australian Strategic Policy Institute, 04 July 2018. Online: https://www.aspi.org.au/report/defining-offensive-cyber-capabilities Voo, Julia – Hemani, Irfan – Jones, Simon – DeSombre, Winnona – Cassidy, Dan – Schwarzenbach, Anina (2020): National Cyber Power Index 2020. Belfer Center for Science and International Affairs, September 2020. Online: https://www.belfercenter.org/publication/national-cyber-power-index-2020 Xiangzhan, Yu – Hongli, Zhang – Haining, Yu – Zhihong, Tian – Jianhong, Zhai – Zhut ing, Pan (2016): Cyberspace Security Competition and Talent Management. Strategic Study of Chinese Academy of Engineering, 18(6), 49–52. Online: https://doi.org/10.15302/JSSCAE-2016.06.010 Ziv, Amitai (2020): Cellphone Hacking and Millions in Gulf Deals: Inner Workings of Top Secret Israeli Cyberattack Firm Revealed. Haaretz, 07 September 2020. Online: https://www.haaretz.com/israel-news/tech-news/.premium-mobile-spytech-millions-in-gulf-deals-topsecret-israeli-cyberattack-firm-reve-1.9125915" ["copyrightYear"]=> int(2023) ["issueId"]=> int(534) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(4) "5-18" ["pub-id::doi"]=> string(23) "10.32565/aarms.2023.3.1" ["abstract"]=> array(1) { ["en_US"]=> string(1407) "

The recent emergence of mercenary spyware like Pegasus or Russia’s ongoing conventional warfare in Ukraine, supplemented by a cyber offensive we never experienced before, made cybersecurity even more critical. Despite the considerable research in the field, it seems that academia and the private sector have not been able to keep up with the growing importance of security and privacy resulting from the significant increase in cyber threats to critical services, infrastructure and human rights. Research on cyber capabilities tends to focus on the general understanding of the field and pays less attention to the rapid spread of increasingly advanced offensive cyber capabilities. Correctly assessing the capabilities of others and recognising the steps necessary to develop their own capabilities are essential for any country in combating future cybersecurity challenges. However, since there is no consensus on describing even basic cyber capabilities, current research uses different interpretations and usually lacks offensive capabilities altogether. In this article, I discuss the problem of assessing, measuring and evaluating offensive cyber capabilities, starting from the different definitions of some related terms through the various cyber power indices, right down to the talent behind cybersecurity, and perhaps the most promising indicators for assessing offensive capabilities.

" } ["copyrightHolder"]=> array(1) { ["en_US"]=> string(14) "Selján Gábor" } ["source"]=> array(1) { ["en_US"]=> string(0) "" } ["subtitle"]=> array(1) { ["en_US"]=> string(41) "Exploring the Talent Behind Cybersecurity" } ["title"]=> array(1) { ["en_US"]=> string(38) "Assessing Offensive Cyber Capabilities" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#740 (6) { ["_data"]=> array(11) { ["id"]=> int(8541) ["email"]=> string(15) "gabor@seljan.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6908) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["familyName"]=> array(2) { ["en_US"]=> string(7) "Selján" ["hu_HU"]=> string(7) "Selján" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Gábor" ["hu_HU"]=> string(6) "Gábor" } ["affiliation"]=> array(1) { ["hu_HU"]=> string(52) "a:1:{s:5:"en_US";s:26:"Budapesti Corvinus Egyetem";}" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(11) "cyber power" [1]=> string(18) "cyber capabilities" [2]=> string(18) "offensive security" [3]=> string(21) "cybersecurity indices" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#753 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(30682) ["id"]=> int(5568) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6908) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#119 (6) { ["_data"]=> array(30) { ["id"]=> int(6214) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2023-11-16" ["lastModified"]=> string(19) "2023-11-20 12:37:31" ["primaryContactId"]=> int(7640) ["sectionId"]=> int(5) ["seq"]=> int(2) ["submissionId"]=> int(6090) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(4315) "Berényi, János – Lévai , Zsolt (2020): CORCAP – a környezetbarát áruszállítási folyosók kialakítása útján. In Horváth , Balázs – Horváth, Gábor (eds.): X. Nemzetközi Közlekedéstudományi Konferencia [10th International Conference on Transport Sciences]. Győr: Széchenyi István Egyetem Közlekedési Tanszék – Közlekedéstudományi Egyesület. Boda, József – Boldizsár, Gábor – Kovács, László – Orosz, Zoltán – Padányi, József – Resperger, István – Szenes, Zoltán (2016): A hadtudományi kutatási irányok, prioritások és témakörök. Államtudományi Műhelytanulmányok, 1(16), 2–23. BRNS (2019): Budapest Rail Node Study. Online: http://bvs.hu/wp-content/uploads/2019/04/BRN_elsoszakcikk_v7.pdf Csárdi, Gábor – Nepusz, Tamás (2006): The Igraph Software Package for Complex Network Research. InterJournal, Complex Systems, 1695(5), 1–9. Dijkstra, Edsger W. (1959): A Note on Two Problems in Connexion with Graphs. Numerische Mathematik, 1(1), 269–271. Online: https://doi.org/10.1007/BF01386390 Haig, Zsolt (2016): Katonai műszaki tudományok a 21. században. Hadtudomány, 26(1–2), 115–116. Online: https://doi.org/10.17047/HADTUD.2016.26.1-2.115 Horváth, Attila (2006): A közúti, vasúti és vízi közlekedés terrorfenyegetettségének jellemzői. In Tálas, Péter (ed.): A politikai marketing fogságában. Budapest: Mágustúdió. 321–336. Jenelius, Erik – Petersen, Tom – Mattsson , Lars-Göran (2006): Importance and Exposure in Road Network Vulnerability Analysis. Transportation Research Part A, 40(7), 537–560. Online: https://doi.org/10.1016/j.tra.2005.11.003 Kristóf, János – Lévai, Zsolt (2002): Vágányzári forgalmi technológiák a gyakorlatban. Forgalom, 4(1), 3–6. Lakatos , Péter – Szászi, Gábor – Taksás, Balázs (2016): A logisztikai infrastruktúra szerepe a regionális versenyképesség alakításában. In Csath , Magdolna (ed.): Regionális versenyképességi tanulmányok. Budapest: NKE. 181–288. Lévai , Zsolt (2020): A vasúti alágazat jelenkori kapcsolódása a közlekedési támogatás rendszeréhez. Katonai Logisztika, 28(1–2), 198–223. Online: https://doi.org/10.30583/2020/1-2/198 R Core Team (s. a.): R: A language and environment for statistical computing. R Foundation for Statistical Computing. Online: https://www.Rproject.org/ Szászi, Gábor (2007): Magyarország közlekedési infrastruktúrájának fejlesztése napjainkban: Közút vagy vasút? Katonai Logisztika, 15(2), 32–59. Szászi, Gábor (2010): Katonai vasúti szállítások a Magyar Honvédség missziós feladatainak rendszerében. Szolnoki Tudományos Közlemények, 16, 101–118. Szászi, Gábor (2013a): A vasúti hálózati infrastruktúrával szemben támasztott újszerű védelmi követelmények kutatása, a továbbfejlesztés feltételrendszerének vizsgálata. PhD thesis. Budapest: NKE. Online: https://doi.org/10.17625/NKE.2014.028 Szászi, Gábor (2013b): Long-span Railway Bridges in the Transport System of Hungary. Hadmérnök, 8(2), 98–107. Szászi, Gábor (2014): Nagyfolyami vasúti hidak, mint közlekedési létfontosságú rendszerelemek. In Horváth , Attila – Bányász, Péter – Orbók, Ákos (eds.): Fejezetek a létfontosságú közlekedési rendszerelemek védelmének aktuális kérdéseiről. Budapest: NKE. 25–48. Tóth, Bence (2017): Állomások és állomásközök zavarának gráfelméleti alapú vizsgálata a magyarországi vasúthálózaton. Hadmérnök, 12(4), 52–66. Tóth, Bence (2018): A magyarországi vasúthálózat zavarainak gráfelméleti alapú vizsgálata. In Horváth, Balázs – Horváth, Gábor – Gaál, Bertalan (eds.): Közlekedéstudományi konferencia. Technika és technológia a fenntartható közlekedés szolgálatában. Győr: Széchenyi István Egyetem Közlekedési Tanszék. 505–519. Tóth, Bence (2021): The Effect of Attacks on the Railway Network of Hungary. Central European Journal of Operations Research, 29(2), 567–587. Online: https://doi.org/10.1007/s10100-020-00684-8 Tóth, Bence – Horváth , István (2019): How the Planned V0 Railway Line Would Increase the Resilience of the Railway Network of Hungary Against Attacks. AARMS, 18(3), 109–129. Online: https://doi.org/10.32565/aarms.2019.3.9" ["copyrightYear"]=> int(2023) ["issueId"]=> int(534) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "19-41" ["pub-id::doi"]=> string(23) "10.32565/aarms.2023.3.2" ["abstract"]=> array(1) { ["en_US"]=> string(824) "

Since 1920, almost all the traffic on rail crossing the Danube in Hungary, crosses it in Budapest via the Southern Railway Bridge which makes it heavily overloaded. This is a very disadvantageous situation not only for commercial shipping but also for military uses as there is certain heavy military equipment that can only be transported via rail.
In our two-part article, we examine the locations of new bridges that could be alternatives to bypass Budapest and thus to reduce the traffic load on the railway lines of the capital. In this first part of our paper, we present the effect of a new Danube bridge as an alternative to the V0 railway line. We examine the possible sites of the bridge with several different route alternatives connecting it to the existing railway lines by using traffic simulation.

" } ["copyrightHolder"]=> array(1) { ["en_US"]=> string(25) "Tóth Bence, Lévai Zsolt" } ["source"]=> array(1) { ["en_US"]=> string(0) "" } ["subtitle"]=> array(1) { ["en_US"]=> string(6) "Part 1" } ["title"]=> array(1) { ["en_US"]=> string(104) "Quantitative Analysis of the Possible Sites of a New Danube Bridge to Bypass Budapest on Rail – Part 1" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#749 (6) { ["_data"]=> array(14) { ["id"]=> int(7640) ["email"]=> string(21) "toth.bence@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6214) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(36) "http://orcid.org/0000-0003-3958-187X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(37) "National University of Public Service" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(26) "

assistant professor

" ["hu_HU"]=> string(16) "

adjunktus

" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Tóth" ["hu_HU"]=> string(5) "Tóth" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Bence" ["hu_HU"]=> string(5) "Bence" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#726 (6) { ["_data"]=> array(15) { ["id"]=> int(7641) ["email"]=> string(18) "levai.zsolt@kti.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6214) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(1) { ["en_US"]=> string(130) "Ludovika - University of Public Service, Faculty of MIlitary Science and Officer Training, Doctoral School of Military Engineering" } ["biography"]=> array(1) { ["en_US"]=> string(0) "" } ["familyName"]=> array(1) { ["en_US"]=> string(6) "Lévai" } ["givenName"]=> array(1) { ["en_US"]=> string(5) "Zsolt" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(7) "railway" [1]=> string(6) "bridge" [2]=> string(12) "graph theory" [3]=> string(7) "traffic" [4]=> string(20) "military engineering" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#769 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(30683) ["id"]=> int(5569) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6214) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#185 (6) { ["_data"]=> array(30) { ["id"]=> int(6215) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2023-11-16" ["lastModified"]=> string(19) "2023-11-20 12:42:30" ["primaryContactId"]=> int(7642) ["sectionId"]=> int(5) ["seq"]=> int(3) ["submissionId"]=> int(6091) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(5477) "A Szeged–Szőreg vasútvonal fejlesztésének megvalósíthatósági tanulmányterve (2006). Budapest: BME Út- és Vasútépítési Tanszék. Berényi, János – Lévai , Zsolt (2020): CORCAP – a környezetbarát áruszállítási folyosók kialakítása útján. In Horváth , Balázs – Horváth , Gábor (eds.): X. Nemzetközi Közlekedéstudományi Konferencia [10th International Conference on Transport Sciences]. Győr: Széchenyi István Egyetem Közlekedési Tanszék – Közlekedéstudományi Egyesület. Braess, Dietrich (1968): Über ein Paradoxon aus der Verkehrsplanung. Unternehmensforschung, 12(1), 258–268. Online: https://doi.org/10.1007/BF01918335 Braess, Dietrich – Nagur ney, Anna – Wakolbinger, Tina (2005): On a Paradox of Traffic Planning. Transportation Science, 39(4), 446–450. Online: https://doi.org/10.1287/trsc.1050.0127 Csárdi, Gábor – Nepusz, Tamás (2006): The Igraph Software Package for Complex Network Research. InterJournal, Complex Systems, 1695(5), 1–9. Dijkstra, Edsger W. (1959): A Note on Two Problems in Connexion with Graphs. Numerische Mathematik, 1(1), 269–271. Online: https://doi.org/10.1007/BF01386390 Jenelius, Erik (2010): Redundancy Importance: Links as Rerouting Alternatives during Road Network Disruptions. Procedia Engineering, 3, 129–137. Online: https://doi.org/10.1016/j.proeng.2010.07.013 Jenelius, Erik – Petersen, Tom – Mattsson , Lars-Göran (2006): Importance and Exposure in Road Network Vulnerability Analysis. Transportation Research Part A, 40(7), 537–560. Online: https://doi.org/10.1016/j.tra.2005.11.003 Horváth , Attila (2006): A közúti, vasúti és vízi közlekedés terrorfenyegetettségének jellemzői. In Tálas, Péter (ed.): A politikai marketing fogságában. Budapest: Mágustúdió. 321–336. Kerényi, Levente – Tóth, Bence (2020): Alternatív vasúti útvonalak minősítése a Magyar Honvédség szállítási feladatainak ellátásában. Katonai Logisztika, 28(1–2), 79–99. Online: https://doi.org/10.30583/2020/1-2/079 Lakatos , Péter – Szászi, Gábor – Taksás, Balázs (2016): A logisztikai infrastruktúra szerepe a regionális versenyképesség alakításában. In Csath, Magdolna (ed.): Regionális versenyképességi tanulmányok. Budapest: NKE. 181–288. Lévai, Zsolt (2020): A vasúti alágazat jelenkori kapcsolódása a közlekedési támogatás rendszeréhez. Katonai Logisztika, 28(1–2), 198–223. Online: https://doi.org/10.30583/2020/1-2/198 R Core Team (s. a.): R: A language and environment for statistical computing. R Foundation for Statistical Computing. Online: https://www.Rproject.org/ Schváb, Zoltán – Lévai, Zsolt (2022): A vasúti árufuvarozás versenyképességének javítása az árufuvarozási folyosók fejlesztésével. In Duleba , Szabolcs (ed.): Logisztikai Évkönyv 2022. Budapest: Magyar Logisztikai Egyesület. 172–183. Online: https://doi.org/10.23717/LOGEVK.2022.16 Scott, Darren M. – Novak , David C. – Aultma n-Hall, Lisa – Guo , Feng (2006): Network Robustness Index: A New Method for Identifying Critical Links and Evaluating the Performance of Transportation Networks. Journal of Transport Geography, 14(3), 215–227. Online: https://doi.org/10.1016/j.jtrangeo.2005.10.003 Szászi, Gábor (2007): Magyarország közlekedési infrastruktúrájának fejlesztése napjainkban: Közút vagy vasút? Katonai Logisztika, 15(2), 32–59. Szászi, Gábor (2010): Katonai vasúti szállítások a Magyar Honvédség missziós feladatainak rendszerében. Szolnoki Tudományos Közlemények, 16, 101–118. Szászi, Gábor (2013a): A vasúti hálózati infrastruktúrával szemben támasztott újszerű védelmi követelmények kutatása, a továbbfejlesztés feltételrendszerének vizsgálata. PhD thesis. Budapest: NKE. Online: https://doi.org/10.17625/NKE.2014.028 Szászi, Gábor (2013b): Long-span Railway Bridges in the Transport System of Hungary. Hadmérnök, 8(2), 98–107. Szászi, Gábor (2014): Nagyfolyami vasúti hidak, mint közlekedési létfontosságú rendszerelemek. In Horváth , Attila – Bányász, Péter –Orbók, Ákos (eds.): Fejezetek a létfontosságú közlekedési rendszerelemek védelmének aktuális kérdéseiről. Budapest: NKE. 25–48. Tóth, Bence (2017): Állomások és állomásközök zavarának gráfelméleti alapú vizsgálata a magyarországi vasúthálózaton. Hadmérnök, 12(4), 52–66. Tóth, Bence (2018): A magyarországi vasúthálózat zavarainak gráfelméleti alapú vizsgálata. In Horváth , Balázs – Horváth , Gábor – Gaál, Bertalan (eds.): Közlekedéstudományi konferencia. Technika és technológia a fenntartható közlekedés szolgálatában. Győr: Széchenyi István Egyetem Közlekedési Tanszék. 505–519. Tóth, Bence G. (2020): Redundancy Analysis of the Railway Network of Hungary. In Tóthné Szita , Klára – Jármai, Károly – Voith, Katalin (eds.): Solutions for Sustainable Development. London: CRC Press. 358–367. Online: https://doi.org/10.1201/9780367824037-42 Tóth, Bence (2021): The Effect of Attacks on the Railway Network of Hungary. Central European Journal of Operations Research, 29(2), 567–587. Online: https://doi.org/10.1007/s10100-020-00684-8 Tóth, Bence – Horváth , István (2019): How the Planned V0 Railway Line Would Increase the Resilience of the Railway Network of Hungary Against Attacks. AARMS, 18(3), 109–129. Online: https://doi.org/10.32565/aarms.2019.3.9" ["copyrightYear"]=> int(2023) ["issueId"]=> int(534) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "43-62" ["pub-id::doi"]=> string(23) "10.32565/aarms.2023.3.3" ["abstract"]=> array(1) { ["en_US"]=> string(868) "

Since 1920, almost all the traffic on rail crossing the Danube in Hungary, crosses it in Budapest via the Southern Railway Bridge which makes it overloaded. This is a very disadvantageous situation not only for commercial shipping but also for military uses as there is certain heavy military equipment that can only be transported via rail.
In our two-part article, we examine the locations of new bridges that could be alternatives to bypass Budapest and thus to reduce the traffic load on the railway lines of the capital. In this second part, we examine the situation on the river Tisza by simulating the existence of several bridge alternatives, both newly built and developed existing ones. We also suggest a combined way of development to treat the capacity changes in the context of the whole network by building two new bridges, one on each river.

" } ["copyrightHolder"]=> array(1) { ["en_US"]=> string(25) "Tóth Bence, Zsolt Lévai" } ["source"]=> array(1) { ["en_US"]=> string(0) "" } ["subtitle"]=> array(1) { ["en_US"]=> string(6) "Part 2" } ["title"]=> array(1) { ["en_US"]=> string(104) "Quantitative Analysis of the Possible Sites of a New Danube Bridge to Bypass Budapest on Rail – Part 2" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#751 (6) { ["_data"]=> array(14) { ["id"]=> int(7642) ["email"]=> string(21) "toth.bence@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6215) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(36) "http://orcid.org/0000-0003-3958-187X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(37) "National University of Public Service" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(26) "

assistant professor

" ["hu_HU"]=> string(16) "

adjunktus

" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Tóth" ["hu_HU"]=> string(5) "Tóth" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Bence" ["hu_HU"]=> string(5) "Bence" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#120 (6) { ["_data"]=> array(15) { ["id"]=> int(7643) ["email"]=> string(18) "levai.zsolt@kti.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6215) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(1) { ["en_US"]=> string(130) "Ludovika - University of Public Service, Faculty of Military Science and Officer Training, Doctoral School of Military Engineering" } ["biography"]=> array(1) { ["en_US"]=> string(0) "" } ["familyName"]=> array(1) { ["en_US"]=> string(5) "Zsolt" } ["givenName"]=> array(1) { ["en_US"]=> string(6) "Lévai" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(7) "railway" [1]=> string(6) "bridge" [2]=> string(12) "graph theory" [3]=> string(10) "redundancy" [4]=> string(20) "military engineering" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#775 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(30684) ["id"]=> int(5570) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6215) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(29) { ["id"]=> int(6728) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2023-11-16" ["lastModified"]=> string(19) "2023-11-20 12:38:44" ["primaryContactId"]=> int(8316) ["sectionId"]=> int(5) ["seq"]=> int(4) ["submissionId"]=> int(6604) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(6134) "Carayannis, Elias G. – Barth , Thorsten D. – Campbell, David F. J. (2012): The Quintuple Helix Innovation Model: Global Warming as a Challenge and Driver for Innovation. Journal of Innovation and Entrepreneurship, 1(1), 1–12. Online: https://doi.org/10.1186/2192-5372-1-2 Carayannis, Elias G. – Campbell, David F. J. (2009): “Mode 3” and “Quadruple Helix”: Toward a 21st Century Fractal Innovation Ecosystem. International Journal of Technology Management, 46(3–4), 201–234. Online: https://doi.org/10.1504/IJTM.2009.023374 Carayannis, Elias G. – Campbell, David F. J. (2010): Triple Helix, Quadruple Helix and Quintuple Helix and How Do Knowledge, Innovation and the Environment Relate to Each Other? A Proposed Framework for a Trans-disciplinary Analysis of Sustainable Development and Social Ecology. International Journal of Social Ecology and Sustainable Development, 1(1), 41–69. Online: https://doi.org/10.4018/jsesd.2010010105 Etzkowitz, Henry (2008): The Triple Helix. University–Industry–Government Innovation in Action. New York: Routledge. Online: https://doi.org/10.4324/9780203929605 European Commission (1995): Green Paper on Innovation. Online: https://europa.eu/documents/comm/green_papers/pdf/com95_688_en.pdf Government of Hungary (2020): Government Resolution 1573/2020 (IX.9.) on the Artificial Intelligence Strategy of Hungary. Government of Hungary (2021): Government Decree 1393/2021 (VI.24.) on the National Military Strategy of Hungary. Hungarian Central Statistical Office (2022a): 9.1.1.19. Startupalapítók, vállalkozások megoszlása főbb jellemzők szerint. STADAT-Táblák. Online: https://www.ksh.hu/stadat_files/gsz/hu/gsz0065.html Hungarian Central Statistical Office (2022b): 9.1.1.20. Startupvállalkozások aránya az adott évben igénybe vett finanszírozási források szerint az összes startupvállalkozás százalékában. STADAT-táblák. Online: https://www.ksh.hu/stadat_files/gsz/hu/gsz0066.html Hungarian Central Statistical Office (2022c): 9.1.1.21. Startupvállalkozások átlagos nettó árbevétele és a foglalkoztatottak átlagos létszáma a startupéletciklus fázisai szerint. STADAT-Táblák. Online: https://www.ksh.hu/stadat_files/gsz/hu/gsz0067.html Cho, Jaehan – DeStefano, Timothy – Kim, Hanhin – Kim, Inchul – Paik, Jin Hyun (2023): What’s Driving the Diffusion of Next-Generation Digital Technologies? Technovation, 119, 1–10. Online: https://doi.org/10.1016/j.technovation.2022.102477 Jáki, Erika – Molnár, Endre Mihály – Kádár, Béla (2019): Characteristics and Challenges of the Hungarian Startup Ecosystem. Vezetéstudomány – Budapest Management Review, 50(5), 2–12. Online: https://doi.org/10.14267/VEZTUD.2019.05.01 Kattel , Rainer – Drechsler, Wolfgang – Karo, Erkki (2022): How to Make an Entrepreneurial State. Why Innovation Needs Bureaucracy. New Haven – London: Yale University Press. Online: https://doi.org/10.12987/9780300235371 Kollmann, Tobias – Stöckmann, Christoph – Hensellek, Simon – Kensbock, Julia (2016): European Startup Monitor 2016. German Startups Association. Kornai, János (2010): Innováció és dinamizmus. Kölcsönhatás a rendszerek és a technikai haladás között. Közgazdasági Szemle, 57(1), 1–36. Lányi, Beatrix (2017): A startup vállalkozók személyiségjellemzőinek hatása az innovatív piaci jelenlétre – Különös tekintettel az egészségügyi és orvosi biotechnológiai ágazatra. Közép-Európai Közlemények, 10(2), 77–90. Perri, Lori (2022): What’s New in the 2022 Gartner Hype Cycle for Emerging Technologies. Gartner, 10 August 2022. Online: https://www.gartner.com/en/articles/what-s-new-in-the-2022-gartner-hype-cycle-for-emerging-technologies Lu, Chaochao – Tang, Xiaoou (2015): Surpassing Human-Level Face Verification Performance on LFW with GaussianFace. Proceedings of the AAAI Conference on Artificial Intelligence, 29(1), 1–13. Online: https://doi.org/10.1609/aaai.v29i1.9797 Lundvall, Bengt-Åke (2016): The Learning Economy and the Economics of Hope. London – New York: Anthem Press. DOI: https://doi.org/10.26530/OAPEN_626406 Makó, Csaba – Illéssy, Miklós (2014): A szervezeti innovációk a közszféra szervezeteiben (A jó állam létrehozásának és tartós fenntartásának elhanyagolt dimenziója). Pro Publico Bono – Magyar Közigazgatás, (4), 4–20. Makó, Csaba – Illésy, Miklós – Számadó, Róza – Szakos, Judit (2020): Workplace Innovation: Concepts, Regulation and Increasing Role of Knowledge Management: Theoretical Considerations and European Experiences. Pro Publico Bono – Magyar Közigazgatás, 8(1), 96–123. Online: https://doi.org/10.32575/ppb.2020.1.6 Marinova, Dora – Phillimore, John (2003): Models of Innovation. In Shavinina , Larisa V. (eds.): The International Handbook on Innovation. Oxford: Pergamon. 44–53. Online: https://doi.org/10.1016/B978-008044198-6/50005-X Mazzucato, Mariana (2016): From Market Fixing to Market-creating: A New Framework for Innovation Policy. Industry and Innovation, 23(2), 140–156. Online: https://doi.org/10.1080/13662716.2016.1146124 NATO (2022): Emerging and Disruptive Technologies. NATO, 08 December 2022. Online: https://www.nato.int/cps/en/natohq/topics_184303.htm OECD (2018): Oslo Manual 2018. Guidelines for Collecting, Reporting and Using Data on Innovation. The Measurement of Scientific, Technological and Innovation Activities. Paris: OECD. Online: https://doi.org/10.1787/9789264304604-en OECD (2020): OECD Digital Economy Outlook 2020. Paris: OECD. Online: https://doi.org/10.1787/bb167041-en Perez, Carlota (2002): Technological Revolutions and Financial Capital. The Dynamics of Bubbles and Golden Ages. Cheltenham–Northampton: Edward Elgar Publishing. Online: https://doi.org/10.4337/9781781005323 Ramstad , Elise (2009): Developmental Evaluation Framework for Innovation and Learning Networks: Integration of the Structure, Process and Outcomes. Journal of Workplace Learning, 21(3), 181–197. Online: https://doi.org/10.1108/13665620910943924 Startup Hungary (2022): Hungarian Startup Report 2021." ["copyrightYear"]=> int(2023) ["issueId"]=> int(534) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "63-76" ["pub-id::doi"]=> string(23) "10.32565/aarms.2023.3.4" ["abstract"]=> array(1) { ["en_US"]=> string(1039) "

In time of crisis, developing Next Generation Digital Technologies in the innovation network, with special attention to startup companies, can be a key to economic thrive. This paper reviews the current and emerging technological trends and how they are connected to the hype surrounding startup companies and their ecosystem, with particular attention to the role of the state. The analyses use Ramstad’s Expanded Triple Helix Model as a framework but with opening its workplace dimensions to subgroups.
In Hungary, digital or technology-led startups are relevant in their numerical and economic volume. Narrowing them further down to artificial intelligence-based companies, one can see that innovation-led cooperations are already state facilitated and could cover every aspect of the ecosystem model. Analysing its operation could lead to good practices for further usage in other technological fields. On the other hand, further qualitative research on their innovation partnership should be conducted to avoid any bias.

" } ["copyrightHolder"]=> array(1) { ["en_US"]=> string(12) "Szakos Judit" } ["source"]=> array(1) { ["en_US"]=> string(0) "" } ["title"]=> array(1) { ["en_US"]=> string(93) "Boosting Effect of Startup Ecosystems through Next Generation Digital Technologies in Hungary" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#770 (6) { ["_data"]=> array(15) { ["id"]=> int(8316) ["email"]=> string(23) "szakos.judit@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6728) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-5991-3929" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(9) "NKE ÁNTK" ["hu_HU"]=> string(9) "NKE ÁNTK" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Szakos" ["hu_HU"]=> string(6) "Szakos" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Judit" ["hu_HU"]=> string(5) "Judit" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(9) { [0]=> string(44) "Next Generation Digital Technologies (NGDTs)" [1]=> string(21) "emerging technologies" [2]=> string(21) "dual-use technologies" [3]=> string(23) "artificial intelligence" [4]=> string(22) "digital transformation" [5]=> string(7) "startup" [6]=> string(20) "innovation ecosystem" [7]=> string(17) "startup ecosystem" [8]=> string(27) "Expanded Triple Helix Model" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#780 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(30685) ["id"]=> int(5571) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6728) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#116 (6) { ["_data"]=> array(28) { ["id"]=> int(6624) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2023-11-16" ["lastModified"]=> string(19) "2023-11-20 12:39:22" ["primaryContactId"]=> int(9013) ["sectionId"]=> int(5) ["seq"]=> int(5) ["submissionId"]=> int(6500) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(2397) "Aydemir, Muhammed – Glodde, Arne – Mooy, Robert – Bach, Gordon (2017): Increasing Productivity in Assembling Z-Folded Electrode-Separator-Composites for Lithium-Ion Batteries. CIRP Annals, 66(1), 25–28. Online: https://doi.org/10.1016/j.cirp.2017.04.096 Buysse, Claire – Miller, Josh (2021): Transport Could Burn Up the EU’s Entire Carbon Budget. The International Council on Clean Transportation, 09 April 2021. Online: https://theicct.org/transport-could-burn-up-the-eus-entire-carbon-budget/ Dorsz, Adam – Lewandowski, Mirosław (2020): Analysis of Fire Hazards Associated with the Operation of Electric Vehicles in Enclosed Structures. Energies, 15(11). Online: https://doi.org/10.3390/en15010011 Düser, Dominic – Schramm, Thomas (2019): Battery Housing for Lithium-ion Batteries. ATZheavy Duty Worldwide, 12(3), 36–39. Online: https://doi.org/10.1007/s41321-019-0036-4 Egelhaaf, Markus – Wolpert , Dieter – Lange, Thomas (2014): Fire Fighting of Battery Electric Vehicle Fires. In Andersson, Petra –Sundstr öm, Björn (eds.): Proceedings from 3rd International Conference on Fires in Vehicles – FIVE 2014. Borås: SP Technical Research Institute of Sweden. 221–230. European Commission (2021): Reducing CO₂ Emissions from Heavy-duty Vehicles. Online: https://ec.europa.eu/clima/eu-action/transport-emissions/road-transport-reducing-co2-emissions-vehicles/reducing-co2-emissions-heavy-duty-vehicles_en Larsson, Fredrik – Andersson, Petra – Mellander, Bengt-Erik (2014): Are Electric Vehicles Safer than Combustion Engine Vehicles? In Sandén, Björn – Wallgren, Pontus (eds.): Systems Perspectives on Electromobility. Göteborg: Chalmers University of Technology. 33–44. Larsson, Fredrik – Andersson, Petra – Blomqvist, Per – Mellander, Bengt-Erik (2017): Toxic Fluoride Gas Emissions from Lithium-ion Battery Fires. Scientific Reports, 7, 1–14. Online: https://doi.org/10.1038/s41598-017-09784-z Schmerler, Rico – Gebken, Tobias – Kalka, Sebastian – Reincke, Tobias (2017): Multifunctional Battery Housing for Electric Vehicles. Lightweight Design Worldwide, 10(5), 26–31. Online: https://doi.org/10.1007/s41777-017-0043-z Sun, Peiyi – Bisschop, Roeland – Niu, Huichang – Hua ng, Xinyan (2020): A Review of Battery Fires in Electric Vehicles. Fire Technology, 56(4), 1361–1410. Online: https://doi.org/10.1007/s10694-019-00944-3" ["copyrightYear"]=> int(2023) ["issueId"]=> int(534) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "77-90" ["pub-id::doi"]=> string(23) "10.32565/aarms.2023.3.5" ["abstract"]=> array(1) { ["en_US"]=> string(1118) "

Nowadays, electrically propelled vehicles are becoming more and more popular. Due to the propulsion system, the risks derived from the operation have changed, compared to the conventionally driven vehicles. The investigated vehicle has the same, new risk factor originating from the behaviour of rechargeable energy storage system (RESS) during combustion and there is only a minority of available literature dealing with the investigation of the battery housing. According to our assumption the housing is a fire comburent material that hinders the work of first responders. In this research we conducted the laboratory examination of a prismatic LiFePO4 battery cell and battery pack cover used in electrically driven vehicles during burning. Combustion gases were collected and were evaluated with the help of gas chromatography. Our results show that plastic housing and cell covers are not recommended in automotive industrial use, because of their comburent characteristics, also the combustion gases are severely harmful. This paper includes the method of sampling, the experiment itself and the results.

" } ["copyrightHolder"]=> array(1) { ["en_US"]=> string(39) "Apagyi Antal, Kuti Rajmund, Papp Csenge" } ["title"]=> array(1) { ["en_US"]=> string(90) "Combustion Gas Examination of a Battery Housing in Electrically Driven Heavy Goods Vehicle" } ["locale"]=> string(5) "en_US" ["authors"]=> array(3) { [0]=> object(Author)#748 (6) { ["_data"]=> array(15) { ["id"]=> int(9013) ["email"]=> string(19) "apagyi.antal@sze.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6624) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(1) { ["en_US"]=> string(0) "" } ["biography"]=> array(1) { ["en_US"]=> string(0) "" } ["familyName"]=> array(1) { ["en_US"]=> string(6) "Apagyi" } ["givenName"]=> array(1) { ["en_US"]=> string(5) "Antal" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#784 (6) { ["_data"]=> array(15) { ["id"]=> int(9014) ["email"]=> string(19) "kuti.rajmund@sze.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6624) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(1) { ["en_US"]=> string(0) "" } ["biography"]=> array(1) { ["en_US"]=> string(0) "" } ["familyName"]=> array(1) { ["en_US"]=> string(4) "Kuti" } ["givenName"]=> array(1) { ["en_US"]=> string(7) "Rajmund" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#750 (6) { ["_data"]=> array(14) { ["id"]=> int(8166) ["email"]=> string(24) "pappcsenge1996@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6624) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-4950-2461" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(29) "Széchenyi István University" ["hu_HU"]=> string(26) "Széchenyi István Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(26) "

department engineer

" ["hu_HU"]=> string(24) "

tanszéki mérnö

" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Papp" ["hu_HU"]=> string(4) "Papp" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Csenge" ["hu_HU"]=> string(6) "Csenge" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(15) "electromobility" [1]=> string(27) "electric heavy good vehicle" [2]=> string(18) "operational safety" [3]=> string(12) "battery fire" [4]=> string(16) "combustion gases" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#776 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(30686) ["id"]=> int(5572) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6624) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#773 (6) { ["_data"]=> array(28) { ["id"]=> int(6761) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2023-11-16" ["lastModified"]=> string(19) "2023-11-20 12:40:00" ["primaryContactId"]=> int(8354) ["sectionId"]=> int(5) ["seq"]=> int(6) ["submissionId"]=> int(6637) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(5917) "CMS (s. a.): Data Protection and Cybersecurity Laws in Albania. Online: https://cms.law/en/int/expert-guides/cms-expert-guide-to-data-protection-and-cyber-security-laws/albania Commissioner for the Right of Information and Personal Data Protection Report (2020). Online: https://www.idp.al/wp-content/uploads/2021/03/Raporti_IDP_2020.pdf Economic Reform Program for the period 2021–2023 (2021). Online: https://finance.gov.mk/wp-content/uploads/2021/02/%D0%9F%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%B0-%D0%BD%D0%B0-%D0%B5%D0%BA%D0%BE%D0%BD%D0%BE%D0%BC%D1%81%D0%BA%D0%B8-%D1%80%D0%B5-%D1%84%D0%BE%D1%80%D0%BC%D0%B8-2021-2023.pdf eGovernment Development Scheme (2020). Online: http://mduls.gov.rs/en/announcements/egovernment-development-scheme-for-the-period-2020-2022-has-been-adopted-300-newelectronic-services-provided-to-citizens-and-the-economy/?script=lat European Commission (2017): Western Balkans Summit 2017: Delivering for the Region. Online: https://ec.europa.eu/commission/presscorner/detail/en/IP_17_2007 European Commission (2018): European Commission Launches Digital Agenda for the Western Balkans. Online: https://ec.europa.eu/commission/presscorner/detail/es/IP_18_4242 European Commission (2019): Western Balkans Summit in Poznań: Strengthening Links within the Region and with the EU. Online: https://ec.europa.eu/commission/presscorner/detail/en/IP_19_3669 European Commission (2020): Country Report North Macedonia. Online: https://neighbourhood-enlargement.ec.europa.eu/system/files/2020-10/north_macedonia_report_2020.pdf European Commission (2023): Decrease of Data Roaming Fees between the Western Balkans and the EU. Online: https://neighbourhood-enlargement.ec.europa.eu/news/decrease-dataroaming-fees-between-western-balkans-and-eu-2023-05-03_en European Council (2018): EU – Western Balkans Summit in Sofia, 17 May 2018. Online: https://www.consilium.europa.eu/en/meetings/international-summit/2018/05/17/ EWB (2017): Meeting of WB Foreign Ministers with Hahn, Discussing Regional Economic Area. European Western Balkans, 20 September 2017. Online: https://europeanwesternbalkans.com/2017/09/20/meeting-wb-foreign-ministers-han-discussingregional-economic-area/ ITU (2021): Digital Skills Assessment Republic of North Macedonia. Online: https://northmacedonia.un.org/sites/default/files/2022-04/ITU_NorthMacedonia_DigitalSkillsAssessment_20211223_FINAL.pdf Jashari, Bardhyl ed. (2022): Digital Agenda Observatory 2021. Cumulative Report on Digital Agenda Advancement in Albania, Kosovo, Montenegro, North Macedonia and Serbia. Skopje: Metamorphosis Foundation for Internet and Society. Kajosevic, Samir (2022): Montenegro Still Assessing Damage From Mystery Cyber Attacks. Balkan Insight, 29 August 2022. Online: https://balkaninsight.com/2022/08/29/montenegro-still-assessing-damage-from-mystery-cyber-attacks/ Kosovo Digital Economy Project (s. a.). Online: https://kodeproject.org/en/home-2/Ministry of Innovation and Public Administration (2018): Cross-cutting Strategy on Digital Agenda 2015–2020 (CSDA). Online: https://akshi.gov.al/wp-content/uploads/2018/03/Strategjia_e_Axhendes_Dixhitale_shqip.pdf Mom čilo, Radulović ed. (2020): Implementation of Berlin Process in the Western Balkans Countries. Online: https://kki.hu/wp-content/uploads/2020/12/V4-countries-in-the-processof-EU-integration-of-the-WB6.pdf National Center for the Prevention of Security Risks in ICT Systems of the Republic of Serbia (s. a). Online: www.cert.rs/en National Strategy for Artificial Intelligence (s. a). Online: https://vlada.mk/node/24948 North Macedonia Scheme Regarding e-Governance Coordination (2020). Online: https://www.mioa.gov.mk/sites/default/files/pbl_files/documents/reports/izveshtaj_za_realizacija_na_gp_za_2020_godina.pdf North Macedonia National Cybersecurity Strategy of the Republic of Macedonia 2018–2022 (2018). Online: https://www.mioa.gov.mk/sites/default/files/pbl_files/documents/strategies/ns_sajber_bezbednost_2018-2022.pdf North Macedonia National Operability Framework (s. a.). Online: https://www.mioa.gov.mk/?q=mk/node/1320 OECD (2018): Digital Society in South East Europe. Online: https://doi.org/10.1787/9789264298576-15-en Office for IT and Government in Serbia (s. a.). Online: https://www.ite.gov.rs/tekst/en/124/office-for-itand-eGovernment.php Regional Cooperation Council (s. a.): Broadband and 5G. Online: https://www.rcc.int/priority_areas/54/broadband-and-5g Registered CERT Associates in Serbia (s. a.). Online: https://www.cert.rs/en/evidencija-certova.html?page=2 Serbia National CERT (s. a.). Online: https://www.ratel.rs/en/page/national-cert Serbia’s Statistical Yearbook (2020). Online: https://publikacije.stat.gov.rs/G2020/Pdf/G20202053.pdf Shift2Rail Joint Undertaking (2020): Multi-annual Action Plan. Luxembourg: Publications Office of the European Union. Online: https://doi.org/10.2881/314331 Strategy for the Development of Digital Skills for the period 2020–2024 in Serbia (2020). Online: https://www.itu.int/en/ITU-D/Regional-Presence/Europe/Documents/Events/2021/Digital%20skills/4_Nevena%20Praizovic_Serbia.pdf Strategy for the Development of Information Society and Information Security in the Republic of Serbia for 2021–2026 (2021). Online: https://www.pravno-informacioni-sistem.rs/SlGlasnikPortal/eli/rep/sgrs/vlada/strategija/2021/86/1/reg Vllahiu, Emirjeta (2022): Kosovo to Establish Agency for Cyber Security Amid Recent Attacks. Balkan Insight, 14 September 2022. Online: https://balkaninsight.com/2022/09/14/kosovoto-establish-agency-for-cyber-security-amid-recent-attacks/ WBIF (s. a.): Digital Future. Western Balkans Investment Framework. Online: https://www.wbif.eu/sectors/digital-infrastructure Western Balkans Info Hub (2018): Digital Agenda for the Balkans – Digitalisation. Online: https://wbc-rti.info/theme/57#:~:text=The%20Digital%20Agenda%20for%20the,more%20jobs%2C%20and%20better%20services" ["copyrightYear"]=> int(2023) ["issueId"]=> int(534) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(6) "91-107" ["pub-id::doi"]=> string(23) "10.32565/aarms.2023.3.6" ["abstract"]=> array(1) { ["en_US"]=> string(1050) "

Digitalisation has been a top priority in the Western Balkans for the past decade. The European Union, recognising it as a driver of economic growth, is encouraging the countries of the region to invest in digital development from 2017. The necessary legislation has been adopted, the institutions responsible for this have been set up and developments have been launched to provide citizens with a wide range of services. At different times, all the countries in the region have set up their own e-public administration portals, which they are working to improve with their own resources and with the support of the European Union. A strong emphasis is being placed on developing the digital skills of the younger generation, as this kind of relationship between the state and its citizens will become the new norm for the generations to come. However, not only the citizens, but also economic operators will benefit from the transition, with reduced costs and faster turnaround times, which could also be an advantage for economic operators.

" } ["copyrightHolder"]=> array(1) { ["en_US"]=> string(14) "Ördögh Tibor" } ["title"]=> array(1) { ["en_US"]=> string(37) "Digitalisation in the Western Balkans" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#754 (6) { ["_data"]=> array(15) { ["id"]=> int(8354) ["email"]=> string(23) "ordogh.tibor@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6761) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Ördögh" ["hu_HU"]=> string(12) "Dr. Ördögh" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Tibor" ["hu_HU"]=> string(5) "Tibor" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(3) { [0]=> string(15) "Western-Balkans" [1]=> string(23) "e-public administration" [2]=> string(14) "digitalisation" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#787 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(30687) ["id"]=> int(5573) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6761) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#778 (6) { ["_data"]=> array(29) { ["id"]=> int(7047) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2023-11-16" ["lastModified"]=> string(19) "2023-11-20 12:40:59" ["primaryContactId"]=> int(8730) ["sectionId"]=> int(5) ["seq"]=> int(7) ["submissionId"]=> int(6923) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(5867) "Antara (2022): TNI Must Maintain Professionalism, Public Trust. Antara News, 06 October 2022. Online: https://en.antaranews.com/news/253589/tni-must-maintain-professionalismpublic-trust Barakat, Sultan – Zyck, Steven A. (2009): The Evolution of Post-Conflict Recovery. Third World Quarterly, 30(6), 1069–1086. Online: https://doi.org/10.1080/01436590903037333 Berger, Peter L. – Luckma nn, Thomas (1966): The Social Construction of Reality. A Treatise in the Sociology of Knowledge. New York: Doubleday & Company. Bland, Douglas L. (1999): A Unified Theory of Civil–Military Relations. Armed Forces and Society, 26(1), 7–25. Online: https://doi.org/10.1177/0095327X9902600102 Bryden, Alan – Hänggi, Heiner eds. (2005): Security Governance in Post-Conflict Peacebuilding. Geneva Centre for the Democratic Control of Armed Forces (DCAF). Burk, James (2002): Theories of Democratic Civil–Military Relations. Armed Forces and Society, 29(1), 7–29. Online: https://doi.org/10.1177/0095327X0202900102 Caspersz, D. – Wallis, J. (2006): The Role of the Military in Post-Conflict Peacebuilding: What Does the ‘New Agenda’ Mean for Inter-Agency Cooperation. Journal of Peace, Conflict, and Development, 8, 1–26. De Coning, Cedric (2017): Peace Enforcement in Africa: Doctrinal Distinctions between the African Union and United Nations. Contemporary Security Policy, 38(1), 145–160. Online: https://doi.org/10.1080/13523260.2017.1283108 De Groot, Tom – Regilme, Salvatore S. F. (2022): Private Military and Security Companies and the Militarization of Humanitarianism. Journal of Developing Societies, 38(1), 50–80. Online: https://doi.org/10.1177/0169796X211066874 Feaver , Peter D. (1999): Civil–Military Relations. Annual Review of Political Science, 2(1), 211–241. Online: https://doi.org/10.1146/annurev.polisci.2.1.211 Finer, Samuel E. (2002): The Man on Horseback. The Role of the Military in Politics. New Brunswick: Transaction Publishers. Franke, Volker (2006): The Peacebuilding Dilemma: Civil–Military Cooperation in Stability Operations. International Journal of Peace Studies, 11(2), 5–25. Galtung, Johan (1975a): Essays in Peace Research. Volume 1. Peace: Research – Education – Action. Copenhagen: Ejlers. Galtung, Johan (1975b): Three Approaches to Peace: Peacekeeping, Peacemaking, and Peacebuilding. In Essays in Peace Research. Volume II. Peace, War and Defense. Copenhagen: Ejlers. 282–304. Galtung, Johan (1997): Peace by Peaceful Means. Peace and Conflict, Development and Civilization. Oslo: International Peace Research Institute. Online: https://doi.org/10.4135/9781446221631 Glasl, Friedrich (1999): Confronting Conflict. A First-Aid Kit for Handling Conflict. Stroud: Hawthorn Press. Haspeslagh, Sophie – You suf, Zahbia eds. (2015): Local Engagement with Armed Groups. In the Midst of Violence. Online: https://rc-services-assets.s3.eu-west-1.amazonaws.com/s3fs-public/Local_engagement_with_armed_groups_in_the_midst_of_violence_Accord_Insight_2.pdf Hernawan, Budi J. – Indarti , Poengky (2008): The Practice of Torture in Aceh and Papua, 1998–2007: With an Annex on the Situation of Human Rights in Timor Leste. Report. Jakarta: SKP Jayapura. Human Rights Watch (2006): Too High a Price: The Human Rights Cost of the Indonesian Military’s Economic Activities. New York: Human Rights Watch. Huntington, Samuel P. (1985): The Soldier and the State. The Theory and Practice of Civil–Military Relations. Cambridge, Mass.: Belknap Press of Harvard University Press. Janowitz, Morris (1964): The Military in the Political Development of New Nations. Chicago: Chicago University Press. Kingma, Kees (1997): Demobilization of Combatants after Civil Wars in Africa and Their Reintegration into Civilian Life. Policy Sciences, 30(3), 151–165. Online: https://doi.org/10.1023/A:1004215705156 Koonings, Kees – Kru ijt, Dirk eds. (2002): Political Armies. The Military and Nation Building in the Age of Democracy. London: Zed Books. Laksmana, Evan (2011): Indonesian Military Reform, 1998–2011: A Retrospective. Security Challenges, 7(2), 63–83. Major, David M. (1999): From Peacekeeping to Peacebuilding: Theory, Cases, Experiments and Solutions. Online: https://www.researchgate.net/publication/262423503_From_Peacekeeping_to_Peacebuilding_Theory_Cases_Experiments_and_Solution/link/00b7d537b5a60edc2c000000/download Mietzner, Marcus (2006): The Politics of Military Reform in Post-Suharto Indonesia: Elite Conflict, Nationalism, and Institutional Resistance. Washington, D.C.: East–West Center. NATO Standard AJP-3.19 (2018): Allied Joint Doctrine for Civil–Military Cooperation. Brussels: NATO Standardization Office (NSO). Pugh, Michael – Cooper, Neil – Goodhand, Jonathan (2004): War Economies in a Regional Context. Overcoming the Economic and Social Legacies of Conflict. Boulder: Lynne Rienner Publishers. Rigby, Andrew (2006): Is There a Role for the Military in Peacebuilding? Online: https://www.c-r.org/downloads/review32.pdf Rukavishnikov, Vladimir O. – Pugh, Michael (2003): Civil–Military Relations. In Caforio, Giuseppe (ed.): Handbook of the Sociology of the Military. New York: Kluwer Academic. 131–150. Online: https://doi.org/10.1007/0-387-34576-0_8 Schiff, Rebecca L. (1995): Civil–Military Relations Reconsidered: A Theory of Concordance. Armed Forces and Society, 22(1), 7–24. Online: https://doi.org/10.1177/0095327X9502200101 Schulze , Kirsten E. (2007): Mission Not So Impossible. The Aceh Monitoring Mission and Lessons Learned for the EU. Stockholm: International Policy Analysis. Tadjbakhsh, Shahrbanou – Chenoy, Anuradha M. (2007): Human Security. Concepts and Implications. London – New York: Routledge. Online: https://doi.org/10.4324/9780203965955 Wall, James A. (1985): Negotiation: Theory and Practice. Glenview, IL: Pearson Scott Foresman." ["copyrightYear"]=> int(2023) ["issueId"]=> int(534) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(7) "109-123" ["pub-id::doi"]=> string(23) "10.32565/aarms.2023.3.7" ["abstract"]=> array(1) { ["en_US"]=> string(1735) "

This paper scrutinises the assimilation of the Indonesian National Armed Forces (Tentara Nasional Indonesia – TNI) into civilian structures to shape a harmonised civil–military cooperation (CIMIC) in post-conflict peacebuilding initiatives. Acting as a crucial state apparatus, the TNI confronts a spectrum of threats, upholds national integrity, and follows Law No. 34/2004 by promoting soft power in non-combative military operations. Notwithstanding concerns raised by peace activists regarding potential human rights breaches during armed interventions, peacebuilding heavily depends on trust-building, which is a key catalyst for stakeholder cooperation. In contradiction to activists’ apprehensions, 2022 surveys reveal an impressive public trust level of around 93% towards the TNI. This robust public confidence sets a promising stage for the active engagement of the TNI in peacebuilding. To ensure effective participation, the TNI must demonstrate human rights commitment and adaptability to civilian protocols and guarantee non-repressive methodologies in peace missions. Leveraging its soft power, the TNI can cultivate productive alliances with civil institutions via joint ventures under civilian supremacy within a regulated CIMIC construct. The theory of change offers a unique perspective on the intertwined dynamics of civil–military collaboration, public trust and soft military power in peacebuilding, steering state policy outcomes. These are shaped by the government’s ability to reshape military duties devoid of military overreach. In conclusion, civilian control over the military materialises through shared accountability in peacebuilding endeavours, encapsulated within the CIMIC framework.

" } ["copyrightHolder"]=> array(1) { ["en_US"]=> string(27) "Effendi Stephanus Yusuf Tri" } ["source"]=> array(1) { ["en_US"]=> string(0) "" } ["title"]=> array(1) { ["en_US"]=> string(137) "The Role of the Indonesian National Armed Forces (TNI) in Post-Conflict Peacebuilding: A Civil–Military Cooperation (CIMIC) Perspective" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#785 (6) { ["_data"]=> array(14) { ["id"]=> int(8730) ["email"]=> string(27) "stephanus.effendi@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7047) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "ID" ["orcid"]=> string(37) "https://orcid.org/0000-0002-0905-7316" ["url"]=> string(54) "https://www.researchgate.net/profile/Stephanus-Effendi" ["affiliation"]=> array(2) { ["en_US"]=> string(20) "Indonesian Air Force" ["hu_HU"]=> string(51) "a:1:{s:5:"en_US";s:25:"The Indonesian Air Force ";}" } ["biography"]=> array(1) { ["en_US"]=> string(2491) "

Stephanus Yusuf Tri Effendi is a military officer serving as a Captain in the Indonesian Air Force Headquarters Intelligence Staff. He holds a Master's degree from the University of Gadjah Mada, Indonesia, graduating in 2019. His multidisciplinary background, shaped by his military service and academic pursuit, has kindled a profound interest in international relations, military studies, and peace and conflict dynamics.

Stephanus is particularly drawn to the complex nexus of civil-military relations (CIMIC), a subject he plans to explore in his upcoming doctoral studies. His research aims to investigate the evolving role of the Indonesian military in non-traditional security challenges, particularly social conflicts, and post-conflict peacebuilding. His focus areas include the respectful implementation of the military's role within the ambit of the rule of law, trust-building, and harmonious cooperation between civil and military institutions.

Recognizing the intertwined nature of peace, security, and development, Stephanus is keen on promoting peacebuilding efforts that uphold human rights and prevent mass atrocities and crimes against humanity. His academic and professional work, fueled by a sense of duty and dedication, is centered around formulating strategies and practices that bridge the gap between military and civil institutions, fostering mutual trust, and paving the way for sustainable peace and development.

Stephanus' research agenda combines an extensive data collection approach involving case studies, interviews, questionnaires, and literature reviews. He aims to utilize the empirical data from social conflict cases in Indonesia over the last ten years to deepen the understanding of civil-military cooperation in peacebuilding.

With his interdisciplinary approach, Stephanus is determined to make significant contributions to the field, informing key stakeholders and policy-makers about the intricacies of civil-military cooperation in peacebuilding. His research will offer practical implications, shed light on novel perspectives, and provide strategies for civil-military cooperation in post-conflict peacebuilding.

As a committed researcher and professional, Stephanus is eager to explore these topics further, sharing his findings with the broader academic and military community, thereby enhancing the collective understanding and effectiveness of civil-military cooperation in peacebuilding efforts.

" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Effendi" ["hu_HU"]=> string(7) "Effendi" } ["givenName"]=> array(2) { ["en_US"]=> string(19) "Stephanus Yusuf Tri" ["hu_HU"]=> string(19) "Stephanus Yusuf Tri" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(14) "trust-building" [1]=> string(10) "soft-power" [2]=> string(13) "peacebuilding" [3]=> string(5) "CIMIC" [4]=> string(15) "social conflict" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#782 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(30688) ["id"]=> int(5574) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7047) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#793 (6) { ["_data"]=> array(28) { ["id"]=> int(6154) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2023-11-16" ["lastModified"]=> string(19) "2023-11-20 12:41:44" ["primaryContactId"]=> int(7549) ["sectionId"]=> int(5) ["seq"]=> int(8) ["submissionId"]=> int(6030) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(7929) "Ahmed, Omar (2020): Turkey May Have Reclaimed the Leadership of Sunni Islam from Saudi Arabia. Middle East Monitor, 30 July 2020. Online: https://www.middleeastmonitor.com/20200730-turkey-may-have-reclaimed-the-leadership-of-sunni-islam-from-saudiarabia/ Amiel, Sandrine (2019): French Fighter Jets Bomb Chadian Rebels in Support of Deby’s Regime. Euronews, 07 February 2019. Online: https://www.euronews.com/2019/02/07/frenchfighter-jets-bomb-chadian-rebels-in-support-of-deby-s-regime Butler, Daren – Gumrukcu , Tuvan (2019): Turkey Signs Maritime Boundaries Deal with Libya Amid Exploration Row. Reuters, 28 November 2019. Online: https://www.reuters.com/article/us-turkey-libya/turkey-signs-maritime-boundaries-deal-with-libya-amid-exploration-rowidUSKBN1Y213I Cammack, Perry – Dunne, Michele: Fueling Middle East Conflicts – or Dousing the Flames. Carnegie Endowment for International Peace, 23 October 2018. Online: https://carnegieendowment.org/2018/10/23/fueling-middle-east-conflicts-or-dousing-flamespub-77548 Chassany, Anne-Sylvaine – Saleh, Heba (2016): Three French Soldiers Killed in Helicopter Crash in Libya. Financial Times, 20 July 2016. Online: https://www.ft.com/content/eb86e8d8-4e6d-11e6-88c5-db83e98a590a Coskun, Orhan – Gumrukcu , Tuvan (2020): Turkey Ready for Fast Reconstruction in Conflicttorn Libya, Official Says. Reuters, 19 June 2020. Online: https://www.reuters.com/article/turkeylibya-security-idUSL8N2DW37O Dal, Emel Parlar (2018a): Assessing Turkey’s Changing Conflict Management Role after the Cold War: Actorness, Approaches and Tools. Third World Quarterly, 39(12), 2291–2314. Online: https://doi.org/10.1080/01436597.2018.1522956 Dal, Emel Parlar (2018b): Rising Powers in International Conflict Management: An Introduction. Third World Quarterly, 39(12), 2207–2221. Online: https://doi.org/10.1080/01436597.2018.1503048 Dixon, Robyn (2020): Russia’s Ally in Libya Is Battered by Defeats. But Moscow Has Wider Goals to Expand Its Influence. The Washington Post, 06 June 2020. Online: https://www.washingtonpost.com/world/europe/russia-libya-war-putin/2020/06/05/c3956bf4-a109-11ea-be06-af5514ee0385_story.html Dominioni, Irene (2020): Italy Refinances Immigration Agreement with Libya Amid Protests. Forbes, 18 July 2020. Online: https://www.forbes.com/sites/irenedominioni/2020/07/18/italyrefinances-immigration-agreement-with-libya-amid-protests/#88ab1a53c49a El-Gamaty, Guma (2018): Libya Conflict: Is France an Honest Broker? Middle East Eye, 29 May 2018. Online: https://www.middleeasteye.net/opinion/libya-conflict-france-honest-broker El Wardany, Salma (2019): Total Gets Libya’s Approval to Acquire Marathon Oil’s Assets. World Oil, 11 December 2019. Online: https://www.worldoil.com/news/2019/12/11/total-getslibya-s-approval-to-acquire-marathon-oil-s-assets Gall, Carlotta (2020): Turkey, Flexing Its Muscles, Will Send Troops to Libya. The New York Times, 02 January 2020. Online: https://www.nytimes.com/2020/01/02/world/europe/erdoganturkey-libya.html Goodman, Peter S. (2019): Turkey’s Long, Painful Economic Crisis Grinds On. The New York Times, 08 July 2019. Online: https://www.nytimes.com/2019/07/08/business/turkey-economycrisis.html Grand, Camille (2015): The French Experience: Sarkozy’s War? In Mue ller , Karl P. (ed.): Precision and Purpose. Airpower in the Libyan Civil War. Santa Monica: RAND Corporation. 183–204. Harkai, István (2017): Líbia – a beavatkozás dilemmái egy bukott államban [Libya – The Dilemmas of Intervention in a Failed State]. In Marsai, Viktor – Vogel, Dávid (eds.): Közel Afrikához [Close to Africa]. Budapest: Dialóg Campus. 123–137. Irish, John – Emmott, Robin (2020): France–Turkey Tensions Mount after NATO Naval Incident. Reuters, 07 July 2020. Online: https://www.reuters.com/article/us-nato-france-turkeyanalysis-idUSKBN2481K5 Jarry, Emmanuel (2018): France’s Sarkozy Told He Suspected of Taking Gaddafi Election Money. Reuters, 21 March 2018. Online: https://www.reuters.com/article/us-france-sarkozylibyaidUSKBN1GX0LR Lefèvre, Raphaël (2014): Commentary on Current Events. The Journal of North African Studies, 19(2), 268–273. Online: https://doi.org/10.1080/13629387.2014.898377 Lu, Lingyu – Thies, Cameron G. (2013): War, Rivalry, and State Building in the Middle East. Political Research Quarterly, 66(2), 239–253. Online: https://doi.org/10.1177/1065912912448538; DOI: https://doi.org/10.1177/1065912912448538 McDonald, Matt (2008): Securitization and the Construction of Security. European Journal of International Relations, 14(4), 563–587. Online: https://doi.org/10.1177/1354066108097553 Magdy, Samy (2020): US: Turkey-sent Syrian Fighters Generate Backlash in Libya. The Washington Post, 02 September 2020. Online: https://www.washingtonpost.com/world/middle_east/us-turkey-sent-syrian-fighters-generate-backlash-in-libya/2020/09/02/db9a148e-ed58-11ea-bd08-1b10132b458f_story.html Momtaz, Rym (2020): Macron Criticizes Turkey but Raises Prospect of Dialogue. Politico, 10 September 2020. Online: https://www.politico.eu/article/emmanuel-macron-calls-out-turkeywhile-extending-dialogue-branch/ Naar, Ismaeel (2020): Turkish Intelligence Agents, Foreign Fighters Arrive in Libya: Sources. Al Arabiya, 06 January 2020. Online: https://english.alarabiya.net/News/northafrica/2020/01/06/Turkish-intelligence-agents-foreign-fighters-arrive-in-Libya-Sources Peel, Michael – England, Andrew – Mallet, Victor – Pitel, Laura (2020): French Spat with Turkey over Libya Lays Bare European Divisions. Financial Times, 05 July 2020. Online: https://www.ft.com/content/3b85dd0e-1f2e-40b0-b44b-947b7f75a03e Pitel, Laura – Sheppard , David (2020): Turkey Fuels Regional Power Game over Mediterranean Gas Reserves. Financial Times, 18 July 2020. Online: https://www.ft.com/content/69a222d4-b37c-4e7e-86dc-4f96b226416d Pusztai, Wolfgang (2017): The Haftar–Russia Link and the Military Plan of the LNA. ISPI, 02 February 2017. Online: https://www.ispionline.it/it/pubblicazione/haftar-russia-link-andmilitary-plan-lna-16289 Ramani, Samuel (2020): Russia’s strategy in Libya. Royal United Services Institute (RUSI), 07 April 2020. Online: https://rusi.org/explore-our-research/publications/commentary/russias-strategy-libya Reynolds, James (2018): Marco Minniti: The Man Who Cut the Migrant Flow to Italy. BBC, 20 September 2018. Online: https://www.bbc.co.uk/news/world-europe-45575763 Saleh, Heba – Pitel, Laura – Foy, Henry (2020): Putin and Erdogan Call for Ceasefire in Warravaged Libya. Financial Times, 08 January 2020. Online: https://www.ft.com/content/823220de-3238-11ea-a329-0bcf87a328f2 Sertin, Carla (2020): ENI and Libya NOC’s Joint Venture Is Losing $9.4 mn Per Day. Oil and Gas Middle East, 02 February 2020. Online: https://www.oilandgasmiddleeast.com/drillingproduction/35946-eni-and-libya-nocs-joint-venture-is-losing-94mn-per-day Shevchenko, Vitaly (2014): Little Green Men or Russian Invaders? BBC, 11 March 2014. Online: https://www.bbc.com/news/world-europe-26532154 Sørli, E. Mirjam – Gleditsch, Nils P. – Strand, Håvard (2005): Why Is There so Much Conflict in the Middle East? The Journal of Conflict Resolution, 49(1), 141–165. Online: https://doi.org/10.1177/0022002704270824 Taylor , Paul (2019): France’s Double Game in Libya. Politico, 17 April 2019. Online: https://www.politico.eu/article/frances-double-game-in-libya-nato-un-khalifa-haftar/ Turak, Natasha (2020): Russian Mercenaries, a CIA-linked General and Lots of Oil: Explaining Libya’s War. CNBC, 29 January 2020. Online: https://www.cnbc.com/2020/01/29/libyas-warexplained-khalifa-haftar-oil-cuts-uae-airstrikes-and-russian-mercenaries.html Wezeman, Pieter D. – Fleura nt, Aude – Kuimo va, Alexandra – Tian, Nan – Wezeman, Siemon T. (2018): Trends in International Arms Transfers. SIPRI Fact Sheet, March 2018. Online: https://doi.org/10.55163/KFLQ6518" ["copyrightYear"]=> int(2023) ["issueId"]=> int(534) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(7) "125-135" ["pub-id::doi"]=> string(23) "10.32565/aarms.2023.3.8" ["abstract"]=> array(1) { ["en_US"]=> string(1504) "

This study offers a comparative perspective on four external states’ behavioural tendencies in contrast to their officially upheld ambitions witnessed throughout the past ten years in Libya. Sound promises on conflict resolution, mitigation and alleged alignment with R2P principles is of course nothing new in the international arena, nor is the fact that the parallel existence of selfish agendas constitute an “innovation”. Nevertheless, the case of failed reconciliation and stabilisation process of Libya despite seemingly massive international support offers a recent sphere for investigating the whole spectrum of underlying opposition among the external parties. What started out as a domestically rooted conflict, soon developed into an increasingly international one. After several attempts at the establishment of a truly unified government, interests have never got sufficiently close to each other. What this article sets out to expand on is a fundamentally balance of threats motivated geostrategic opposition, which was only seemingly centred around local key figures like Haftar, Sarraj or even influential tribal leaders. Numerous foreign stakeholders were acting against the very declarations and statements they themselves called their fellows to comply with via means of proxy actions and in hopes of capitalising on the advantages stemming from the status quo. This work discusses the means these states acted counter-productively against the Libyan conflict resolution.

" } ["copyrightHolder"]=> array(1) { ["en_US"]=> string(13) "Kása Bálint" } ["title"]=> array(1) { ["en_US"]=> string(161) "The Prevalence of External States’ Covert Interests over Overtly Emphasised International Conflict Resolution Agendas Throughout a Decade of Libyan Uncertainty" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#789 (6) { ["_data"]=> array(15) { ["id"]=> int(7549) ["email"]=> string(23) "balint.kasa@outlook.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6154) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-3658-416X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(52) "a:1:{s:5:"hu_HU";s:26:"Budapesti Corvinus Egyetem";}" } ["biography"]=> array(1) { ["en_US"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Kása" ["hu_HU"]=> string(5) "Kása" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Bálint" ["hu_HU"]=> string(7) "Bálint" } ["preferredPublicName"]=> array(1) { ["en_US"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(7) { [0]=> string(5) "Libya" [1]=> string(9) "proxy war" [2]=> string(17) "balance of threat" [3]=> string(6) "Russia" [4]=> string(6) "Turkey" [5]=> string(6) "France" [6]=> string(5) "Italy" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#795 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(30689) ["id"]=> int(5575) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6154) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF