Full Issue

Archive

object(Publication)#705 (6) { ["_data"]=> array(27) { ["id"]=> int(1168) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2021-11-18 16:42:47" ["sectionId"]=> int(38) ["seq"]=> int(1) ["submissionId"]=> int(1052) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(4) "5-18" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.3.1" ["abstract"]=> array(2) { ["en_US"]=> string(781) "

This research is aimed at identifying the role of petroleum revenues in the Kurdistan Region for better economic efficiency and sovereignty of the Kurdistan Region in the future. This study identifies some root causes of deficiency of revenue usage generally, as well as specific causes in the Kurdistan Region. Further, the study looks at the various factors that affect oil production in the Kurdistan Region and compares it to the Federal Government. This study seeks to show how the Kurdistan Region generates the oil reserves regionally, despite the difficulties it encounters with the Federal Government due to the constitutional ambiguity. The research analysis concludes the importance of energy efficiency for the Kurdistan Region both economically and politically.

" ["hu_HU"]=> string(781) "

This research is aimed at identifying the role of petroleum revenues in the Kurdistan Region for better economic efficiency and sovereignty of the Kurdistan Region in the future. This study identifies some root causes of deficiency of revenue usage generally, as well as specific causes in the Kurdistan Region. Further, the study looks at the various factors that affect oil production in the Kurdistan Region and compares it to the Federal Government. This study seeks to show how the Kurdistan Region generates the oil reserves regionally, despite the difficulties it encounters with the Federal Government due to the constitutional ambiguity. The research analysis concludes the importance of energy efficiency for the Kurdistan Region both economically and politically.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(51) "The Politics of Oil in the Kurdistan Region of Iraq" ["hu_HU"]=> string(51) "The Politics of Oil in the Kurdistan Region of Iraq" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#740 (6) { ["_data"]=> array(15) { ["id"]=> int(1198) ["email"]=> string(24) "paiman.ramazan@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1168) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "IQ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Ahmad" ["hu_HU"]=> string(5) "Ahmad" } ["givenName"]=> array(2) { ["en_US"]=> string(14) "Paiman Ramazan" ["hu_HU"]=> string(14) "Paiman Ramazan" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(16) "Kurdistan Region" [1]=> string(25) "Federal Government (Iraq)" [2]=> string(14) "oil production" [3]=> string(20) "international legacy" [4]=> string(22) "constitutional dispute" } ["en_US"]=> array(5) { [0]=> string(16) "Kurdistan Region" [1]=> string(25) "Federal Government (Iraq)" [2]=> string(14) "oil production" [3]=> string(20) "international legacy" [4]=> string(22) "constitutional dispute" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#753 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20045) ["id"]=> int(376) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1168) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF

Combating Cyber Crime

Antoliš Krunoslav, Varjačić Ivančica, Jelenski Mario
doi: 10.32565/aarms.2018.3.2
19-46.
object(Publication)#119 (6) { ["_data"]=> array(27) { ["id"]=> int(1169) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2022-01-07 15:56:23" ["sectionId"]=> int(38) ["seq"]=> int(2) ["submissionId"]=> int(1053) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "19-46" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.3.2" ["abstract"]=> array(2) { ["en_US"]=> string(584) "

Life in a modern society is determined by strategic drivers, the most important of which are the Internet and Information and Communication Technology (ICT). Their use is one that contributes to global development and enables it to be balanced globally. The sustainability of this development is directly dependent on the degree of Internet misuse and the misuse of ICT. That is why we are discussing computer criminality through the example of Croatia. In the second part, we analyse the misuse of new ICT and the ways and possibilities of legitimate opposition to ICT abuses.

" ["hu_HU"]=> string(584) "

Life in a modern society is determined by strategic drivers, the most important of which are the Internet and Information and Communication Technology (ICT). Their use is one that contributes to global development and enables it to be balanced globally. The sustainability of this development is directly dependent on the degree of Internet misuse and the misuse of ICT. That is why we are discussing computer criminality through the example of Croatia. In the second part, we analyse the misuse of new ICT and the ways and possibilities of legitimate opposition to ICT abuses.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(21) "Combating Cyber Crime" ["hu_HU"]=> string(21) "Combating Cyber Crime" } ["locale"]=> string(5) "en_US" ["authors"]=> array(3) { [0]=> object(Author)#749 (6) { ["_data"]=> array(15) { ["id"]=> int(1199) ["email"]=> string(15) "kantolis@fkz.hr" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1169) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HR" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Antoliš" ["hu_HU"]=> string(8) "Antoliš" } ["givenName"]=> array(2) { ["en_US"]=> string(9) "Krunoslav" ["hu_HU"]=> string(9) "Krunoslav" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#772 (6) { ["_data"]=> array(15) { ["id"]=> int(1200) ["email"]=> string(16) "ivarjacic@mup.hr" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1169) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HR" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Varjačić" ["hu_HU"]=> string(10) "Varjačić" } ["givenName"]=> array(2) { ["en_US"]=> string(9) "Ivančica" ["hu_HU"]=> string(9) "Ivančica" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#726 (6) { ["_data"]=> array(15) { ["id"]=> int(1201) ["email"]=> string(24) "mario.jelenski@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1169) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HR" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Jelenski" ["hu_HU"]=> string(8) "Jelenski" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Mario" ["hu_HU"]=> string(5) "Mario" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(8) "Internet" [1]=> string(3) "ICT" [2]=> string(5) "abuse" [3]=> string(6) "misuse" [4]=> string(11) "cyber crime" } ["en_US"]=> array(5) { [0]=> string(8) "Internet" [1]=> string(3) "ICT" [2]=> string(5) "abuse" [3]=> string(6) "misuse" [4]=> string(11) "cyber crime" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#769 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21296) ["id"]=> int(377) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1169) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#185 (6) { ["_data"]=> array(27) { ["id"]=> int(1170) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2021-11-18 16:26:43" ["sectionId"]=> int(38) ["seq"]=> int(3) ["submissionId"]=> int(1054) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "47-62" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.3.3" ["abstract"]=> array(2) { ["en_US"]=> string(791) "

Today, terrorism is one of the most significant security risks. The spread of infocommunication technologies (ICT) resulted in new types of challenges. Innovation in ICT tools represents new means that terrorists, law enforcement and armed forces have to face. Some of the actions on different platforms of social media can be included here, which can be considered a challenge for all these organizations trying to adapt to them. Today we cannot talk about cyberterrorists and cyberterrorism, nevertheless this does not mean that terrorists would not use the cyberspace or that this platform would not mean a significant threat. This study aims to examine the correlation between social media and terrorism, including psychological operations and intelligence to several other areas.

" ["hu_HU"]=> string(791) "

Today, terrorism is one of the most significant security risks. The spread of infocommunication technologies (ICT) resulted in new types of challenges. Innovation in ICT tools represents new means that terrorists, law enforcement and armed forces have to face. Some of the actions on different platforms of social media can be included here, which can be considered a challenge for all these organizations trying to adapt to them. Today we cannot talk about cyberterrorists and cyberterrorism, nevertheless this does not mean that terrorists would not use the cyberspace or that this platform would not mean a significant threat. This study aims to examine the correlation between social media and terrorism, including psychological operations and intelligence to several other areas.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(26) "Social Media and Terrorism" ["hu_HU"]=> string(26) "Social Media and Terrorism" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#750 (6) { ["_data"]=> array(15) { ["id"]=> int(1202) ["email"]=> string(24) "banyasz.peter@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1170) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Bányász" ["hu_HU"]=> string(9) "Bányász" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Péter" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(9) "terrorism" [1]=> string(12) "social media" [2]=> string(13) "Islamic State" [3]=> string(6) "PSYOPS" [4]=> string(5) "OSINT" [5]=> string(18) "social engineering" } ["en_US"]=> array(6) { [0]=> string(9) "terrorism" [1]=> string(12) "social media" [2]=> string(13) "Islamic State" [3]=> string(6) "PSYOPS" [4]=> string(5) "OSINT" [5]=> string(18) "social engineering" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#771 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(20047) ["id"]=> int(378) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1170) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(27) { ["id"]=> int(1180) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2022-02-15 11:27:53" ["sectionId"]=> int(38) ["seq"]=> int(4) ["submissionId"]=> int(1064) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "63-70" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.3.4" ["abstract"]=> array(2) { ["en_US"]=> string(950) "

After the Second World War, hundreds of thousands of young Hungarians became prisoners of war (POW). Most of them were transported to the east, to the Soviet Union, but still large numbers were captured by French, British or American troops after the collapse of the Third Reich. Hungarians and Germans joined the French Foreign Legion (FFL) in large numbers due to the terrible living conditions of the prison camps. Thousands of former Honvéd soldiers and members of the Hungarian Royal Levente Movement joined the Légion Étrangère to escape those camps, just to die for France in Indochina, from the mountains of Cao Bang to the fields of Dien Bien Phu. This period of the FFL is less researched than the well-known “périod hongrois” (Hungarian Period), the wave of refugees after the ill-fated 1956 Revolution. This article is about those young men, who went from a war to another just to fight on an even more lethal battlefield.

" ["hu_HU"]=> string(950) "

After the Second World War, hundreds of thousands of young Hungarians became prisoners of war (POW). Most of them were transported to the east, to the Soviet Union, but still large numbers were captured by French, British or American troops after the collapse of the Third Reich. Hungarians and Germans joined the French Foreign Legion (FFL) in large numbers due to the terrible living conditions of the prison camps. Thousands of former Honvéd soldiers and members of the Hungarian Royal Levente Movement joined the Légion Étrangère to escape those camps, just to die for France in Indochina, from the mountains of Cao Bang to the fields of Dien Bien Phu. This period of the FFL is less researched than the well-known “périod hongrois” (Hungarian Period), the wave of refugees after the ill-fated 1956 Revolution. This article is about those young men, who went from a war to another just to fight on an even more lethal battlefield.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(43) "Hungarians Fighting for France in Indochina" ["hu_HU"]=> string(43) "Hungarians Fighting for France in Indochina" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#748 (6) { ["_data"]=> array(15) { ["id"]=> int(1211) ["email"]=> string(30) "harangi-toth.zoltan@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1180) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(13) "Harangi-Tóth" ["hu_HU"]=> string(13) "Harangi-Tóth" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Zoltán" ["hu_HU"]=> string(7) "Zoltán" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(26) "Hungarian prisoners of war" [1]=> string(21) "French Foreign Legion" [2]=> string(13) "Indochina war" } ["en_US"]=> array(3) { [0]=> string(26) "Hungarian prisoners of war" [1]=> string(21) "French Foreign Legion" [2]=> string(13) "Indochina war" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#754 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4687) ["id"]=> int(386) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1180) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#116 (6) { ["_data"]=> array(27) { ["id"]=> int(1182) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2022-02-15 11:29:57" ["sectionId"]=> int(38) ["seq"]=> int(5) ["submissionId"]=> int(1066) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(5) "71-82" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.3.5" ["abstract"]=> array(2) { ["en_US"]=> string(1485) "

Alongside with the appearance of the so far unknown reality called cyberspace, the new conditions of the course of conflicts emerged, consequently both the scientists as well as practitioners started to use the term cyber conflict. Unfortunately, presently there is no consistent, common view concerning a cyber conflict.
The article presents a theoretical basis of cyber conflicts based on the research carried out by the authors. The article itself is an added value since it provides the suggestion and explanation of the perspective for the understanding of cyber conflicts through the prism of Gerasimov’s perception of a contemporary conflict. Moreover, it presents a new definition of a cyber conflict as the process being the system of activities. The authors also present the stages of a conflict according to Gerasimov, as well as the structure of a cyber conflict. Additionally, the article envisages the aspects of Russian attitude to conflict solving which are worth paying attention to. The presented article offers the perspective of the Russian understanding of the resolution of conflicts, it bridges the gap in research on cyber conflicts as well as assures a strong theoretical basis for the understanding of a Russian point of view on the solution of contemporary conflicts, which might be useful for counteracting cyber conflicts. The authors hold the view that the article is the incentive for further research on cyber conflicts during competition.

" ["hu_HU"]=> string(1485) "

Alongside with the appearance of the so far unknown reality called cyberspace, the new conditions of the course of conflicts emerged, consequently both the scientists as well as practitioners started to use the term cyber conflict. Unfortunately, presently there is no consistent, common view concerning a cyber conflict.
The article presents a theoretical basis of cyber conflicts based on the research carried out by the authors. The article itself is an added value since it provides the suggestion and explanation of the perspective for the understanding of cyber conflicts through the prism of Gerasimov’s perception of a contemporary conflict. Moreover, it presents a new definition of a cyber conflict as the process being the system of activities. The authors also present the stages of a conflict according to Gerasimov, as well as the structure of a cyber conflict. Additionally, the article envisages the aspects of Russian attitude to conflict solving which are worth paying attention to. The presented article offers the perspective of the Russian understanding of the resolution of conflicts, it bridges the gap in research on cyber conflicts as well as assures a strong theoretical basis for the understanding of a Russian point of view on the solution of contemporary conflicts, which might be useful for counteracting cyber conflicts. The authors hold the view that the article is the incentive for further research on cyber conflicts during competition.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(104) "Comprehending Gerasimov’s Perception of a Contemporary Conflict – The Way to Prevent Cyber Conflicts" ["hu_HU"]=> string(104) "Comprehending Gerasimov’s Perception of a Contemporary Conflict – The Way to Prevent Cyber Conflicts" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#775 (6) { ["_data"]=> array(15) { ["id"]=> int(1213) ["email"]=> string(28) "r.janczewski@akademia.mil.pl" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1182) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "PL" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Janczewski" ["hu_HU"]=> string(10) "Janczewski" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Robert" ["hu_HU"]=> string(6) "Robert" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#778 (6) { ["_data"]=> array(15) { ["id"]=> int(1214) ["email"]=> string(26) "g.pilarski@akademia.mil.pl" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1182) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "PL" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Pilarski" ["hu_HU"]=> string(8) "Pilarski" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Grzegorz" ["hu_HU"]=> string(8) "Grzegorz" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(9) "component" [1]=> string(22) "cybernetic environment" [2]=> string(21) "information processes" [3]=> string(20) "Signals Intelligence" [4]=> string(22) "information processing" } ["en_US"]=> array(5) { [0]=> string(9) "component" [1]=> string(22) "cybernetic environment" [2]=> string(21) "information processes" [3]=> string(20) "Signals Intelligence" [4]=> string(22) "information processing" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#777 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4691) ["id"]=> int(388) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1182) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#120 (6) { ["_data"]=> array(27) { ["id"]=> int(1184) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2022-02-15 11:30:49" ["sectionId"]=> int(38) ["seq"]=> int(6) ["submissionId"]=> int(1068) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(6) "83-100" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.3.6" ["abstract"]=> array(2) { ["en_US"]=> string(746) "

Cyberspace is an environment in which cyber-attacks can be committed. Fraudulent attacks are one of the oldest cyber-attacks of all. The aim of this article is to familiarize the reader with the evolution of phishing and Business Email Compromise (BEC) attacks that occurred to a large extent in the cyberspace of the Czech Republic from 2014 to 2018. The article describes scam, phishing and BEC definitions, as well as individual ways of implementing specific attacks. Special attention is also paid to the possible criminal liability of the attacker for the described cyber-attacks, both according to the international legal regulations (enshrined in the Convention on Cybercrime) and according to the legislation of the Czech Republic.

" ["hu_HU"]=> string(746) "

Cyberspace is an environment in which cyber-attacks can be committed. Fraudulent attacks are one of the oldest cyber-attacks of all. The aim of this article is to familiarize the reader with the evolution of phishing and Business Email Compromise (BEC) attacks that occurred to a large extent in the cyberspace of the Czech Republic from 2014 to 2018. The article describes scam, phishing and BEC definitions, as well as individual ways of implementing specific attacks. Special attention is also paid to the possible criminal liability of the attacker for the described cyber-attacks, both according to the international legal regulations (enshrined in the Convention on Cybercrime) and according to the legislation of the Czech Republic.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(83) "Evolution of Phishing and Business Email Compromise Campaigns in the Czech Republic" ["hu_HU"]=> string(83) "Evolution of Phishing and Business Email Compromise Campaigns in the Czech Republic" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#787 (6) { ["_data"]=> array(15) { ["id"]=> int(1216) ["email"]=> string(20) "jan.kolouch@ambis.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1184) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Kolouch" ["hu_HU"]=> string(7) "Kolouch" } ["givenName"]=> array(2) { ["en_US"]=> string(3) "Jan" ["hu_HU"]=> string(3) "Jan" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(7) { [0]=> string(4) "scam" [1]=> string(8) "phishing" [2]=> string(25) "Business Email Compromise" [3]=> string(10) "cybercrime" [4]=> string(11) "cyberattack" [5]=> string(10) "fake email" [6]=> string(9) "execution" } ["en_US"]=> array(7) { [0]=> string(4) "scam" [1]=> string(8) "phishing" [2]=> string(25) "Business Email Compromise" [3]=> string(10) "cybercrime" [4]=> string(11) "cyberattack" [5]=> string(10) "fake email" [6]=> string(9) "execution" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#789 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4695) ["id"]=> int(390) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1184) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#779 (6) { ["_data"]=> array(27) { ["id"]=> int(1185) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2022-01-07 15:57:09" ["sectionId"]=> int(38) ["seq"]=> int(7) ["submissionId"]=> int(1069) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "101-114" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.3.7" ["abstract"]=> array(2) { ["en_US"]=> string(830) "

Targeted attacks cause the most serious problems nowadays in the cyberspace, as in most cases they are used for cyber espionage, in cyber warfare activities and have a significant role in data leaks both in the governmental and private sector. Meanwhile, it is very difficult to detect such attacks in time, due to the strategy, tactics and chosen tools behind them. Therefore, a new way of cyber defense is needed to reduce risk caused by Advanced Persistent Threat (APT). In this paper we review the process of targeted cyberattacks, focusing on the challenges of authentication, then we introduce user behavior analytics (UBA) as a potential countermeasure. We also emphasize through a case study, how devastating a cyberattack can be for a company and why UBA would be a good candidate in a modern cyber defense system.

" ["hu_HU"]=> string(830) "

Targeted attacks cause the most serious problems nowadays in the cyberspace, as in most cases they are used for cyber espionage, in cyber warfare activities and have a significant role in data leaks both in the governmental and private sector. Meanwhile, it is very difficult to detect such attacks in time, due to the strategy, tactics and chosen tools behind them. Therefore, a new way of cyber defense is needed to reduce risk caused by Advanced Persistent Threat (APT). In this paper we review the process of targeted cyberattacks, focusing on the challenges of authentication, then we introduce user behavior analytics (UBA) as a potential countermeasure. We also emphasize through a case study, how devastating a cyberattack can be for a company and why UBA would be a good candidate in a modern cyber defense system.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(59) "Analysis of Cyberattack Patterns by User Behavior Analytics" ["hu_HU"]=> string(59) "Analysis of Cyberattack Patterns by User Behavior Analytics" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#792 (6) { ["_data"]=> array(15) { ["id"]=> int(1217) ["email"]=> string(25) "krasznay.csaba@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1185) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Krasznay" ["hu_HU"]=> string(8) "Krasznay" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Csaba" ["hu_HU"]=> string(5) "Csaba" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#784 (6) { ["_data"]=> array(15) { ["id"]=> int(1218) ["email"]=> string(19) "hamornik@erg.bme.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1185) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Hámornik" ["hu_HU"]=> string(9) "Hámornik" } ["givenName"]=> array(2) { ["en_US"]=> string(14) "Balázs Péter" ["hu_HU"]=> string(14) "Balázs Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(23) "user behavior analytics" [1]=> string(11) "cyberattack" [2]=> string(15) "targeted attack" [3]=> string(14) "authentication" } ["en_US"]=> array(4) { [0]=> string(23) "user behavior analytics" [1]=> string(11) "cyberattack" [2]=> string(15) "targeted attack" [3]=> string(14) "authentication" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#785 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21297) ["id"]=> int(391) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1185) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#783 (6) { ["_data"]=> array(27) { ["id"]=> int(1187) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2022-02-15 11:31:26" ["sectionId"]=> int(38) ["seq"]=> int(8) ["submissionId"]=> int(1071) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "115-130" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.3.8" ["abstract"]=> array(2) { ["en_US"]=> string(814) "

Although the Czech Republic belongs to the most “internetised” countries in the world, its information and communication security policy (as well as the protection of the critical information infrastructure) lagged behind for a relatively long time, when compared to most of the remaining European countries. Building the hierarchy regarding the umbrella teams of the Cybernetic Emergency Response Teams (CERT) and Computer Security Incident Response Teams (CSIRT) type (regardless of whether we call them governmental, national or otherwise) was unthinkable without the contribution of the private sector that substituted many functions of the state in this field. The whole process can be understood as an interaction of international and national pressures appealing to the solution of the situation.

" ["hu_HU"]=> string(814) "

Although the Czech Republic belongs to the most “internetised” countries in the world, its information and communication security policy (as well as the protection of the critical information infrastructure) lagged behind for a relatively long time, when compared to most of the remaining European countries. Building the hierarchy regarding the umbrella teams of the Cybernetic Emergency Response Teams (CERT) and Computer Security Incident Response Teams (CSIRT) type (regardless of whether we call them governmental, national or otherwise) was unthinkable without the contribution of the private sector that substituted many functions of the state in this field. The whole process can be understood as an interaction of international and national pressures appealing to the solution of the situation.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(139) "Milestones Related to the Development of Organizational Aspects of Cybersecurity and Protection against Cyber-Threats in the Czech Republic" ["hu_HU"]=> string(139) "Milestones Related to the Development of Organizational Aspects of Cybersecurity and Protection against Cyber-Threats in the Czech Republic" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#788 (6) { ["_data"]=> array(15) { ["id"]=> int(1220) ["email"]=> string(15) "krulik@polac.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1187) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Krulík" ["hu_HU"]=> string(7) "Krulík" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Oldřich" ["hu_HU"]=> string(8) "Oldřich" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(10) "CERT/CSIRT" [1]=> string(45) "information and communication security policy" [2]=> string(46) "critical information infrastructure protection" [3]=> string(8) "measures" [4]=> string(15) "recommendations" } ["en_US"]=> array(5) { [0]=> string(10) "CERT/CSIRT" [1]=> string(45) "information and communication security policy" [2]=> string(46) "critical information infrastructure protection" [3]=> string(8) "measures" [4]=> string(15) "recommendations" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#798 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4700) ["id"]=> int(393) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1187) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#780 (6) { ["_data"]=> array(27) { ["id"]=> int(1188) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2022-02-15 11:32:01" ["sectionId"]=> int(38) ["seq"]=> int(9) ["submissionId"]=> int(1072) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "131-148" ["pub-id::doi"]=> string(23) "10.32565/aarms.2018.3.9" ["abstract"]=> array(2) { ["en_US"]=> string(922) "

The security of cyberspace can be ensured by a broad cooperation of different organizations, actors. This cooperation cannot be achieved without interoperable information exchange between cybersecurity actors, organisations, and their IT systems. Interoperable information exchange can be realized using own resources, or using services provided by third parties. IT interoperability service can be defined as a service by which a service provider supports interoperable data exchange between IT systems of service consumers and cooperating actors. This publication provides different categorizations of interoperability services, discusses their benefits, and the necessary user tasks. It determines the types of interoperability service providers and their necessary capabilities. Finally, it defines the special requirements of cybersecurity information exchange and presents the main types of required services.

" ["hu_HU"]=> string(922) "

The security of cyberspace can be ensured by a broad cooperation of different organizations, actors. This cooperation cannot be achieved without interoperable information exchange between cybersecurity actors, organisations, and their IT systems. Interoperable information exchange can be realized using own resources, or using services provided by third parties. IT interoperability service can be defined as a service by which a service provider supports interoperable data exchange between IT systems of service consumers and cooperating actors. This publication provides different categorizations of interoperability services, discusses their benefits, and the necessary user tasks. It determines the types of interoperability service providers and their necessary capabilities. Finally, it defines the special requirements of cybersecurity information exchange and presents the main types of required services.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(93) "Interoperability Services Supporting Information Exchange Between Cybersecurity Organisations" ["hu_HU"]=> string(93) "Interoperability Services Supporting Information Exchange Between Cybersecurity Organisations" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#801 (6) { ["_data"]=> array(15) { ["id"]=> int(1221) ["email"]=> string(22) "munk.sandor@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1188) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Munk" ["hu_HU"]=> string(4) "Munk" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Sándor" ["hu_HU"]=> string(7) "Sándor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(16) "interoperability" [1]=> string(27) "cybersecurity organisations" [2]=> string(34) "interoperable information exchange" [3]=> string(11) "IT services" } ["en_US"]=> array(4) { [0]=> string(16) "interoperability" [1]=> string(27) "cybersecurity organisations" [2]=> string(34) "interoperable information exchange" [3]=> string(11) "IT services" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#794 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4704) ["id"]=> int(394) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1188) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#781 (6) { ["_data"]=> array(27) { ["id"]=> int(1189) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2022-01-07 15:57:54" ["sectionId"]=> int(38) ["seq"]=> int(10) ["submissionId"]=> int(1073) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "149-164" ["pub-id::doi"]=> string(24) "10.32565/aarms.2018.3.10" ["abstract"]=> array(2) { ["en_US"]=> string(1422) "

Due to the processes and specialized research of the revolution in technological and scientific information of the last few decades, the development of Unmanned Aircraft Systems (UAS) has now reached the state where it may become a defining factor in the market of civil technologies. In the wake of efforts to enhance aviation safety since the first generation of multicopters, hobby and professional tools have become available that—provided that statutory requirements are flexible enough—could be used in corporate and government sectors alike.
However, the use of such equipment to improve public services would require a strategic-level policy change. Due to rapid technological changes, the speed at which drones are developing is unprecedented, and such equipment is becoming dated significantly faster than, for example, the planned life-cycle of military equipment.
These circumstances call for a solution that breaks away from existing procurement principles, and is able to continuously provide government organizations with equipment that meets the latest technical standards, and supports the efficient execution of the most diverse specialized tasks.
This publication aims to present the complexity, technical dimensions and development trends of “drone science”, along with suggestions on how their use could be efficiently integrated into the toolbox of public service tasks.

" ["hu_HU"]=> string(1422) "

Due to the processes and specialized research of the revolution in technological and scientific information of the last few decades, the development of Unmanned Aircraft Systems (UAS) has now reached the state where it may become a defining factor in the market of civil technologies. In the wake of efforts to enhance aviation safety since the first generation of multicopters, hobby and professional tools have become available that—provided that statutory requirements are flexible enough—could be used in corporate and government sectors alike.
However, the use of such equipment to improve public services would require a strategic-level policy change. Due to rapid technological changes, the speed at which drones are developing is unprecedented, and such equipment is becoming dated significantly faster than, for example, the planned life-cycle of military equipment.
These circumstances call for a solution that breaks away from existing procurement principles, and is able to continuously provide government organizations with equipment that meets the latest technical standards, and supports the efficient execution of the most diverse specialized tasks.
This publication aims to present the complexity, technical dimensions and development trends of “drone science”, along with suggestions on how their use could be efficiently integrated into the toolbox of public service tasks.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(106) "Technical Dimensions of the Development of Unmanned Aerial Systems and Their Impact on Public Service Uses" ["hu_HU"]=> string(106) "Technical Dimensions of the Development of Unmanned Aerial Systems and Their Impact on Public Service Uses" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#791 (6) { ["_data"]=> array(15) { ["id"]=> int(1222) ["email"]=> string(24) "nemeth.andras@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1189) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Németh" ["hu_HU"]=> string(7) "Németh" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "András" ["hu_HU"]=> string(7) "András" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(25) "Unmanned Aircraft Systems" [1]=> string(6) "drones" [2]=> string(30) "system of public-service tasks" [3]=> string(18) "development trends" } ["en_US"]=> array(4) { [0]=> string(25) "Unmanned Aircraft Systems" [1]=> string(6) "drones" [2]=> string(30) "system of public-service tasks" [3]=> string(18) "development trends" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#799 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21298) ["id"]=> int(395) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1189) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#786 (6) { ["_data"]=> array(28) { ["id"]=> int(1190) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2022-02-15 11:32:41" ["sectionId"]=> int(38) ["seq"]=> int(11) ["submissionId"]=> int(1074) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "165-170" ["pub-id::doi"]=> string(24) "10.32565/aarms.2018.3.11" ["abstract"]=> array(2) { ["en_US"]=> string(790) "

This article serves as a short preview to the history of roadblocks (road obstacles), and also as an outlook to modern and future technologies, and challenges they face in this particular field of science. At this moment, it is a real problem to stop the car immediately (if possible), before it causes damages, or threats any civil or military objects. It does not necessarily have to be only an accident, it can be a terrorist attack, which can cause enormous collateral damage and also life losses. The contemporary problem is not only the combat with fire explosive systems, but it is also important to focus on avoiding damaging of important devices, road objects or spots called “soft targets”. All this combined presents the essential challenge for roadblocks development.

" ["hu_HU"]=> string(790) "

This article serves as a short preview to the history of roadblocks (road obstacles), and also as an outlook to modern and future technologies, and challenges they face in this particular field of science. At this moment, it is a real problem to stop the car immediately (if possible), before it causes damages, or threats any civil or military objects. It does not necessarily have to be only an accident, it can be a terrorist attack, which can cause enormous collateral damage and also life losses. The contemporary problem is not only the combat with fire explosive systems, but it is also important to focus on avoiding damaging of important devices, road objects or spots called “soft targets”. All this combined presents the essential challenge for roadblocks development.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(28) "The History of Road-Blocking" ["hu_HU"]=> string(28) "The History of Road-Blocking" } ["title"]=> array(2) { ["en_US"]=> string(54) "Roadblock: Is it an Effective Tool Against a Car Bomb?" ["hu_HU"]=> string(54) "Roadblock: Is it an Effective Tool Against a Car Bomb?" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#797 (6) { ["_data"]=> array(15) { ["id"]=> int(1223) ["email"]=> string(16) "ludek.rak@nob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1190) ["seq"]=> int(11) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(3) "Rak" ["hu_HU"]=> string(3) "Rak" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Luděk" ["hu_HU"]=> string(6) "Luděk" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(9) "roadblock" [1]=> string(8) "car bomb" [2]=> string(11) "soft target" } ["en_US"]=> array(3) { [0]=> string(9) "roadblock" [1]=> string(8) "car bomb" [2]=> string(11) "soft target" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#803 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4710) ["id"]=> int(396) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1190) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#782 (6) { ["_data"]=> array(28) { ["id"]=> int(1191) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2022-01-07 15:58:31" ["sectionId"]=> int(38) ["seq"]=> int(12) ["submissionId"]=> int(1075) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "171-188" ["pub-id::doi"]=> string(24) "10.32565/aarms.2018.3.12" ["abstract"]=> array(2) { ["en_US"]=> string(672) "

Establishing and operating an effective information security management system within an organization is never an easy job. Organizational culture, management support, budget restrictions and many other factors affect the security efforts of a company. Although the information security academic literature is growing, there is no clear guidance in several fields of the topic, therefore the life-tested best practices can be a useful aid in operating such systems. The aim of this paper is to provide a short guidance regarding the basic steps of a beginner information security manager, and maybe to give some useful thoughts to the experienced officers, as well.

" ["hu_HU"]=> string(672) "

Establishing and operating an effective information security management system within an organization is never an easy job. Organizational culture, management support, budget restrictions and many other factors affect the security efforts of a company. Although the information security academic literature is growing, there is no clear guidance in several fields of the topic, therefore the life-tested best practices can be a useful aid in operating such systems. The aim of this paper is to provide a short guidance regarding the basic steps of a beginner information security manager, and maybe to give some useful thoughts to the experienced officers, as well.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(52) "Best Practices from the Enterprise’s Point of View" ["hu_HU"]=> string(52) "Best Practices from the Enterprise’s Point of View" } ["title"]=> array(2) { ["en_US"]=> string(59) "Seven Pieces of Advice to Improve Your Information Security" ["hu_HU"]=> string(59) "Seven Pieces of Advice to Improve Your Information Security" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#808 (6) { ["_data"]=> array(15) { ["id"]=> int(1224) ["email"]=> string(31) "gergely.szentgali@t-systems.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1191) ["seq"]=> int(12) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Szentgáli" ["hu_HU"]=> string(10) "Szentgáli" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Gergely" ["hu_HU"]=> string(7) "Gergely" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(20) "information security" [1]=> string(4) "ISMS" [2]=> string(14) "cyber security" [3]=> string(4) "risk" [4]=> string(8) "incident" [5]=> string(10) "management" } ["en_US"]=> array(6) { [0]=> string(20) "information security" [1]=> string(4) "ISMS" [2]=> string(14) "cyber security" [3]=> string(4) "risk" [4]=> string(8) "incident" [5]=> string(10) "management" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#807 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(21299) ["id"]=> int(397) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1191) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#813 (6) { ["_data"]=> array(27) { ["id"]=> int(1193) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2018-12-31" ["lastModified"]=> string(19) "2022-02-21 15:24:49" ["sectionId"]=> int(38) ["seq"]=> int(13) ["submissionId"]=> int(1077) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(74) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "179-186" ["pub-id::doi"]=> string(24) "10.32565/aarms.2018.3.13" ["abstract"]=> array(2) { ["en_US"]=> string(747) "

The paper discusses the importance of tattoo in the criminal environment and prison subculture. Special attention is paid to the function of tattoos, especially in the area of identification and communication. Frequently used symbols have a considerable explanatory value. They reflect the criminal past of the wearer, expressing religious or ideological beliefs, indicate a process of radicalisation, membership in a criminal group or gang. With the help of analysis of the selected tattoo symbols, it is possible to collect valuable information about the personality profile of a particular individual. The findings presented in the paper are based on the original research project realised in the prison facilities in the Czech Republic.

" ["hu_HU"]=> string(747) "

The paper discusses the importance of tattoo in the criminal environment and prison subculture. Special attention is paid to the function of tattoos, especially in the area of identification and communication. Frequently used symbols have a considerable explanatory value. They reflect the criminal past of the wearer, expressing religious or ideological beliefs, indicate a process of radicalisation, membership in a criminal group or gang. With the help of analysis of the selected tattoo symbols, it is possible to collect valuable information about the personality profile of a particular individual. The findings presented in the paper are based on the original research project realised in the prison facilities in the Czech Republic.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(76) "Nonverbal Communication of Prison Subculture through Criminal Tattoo Symbols" ["hu_HU"]=> string(76) "Nonverbal Communication of Prison Subculture through Criminal Tattoo Symbols" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#814 (6) { ["_data"]=> array(15) { ["id"]=> int(1225) ["email"]=> string(29) "barbora.vegrichtova@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1193) ["seq"]=> int(13) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(12) "Vegrichtová" ["hu_HU"]=> string(12) "Vegrichtová" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Barbora" ["hu_HU"]=> string(7) "Barbora" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(13) "communication" [1]=> string(7) "convict" [2]=> string(8) "criminal" [3]=> string(6) "prison" [4]=> string(6) "symbol" [5]=> string(6) "tattoo" } ["en_US"]=> array(6) { [0]=> string(13) "communication" [1]=> string(7) "convict" [2]=> string(8) "criminal" [3]=> string(6) "prison" [4]=> string(6) "symbol" [5]=> string(6) "tattoo" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#815 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(4714) ["id"]=> int(398) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1193) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF