In the article the author examines the combat service support aspects of the air bases, devided into three chapters: the force protection activity, the host nation support and the supportive capabilities of air bases in favour of air forces. The study conducts the examination in a general context and highlights the framework through which the air bases possess the capability to provide the proper defence, to realise the regular and safety flow of air traffic and it is also highlighted what the nations should consider during the deployment and hosting forces in order to ensure the sufficient circuimstances for the efficient conduct of activities. For the simpler understanding of activity areas, diagrams can be found at the ends of main chapters edited by the author.
" ["hu_HU"]=> string(693) "A cikkben a szerző a légibázisok harci kiszolgáló támogatását részletezi, amit három alfejezetre bont: az erők védelme tevékenységi kör, a befogadó nemzeti támogatás, valamint a légibázisok repülő csapatokat támogató képességei. A téma kifejtése során bemutatja a keretrendszert, amely által a légibázisok megfelelő védelmet képesek nyújtani, biztosítják a rendszeres és biztonságos légiközlekedés megvalósíthatóságát, valamint azt, hogy átcsoportosítás esetén a küldő és a befogadó nemzetek milyen megfontolások alapján tervezhetik a megfelelő körülmények létrehozását a hatékony feladatvégrehajtást lehetővé téve.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(47) "The Combat Service Support Aspects of Air Bases" ["hu_HU"]=> string(62) "A légibázisok harci kiszolgáló támogatásának aspektusai" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#722 (6) { ["_data"]=> array(15) { ["id"]=> int(4491) ["email"]=> string(25) "csengeri.janos@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3938) ["seq"]=> int(1) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-4540-9681" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Csengeri" ["hu_HU"]=> string(8) "Csengeri" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "János " ["hu_HU"]=> string(8) "János " } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(11) "légibázis" [1]=> string(30) "harci kiszolgáló támogatás" [2]=> string(14) "erők védelme" [3]=> string(29) "befogadó nemzeti támogatás" [4]=> string(58) "légi bázisok repülő csapatokat támogató képességei" } ["en_US"]=> array(5) { [0]=> string(8) "air base" [1]=> string(22) "combat service support" [2]=> string(16) "force protection" [3]=> string(19) "host nation support" [4]=> string(49) "capabilities of air bases in favour of air forces" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#735 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10509) ["id"]=> int(3087) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(3938) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Following the formation of the global informational space the concepts of informational warfare has rapidly developed and it has led to the formation of a new battleground which is an ideal place for the strategic rivalry between the great powers. Nowadays, as a result of continuous development a new global informational confrontation has evolved that ongoing in both peacetime and wartime where informational resources used as weapons to manipulate the consciousness of the masses and to reach foreign policy goals. In my article I will examine Russia’s informational warfare concepts which may contribute to a better understanding of the background of today’s informational war.
" ["hu_HU"]=> string(779) "A globális információs tér megjelenését követő években viszonylag hamar megjelent az információs hadviselés koncepciója, melynek következtében létrejött a nagyhatalmak közötti stratégiai vetélkedés egy újabb terepe. A töretlen fejlődés eredményeképp napjainkra kialakult a béke- és háborús időszakban megszakítás nélkül folyó globális információs küzdelem, melyben az információs erőforrások fegyverként kerülnek felhasználásra a tömegek tudatának manipulálása és a külpolitikai célok elérése céljából. Cikkemben Oroszország információs műveletekkel kapcsolatos koncepcióit vizsgálom meg, mely reményeim szerint hozzájárul a napjainkban folyó információs háború hátterének jobb megértéséhez.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(71) "The Evolution of Russian Information Warfare Concept After the Cold War" ["hu_HU"]=> string(98) "Az információs hadviselés orosz koncepciójának fejlődése a hidegháború végét követően" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#708 (6) { ["_data"]=> array(15) { ["id"]=> int(4494) ["email"]=> string(24) "fekete.csanad@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3940) ["seq"]=> int(2) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-9873-4736" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Fekete" ["hu_HU"]=> string(6) "Fekete" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Csanád" ["hu_HU"]=> string(7) "Csanád" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(25) "információs hadviselés" [1]=> string(28) "új generációs hadviselés" [2]=> string(22) "fegyveres konfliktusok" [3]=> string(22) "lélektani hadviselés" } ["en_US"]=> array(4) { [0]=> string(19) "information warfare" [1]=> string(22) "new generation warfare" [2]=> string(15) "armed conflicts" [3]=> string(21) "psychological warfare" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#751 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10513) ["id"]=> int(3089) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(3940) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }In the World War II the partisan warfare was a sideshow but in some European countries (France, Soviet Union and Yugoslavia) resistance movements were really effective and powerful against the invading forces. The study at first sums up the characteristics of partisan warfare in the European theatre of WW II. After this the study presents the fights of the French Resistance, the Soviet partisan movement and Tito’s partisans in Yugoslavia by using the war memoirs of Charles de Gaulle, Joseph Stalin, Georgy Zhukov and Josip Tito.
" ["hu_HU"]=> string(535) "A második világháború harcait tekintve a partizán hadviselés csupán mellékcselekmény volt, azonban néhány európai ország (Franciaország, Szovjetunió, Jugoszlávia) ellenállási mozgalma komoly eredményeket ért el a megszállókkal szemben. A tanulmány először összefoglalja a második világháború időszaka partizán hadviselésének jellegzetességeit, majd de Gaulle, Sztálin, Zsukov és Tito emlékiratai alapján bemutatja a francia ellenállás, a szovjet és a jugoszláv partizánok küzdelmeit.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(71) "Partisan Wars and Resistance Movements in the European Theatre of WW II" ["hu_HU"]=> string(81) "A második világháború partizánharcai és ellenállási mozgalmai Európában" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#123 (6) { ["_data"]=> array(15) { ["id"]=> int(4497) ["email"]=> string(25) "forgacs.balazs@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3942) ["seq"]=> int(3) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-5795-3281" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Forgács" ["hu_HU"]=> string(8) "Forgács" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Balázs" ["hu_HU"]=> string(10) "Balázs " } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(23) "második világháború" [1]=> string(21) "partizán hadviselés" [2]=> string(23) "ellenállási mozgalmak" [3]=> string(22) "háborús emlékiratok" } ["en_US"]=> array(4) { [0]=> string(12) "World War II" [1]=> string(16) "partisan warfare" [2]=> string(20) "resistance movements" [3]=> string(11) "war memoirs" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#730 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10517) ["id"]=> int(3091) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(3942) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }A NATO Review video posted on July 3 2014 was the first official NATO media release to use the term hybrid warfare in the context of the situation in Ukraine. In September 2014, during the Wales Summit, the term „hybrid warfare” was used on several occasions in connection with Ukraine. Today, most experts deal specifically with the events of the hybrid warfare in Crimea and in the Eastern Ukraine. This study first attempts to summarize and process the chronological history of the occupation of the Crimea in Hungarian.
" ["hu_HU"]=> string(604) "A 2014. július 3-án közzétett NATO Review video volt az első hivatalos NATOsajtó, amely a hibrid hadviselést az ukrajnai helyzettel összefüggésében használta. 2014. szeptemberében a walesi csúcstalálkozón a „hibrid hadviselés”-t már több alkalommal említették Ukrajnával kapcsolatosan. Mára a legtöbb szakértő külön foglalkozik a hibrid hadviselés esetében a krími eseményekkel és a Kelet-Ukrajnában történtekkel. Ezen tanulmány elsőként igyekszik magyar nyelven összegezni és feldolgozni a Krím-félsziget elfoglalásának kronologikus történetét.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(50) "Chronology of the Occupation of the Crimea in 2014" ["hu_HU"]=> string(61) "A Krím-félsziget 2014. évi elfoglalásának kronológiája" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#752 (6) { ["_data"]=> array(15) { ["id"]=> int(4500) ["email"]=> string(23) "holecz.jozsef@uninke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3945) ["seq"]=> int(4) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-7880-1367" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Holecz" ["hu_HU"]=> string(6) "Holecz" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "József" ["hu_HU"]=> string(7) "József" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(18) "hibrid hadviselés" [1]=> string(16) "Krím-félsziget" [2]=> string(7) "Ukrajna" [3]=> string(12) "Oroszország" } ["en_US"]=> array(4) { [0]=> string(14) "hybrid warfare" [1]=> string(6) "Crimea" [2]=> string(7) "Ukraine" [3]=> string(6) "Russia" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#736 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10522) ["id"]=> int(3094) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(3945) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The Emergence of Hybrid Warfare Elements in the Conflict Between China and Taiwan
Today's battlefields are very different from the battlefields in the 19th century. New threats and new global and regional security challenges have emerged. In the complex operating environment and the digital world, new warfare forms have emerged, such as asymmetric warfare. The use of conventional, common operations has changed, and new political, cyber and media elements have been added, which are combined to form a new hybrid warfare form. The settlement of the conflict in the Crimea in 2014 and the result of this were an exemplary example. The conflict between China and Taiwan since 1949 is a very long and tense problem that has not been solved by any means until now. China's unification efforts over the last decades have entered a new phase and learn from the Russian example, using hybrid warfare tools to enforce their unification aspirations. The purpose of this paper is to present the steps taken and to outline the possible additional Chinese steps and how to remedy them.
" ["hu_HU"]=> string(1265) "Napjaink harcterei nagyban különböznek a 19. század harctereitől. Megjelentek új fenyegetések, új globális és regionális biztonsági kihívások. Az összetett műveleti környezetben, valamint a digitalizált világ keretei között új hadviselési formák jelentek meg, úgymint az aszimmetrikus hadviselés. A megszokott konvencionális műveletek alkalmazása megváltozott, és a műveletek kiegészültek újabb politikai, kiber és média elemekkel, amelyek együttesen kerülnek alkalmazásra, ezzel egy új hibrid hadviselési formát alkotva. A 2014-ben, a Krím-félszigeten lezajlott konfliktus rendezése és annak eredménye ennek egy eklatáns példája volt. A Kína és Tajvan között 1949 óta fennálló konfliktus nagyon hosszú és feszültségekkel teli probléma, melyet mind ez ideáig egyik országnak sem sikerült semmilyen módszerrel sem megoldani. Az utóbbi évtizedekben a kínai egyesítési törekvések egy újabb fázisba léptek, és az orosz példán tanulva, a hibrid hadviselés eszközei segítségével igyekeznek érvényt szerezni akaratuknak. Jelen tanulmány célja bemutatni az erre irányuló lépéseket és felvázolni a lehetséges további kínai lépéseket és azok elhárításnak módját.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(81) "The Emergence of Hybrid Warfare Elements in the Conflict Between China and Taiwan" ["hu_HU"]=> string(76) "A hibrid hadviselés elemeinek megjelenése Kína és Tajvan konfliktusában" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#754 (6) { ["_data"]=> array(15) { ["id"]=> int(4505) ["email"]=> string(28) "kocsi.janos.gyula@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3947) ["seq"]=> int(5) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-9174-1466" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Kocsi" ["hu_HU"]=> string(5) "Kocsi" } ["givenName"]=> array(2) { ["en_US"]=> string(12) "János Gyula" ["hu_HU"]=> string(12) "János Gyula" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(18) "Hibrid hadviselés" [1]=> string(25) "Kína‒Tajvan konfliktus" [2]=> string(33) "új repülési utak Tajvan felett" [3]=> string(40) "kínai hadgyakorlatok Tajvan partjainál" [4]=> string(13) "egy Kína elv" } ["en_US"]=> array(5) { [0]=> string(14) "Hybrid Warfare" [1]=> string(16) "One China Policy" [2]=> string(21) "China-Taiwan Conflict" [3]=> string(31) "New Aviation Paths above Taiwan" [4]=> string(38) "Chinese Exercises on Taiwan’s Coasts" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#757 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10529) ["id"]=> int(3097) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(3947) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The Establishment of the Stability of Democratic States During Peace Operations. Potential Duties of Forces Participating at the Establishment of Stability. Experience Gained During Stabilization Tasks in Afghanistan
The article gives an overview of the general stability characteristics of today's democratic states, of the main areas of state security, and of the main tasks that help to secure the safe operation of the state. It examines the major areas of implementation of peace operations for the sake of stabilization and possible tasks. It analyzes the potential duties of peacekeeping forces in order to create stability in the state. It summarizes the main peace-support tasks of the establishment of stabilization during peace operations, results and mistakes, shortcomings based on experiences in Afghanistan, suggestions and assessments.
" ["hu_HU"]=> string(641) "The article gives an overview of the general stability characteristics of today's democratic states, of the main areas of state security, and of the main tasks that help to secure the safe operation of the state. It examines the major areas of implementation of peace operations for the sake of stabilization and possible tasks. It analyzes the potential duties of peacekeeping forces in order to create stability in the state. It summarizes the main peace-support tasks of the establishment of stabilization during peace operations, results and mistakes, shortcomings based on experiences in Afghanistan, suggestions and assessments.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(216) "The Establishment of the Stability of Democratic States During Peace Operations. Potential Duties of Forces Participating at the Establishment of Stability. Experience Gained During Stabilization Tasks in Afghanistan" ["hu_HU"]=> string(216) "The Establishment of the Stability of Democratic States During Peace Operations. Potential Duties of Forces Participating at the Establishment of Stability. Experience Gained During Stabilization Tasks in Afghanistan" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#767 (6) { ["_data"]=> array(15) { ["id"]=> int(4557) ["email"]=> string(32) "komjathy.lajos.jozsef@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3995) ["seq"]=> int(6) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-6486-9122" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(9) "Komjáthy" ["hu_HU"]=> string(9) "Komjáthy" } ["givenName"]=> array(2) { ["en_US"]=> string(13) "Lajos József" ["hu_HU"]=> string(13) "Lajos József" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(22) "young democratic state" [1]=> string(9) "stability" [2]=> string(11) "operability" [3]=> string(16) "peace operations" [4]=> string(43) "preparation and training of law enforcement" [5]=> string(26) "experiences in Afghanistan" } ["en_US"]=> array(6) { [0]=> string(22) "young democratic state" [1]=> string(9) "stability" [2]=> string(11) "operability" [3]=> string(16) "peace operations" [4]=> string(43) "preparation and training of law enforcement" [5]=> string(26) "experiences in Afghanistan" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#761 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10622) ["id"]=> int(3134) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(3995) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The Battle of Britain was the biggest and the most important air battle during the second World War (10. July 1940 – 31. October 1940) in which the pilots of Royal Air Force and the Luftwaffe fought against each other. It can be divided into four major sections where serious technological advances took place, influencing its outcome.
" ["hu_HU"]=> string(430) "Az angliai csata (1940. július 10. ‒ október 31.) a történelem legnagyobb és legfontosabb légi csatája volt a második világháborúban, melyben a brit Royal Air Force (továbbiakban: RAF) és a német légierő (Luftwaffe) pilótái csaptak össze. Négy nagy szakaszra oszthatjuk a csatát, minden szakasz alatt komoly technológiai fejlesztés ment végbe, ami jelentősen befolyásolta annak végkimenetelét.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(38) "The Battle of Britain and the Opponent" ["hu_HU"]=> string(40) "Az angliai csata és szembenálló felei" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#766 (6) { ["_data"]=> array(15) { ["id"]=> int(4558) ["email"]=> string(20) "kovpet1991@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3996) ["seq"]=> int(7) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-6783-0979" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Kovács" ["hu_HU"]=> string(7) "Kovács" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Petra" ["hu_HU"]=> string(5) "Petra" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(13) "angliai csata" [1]=> string(23) "második világháború" [2]=> string(3) "RAF" [3]=> string(9) "Luftwaffe" } ["en_US"]=> array(4) { [0]=> string(17) "Battle of Britain" [1]=> string(13) "II. World War" [2]=> string(3) "RAF" [3]=> string(9) "Luftwaffe" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#765 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10624) ["id"]=> int(3135) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(3996) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Britain’s Defence Strategy and her Home Defence Forces Between the 17th and 19th Century
The main goal of this study is to introduce Great Britain’s unique defence strategy and her empire’s militia type home defence forces. In the following, this paper introduces the British Empire’s strategic position, her international relationships and in this context her armed forces’ proper military organization, which was different during this era in many ascpets compared to other nations.
" ["hu_HU"]=> string(409) "The main goal of this study is to introduce Great Britain’s unique defence strategy and her empire’s militia type home defence forces. In the following, this paper introduces the British Empire’s strategic position, her international relationships and in this context her armed forces’ proper military organization, which was different during this era in many ascpets compared to other nations.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(90) "Britain’s Defence Strategy and her Home Defence Forces Between the 17th and 19th Century" ["hu_HU"]=> string(90) "Britain’s Defence Strategy and Her Home Defence Forces Between the 17th and 19th Century" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#733 (6) { ["_data"]=> array(15) { ["id"]=> int(4559) ["email"]=> string(31) "molnar.gabor.zoltan27@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3997) ["seq"]=> int(8) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-7227-9405" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Molnár" ["hu_HU"]=> string(7) "Molnár" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Gábor" ["hu_HU"]=> string(6) "Gábor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(8) { [0]=> string(8) "strategy" [1]=> string(11) "recruitment" [2]=> string(26) "expeditionary capabilities" [3]=> string(20) "expeditionary forces" [4]=> string(14) "militia forces" [5]=> string(16) "volunteer forces" [6]=> string(15) "colonial forces" [7]=> string(16) "auxiliary troops" } ["en_US"]=> array(8) { [0]=> string(8) "strategy" [1]=> string(11) "recruitment" [2]=> string(26) "expeditionary capabilities" [3]=> string(20) "expeditionary forces" [4]=> string(14) "militia forces" [5]=> string(16) "volunteer forces" [6]=> string(15) "colonial forces" [7]=> string(16) "auxiliary troops" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#769 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10626) ["id"]=> int(3136) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(3997) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }First Results of Automation of Command and Control Systems in the US Army III.
This article is the next partial result of a planned long-term research. The ultimate goal ofthe research is to present a history of the REVA service from the point of view of technical devices. Continuing the previous part, this article presents the Combat Service Support System (CS3), one of the three subsystems of the field, army automated command and control systems in the US Army, the military supply system to automate tasks.
" ["hu_HU"]=> string(631) "Ez a cikk egy hosszú időre tervezett kutatás következő részeredménye. A kutatás végső célja az informatikai szolgálat történetének megírása a rendszeresített technikai eszközök szemszögéből. Ebben a cikkben az előző részek folytatásaként a háborús vezetés automatizálásának tervezett programjai közül az amerikai szárazföldi csapatoknál a tábori (összfegyvernemi) hadsereg automatizált csapatvezetési rendszerének harmadik alrendszere, a hadtápellátás automatizált adatfeldolgozó rendszere a CS3 rendszer kerül bemutatásra a rendszer technikai hátterének szemszögéből.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(78) "First Results of Automation of Command and Control Systems in the US Army III." ["hu_HU"]=> string(99) "A csapatvezetési rendszerek automatizálásának első eredményei az USA fegyveres erőinél III." } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#779 (6) { ["_data"]=> array(15) { ["id"]=> int(4560) ["email"]=> string(23) "negyesi.imre@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3998) ["seq"]=> int(9) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-1144-1912" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Négyesi" ["hu_HU"]=> string(8) "Négyesi" } ["givenName"]=> array(2) { ["en_US"]=> string(4) "Imre" ["hu_HU"]=> string(4) "Imre" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(19) "számítástechnika" [1]=> string(12) "információ" [2]=> string(8) "vezetés" [3]=> string(12) "történelem" } ["en_US"]=> array(4) { [0]=> string(9) "Computers" [1]=> string(11) "Information" [2]=> string(10) "Management" [3]=> string(7) "History" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#773 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10628) ["id"]=> int(3137) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(3998) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Cyberstrategy of United States – Chronology Process in the Light of the Goals
Thanks to continuous technological progress and the emergence of new security challenges and threats, they become part of the daily activities of military activities. The capabilities and the ever-increasing tendencies have been recognized by NATO (North Atlantic Treaty Organization), the European Union, the United States of America and Hungary. Our country, the National University of Public Service and the Hungarian Defense Forces are facing major challenges in the development, creation and application of cyber-security and cybercrime capabilities. It is therefore important to examine the US strategy for the United States, to systematize the documents adopted at the meetings, which are related to the cyber defense efforts.
" ["hu_HU"]=> string(740) "Thanks to continuous technological progress and the emergence of new security challenges and threats, they become part of the daily activities of military activities. The capabilities and the ever-increasing tendencies have been recognized by NATO (North Atlantic Treaty Organization), the European Union, the United States of America and Hungary. Our country, the National University of Public Service and the Hungarian Defense Forces are facing major challenges in the development, creation and application of cyber-security and cybercrime capabilities. It is therefore important to examine the US strategy for the United States, to systematize the documents adopted at the meetings, which are related to the cyber defense efforts.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(79) "Cyberstrategy of United States – Chronology Process in the Light of the Goals" ["hu_HU"]=> string(79) "Cyberstrategy of United States – Chronology Process in the Light of the Goals" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#768 (6) { ["_data"]=> array(15) { ["id"]=> int(4561) ["email"]=> string(24) "parada.istvan@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(3999) ["seq"]=> int(10) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-3083-6015" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Paráda" ["hu_HU"]=> string(7) "Paráda" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "István" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(12) "Cyberstategy" [1]=> string(22) "Critical Infrastucture" [2]=> string(21) "Department of Defense" } ["en_US"]=> array(3) { [0]=> string(12) "Cyberstategy" [1]=> string(22) "Critical Infrastucture" [2]=> string(21) "Department of Defense" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#777 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10630) ["id"]=> int(3138) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(3999) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The Naval Warfare of the Great Powers in the Age of Muzzle-loading Weapons (1648‒1866) Part V.
The first part of the article series introduced the military-technical means and organizations of the naval forces of Great Britain, France, Russia and the Habsburg Empire in the era of ship of the line equipped with muzzle-loading cannons. The second and third part presents the geostrategic position of the same states, their role in the colonization and also their economic potential in the same period with particular reference to the effect of these factors on the development of the naval forces. The fourth part studies the effects of industrial revolution on the navies. The fifth part studies the British, French and US naval organizations in the era of ships of the line.
" ["hu_HU"]=> string(715) "A cikksorozat első része Nagy-Britannia, Franciaország és Oroszország, illetve a Habsburg Birodalom haditengerészetének haditechnikai eszközeit és szervezeteit mutatta be az elöltöltő ágyúval felszerelt sorhajók korszakában. A második és a harmadik rész ugyanezeknek az államoknak a geostratégiai pozícióját, a gyarmatosításban betöltött szerepét, illetve gazdasági potenciálját tárgyalta, különös tekintettel e tényezők haditengerészet fejlődésére gyakorolt hatására. A negyedik rész az ipari forradalom hatásait vizsgálja a haditengerészetekre. Az ötödik rész a brit, francia és amerikai haditengerészet szervezetét mutatja be a sorhajók korszakában.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(7) "Part V." ["hu_HU"]=> string(8) "V. rész" } ["title"]=> array(2) { ["en_US"]=> string(89) "The Naval Warfare of the Great Powers in the Age of Muzzle-loading Weapons (1648‒1866) " ["hu_HU"]=> string(71) "A nagyhatalmak tengeri hadviselése az elöltöltő fegyverek korában " } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(3) { [0]=> object(Author)#764 (6) { ["_data"]=> array(15) { ["id"]=> int(4610) ["email"]=> string(26) "turcsanyi.karoly@uninke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4042) ["seq"]=> int(11) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-0161-6718" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Turcsányi" ["hu_HU"]=> string(10) "Turcsányi" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Károly" ["hu_HU"]=> string(7) "Károly" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#780 (6) { ["_data"]=> array(15) { ["id"]=> int(4611) ["email"]=> string(22) "hegedus.erno@hm.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4042) ["seq"]=> int(11) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-8457-5044" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Hegedűs" ["hu_HU"]=> string(8) "Hegedűs" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Ernő" ["hu_HU"]=> string(5) "Ernő" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#782 (6) { ["_data"]=> array(15) { ["id"]=> int(4612) ["email"]=> string(20) "ban.attila@hm.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4042) ["seq"]=> int(11) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-8254-1139" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Bán" ["hu_HU"]=> string(4) "Bán" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Attila" ["hu_HU"]=> string(6) "Attila" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(29) "haditengerészeti hadviselés" [1]=> string(20) "elöltöltő fegyver" [2]=> string(8) "sorhajó" [3]=> string(27) "haditengerészet szervezete" } ["en_US"]=> array(4) { [0]=> string(13) "naval warfare" [1]=> string(18) "muzzle-loading gun" [2]=> string(16) "ship of the line" [3]=> string(18) "naval organization" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#781 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10714) ["id"]=> int(3180) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4042) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The Effect of the Neturei Karta and Sikrikim on the Security of the State of Israel
Most of the ultra-orthodox Jewish groups have anti-Zionist views to certain extent. This attitude stems from the strict interpretation of the lines of the Song of Songs (2.7; 3.5; 8.4), according to which God forbade the mass return of Jews to Israel until the Messiah came. It means that the establishment of a Jewish state in the land of Israel can not be based on national self-determination, it can only be achieved by the fulfillment of religious prophecies. Among these groups, the Neturei Karta is the most extremely anti-Zionist. Within the Neturei Karta, there is, however, a smaller community, the Sikrikim, which is even more radical. The operation of both groups involves certain security challenges, especially in the area of public security and intelligence / counter-intelligence.
" ["hu_HU"]=> string(940) "Az ultra-ortodox zsidóság vallási csoportok többségéről kijelenthető, hogy valamilyen mértékben anti-cionista nézeteket vall. Ez a hozzáállás az Énekek Énekének (2,7; 3,5; 8,4) verseit magyarázó sorok szigorú értelmezéséből ered: eszerint Isten megtiltotta a zsidóságnak az Izraelbe való tömeges visszatérést egészen addig, amíg el nem jön a Messiás. Ebből következik, hogy egy zsidó állam megalapítását Izrael földjén nem lehet a nemzeti önrendelkezésre alapozni, az csupán a vallási próféciák beteljesülésével jöhet el. Ezen csoportok közül a Neturei Karta számít a legszélsőségesebben anti-cionistának. A Neturei Kartán belül azonban van egy kisebb közösség, a Sikrikim, amely még radikálisabbnak számít. Mindkét csoport működése tartalmaz bizonyos mértékű biztonsági kihívásokat, főleg a közbiztonság és a hírszerzés/elhárítás területén.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(83) "The Effect of the Neturei Karta and Sikrikim on the Security of the State of Israel" ["hu_HU"]=> string(79) "A Neturei Karta és a Sikrikim közösség hatása Izrael Állam biztonságára" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#776 (6) { ["_data"]=> array(15) { ["id"]=> int(4613) ["email"]=> string(24) "kiraly.istvan@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4043) ["seq"]=> int(12) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-9405-5843" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Király" ["hu_HU"]=> string(7) "Király" } ["givenName"]=> array(2) { ["en_US"]=> string(15) "István Mihály" ["hu_HU"]=> string(15) "István Mihály" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(21) "ultra-ortodox zsidók" [1]=> string(6) "Izrael" [2]=> string(13) "Neturei Karta" } ["en_US"]=> array(3) { [0]=> string(19) "ultra-orthodox Jews" [1]=> string(6) "Israel" [2]=> string(13) "Neturei karta" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#790 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10717) ["id"]=> int(3182) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4043) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The aim of this paper is to collect those essential questions which determine Romania’s role in NATO. Taking into account that since 2014 there is a crisis in Ukraine the purpose of strengthening the Eastern European borders and the strategic role of the Black Sea, makes the regional security more important. Romania became a key partner of the United States of America and the NATO not only in these days, but before it has joined the Alliance as well.
" ["hu_HU"]=> string(597) "A tanulmány célja, hogy összegezze azokat a lényegesnek számító kérdéseket, melyek meghatározzák Románia NATO-ban vállalt és betöltött szerepét. Figyelembe véve a 2014 óta zajló ukrán válság hatásait főként a kelet-európai határ védelmének erősítésére, illetve a Fekete-tenger stratégiai jelentőségére vonatkozóan, a regionális biztonság egyre kiemelkedőbb szereppel bír. Románia kulcsfontosságú partnerévé vált az Egyesült Államok és a NATO számára nem csupán napjainkban, hanem a Szövetséghez való csatlakozását megelőzően is.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(58) "Geostrategic Role of Romania on the NATO’s Eastern Flank" ["hu_HU"]=> string(55) "Románia geostratégiai szerepe a NATO keleti határán" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#785 (6) { ["_data"]=> array(15) { ["id"]=> int(4615) ["email"]=> string(26) "kozma.klementina@uninke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4045) ["seq"]=> int(13) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-5746-7048" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Kozma" ["hu_HU"]=> string(5) "Kozma" } ["givenName"]=> array(2) { ["en_US"]=> string(10) "Klementina" ["hu_HU"]=> string(10) "Klementina" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(8) "Románia" [1]=> string(13) "Fekete-tenger" [2]=> string(22) "biztonsági környezet" [3]=> string(13) "geostratégia" } ["en_US"]=> array(4) { [0]=> string(7) "Romania" [1]=> string(9) "Black Sea" [2]=> string(20) "security environment" [3]=> string(11) "geostrategy" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#789 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10721) ["id"]=> int(3184) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4045) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }There has been crisis management and critical infrastructure protection within the Spanish government since the 1990s, but in the wake of the new challenges, a National Security Office (Departamento de Seguridad Nacional) was established in the Prime Minister's Office in 2012, to coordinate the national security activity of the government institutions at the highest possible political level.
The Spanish government issued a National Security Strategy in 2011 for the first time, followed by the second in 2013, and by the third, current strategy in December 2017. In addition to the National Security Strategy, the Cyber Security Strategy (2013), the Maritime Security Strategy (2013) and the Energy Security Strategy (2015) were created as separate documents under the coordination of the National Security Office.
The Spanish National Security Strategy of 2013 launched a new National Security System in which the Prime Minister is responsible for the management, direction and promotion of the national security policy. In 2013, the National Security Council (Consejo de Seguridad Nacional) was set up with the participation of the Deputy Prime Minister, the relevant State Secretaries, the Director of the Prime Minister’s Office and the heads of the military, law enforcement and intelligence agencies. The Council has met 15 times since its creation. In 2015 the National Security Act codified the structure and it obliges the government to report on the implementation of the national security strategy annually and to renew the national security strategy every five years.
Special committees have been established to support the National Security Council in specific areas of National Security Strategy. These committees are activated in situations where the coordination of various agencies of the Public Administration are necessary, therefore they comprise the appropriate public authorities and private agents when required.
There has been crisis management and critical infrastructure protection within the Spanish government since the 1990s, but in the wake of the new challenges, a National Security Office (Departamento de Seguridad Nacional) was established in the Prime Minister's Office in 2012, to coordinate the national security activity of the government institutions at the highest possible political level.
The Spanish government issued a National Security Strategy in 2011 for the first time, followed by the second in 2013, and by the third, current strategy in December 2017. In addition to the National Security Strategy, the Cyber Security Strategy (2013), the Maritime Security Strategy (2013) and the Energy Security Strategy (2015) were created as separate documents under the coordination of the National Security Office.
The Spanish National Security Strategy of 2013 launched a new National Security System in which the Prime Minister is responsible for the management, direction and promotion of the national security policy. In 2013, the National Security Council (Consejo de Seguridad Nacional) was set up with the participation of the Deputy Prime Minister, the relevant State Secretaries, the Director of the Prime Minister’s Office and the heads of the military, law enforcement and intelligence agencies. The Council has met 15 times since its creation. In 2015 the National Security Act codified the structure and it obliges the government to report on the implementation of the national security strategy annually and to renew the national security strategy every five years.
Special committees have been established to support the National Security Council in specific areas of National Security Strategy. These committees are activated in situations where the coordination of various agencies of the Public Administration are necessary, therefore they comprise the appropriate public authorities and private agents when required.
Protecting Critical Information Infrastructures from Cyber Attacks in Turkey: Cybersecurity Versus Internet Freedom?
The study introduces Turkey’s cybersecurity environment, main actors, institutions and strategies. The analysis highlights the connection between global trends, the growing regional instability, the Turkish internal political affairs and the development of the Turkish cyber defense capabilities. The paper draws attention to the fact that without proper legal guarantees the development of the states’ cyber defense capabilities can make it easier for authoritarian regimes not just to fight against cybercriminals and cyberterrorists but to silence the political opposition.
" ["hu_HU"]=> string(622) "A tanulmány Törökország kiberbiztonsági környezetét, fő szereplőit, intézményeit és stratégiáit mutatja be. Az elemzés rámutat a globális trendek, a növekvő regionális instabilitás, a török belpolitikai fejlemények és a török kibervédelmi képességek közötti összefüggésre. Emellett felhívja a figyelmet arra, hogy az államok kibervédelmi képességeinek fejlesztése megfelelő jogi garanciák hiányában nem csak a kiberbűnözők és a kiberterroristák elleni harcot könnyíti meg az autoriter rezsimek számára, hanem a politikai ellenvélemények elhallgattatását is.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(116) "Protecting Critical Information Infrastructures from Cyber Attacks in Turkey: Cybersecurity Versus Internet Freedom?" ["hu_HU"]=> string(135) "Kritikus információs infrastruktúrák kibertámadások elleni védelme Törökországban: kiberbiztonság versus internetszabadság?" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#799 (6) { ["_data"]=> array(15) { ["id"]=> int(4629) ["email"]=> string(29) "penzvalto.nikolett@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4055) ["seq"]=> int(15) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-1114-1488" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(12) "Pénzváltó" ["hu_HU"]=> string(12) "Pénzváltó" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Nikolett" ["hu_HU"]=> string(8) "Nikolett" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(14) "Törökország" [1]=> string(15) "kiberbiztonság" [2]=> string(18) "internetszabadság" } ["en_US"]=> array(3) { [0]=> string(6) "Turkey" [1]=> string(14) "cyber security" [2]=> string(16) "internet freedom" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#800 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10744) ["id"]=> int(3196) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4055) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Compensation for Prisoners in the Light of the Case-Law of the European Court of Human Rights
In my paper, I intend to examine how the circumstances of imprisonment are or may be detrimental to human dignity, with particular focus on the inadequate living space, in the light of the international requirement system, the professional processes we intend to introduce in order to compensate the damaged prisoners and find a solution to the structural problems of the penitentiary system, and finally, I make some proposals to address the possible overcrowding with professional methods.
" ["hu_HU"]=> string(570) "Dolgozatom témája annak vizsgálata, hogy a nemzetközi követelményrendszer tükrében a bebörtönzés körülményei – különös tekintettel az élettér elégtelenségére – miként sértik/sérthetik az emberi méltóságot, a büntetés-végrehajtási rendszerben fennálló strukturális problémák megoldására milyen szakmai eljárások bevezetésével kíséreljük meg kártalanítani a sérelmet szenvedett fogvatartottakat és végül néhány javaslattal élek a lehetségese túltelítettség szakmai módszerekkel való csökkentésére.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(93) "Compensation for Prisoners in the Light of the Case-Law of the European Court of Human Rights" ["hu_HU"]=> string(95) "A fogvatartottak kártalanítása az Emberi Jogok Európai Bírósága joggyakorlata tükrében" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#804 (6) { ["_data"]=> array(15) { ["id"]=> int(4632) ["email"]=> string(24) "forgacs.judit@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4059) ["seq"]=> int(16) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-4490-5875" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Forgács" ["hu_HU"]=> string(8) "Forgács" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Judit" ["hu_HU"]=> string(5) "Judit" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(24) "büntetés-végrehajtás" [1]=> string(15) "kártalanítás" [2]=> string(17) "túltelítettség" [3]=> string(20) "minimális élettér" } ["en_US"]=> array(4) { [0]=> string(15) "law enforcement" [1]=> string(12) "compensation" [2]=> string(12) "overcrowding" [3]=> string(20) "minimal living space" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#803 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(24647) ["id"]=> int(3199) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4059) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The deuterocanonical Book of Ben Sira is considered a collection of wisdom sayings as it belongs to biblical wisdom literature. Attached to the collection of sayings we find a hymn, a so-called anthology „The Praise of the Fathers” representing the author’s view on Israel’s history. Ben Sira’s main concern appears to be the Law (the Torah) and the relation of man to God. The author considers the influence an exceptonal individual can excercise over society in general. The heros are discovered by Ben Sira in four offices: patriarch, priest, judge and king. The portrait gallery includes nevertheless one warrior, a man of valour, Joshua. Joshua’s glory and greatness is described by Ben Sira as depending on Joshua’s prophetic office: his military success is due to God’s intervention on his behalf. Thus, the author of the hellenistic period confirms the biblical view on war: war is always holy, it is part of the cult led by God and fought with God’s help.
" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#806 (6) { ["_data"]=> array(15) { ["id"]=> int(4635) ["email"]=> string(26) "hajnal.piroska@t-online.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4062) ["seq"]=> int(17) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-2736-312X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Hajnal" ["hu_HU"]=> string(6) "Hajnal" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Piroska" ["hu_HU"]=> string(7) "Piroska" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["hu_HU"]=> array(5) { [0]=> string(7) "prophet" [1]=> string(6) "wisdom" [2]=> string(7) "warrior" [3]=> string(16) "biblical warfare" [4]=> string(4) "hero" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#807 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10756) ["id"]=> int(3202) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4062) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }To make the members of the society, especially the younger generations more affective towards national defence has been an important state activity for a long time. The study reviews on the most important areas of patriotic education from the beginning of the 19th century till the beginning of the millenium.
" ["hu_HU"]=> string(278) "A társadalom tagjainak, különösen a fiatal generációknak a honvédelem ügye iránti érzékenyítése hosszú idő óta kiemelt állami feladat. A tanulmány a XIX. századtól a kétezres évek elejéig tekinti át a honvédelmi nevelés legfontosabb színtereit.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(49) "Patriotic Education from Historical Point of View" ["hu_HU"]=> string(45) "Honvédelmi nevelés történeti távlatokban" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#810 (6) { ["_data"]=> array(15) { ["id"]=> int(4642) ["email"]=> string(25) "kunszabo.istvan@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4069) ["seq"]=> int(18) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-3086-3184" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(10) "Kun Szabó" ["hu_HU"]=> string(10) "Kun Szabó" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "István" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(20) "honvédelmi nevelés" [1]=> string(16) "levente mozgalom" [2]=> string(4) "MHSZ" } ["en_US"]=> array(3) { [0]=> string(19) "patriotic education" [1]=> string(16) "Levente movement" [2]=> string(24) "Hungarian Defence League" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#812 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10771) ["id"]=> int(3208) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4069) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The article examines the sustainability of our country's environmental status through the use of various natural resources in Hungary. Both sides of energy management are focused on production and consumption. The mix of energy used is evaluated through the change in carbon dioxide emissions. The amount of energy used is also analysed in the proportions of the individual economic sectors. In water management, the water flow of surface water is compared with the amount of water from the drilled wells and the amount of water used. After the demise of water-intensive and polluting heavy industries, domestic water management seems to be sustainable for a long time. The sustainability of agriculture is measured by the number of agricultural employees and by the size of the cultivated land or its changes.
" ["hu_HU"]=> string(934) "A tanulmány a különböző természeti erőforrások magyarországi felhasználásán keresztül tekinti át hazánk környezeti állapotának fenntarthatóságát. Az energiagazdálkodás két oldalát, a termelést és a fogyasztást vizsgálja. A felhasznált energia mix összetételét a széndioxid kibocsátás változásán keresztül értékeli. Az elfogyasztott energia mennyiségét az egyes nemzetgazdasági ágazatokban is, és azok között arányaiban is vizsgálja. A vízgazdálkodásban a felszíni vizek vízhozamát vetjük össze a fúrt kutakból kiemelt és a felhasznált víz mennyiségével. A vízigényes és környezetszennyező nehézipar leépülése után a hazai vízgazdálkodás hosszú ideig fenntarthatónak tűnt. A mezőgazdaság fenntarthatóságát az ágazatban foglalkoztatottak számával, illetve a művelés alatt lévő termőterület nagyságával, annak változásaival méri.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(75) "Changing of Sustainability Characteristics in Hungary Between 1990 and 2017" ["hu_HU"]=> string(80) "Fenntarthatósági jellemzők változása Magyarországon 1990 és 2017 között" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#816 (6) { ["_data"]=> array(15) { ["id"]=> int(4643) ["email"]=> string(26) "andrea.farkas@klimaklub.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4070) ["seq"]=> int(19) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-1820-7988" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Farkas" ["hu_HU"]=> string(6) "Farkas" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Andrea" ["hu_HU"]=> string(6) "Andrea" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(12) { [0]=> string(11) "energia mix" [1]=> string(38) "üvegházhatású gázok kibocsátása" [2]=> string(16) "energiatermelés" [3]=> string(18) "energiafogyasztás" [4]=> string(13) "háztartások" [5]=> string(12) "közlekedés" [6]=> string(14) "mezőgazdaság" [7]=> string(18) "területhasználat" [8]=> string(22) "beépített területek" [9]=> string(18) "nemzeti biztonság" [10]=> string(24) "kritikus infrastruktúra" [11]=> string(23) "biztonsági kockázatok" } ["en_US"]=> array(12) { [0]=> string(10) "energy mix" [1]=> string(23) "greenhouse gas emission" [2]=> string(17) "energy production" [3]=> string(18) "energy consumption" [4]=> string(10) "households" [5]=> string(9) "transport" [6]=> string(11) "agriculture" [7]=> string(8) "land use" [8]=> string(14) "built-up areas" [9]=> string(17) "national security" [10]=> string(23) "critical infrastructure" [11]=> string(17) "risks of security" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#815 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10774) ["id"]=> int(3210) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4070) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Studying the Possibilities of Postgraduate Specialisation Programme Collecting Governmental Aimed Info-Communication Systems and Services: Presentation of Research Program
During the recent national and international level crises, danger situations and other emergency events, a strong cooperation is required among the defence organisations maintaining the response activity. Thus info-communication support of command and control activity is put into focus, which can be a key feature to success. To the purpose of helping this, high level preparation of infocommunication experts with a focus on complex activities is inevitable. In this recent paper the author wishes to draw up the necessary knowledge material for the creation of a possible postgraduate specialisation programme, and to present the subject, aim and basics of a research in interest of it.
" ["hu_HU"]=> string(696) "During the recent national and international level crises, danger situations and other emergency events, a strong cooperation is required among the defence organisations maintaining the response activity. Thus info-communication support of command and control activity is put into focus, which can be a key feature to success. To the purpose of helping this, high level preparation of infocommunication experts with a focus on complex activities is inevitable. In this recent paper the author wishes to draw up the necessary knowledge material for the creation of a possible postgraduate specialisation programme, and to present the subject, aim and basics of a research in interest of it.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(171) "Studying the Possibilities of Postgraduate Specialisation Programme Collecting Governmental Aimed Info-Communication Systems and Services: Presentation of Research Program" ["hu_HU"]=> string(171) "Studying the Possibilities of Postgraduate Specialisation Programme Collecting Governmental Aimed Info-Communication Systems and Services: Presentation of Research Program" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#820 (6) { ["_data"]=> array(15) { ["id"]=> int(4644) ["email"]=> string(23) "farkas.tibor@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4071) ["seq"]=> int(20) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-8868-9628" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Farkas" ["hu_HU"]=> string(6) "Farkas" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Tibor" ["hu_HU"]=> string(5) "Tibor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(16) "research project" [1]=> string(37) "postgraduate specialisation programme" [2]=> string(18) "info-communication" [3]=> string(14) "defence sector" [4]=> string(21) "defence communication" } ["en_US"]=> array(5) { [0]=> string(16) "research project" [1]=> string(37) "postgraduate specialisation programme" [2]=> string(18) "info-communication" [3]=> string(14) "defence sector" [4]=> string(21) "defence communication" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#819 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10776) ["id"]=> int(3211) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4071) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The Application of Military Scrum Requirement Analysis Method During Critical Infrastructure Developments
In the previous decade, the European Union defined the notion of critical infrastructures – vital systems in Hungarian terminology. This article explores the development process of the European Union regulations from the beginning of the 2000s to present days, as well as the related domestic legislation. After that, we can take an insight into the two decades old agile software development which has a decisive direction in the software technology nowadays. At the end of the study, we can see the requirement analysis method of the Military Scrum what can be used to decrease the external- and internal risks in the islands of the cyberspace.
" ["hu_HU"]=> string(750) "Az Európai Unió már az előző évtizedben definiálta a kritikus infrastruktúrák – a magyar terminológiában létfontosságú rendszerek – fogalmát. A dolgozat feltárja az Európai Uniós szabályozás fejlődését a 2000-es évek elejétől napjainkig, valamint a kapcsolódó hazai jogszabályokat is górcső alá veszi. Ezt követően betekintést nyerhetünk a szoftvertechnológia egy lassan húsz éves múltra visszavezethető, napjainkban meghatározó irányvonalára az agilis szoftverfejlesztésre is. A tanulmány végén a kibertér szigeteiben tapasztalható külső és belső eredetű kockázatok kezelésére is használható módszert, a Military Scrum követelményelemző módszerét mutatják be a szerzők.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(105) "The Application of Military Scrum Requirement Analysis Method During Critical Infrastructure Developments" ["hu_HU"]=> string(112) "A Military Scrum követelményelemző módszerének alkalmazása létfontosságú rendszerek fejlesztése során" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(2) { [0]=> object(Author)#824 (6) { ["_data"]=> array(15) { ["id"]=> int(4645) ["email"]=> string(28) "gerevich.janos@agilexpert.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4072) ["seq"]=> int(21) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-7236-4514" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Gerevich" ["hu_HU"]=> string(8) "Gerevich" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "János" ["hu_HU"]=> string(8) "János " } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#829 (6) { ["_data"]=> array(15) { ["id"]=> int(4646) ["email"]=> string(23) "negyesi.imre@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4072) ["seq"]=> int(21) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-1144-1912" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Négyesi" ["hu_HU"]=> string(8) "Négyesi" } ["givenName"]=> array(2) { ["en_US"]=> string(4) "Imre" ["hu_HU"]=> string(4) "Imre" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(7) { [0]=> string(8) "kritikus" [1]=> string(16) "létfontosságú" [2]=> string(15) "infrastruktúra" [3]=> string(8) "rendszer" [4]=> string(6) "agilis" [5]=> string(13) "követelmény" [6]=> string(8) "elemzés" } ["en_US"]=> array(7) { [0]=> string(8) "critical" [1]=> string(5) "vital" [2]=> string(14) "infrastructure" [3]=> string(6) "system" [4]=> string(5) "agile" [5]=> string(11) "requirement" [6]=> string(8) "analysis" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#823 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10778) ["id"]=> int(3212) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4072) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Assigned Strength Home Retraining of the No. 101 Flying Squadron, Circumstances of Flying Technical Routine Recovery
Beginning of home practical re-training, Flying technical routine recovery of the flying personnel re-trained in SU after flight tests. Recovery of trainer routine. Documents of pilots and flights. Leading of flights, flight leaders. Zone flight service system.
" ["hu_HU"]=> string(432) "A hazai gyakorlati átképzés megkezdése a Szovjetunióban átképzett repülőgépvezetői állomány repüléstechnikai jártasságának helyreállítása az átvételi berepüléseket követően. Az oktatói jártasság helyreállítása. A repülés és a repülőgépvezetők főbb okmányai. A repülések vezetése, a repülésvezetők. A zónás repülést kiszolgáló rendszer. A repülési váltás szolgálatai.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(116) "Assigned Strength Home Retraining of the No. 101 Flying Squadron, Circumstances of Flying Technical Routine Recovery" ["hu_HU"]=> string(151) "A 101. felderítőrepülő-század beosztott állománya hazai átképzésének, a repüléstechnikai jártassága helyreállításának körülményei" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#826 (6) { ["_data"]=> array(15) { ["id"]=> int(4652) ["email"]=> string(28) "goldensoldierpilot@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4077) ["seq"]=> int(22) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-9865-3530" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Katona" ["hu_HU"]=> string(6) "Katona" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "István" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(13) { [0]=> string(30) "repüléstechnikai jártasság" [1]=> string(29) "hazai állomány átképzése" [2]=> string(22) "átvételi berepülés" [3]=> string(38) "rendeltetésnek megfelelő jártasság" [4]=> string(21) "oktatói jogosultság" [5]=> string(14) "repülési lap" [6]=> string(26) "lövészet földi célokra" [7]=> string(11) "bombavetés" [8]=> string(18) "légi felderítés" [9]=> string(20) "légi fényképezés" [10]=> string(31) "repülésirányító szolgálat" [11]=> string(19) "ügyeletes mérnök" [12]=> string(15) "zónaparancsnok" } ["en_US"]=> array(14) { [0]=> string(24) "flying technical routine" [1]=> string(26) "home personnel re-training" [2]=> string(22) "acceptance flight test" [3]=> string(24) "proper procedure routine" [4]=> string(15) "trainer licence" [5]=> string(21) "paperwork for flights" [6]=> string(23) "shooting ground targets" [7]=> string(7) "bombing" [8]=> string(21) "reconnaissance flight" [9]=> string(18) "aerial photography" [10]=> string(15) "flight requests" [11]=> string(25) "flight management service" [12]=> string(16) "engineer on duty" [13]=> string(14) "zone commander" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#835 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10790) ["id"]=> int(3218) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4077) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The Psychological Aspects of Critical Informational Infrastructure (Human Security Risk Analysis)
The defense against the attacks on IT systems with high social importance depends more and more on the preparedness of the human operators. In the estimation and increasing of this preparedness the psychological selection, sifting and preparation play an important role.
In present article we firstly identify the legal regulators concerning the human security risk factors and we also take a look at their classification into the conceptual framework of the defense of the critical informational infrastructure. In the second part of the article we publish a comprehensive and elaborated process for analysing the human security risks, which was also implemented in practice. Following the identification of the personality traits that are resulting in risky behaviours one can sift those people who could be the targets of social engineering.
A társadalmi szempontból létfontosságú informatikai rendszerek elleni támadások elleni védekezés egyre fokozottabban múlik a dolgozók felkészültségén. A felkészültség mérésében, növelésében jelentős szerepet játszik a pszichológiai szempontú kiválasztás, szűrés és felkészítés. A cikkben bemutatásra kerül a humán biztonsági tényezőkkel kapcsolatos jelenlegi szabályozók beazonosítása és annak lehetséges besorolása a kritikus információs infrastruktúra védelem fogalomrendszerében. A cikk második részében egy, a gyakorlatban is kipróbált humán biztonsági kockázatelemzés kidolgozásának teljes folyamatát adjuk közre. A pszichológiai szempontból kockázati tényezőt jelentő személyiségjellemzők beazonosítását követően kerülhet sor azon személyek beazonosítására, akik nagyobb valószínűséggel lehetnek célpontjai az információs támadásoknak.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["prefix"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["subtitle"]=> array(2) { ["en_US"]=> string(30) "(Human Security Risk Analysis)" ["hu_HU"]=> string(38) "(Humán biztonsági kockázatelemzés)" } ["title"]=> array(2) { ["en_US"]=> string(66) "The Psychological Aspects of Critical Informational Infrastructure" ["hu_HU"]=> string(92) "A kritikus információs infrastruktúra védelem pszichológiai szempontú megközelítése" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(2) { [0]=> object(Author)#794 (6) { ["_data"]=> array(15) { ["id"]=> int(4661) ["email"]=> string(19) "neemeth@t-online.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4080) ["seq"]=> int(23) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-7392-7817" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Németh" ["hu_HU"]=> string(7) "Németh" } ["givenName"]=> array(2) { ["en_US"]=> string(4) "Zita" ["hu_HU"]=> string(4) "Zita" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#827 (6) { ["_data"]=> array(15) { ["id"]=> int(4662) ["email"]=> string(23) "volgyi.zoltan@uninke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4080) ["seq"]=> int(23) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-5779-9536" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Völgyi" ["hu_HU"]=> string(7) "Völgyi" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Zoltán" ["hu_HU"]=> string(7) "Zoltán" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(28) "humán biztonsági kockázat" [1]=> string(19) "kompetenciaelemzés" [2]=> string(31) "pszichológiai kockázati szint" [3]=> string(19) "fejlesztő központ" } ["en_US"]=> array(2) { [0]=> string(27) "human security risk factors" [1]=> string(23) "psychological selection" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#831 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10808) ["id"]=> int(3227) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4080) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }„Unrestricted Warfare” (超限战) – A Chinese Viewpoint on Power Competition in the 21st Century
This paper strives to analyze and give an overview of one of the key books of contemporary Chinese strategic studies, titled „Unrestricted Warfare” (超限战), written by QIAO Liang and WANG Xianshui. The consequent analyzis embeds the overview of the book within the historical context of its conception as well as the relevant aspects of Chinese geopolitical thinking.
„Unrestricted Warfare” was written as a consequence of one of China’s most important foreign policy shock experiences of recent years, the 1995-96 Taiwan Strait Crisis, therefore it can be viewed as a reaction to China’s conceptions of external threat perceptions. The virtue of the book is not necessarily it’s academic achievements in the field of strategic studies, rather the endeavour to conceptualize and disseminate issues of 21. century power struggles to a large domestic audience, strengthening the resilience of the Chinese public.
A mű a kínai hadelméleti gondolkodás utóbbi éveinek egyik legfontosabb művét, Qiao Liang és Wang Xiansui szerzőpáros „Korlátok nélküli hadviselés” ( 超限战 elterjedt angol fordításban „Unrestricted Warfare”) dolgozza fel, elemezve a mű főbb gondolatmeneteit és történeti, valamint a kínai geopolitikai gondolkodás kontextusában értelmezi annak üzenetét.
A könyv Kína utóbbi éveinek egyik legfontosabb külpolitikai sokkhatása, a tajvani krízis (1995–96) kapcsán látott napvilágot, ezért mindenképp egy reakciónak tekintendő Kína külső fenyegetettség percepcióival kapcsolatban. A könyv nem elsősorban hadtudományi új meglátásai miatt meghatározó, érdeme összetett, főként a kínai társadalom számára az új típusú hadviselés kihívásainak tudatosítása miatt fontos mű.
In the article the author explains the operational of surface-to-air missiles. In order to understand these systems easier, during the explanation there are no complicated physical or mathematical formulas. The author explains the principles of reactive propulsion, the basic rocket engine constructions, and explains what happens from the launch of the rocket until the destruction of the target.
" ["hu_HU"]=> string(420) "A cikkben a szerző ismerteti a légvédelmi rakéták működését. A könnyebb feldolgozhatóság érdekében a bonyolult fizikai és matematikai összefüggésektől eltekintve, a lehető legegyszerűbb módon mutatja be a reaktív hajtás elméletét, ismerteti az általános rakétahajtómű konstrukciókat, illetve végigvezeti az olvasót a rakéta kilövésétől kezdve a megsemmisítés pillanatáig.
" } ["copyrightHolder"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["title"]=> array(2) { ["en_US"]=> string(38) "Operational of Surface-to-Air Missiles" ["hu_HU"]=> string(34) "Légvédelmi rakéták működése" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#841 (6) { ["_data"]=> array(15) { ["id"]=> int(4704) ["email"]=> string(20) "1310balint@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(4117) ["seq"]=> int(25) ["userGroupId"]=> int(133) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-7755-893X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Tóth" ["hu_HU"]=> string(5) "Tóth" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Bálint" ["hu_HU"]=> string(7) "Bálint" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(16) "rakétahajtómű" [1]=> string(20) "légvédelmi rakéta" [2]=> string(35) "légi cél megsemmisítési módjai" [3]=> string(32) "rakéta irányítási rendszerek" } ["en_US"]=> array(4) { [0]=> string(13) "rocket engine" [1]=> string(22) "surface-to-air missile" [2]=> string(20) "destruction methodes" [3]=> string(20) "SAM guidance systems" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#845 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(10905) ["id"]=> int(3264) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(4117) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }