Full Issue

object(Publication)#697 (6) { ["_data"]=> array(27) { ["id"]=> int(357) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2020-10-22" ["lastModified"]=> string(19) "2020-11-11 15:32:58" ["primaryContactId"]=> int(496) ["sectionId"]=> int(5) ["seq"]=> int(1) ["submissionId"]=> int(443) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2020) ["issueId"]=> int(381) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(6) "5–15" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.1.1" ["abstract"]=> array(1) { ["en_US"]=> string(657) "

Recently, the increase of spending in the sector of defence has opened up larger and larger spaces for the development / modernisation potential of individual countries. However, in this “resource overflow”, the effectiveness of the use of financial resources for defence is undermined. This study takes a look at the dangers of the ever-decreasing defence budget share (dangers well known in economics and well known in the field of defence sphere in the recent past) and the “free-rider effect” observed in different members states of the NATO (related to e.g. NATO Article 5) and reviews the effectiveness of financial resource management.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["title"]=> array(1) { ["en_US"]=> string(95) "Are We Really Lacking the Effectiveness of Financial Resource Management in the Defence Sector?" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#732 (6) { ["_data"]=> array(15) { ["id"]=> int(496) ["email"]=> string(20) "bencsikgab@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(357) ["seq"]=> int(1) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-1394-6765" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Bencsik" ["hu_HU"]=> string(7) "Bencsik" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Gábor" ["hu_HU"]=> string(6) "Gábor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(16) "defence spending" [1]=> string(29) "financial resource management" [2]=> string(16) "threats-security" [3]=> string(18) "cost-effectiveness" [4]=> string(18) "efficiency testing" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#745 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(13219) ["id"]=> int(3901) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(357) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#121 (6) { ["_data"]=> array(27) { ["id"]=> int(1227) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2020-10-26" ["lastModified"]=> string(19) "2020-11-11 15:33:22" ["primaryContactId"]=> int(1260) ["sectionId"]=> int(5) ["seq"]=> int(2) ["submissionId"]=> int(1110) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2020) ["issueId"]=> int(381) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "17–26" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.1.2" ["abstract"]=> array(1) { ["en_US"]=> string(802) "

The use of military forces in disaster relief activities is indispensable. It is a human and technical resource that can carry out special tasks quickly and professionally. One of the negative consequences of the global climate change is the increasing number and intensity of natural disasters, where the role of the military is more and more appreciated. For Hungary, as a small country and a member of the NATO, it is important to have a compact but capable military, which is able to work in a wide range of different scenarios of crisis management from peace support to disaster operations, especially in a multinational environment. This study introduces the disaster management capabilities of the Hungarian Defence Forces, focusing on the existing and planned international cooperations.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["title"]=> array(1) { ["en_US"]=> string(162) "The Structure and Main Elements of Disaster Management System of the Hungarian Defence Forces, with Special Regard to the Development of International Cooperation" } ["locale"]=> string(5) "en_US" ["authors"]=> array(3) { [0]=> object(Author)#741 (6) { ["_data"]=> array(15) { ["id"]=> int(1269) ["email"]=> string(22) "berek.tamas@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1227) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-8358-6139" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Berek" ["hu_HU"]=> string(5) "Berek" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Tamás" ["hu_HU"]=> string(6) "Tamás" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#764 (6) { ["_data"]=> array(15) { ["id"]=> int(1260) ["email"]=> string(23) "foldi.laszlo@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1227) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-7575-7188" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Földi" ["hu_HU"]=> string(6) "Földi" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "László" ["hu_HU"]=> string(8) "László" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#718 (6) { ["_data"]=> array(15) { ["id"]=> int(1268) ["email"]=> string(25) "padanyi.jozsef@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(1227) ["seq"]=> int(2) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-6665-8444" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Padányi" ["hu_HU"]=> string(8) "Padányi" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "József" ["hu_HU"]=> string(7) "József" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(24) "Hungarian Defence Forces" [1]=> string(14) "climate change" [2]=> string(19) "disaster management" [3]=> string(21) "use of military force" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#761 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(13261) ["id"]=> int(3902) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(1227) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#187 (6) { ["_data"]=> array(27) { ["id"]=> int(713) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2020-10-26" ["lastModified"]=> string(19) "2020-11-11 15:33:54" ["primaryContactId"]=> int(1015) ["sectionId"]=> int(5) ["seq"]=> int(3) ["submissionId"]=> int(869) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2020) ["issueId"]=> int(381) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "27–36" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.1.9" ["abstract"]=> array(1) { ["en_US"]=> string(772) "

Warfare ideologies in Europe basically changed in the Early Modern period. This period is the age of Reformation, of which Desiderius Erasmus was one of the earliest prominent thinkers. Concerning warfare, Erasmus can be understood as a representative of pacifism, but at the same time, it can be argued that he was the first reformer with a specific theory of justification of war. In this respect, Erasmus had several followers from every part of Europe, including Hungary. This Hungarian “apprentice” was István Magyari, who was also the first representative of Hungarian military science. This paper uncovers and examines the common points of Erasmus and Magyari in their theory of justification of war, and Magyari’s divergence from Erasmus’ thinking.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["title"]=> array(1) { ["en_US"]=> string(55) "Erasmus and István Magyari on the Justification of War" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#737 (6) { ["_data"]=> array(15) { ["id"]=> int(1015) ["email"]=> string(22) "Boda.Mihaly@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(713) ["seq"]=> int(3) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-3037-3644" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(60) "Hadtörténelmi, Filozófiai és Kultúrtörténeti Tanszék" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Boda" ["hu_HU"]=> string(4) "Boda" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Mihály" ["hu_HU"]=> string(7) "Mihály" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(20) "justification of war" [1]=> string(15) "just war theory" [2]=> string(7) "Erasmus" [3]=> string(15) "István Magyari" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#763 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(13263) ["id"]=> int(3903) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(713) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#189 (6) { ["_data"]=> array(27) { ["id"]=> int(684) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2020-10-26" ["lastModified"]=> string(19) "2020-11-11 15:34:19" ["primaryContactId"]=> int(982) ["sectionId"]=> int(5) ["seq"]=> int(4) ["submissionId"]=> int(837) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2020) ["issueId"]=> int(381) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "37–44" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.1.3" ["abstract"]=> array(1) { ["en_US"]=> string(1126) "

This article addresses the perspectives of Public Service Management in Ecuador, a Latin American country which saw various social changes and political paradigms. The new Constitution of Ecuador was launched in 2008 in a scenario where nationalism replaced the liberal paradigm in Ecuador. Its main features were the defence of postliberal values and sovereignty as a superior principle. On the other hand, the role of the public sector in the economy of Ecuador grew after 1972 when petroleum revenues increased remarkably. Nowadays, the public sector reduction was entered into force after the collapse in the price of crude oil in 2014 and an earthquake of 7.8 Mw that devastated the coast of Manabí in 2016. In this context, during the presidency of the former president Rafael Correa, new principles were instituted, such as decentralisation, the new concept of public servant and new methodologies such as National Management for Results. The methodology used is secondary data sources including various types of books, journal articles, government and non-governmental reports, government implementation plans.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["title"]=> array(1) { ["en_US"]=> string(36) "Public Service Management in Ecuador" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#771 (6) { ["_data"]=> array(15) { ["id"]=> int(982) ["email"]=> string(21) "stefy220_@hotmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(684) ["seq"]=> int(4) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-1460-7324" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Cevallos" ["hu_HU"]=> string(8) "Cevallos" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Stefany" ["hu_HU"]=> string(7) "Stefany" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(14) "public service" [1]=> string(21) "new public management" [2]=> string(12) "constitution" [3]=> string(16) "decentralisation" [4]=> string(14) "accountability" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#746 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(13264) ["id"]=> int(3904) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(684) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#118 (6) { ["_data"]=> array(27) { ["id"]=> int(468) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2020-10-26" ["lastModified"]=> string(19) "2020-11-11 15:34:40" ["primaryContactId"]=> int(670) ["sectionId"]=> int(5) ["seq"]=> int(5) ["submissionId"]=> int(583) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2020) ["issueId"]=> int(381) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "45–54" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.1.4" ["abstract"]=> array(1) { ["en_US"]=> string(806) "

HUSZÁR, the Hungarian National Organisation for Rescue Services, was founded in 2012 and now has a staff of over 80. HUSZÁR is a special rescue unit that can be deployed in domestic and international disaster management. Based on the United Nations International Search and Rescue Advisory Group (UN INSARAG) classification, HUSZÁR is a medium level urban search and rescue team and its units are equipped with special skills and technical equipment. A special feature of the team is volunteerism combined with professional interventional skills. Its subunits can manage individual interventions, they have participated in several international disaster relief tasks following earthquakes and tsunamis, and they have also played an active role in the preparation of other nations’ rescue teams.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["title"]=> array(1) { ["en_US"]=> string(53) "Voluntary Rescue Service in Hungary: The HUSZÁR Team" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#775 (6) { ["_data"]=> array(15) { ["id"]=> int(5976) ["email"]=> string(30) "tamas.habermayer@katved.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(468) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-6677-9163" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(11) "Hábermayer" ["hu_HU"]=> string(11) "Hábermayer" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Tamás" ["hu_HU"]=> string(6) "Tamás" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#767 (6) { ["_data"]=> array(15) { ["id"]=> int(670) ["email"]=> string(20) "katvedhory@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(468) ["seq"]=> int(5) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-7595-7980" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Horváth" ["hu_HU"]=> string(8) "Horváth" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Péter" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(7) "HUSZÁR" [1]=> string(7) "INSARAG" [2]=> string(7) "Hungary" [3]=> string(21) "voluntary rescue team" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#769 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(13265) ["id"]=> int(3905) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(468) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#115 (6) { ["_data"]=> array(27) { ["id"]=> int(626) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2020-10-26" ["lastModified"]=> string(19) "2020-11-11 15:35:03" ["primaryContactId"]=> int(890) ["sectionId"]=> int(5) ["seq"]=> int(6) ["submissionId"]=> int(770) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2020) ["issueId"]=> int(381) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "55–63" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.1.5" ["abstract"]=> array(1) { ["en_US"]=> string(582) "

Water is an essential fire extinguishing agent. Besides the existence of water for this purpose, the availability of water sources is essential as well. Quick and efficient access to water sources contributes to effective firefighting, thereby avoiding any increase in damage, and it protects human life. With regard to the water sources, the authors examine and analyse the anthropometric data, and the physical properties of the equipment needed for the water. These are also used to determine the conditions of optimal access to the various water sources for firefighting.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["title"]=> array(1) { ["en_US"]=> string(72) "Solutions for the Accessibility of Water Sources for Fire Extinguishment" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#772 (6) { ["_data"]=> array(15) { ["id"]=> int(890) ["email"]=> string(24) "herczeggergely@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(626) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(36) "http://orcid.org/0000-0001-9633-5152" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(8) "NKE KMDI" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(19) "

doktorandusz

" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Herczeg" ["hu_HU"]=> string(7) "Herczeg" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Gergely" ["hu_HU"]=> string(7) "Gergely" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#779 (6) { ["_data"]=> array(15) { ["id"]=> int(891) ["email"]=> string(25) "restas.agoston@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(626) ["seq"]=> int(6) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(36) "http://orcid.org/0000-0003-4886-0117" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(58) "NKE RTK KVI Tűzvédelmi és Mentésirányítási Tanszék" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Restás" ["hu_HU"]=> string(7) "Restás" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Ágoston" ["hu_HU"]=> string(8) "Ágoston" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(30) "water sources for firefighting" [1]=> string(12) "fire hydrant" [2]=> string(13) "water sources" [3]=> string(13) "accessibility" [4]=> string(30) "fire intervention requirements" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#781 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(13303) ["id"]=> int(3925) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(626) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#743 (6) { ["_data"]=> array(27) { ["id"]=> int(656) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2020-10-26" ["lastModified"]=> string(19) "2020-11-11 15:35:26" ["primaryContactId"]=> int(928) ["sectionId"]=> int(5) ["seq"]=> int(7) ["submissionId"]=> int(802) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2020) ["issueId"]=> int(381) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "65–81" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.1.6" ["abstract"]=> array(1) { ["en_US"]=> string(920) "

Regarding the Internet, individuals expect anonymity and confidentiality, but the authorities expect as much traceability as possible. Individuals are provided with encryption procedures used in internet communication, supported by more and more efficient devices and applications. For law enforcement, the publicity of these procedures could be a serious problem. However, in addition to a well-functioning technical background, conscious use of tools is required to maintain anonymity. In this article I present the necessary techniques to achieve this goal, their operational principles, scopes and points that may enable the technology to be compromised. In the second part of this article, the partial results of my research will be presented, which measures the presence and activity of the darknet; it can provide a basis for carrying out similar investigations and can help develop the protection process.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["title"]=> array(1) { ["en_US"]=> string(120) "Opportunities of Darknet Operations in Cyber Warfare: Examining its Functions and Presence in the University Environment" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#765 (6) { ["_data"]=> array(15) { ["id"]=> int(928) ["email"]=> string(31) "koczka.ferenc@uni-eszterhazy.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(656) ["seq"]=> int(7) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-7541-6495" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(28) "Eszterhazy Karoly University" ["hu_HU"]=> string(27) "Eszterházy Károly Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(21) "

Director of IT

" ["hu_HU"]=> string(29) "

Informatikai Igazgató

" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Koczka" ["hu_HU"]=> string(6) "Koczka" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Ferenc" ["hu_HU"]=> string(6) "Ferenc" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(7) "darknet" [1]=> string(3) "VPN" [2]=> string(3) "TOR" [3]=> string(13) "onion routing" [4]=> string(18) "electronic warfare" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#786 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(13268) ["id"]=> int(3907) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(656) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#770 (6) { ["_data"]=> array(27) { ["id"]=> int(4942) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2020-10-26" ["lastModified"]=> string(19) "2021-04-14 09:42:52" ["sectionId"]=> int(5) ["seq"]=> int(8) ["submissionId"]=> int(4821) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(381) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(7) "83–93" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.1.7" ["abstract"]=> array(1) { ["en_US"]=> string(2021) "

The term information security evolved to cybersecurity nowadays, which emphasises the interdependence of information assets and the importance of cyber-physical systems. Parallel to this, the need for appropriate management of the EU and government strategies and new public administration tasks also appeared.
In the European Union, the first measure concerning this issue was the establishment of the European Union Agency for Network and Information Security (ENISA) in 2004, mostly with consultative tasks. The first official cybersecurity strategy in the EU, called the Open, Safe and Secure Cyberspace, was accepted in 2013. Afterwards, ENISA’s role has been strengthened as well as its range of tasks were broadened. Beside the critical infrastructure protection efforts, the Network Information Security (NIS) directive and related legislation were a giant leap towards a common level of cybersecurity in the community. The formation of an EU Cybersecurity Act and filling NIS with more practical guidance is an ongoing process nowadays.
Despite being a post-socialist country, Hungary is in the first line of legislation on cybersecurity in the community. Since 2005 there were several government decrees, from 2009 the first act-level rules on the information security of some governmental services. Based on the National Security Strategy, the National Cybersecurity Strategy was formed in 2013. The same year the first information security act applicable to all government, local government, governmental data processing and critical infrastructure service providers has come into force. The alignment of the National Cybersecurity Strategy to NIS directive happens these days.
Thus, the regulation of cybersecurity in the EU and in Hungary are heading in the right direction, but the practical implementation today is far away from the strategic objectives. The community is lagging far behind the United States of America and China, just to mention the most important players in the field.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(1) { ["en_US"]=> string(73) "Governmental Regulation of Cybersecurity in the EU and Hungary after 2000" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#780 (6) { ["_data"]=> array(15) { ["id"]=> int(5977) ["email"]=> string(26) "szadeczky.tamas@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4942) ["seq"]=> int(8) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-7191-4924" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Szádeczky" ["hu_HU"]=> string(10) "Szádeczky" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Tamás" ["hu_HU"]=> string(6) "Tamás" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(14) "cyber strategy" [1]=> string(32) "information security legislation" [2]=> string(17) "incident response" [3]=> string(5) "ENISA" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#777 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(13270) ["id"]=> int(3909) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4942) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#768 (6) { ["_data"]=> array(27) { ["id"]=> int(587) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2020-10-26" ["lastModified"]=> string(19) "2020-11-11 15:36:09" ["primaryContactId"]=> int(842) ["sectionId"]=> int(5) ["seq"]=> int(9) ["submissionId"]=> int(728) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["copyrightYear"]=> int(2020) ["issueId"]=> int(381) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(8) "95–108" ["pub-id::doi"]=> string(23) "10.32565/aarms.2020.1.8" ["abstract"]=> array(1) { ["en_US"]=> string(902) "

The military information scene is expanding as technology advances, and it has a fundamental impact on combat activities. It requires a high level of precision, expertise and dedication to set the right standards for military concepts and to establish a proper set of requirements of standards for military concepts, such as in NATO. Digital devices have become an integral part of the activities of the combatant soldier, as the use of modern tools makes combat activities more efficient. In a modern society, modernisation processes extend to the field of defence as well, resulting in intensive development in a growing number of countries. The requirements of the digital soldier are nowadays influenced not only by the warrior but also by those connected to him in the full information space, since a modern soldier is already an element of a network in network-centric military operations.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(59) "AARMS – Academic and Applied Research in Military Science" ["hu_HU"]=> string(59) "AARMS – Academic and Applied Research in Military Science" } ["title"]=> array(1) { ["en_US"]=> string(75) "Outlining a Set of Theory-based Requirements for the Future Digital Soldier" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#793 (6) { ["_data"]=> array(15) { ["id"]=> int(842) ["email"]=> string(38) "Szeleczki.Szilveszter@hallg.uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(587) ["seq"]=> int(9) ["userGroupId"]=> int(82) ["country"]=> string(2) "HU" ["orcid"]=> string(36) "http://orcid.org/0000-0003-2891-0527" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(20) "

MSc hallgató

" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Szeleczki" ["hu_HU"]=> string(9) "Szeleczki" } ["givenName"]=> array(2) { ["en_US"]=> string(11) "Szilveszter" ["hu_HU"]=> string(11) "Szilveszter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(11) "requirement" [1]=> string(11) "information" [2]=> string(7) "soldier" [3]=> string(4) "NATO" [4]=> string(12) "digitisation" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#787 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(13269) ["id"]=> int(3908) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(587) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#773 (6) { ["_data"]=> array(27) { ["id"]=> int(4943) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2020-10-26" ["lastModified"]=> string(19) "2020-11-11 15:36:31" ["sectionId"]=> int(5) ["seq"]=> int(10) ["submissionId"]=> int(4822) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(0) "" ["copyrightYear"]=> int(2020) ["issueId"]=> int(381) ["licenseUrl"]=> string(42) "http://creativecommons.org/licenses/by/4.0" ["pages"]=> string(9) "109–119" ["pub-id::doi"]=> string(24) "10.32565/aarms.2020.1.10" ["abstract"]=> array(1) { ["en_US"]=> string(685) "

Available definitions describe a soft target as a location with high vulnerability, but a low level of protection. However, such general definitions can hardly be used in the process of soft targets identification. The aim of the article is to create a temporary specific definition that could be utilised for this purpose. The suggested definition of a soft target is based on performed statistical analysis of 275 cases of terrorist attacks aimed against soft targets in the European Union from 2000 to 2015. In the definition, a soft target is characterised based on the probability of a terrorist attack occurrence and the expected number of casualties caused by the attack.

" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(1) { ["en_US"]=> string(43) "Soft Targets: Definition and Identification" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#785 (6) { ["_data"]=> array(15) { ["id"]=> int(5978) ["email"]=> string(20) "tomas.zeman2@unob.cz" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4943) ["seq"]=> int(10) ["userGroupId"]=> int(82) ["country"]=> string(2) "CZ" ["orcid"]=> string(37) "https://orcid.org/0000-0001-7269-4994" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Zeman" ["hu_HU"]=> string(5) "Zeman" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Tomáš" ["hu_HU"]=> string(7) "Tomáš" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(12) "soft targets" [1]=> string(17) "terrorist attacks" [2]=> string(17) "crisis management" [3]=> string(10) "definition" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#795 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(13272) ["id"]=> int(3910) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4943) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF