Full Issue

Archive

object(Publication)#697 (6) { ["_data"]=> array(27) { ["id"]=> int(725) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-04-30" ["lastModified"]=> string(19) "2022-01-07 15:42:33" ["sectionId"]=> int(38) ["seq"]=> int(1) ["submissionId"]=> int(883) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(60) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(4) "5-12" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.1.1" ["abstract"]=> array(2) { ["en_US"]=> string(377) "

Many pros and cons arguments can be read about boot camps in terms of efficiency and application. My article reviews tragedies and deaths occurred in juvenile boot camps processing their background and causes. It is not my purpose to present boot camps in a negative light but to reveal circumstances of tragedies and on the basis of this to prevent their re-occurrence.

" ["hu_HU"]=> string(377) "

Many pros and cons arguments can be read about boot camps in terms of efficiency and application. My article reviews tragedies and deaths occurred in juvenile boot camps processing their background and causes. It is not my purpose to present boot camps in a negative light but to reveal circumstances of tragedies and on the basis of this to prevent their re-occurrence.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(46) "Juvenile Boot Camps in the Shadow of Tragedies" ["hu_HU"]=> string(46) "Juvenile Boot Camps in the Shadow of Tragedies" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#734 (6) { ["_data"]=> array(15) { ["id"]=> int(5799) ["email"]=> string(17) "csukaim@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(725) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Csukai" ["hu_HU"]=> string(6) "Csukai" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Magdolna" ["hu_HU"]=> string(8) "Magdolna" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#710 (6) { ["_data"]=> array(15) { ["id"]=> int(5800) ["email"]=> string(25) "ruzsonyi.peter@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(725) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Ruzsonyi" ["hu_HU"]=> string(8) "Ruzsonyi" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Péter" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(3) { [0]=> string(10) "boot camps" [1]=> string(14) "military drill" [2]=> string(9) "tragedies" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#746 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(8) { ["submissionFileId"]=> int(21286) ["id"]=> int(258) ["isApproved"]=> bool(true) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(725) ["seq"]=> int(0) ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#121 (6) { ["_data"]=> array(27) { ["id"]=> int(1192) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-04-30" ["lastModified"]=> string(19) "2022-01-07 15:41:54" ["sectionId"]=> int(38) ["seq"]=> int(2) ["submissionId"]=> int(1076) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(60) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "13-22" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.1.2" ["abstract"]=> array(2) { ["en_US"]=> string(547) "

The diversity of available technology challenges our organizations, leadership and (uniformed and civilian) co-workers day by day. Fiscal limits, conflicting technologies, constant need of unavailable knowledge and various other environmental factors may get centralized organizations with positional power in critical situations in our century. This article tries to bring to front some arguments why knowledge management should be considered as a key part of the necessary solution in avoiding new risks we shall face in the 21st century.

" ["hu_HU"]=> string(549) "

The diversity of available technology challenges our organizations, leadership and  (uniformed and civilian) co-workers day by day. Fiscal limits, conflicting technologies, constant need of unavailable knowledge and various other environmental factors may get centralized organizations with positional power in critical situations in our century. This article tries to bring to front some arguments why knowledge management should be considered as a key part of the necessary solution in avoiding new risks we shall face in the 21st century.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(89) "Thoughts on Technological Diversity and Knowledge Management in Centralised Organizations" ["hu_HU"]=> string(89) "Thoughts on Technological Diversity and Knowledge Management in Centralised Organizations" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#742 (6) { ["_data"]=> array(15) { ["id"]=> int(1227) ["email"]=> string(26) "koronvary.peter@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1192) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Koronváry" ["hu_HU"]=> string(10) "Koronváry" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Péter" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(1228) ["email"]=> string(23) "szegedi.peter@hm.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1192) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Szegedi" ["hu_HU"]=> string(7) "Szegedi" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Péter" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(10) "management" [1]=> string(10) "leadership" [2]=> string(23) "knowledge organization," [3]=> string(10) "technology" [4]=> string(21) "public administration" [5]=> string(8) "military" } ["en_US"]=> array(6) { [0]=> string(10) "management" [1]=> string(10) "leadership" [2]=> string(23) "knowledge organization," [3]=> string(10) "technology" [4]=> string(21) "public administration" [5]=> string(8) "military" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#762 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21285) ["id"]=> int(400) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1192) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(29) { ["id"]=> int(1228) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-04-30" ["lastModified"]=> string(19) "2021-11-17 16:35:40" ["sectionId"]=> int(38) ["seq"]=> int(3) ["submissionId"]=> int(1111) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(60) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "23-30" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.1.3" ["abstract"]=> array(2) { ["en_US"]=> string(622) "

Public Service Motivation (PSM) originates from psychology and it spreads in other disciplines such as public administration. PSM was developed in the USA and it is also applied in Europe. In this study, I investigated the connection between PSM, job satisfaction, red tape, and resignation satisfaction in case of a Mayor’s office of a district in Budapest. I had four hypotheses but I could prove only one. I found a significant connection between PSM factors and job satisfaction. These results may suggest that PSM could affect how public servants are satisfied with their job in the Hungarian public service.

" ["hu_HU"]=> string(622) "

Public Service Motivation (PSM) originates from psychology and it spreads in other disciplines such as public administration. PSM was developed in the USA and it is also applied in Europe. In this study, I investigated the connection between PSM, job satisfaction, red tape, and resignation satisfaction in case of a Mayor’s office of a district in Budapest. I had four hypotheses but I could prove only one. I found a significant connection between PSM factors and job satisfaction. These results may suggest that PSM could affect how public servants are satisfied with their job in the Hungarian public service.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(94) "Public Service Motivation (PSM) and Job Satisfaction in Case of Hungarian Local Public Service" ["hu_HU"]=> string(94) "Public Service Motivation (PSM) and Job Satisfaction in Case of Hungarian Local Public Service" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#744 (6) { ["_data"]=> array(15) { ["id"]=> int(1261) ["email"]=> string(18) "hvadaszg@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1228) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(16) "Hollósy-Vadász" ["hu_HU"]=> string(16) "Hollósy-Vadász" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Gábor" ["hu_HU"]=> string(6) "Gábor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(25) "Public Service Motivation" [1]=> string(11) "PSM factors" [2]=> string(16) "job satisfaction" [3]=> string(11) "correlation" [4]=> string(19) "regression analysis" [5]=> string(10) "motivators" } ["en_US"]=> array(6) { [0]=> string(25) "Public Service Motivation" [1]=> string(11) "PSM factors" [2]=> string(16) "job satisfaction" [3]=> string(11) "correlation" [4]=> string(19) "regression analysis" [5]=> string(10) "motivators" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#768 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19944) ["id"]=> int(427) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1228) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#189 (6) { ["_data"]=> array(29) { ["id"]=> int(1229) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-04-30" ["lastModified"]=> string(19) "2021-11-17 16:36:02" ["sectionId"]=> int(38) ["seq"]=> int(4) ["submissionId"]=> int(1112) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(60) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "31-44" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.1.4" ["abstract"]=> array(2) { ["en_US"]=> string(900) "

In international environments numerous different disaster management systems can be found, whose operation can be also varied because of their differences. Nowadays, there is no common, comprehensive analyzing model which could be adopted for describing and analyzing one state’s disaster management system. Through conclusions drawn during the analysis of foreign emergency managements, the different domestic disaster risk management methods can be improved. Hence, the phrase disaster management can be defined in several ways and those approaches determine the analyzation framework of the given country, as well. For a unified interpretation, a model needs to be created which promotes the descriptive analysis. Since the topic is actual, in this paper an analysis model is presented, which can be applied in international environments, and it can also be helpful for domestic research.

" ["hu_HU"]=> string(900) "

In international environments numerous different disaster management systems can be found, whose operation can be also varied because of their differences. Nowadays, there is no common, comprehensive analyzing model which could be adopted for describing and analyzing one state’s disaster management system. Through conclusions drawn during the analysis of foreign emergency managements, the different domestic disaster risk management methods can be improved. Hence, the phrase disaster management can be defined in several ways and those approaches determine the analyzation framework of the given country, as well. For a unified interpretation, a model needs to be created which promotes the descriptive analysis. Since the topic is actual, in this paper an analysis model is presented, which can be applied in international environments, and it can also be helpful for domestic research.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(63) "State-Level Analysis Aspects of Comparative Disaster Management" ["hu_HU"]=> string(63) "State-Level Analysis Aspects of Comparative Disaster Management" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#713 (6) { ["_data"]=> array(15) { ["id"]=> int(1262) ["email"]=> string(19) "papp.bend@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1229) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Papp" ["hu_HU"]=> string(4) "Papp" } ["givenName"]=> array(2) { ["en_US"]=> string(9) "Bendegúz" ["hu_HU"]=> string(9) "Bendegúz" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(16) "qualifying point" [1]=> string(14) "analysis level" [2]=> string(17) "theoretical model" [3]=> string(34) "international emergency management" } ["en_US"]=> array(4) { [0]=> string(16) "qualifying point" [1]=> string(14) "analysis level" [2]=> string(17) "theoretical model" [3]=> string(34) "international emergency management" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#747 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19945) ["id"]=> int(428) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1229) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#118 (6) { ["_data"]=> array(27) { ["id"]=> int(1230) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-04-30" ["lastModified"]=> string(19) "2021-11-17 16:36:21" ["sectionId"]=> int(38) ["seq"]=> int(5) ["submissionId"]=> int(1113) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(60) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "45-52" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.1.5" ["abstract"]=> array(2) { ["en_US"]=> string(1041) "

Handling emergencies caused by different environmental and civilization catastrophes, [1] (e.g. extreme weather, flood, severe industrial accidents involving dangerous substances, possible terror activities) is an ever-increasing challenge for damage control rescue entities. Efficient executing of these tasks requires ever increasing preparedness of intervention units, constant technical equipment development, introduction of new technical rescue tactics and complex intervention plans. Executing such a complex rescue plan is an extremely complicated task. At a given situation more units are to be coordinated in several  disaster areas (sites). Several special technical rescue tasks have to be pre-planned to increase the efficiency of the interventions. The authors would like to help these planning efforts by an originally developed proprietary force-unit calculation application (software) program, described in this article. The possible applications, technical requirements, detailed usage steps are also described.

" ["hu_HU"]=> string(1041) "

Handling emergencies caused by different environmental and civilization catastrophes, [1] (e.g. extreme weather, flood, severe industrial accidents involving dangerous substances, possible terror activities) is an ever-increasing challenge for damage control rescue entities. Efficient executing of these tasks requires ever increasing preparedness of intervention units, constant technical equipment development, introduction of new technical rescue tactics and complex intervention plans. Executing such a complex rescue plan is an extremely complicated task. At a given situation more units are to be coordinated in several  disaster areas (sites). Several special technical rescue tasks have to be pre-planned to increase the efficiency of the interventions. The authors would like to help these planning efforts by an originally developed proprietary force-unit calculation application (software) program, described in this article. The possible applications, technical requirements, detailed usage steps are also described.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(85) "Designing Complex Technical Rescues with a Proprietary Application (Computer Program)" ["hu_HU"]=> string(85) "Designing Complex Technical Rescues with a Proprietary Application (Computer Program)" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#775 (6) { ["_data"]=> array(15) { ["id"]=> int(5797) ["email"]=> string(20) "h12csaba@t-online.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1230) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Hajdu" ["hu_HU"]=> string(5) "Hajdu" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Csaba" ["hu_HU"]=> string(5) "Csaba" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#764 (6) { ["_data"]=> array(15) { ["id"]=> int(5798) ["email"]=> string(19) "kuti.rajmund@sze.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1230) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Kuti" ["hu_HU"]=> string(4) "Kuti" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Rajmund" ["hu_HU"]=> string(7) "Rajmund" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(24) "complex technical rescue" [1]=> string(24) "disaster relief planning" [2]=> string(22) "force-unit calculation" [3]=> string(63) "originally developed proprietary application (software) program" } ["en_US"]=> array(4) { [0]=> string(24) "complex technical rescue" [1]=> string(24) "disaster relief planning" [2]=> string(22) "force-unit calculation" [3]=> string(63) "originally developed proprietary application (software) program" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#769 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(19946) ["id"]=> int(429) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1230) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#766 (6) { ["_data"]=> array(29) { ["id"]=> int(1231) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-04-30" ["lastModified"]=> string(19) "2021-11-17 16:36:40" ["sectionId"]=> int(38) ["seq"]=> int(6) ["submissionId"]=> int(1114) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(60) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "53-70" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.1.6" ["abstract"]=> array(2) { ["en_US"]=> string(763) "

Today’s society is increasingly dependent on electricity and the armed forces also face this problem. In this regards the issue of providing electricity in field conditions when power lines are not available is extremely interesting. The technology of the generators used in the fields has developed only at a minimal level over the past half century while the demand for electricity has multiplied. Logistics becomes more and more difficult and fuel caravans are one of the most vulnerable parts of military actions. Smart grid technologies based on RES2 are no longer a novelty for civil engineering. How are these used in military environments and what are the limits of their application? These are the questions I would like to find some answers to.

" ["hu_HU"]=> string(763) "

Today’s society is increasingly dependent on electricity and the armed forces also face this problem. In this regards the issue of providing electricity in field conditions when power lines are not available is extremely interesting. The technology of the generators used in the fields has developed only at a minimal level over the past half century while the demand for electricity has multiplied. Logistics becomes more and more difficult and fuel caravans are one of the most vulnerable parts of military actions. Smart grid technologies based on RES2 are no longer a novelty for civil engineering. How are these used in military environments and what are the limits of their application? These are the questions I would like to find some answers to.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(27) "Global Challenges of Energy" ["hu_HU"]=> string(27) "Global Challenges of Energy" } ["title"]=> array(2) { ["en_US"]=> string(31) "Smart Military Electrical Grids" ["hu_HU"]=> string(31) "Smart Military Electrical Grids" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#772 (6) { ["_data"]=> array(15) { ["id"]=> int(1265) ["email"]=> string(23) "vegvari.zsolt@hm.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1231) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Végvári" ["hu_HU"]=> string(9) "Végvári" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Zsolt" ["hu_HU"]=> string(5) "Zsolt" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(11) "smart grids" [1]=> string(19) "hybrid power supply" [2]=> string(18) "field power supply" } ["en_US"]=> array(3) { [0]=> string(11) "smart grids" [1]=> string(19) "hybrid power supply" [2]=> string(18) "field power supply" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#781 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20023) ["id"]=> int(430) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1231) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#771 (6) { ["_data"]=> array(27) { ["id"]=> int(1232) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-04-30" ["lastModified"]=> string(19) "2021-11-17 16:37:04" ["sectionId"]=> int(38) ["seq"]=> int(7) ["submissionId"]=> int(1115) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(60) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "71-86" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.1.7" ["abstract"]=> array(2) { ["en_US"]=> string(1176) "

Africa is a high priority region to the European Union. Therefore, the European Union Launched independent missions in the unstable regions of the African continent regularly since 2003, in order to restraint and eliminate local conflicts and prepare local armed forces for mission. Hungary was involved in a wide range of tasks in recent years from June 2005. We contributed to the success of these missions, our soldiers served on the highest respectable level among others in the Darfur, Congo, Chadian, Somali and Mali operations as well as in the elimination of piracy in this region. After all, it is likely that the European Union will continuously count on our country’s participation in its peacesupporting missions. In the study I would like to present nine major operations, and the ultimately cancelled Libyan mission. I detail the case-specific objectives and implementation through first-hand experience, which was gained during my deployment. As far as Hungary is concerned, I wish to demonstrate the Hungarian soldiers’ admirable work during these missions, besides, I would like to concentrate on the background and conditions of our participation.

" ["hu_HU"]=> string(1176) "

Africa is a high priority region to the European Union. Therefore, the European Union Launched independent missions in the unstable regions of the African continent regularly since 2003, in order to restraint and eliminate local conflicts and prepare local armed forces for mission. Hungary was involved in a wide range of tasks in recent years from June 2005. We contributed to the success of these missions, our soldiers served on the highest respectable level among others in the Darfur, Congo, Chadian, Somali and Mali operations as well as in the elimination of piracy in this region. After all, it is likely that the European Union will continuously count on our country’s participation in its peacesupporting missions. In the study I would like to present nine major operations, and the ultimately cancelled Libyan mission. I detail the case-specific objectives and implementation through first-hand experience, which was gained during my deployment. As far as Hungary is concerned, I wish to demonstrate the Hungarian soldiers’ admirable work during these missions, besides, I would like to concentrate on the background and conditions of our participation.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(65) "Hungarian Participation in the EU-Led African Military Operations" ["hu_HU"]=> string(65) "Hungarian Participation in the EU-Led African Military Operations" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#773 (6) { ["_data"]=> array(15) { ["id"]=> int(1266) ["email"]=> string(23) "besenyo.janos@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1232) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Besenyő" ["hu_HU"]=> string(8) "Besenyő" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "János" ["hu_HU"]=> string(6) "János" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(14) "European Union" [1]=> string(12) "peacekeeping" [2]=> string(6) "piracy" [3]=> string(21) "humanitarian activity" [4]=> string(17) "military training" } ["en_US"]=> array(5) { [0]=> string(14) "European Union" [1]=> string(12) "peacekeeping" [2]=> string(6) "piracy" [3]=> string(21) "humanitarian activity" [4]=> string(17) "military training" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#777 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20024) ["id"]=> int(431) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1232) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#784 (6) { ["_data"]=> array(28) { ["id"]=> int(1233) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-04-30" ["lastModified"]=> string(19) "2022-01-07 15:41:13" ["sectionId"]=> int(38) ["seq"]=> int(8) ["submissionId"]=> int(1116) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(60) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(6) "87-140" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.1.8" ["abstract"]=> array(2) { ["en_US"]=> string(1999) "

The research question and problem statement I posed to answer simply has been: what kind of patterns and specific discourses can be identified around the keywords of “information  security” and “social construction” in information systems and its related reference fields such as social sciences, management studies, decision sciences extended to psychology. We may start summarizing the conclusions by stating that “information security” and “social construction” in the SCOPUS domain offers a wide range of literature in the social sciences and related subject areas; the initial search resulted in 406 article hits, whose basic bibliographic parameters with keywords and abstracts were downloaded. I categorized this sample according to the journals H-index, the Scimago Journal & Country Rank (SJR) Q1‒Q4 ranking and the individual papers’ citations, into five—socalled structural—clusters. Three papers were identified as the highest referenced and most influential, and analysed separately. The other were clustered as follows: 30 papers were classified into CL1, a high impact cluster due to its high citation and H-index, 122 papers were grouped into CL2, a mature cluster, due to their publishing date and medium referencing, 71 papers fell into CL3, a high potential cluster, due to their high H-index and recent appearance and, finally 152 papers were clustered into CL4, the mainstream of the sample due to their medium impact and wide spread of publishing dates. These clusters were further analysed with basic text mining techniques: word counting, key word analysis, textual clusters and N-Gram analysis, and concordance analysis. I found that clusters are different as far as the academic discourse on information security evolves, and each contain unique added value to the social construction of information security amongst users, institutions, technology and public policy. Finally, conclusion and further research opportunities are presented.

" ["hu_HU"]=> string(1999) "

The research question and problem statement I posed to answer simply has been: what kind of patterns and specific discourses can be identified around the keywords of “information  security” and “social construction” in information systems and its related reference fields such as social sciences, management studies, decision sciences extended to psychology. We may start summarizing the conclusions by stating that “information security” and “social construction” in the SCOPUS domain offers a wide range of literature in the social sciences and related subject areas; the initial search resulted in 406 article hits, whose basic bibliographic parameters with keywords and abstracts were downloaded. I categorized this sample according to the journals H-index, the Scimago Journal & Country Rank (SJR) Q1‒Q4 ranking and the individual papers’ citations, into five—socalled structural—clusters. Three papers were identified as the highest referenced and most influential, and analysed separately. The other were clustered as follows: 30 papers were classified into CL1, a high impact cluster due to its high citation and H-index, 122 papers were grouped into CL2, a mature cluster, due to their publishing date and medium referencing, 71 papers fell into CL3, a high potential cluster, due to their high H-index and recent appearance and, finally 152 papers were clustered into CL4, the mainstream of the sample due to their medium impact and wide spread of publishing dates. These clusters were further analysed with basic text mining techniques: word counting, key word analysis, textual clusters and N-Gram analysis, and concordance analysis. I found that clusters are different as far as the academic discourse on information security evolves, and each contain unique added value to the social construction of information security amongst users, institutions, technology and public policy. Finally, conclusion and further research opportunities are presented.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(57) "Review of Journals for Theory and Advanced Research Desig" ["hu_HU"]=> string(57) "Review of Journals for Theory and Advanced Research Desig" } ["title"]=> array(2) { ["en_US"]=> string(86) "Application of Science‒Technology‒Society Studies in Information Security Research" ["hu_HU"]=> string(86) "Application of Science‒Technology‒Society Studies in Information Security Research" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#785 (6) { ["_data"]=> array(15) { ["id"]=> int(1267) ["email"]=> string(27) "nemeslaki.andras@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1233) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Nemeslaki" ["hu_HU"]=> string(9) "Nemeslaki" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "András" ["hu_HU"]=> string(7) "András" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(20) "information security" [1]=> string(19) "social construction" [2]=> string(20) "SCOPUS data analysis" [3]=> string(11) "text mining" [4]=> string(17) "literature review" } ["en_US"]=> array(5) { [0]=> string(20) "information security" [1]=> string(19) "social construction" [2]=> string(20) "SCOPUS data analysis" [3]=> string(11) "text mining" [4]=> string(17) "literature review" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#786 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21284) ["id"]=> int(432) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1233) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF