Full Issue
Editorial Greetings
Szerkesztői köszöntő
" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(0) "" } ["title"]=> array(1) { ["hu_HU"]=> string(24) "Szerkesztői köszöntő" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(0) { } ["keywords"]=> array(0) { } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#788 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46204) ["id"]=> int(6798) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(9057) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Police Science
Bírósági beadvány Sallai János tanúnyilatkozatára a folyamatban lévő Rendészettudományi szaklexikon téves szócikkeinek megsemmisítésére indított perben
Bírósági beadvány Sallai János tanúnyilatkozatára a folyamatban lévő Rendészettudományi szaklexikon téves szócikkeinek megsemmisítésére indított perben
" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(13) "Balla Zoltán" } ["title"]=> array(1) { ["hu_HU"]=> string(168) "Bírósági beadvány Sallai János tanúnyilatkozatára a folyamatban lévő Rendészettudományi szaklexikon téves szócikkeinek megsemmisítésére indított perben" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#763 (6) { ["_data"]=> array(15) { ["id"]=> int(11087) ["email"]=> string(23) "Balla.Zoltan@uni-nke.hu" ["includeInBrowse"]=> bool(false) ["publicationId"]=> int(8620) ["seq"]=> int(1) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(236) "habilitált docens, PhD, főiskolai tanár, Nemzeti Közszolgálati Egyetem Rendészettudományi Kar Igazgatásrendészeti és Nemzetközi Rendészeti Tanszék, Balla.Zoltan@uni-nke.hu
" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(5) "Balla" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Zoltán" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(0) { } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#790 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46205) ["id"]=> int(6799) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8620) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Next-Generation Developments in Digital Forensics and Cybersecurity Insights from a Study Visit to the National Forensic Sciences University
Introduction: The rapid expansion of digital technologies in the first quarter of the twenty-first century has fundamentally reshaped the nature and methods of criminal activity. The resulting threats – above all the exponential growth of cybercrimes, the proliferation of illegal activities on dark web platforms, and the increasingly widespread criminal exploitation of cryptocurrencies – pose complex challenges that can only be addressed through interdisciplinary approaches, sustained professional development, and the deployment of innovative technological solutions by law enforcement agencies.
Objectives: This study aims to document and analyse the professional experiences gathered by faculty members of the Faculty of Law Enforcement, University of Public Service, during the specialised training programme organised by the National Forensic Sciences University (NFSU) in Gandhinagar from 27 September to 4 October 2025. Particular attention is given to identifying which elements of the Indian digital forensics and cybersecurity model could be meaningfully transposed to Hungarian law enforcement practice, taking into account the domestic regulatory framework, the available technological infrastructure, and the specificities of organisational culture.
Methodology: The research draws on systematic analysis of first-hand empirical experiences gathered throughout the training programme. Participatory observation, professional consultations with NFSU faculty, and insights from lectures and laboratory demonstrations collectively enabled an in-depth examination of cutting-edge developments in forensic sciences, cybersecurity, and criminology. This approach simultaneously provided the analytical foundation for a comparative assessment of the Indian model's applicability within the Hungarian law enforcement context.
Results: The study visit brought to light technological solutions spanning multiple domains of law enforcement innovation: from the application of artificial intelligence in predictive policing and the investigation of dark web and cryptocurrency-related crimes, through mobile forensics methodologies and three-dimensional crime scene documentation, to brain mapping and polygraph-based examination techniques. India's model of technological self-reliance – in particular the Make in India and Make for India initiatives – offers instructive lessons for planning domestic developments. The training's key findings indicate that restricting PowerShell usage, introducing Faraday bags, integrating OSINT tools, and deploying AI for predictive policing each hold considerable development potential for Hungarian law enforcement.
Conclusion: The study visit confirmed that Hungarian law enforcement has substantial room for advancement in digital forensics and cybersecurity, the realisation of which requires strategic planning, interdisciplinary collaboration, and targeted technological investment. Pursuing technological self-reliance should be treated as a strategic priority; favouring ethical AI applications and open-source tools offers a more sustainable and adaptable long-term solution. Future partnership with NFSU – through joint research projects, student exchange programmes, and collaborative development of forensic tools – holds the promise of mutual benefit for both institutions.
" ["hu_HU"]=> string(3577) "Bevezetés: A 21. század első negyedében a digitális technológia rohamos terjedése gyökeresen átalakította a bűnözés természetét és módszereit. Az így keletkező új típusú fenyegetések – mindenekelőtt a kiberbűncselekmények, az illegális dark web platformok és a kriptovaluták bűnügyi célú alkalmazása – olyan összetett kihívásokat jelentenek, amelyek hatékony kezeléséhez a bűnüldöző szerveknek interdiszciplináris szemléletre, folyamatos szakmai megújulásra és innovatív technológiai eszközökre van szükségük.
Célkitűzések: A tanulmány célja összefoglalni azokat a szakmai tapasztalatokat, amelyeket a Nemzeti Közszolgálati Egyetem Rendészettudományi Karának oktatói a National Forensic Sciences University (NFSU) által Gandhinagarban, 2025. szeptember 27. és október 4. között szervezett továbbképzésen szereztek. A szerző különös figyelmet fordít annak vizsgálatára, hogy az indiai digitális forenzikai és kiberbiztonsági modell mely elemei ültethetők át a magyar rendészeti gyakorlatba, figyelembe véve a hazai jogszabályi környerzetet, az elérhető technológiai infrastruktúrát és a szervezeti kultúra sajátosságait.
Módszertan: A kutatás módszertani alapját a továbbképzési program keretében gyűjtött közvetlen, empirikus tapasztalatok rendszeres feldolgozása képezi. A résztvevő megfigyelés, az NFSU oktatóival folytatott szakmai konzultációk, valamint az előadásokon és laboratóriumi bemutatókon szerzett ismeretek együttesen tették lehetővé a forenzikus tudományok, a kiberbiztonság és a kriminológia legfrissebb trendjeit bemutató tartalmak mélyreható elemzését, s egyúttal megteremtették az összehasonlító értékelés alapját is.
Eredmények: A tanulmányút során megismert technológiai megoldások a rendészeti innováció számos területét ölelik fel: a mesterséges intelligencia prediktív rendészetben való alkalmazásától a dark web és kriptovaluta-ügyek nyomozásán, a mobilforenzika módszerein és a bűnügyi helyszínek háromdimenziós dokumentációján át az agytérképezés és poligráfalapú vizsgálati eljárásokig. Az indiai technológiai önállóság modellje – különösen a Make in India és a Make for India kezdeményezések tapasztalatai – releváns tanulságokkal szolgálhat a hazai fejlesztések tervezéséhez. A képzés megállapításai szerint a PowerShell-használat korlátozása, a Faraday-táskák rendszeresítése, az OSINT-eszközök integrációja, valamint az AI prediktív rendészeti alkalmazása mind számottevő fejlesztési potenciált hordoz.
Konklúzió: A tanulmányút összességében megerősítette, hogy a digitális forenzika és a kiberbiztonság területén a magyar rendészeti rendszernek jelentős fejlődési lehetőségei vannak, amelyek kiaknázásához stratégiai szemléletű tervezés, interdiszciplináris együttműködés és célzott technológiai beruházások szükségesek. A technológiai önállóságra törekvés stratégiai prioritásnak tekintendő; az etikus AI-alkalmazás és a nyílt forráskódú eszközök előnyben részesítése hosszú távon fenntarthatóbb és rugalmasabb megoldást kínál. Az NFSU-val kialakítható jövőbeli partnerség – közös kutatási projektek, hallgatócsere-programok és forenzikus eszközök együttes fejlesztése révén – mindkét intézmény számára kölcsönös előnyökkel kecsegtet.
" } ["subtitle"]=> array(2) { ["en_US"]=> string(72) "Insights from a Study Visit to the National Forensic Sciences University" ["hu_HU"]=> string(74) "Tapasztalatok a National Forensic Sciences University tanulmányútjáról" } ["title"]=> array(2) { ["en_US"]=> string(67) "Next-Generation Developments in Digital Forensics and Cybersecurity" ["hu_HU"]=> string(72) "A digitális forenzika és kiberbiztonság újgenerációs fejlesztései" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(14) "Bezerédi Imre" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#817 (6) { ["_data"]=> array(14) { ["id"]=> int(11485) ["email"]=> string(24) "bezeredi.imre@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8883) ["seq"]=> int(2) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(28) "NKE RTK Rendvédelmi Tagozat" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(32) "PhD, parancsnok-helyettes
" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(9) "Bezerédi" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(4) "Imre" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["hu_HU"]=> array(1) { [0]=> string(94) "digitális forenzika, kiberbiztonság, mesterséges intelligencia, prediktív rendészet, NFSU" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#807 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46206) ["id"]=> int(6800) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8883) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The Law and the Machine Thoughts on Regulating Artificial Intelligence
Introduction: The rapid development of artificial intelligence has created new regulatory challenges worldwide, with the European Union, the United States, China, and other countries providing different responses. However, it remains unclear to what extent traditional legislative tools are suitable for regulating dynamically evolving technologies capable of autonomous decision-making.
Objectives: The study aims to explore the fundamental dilemmas of AI legal regulation by comparing approaches across different legal systems and identifying the limitations of traditional legislation.
Methodology: The author employs comparative legal analysis, examining the European Union's 2024 AI Act (risk-based approach), the fragmented sectoral regulation of the United States, China's interim measures incorporating ideological control, and Brazil's framework bill proposal. The analysis extends to precedent-setting court cases (State v. Loomis), ethical framework documents (CEPEJ Charter), and the examination of data protection, liability, and transparency issues in legal practice.
Results: The analysis revealed that the reactive nature of traditional legislation constitutes a structural limitation in regulating dynamically developing AI technologies. The EU's risk-based approach enables promising differentiation, but the rigidity of the law hinders rapid adaptation. Establishing liability in cases of autonomous vehicles and algorithmic decision-making faces significant difficulties under traditional legal principles. The Loomis case highlighted the tension between algorithmic opacity and the right to due process. The five ethical principles formulated by CEPEJ – respect for fundamental rights, prohibition of discrimination, quality and security, transparency, and user control – provide a normative framework, but enforcement mechanisms are often lacking. The absence of international coordination leads to regulatory arbitrage and a fragmented compliance environment.
Conclusion: Legal regulation alone is insufficient for governing AI – adaptive regulatory frameworks, regulatory sandboxes, and the combination of mandatory requirements with flexible principle-based guidance are needed. AI regulation is not merely a technical but a societal and value-based question requiring ongoing dialogue and cooperation among governments, corporations, civil society, and academia. Future research should focus on the effectiveness of enforcement mechanisms, possibilities for international coordination, and the operationalization of ethical principles.
" ["hu_HU"]=> string(2932) "Bevezetés: A mesterséges intelligencia gyors fejlődése világszerte új szabályozási kihívásokat teremt, amelyekre az Európai Unió, az Egyesült Államok, Kína és más országok eltérő válaszokat adtak. Ugyanakkor kevéssé ismert, hogy a hagyományos jogalkotási eszközök mennyiben alkalmasak a dinamikusan változó, önálló döntéseket hozó technológiák szabályozására.
Célkitűzések: A tanulmány célja a mesterséges intelligencia jogi szabályozásának alapvető nehézségeit feltárni, összehasonlítva a különböző jogrendszerek megközelítéseit és azonosítva a hagyományos jogalkotás korlátait.
Módszertan: A szerző összehasonlító jogi elemzést alkalmaz, vizsgálva az Európai Unió 2024-es AI-Act (kockázatalapú megközelítés), az Egyesült Államok fragmentált szektorális szabályozását, Kína ideológiai kontrollt is magában foglaló átmeneti intézkedéseit, valamint Brazília kerettörvény-javaslatát. Az elemzés kiterjed a precedensértékű bírósági esetekre (State v. Loomis), az etikai keretdokumentumokra (CEPEJ Charta), valamint az adatvédelmi, felelősségi és átláthatósági kérdések joggyakorlati vizsgálatára.
Eredmények: Az elemzés feltárta, hogy a hagyományos jogalkotás reaktív jellege strukturális korlátot jelent a dinamikusan fejlődő MI-technológiák szabályozásában. Az EU kockázatalapú megközelítése ígéretes differenciálást tesz lehetővé, de a rendelet merevsége akadályozza a gyors alkalmazkodást. A felelősség megállapítása az önvezető járművek és az algoritmikus döntéshozatal esetében komoly nehézségekbe ütközik a hagyományos jogelvek alapján. A Loomis-ügy rámutatott az algoritmikus átláthatatlanság és a tisztességes eljáráshoz való jog közötti feszültségre. A CEPEJ által megfogalmazott öt etikai elv – az alapvető jogok tisztelete, diszkrimináció tilalma, minőség és biztonság, átláthatóság, valamint felhasználói ellenőrzés – normatív keretet ad, de a végrehajtási mechanizmusok gyakran hiányoznak. A nemzetközi koordináció hiánya szabályozási arbitrázshoz és töredezett megfelelési környezethez vezet.
Konklúzió: A rendeleti szabályozás önmagában nem elegendő az MI irányítására – adaptív szabályozási keretekre, szabályozási homokozókra és a kötelező előírások rugalmas, elvalapú iránymutatásokkal való ötvözésére van szükség. Az MI szabályozása nem pusztán technikai, hanem társadalmi és értékválasztási kérdés, amely folyamatos párbeszédet és a kormányzatok, vállalatok, civil társadalom és akadémia együttműködését igényli. A jövőbeni kutatásoknak a végrehajtási mechanizmusok hatékonyságára, a nemzetközi koordináció lehetőségeire és az etikai elvek operacionalizálására kell összpontosítaniuk.
" } ["subtitle"]=> array(2) { ["en_US"]=> string(46) "Thoughts on Regulating Artificial Intelligence" ["hu_HU"]=> string(59) "Gondolatok a mesterséges intelligencia szabályozásáról" } ["title"]=> array(2) { ["en_US"]=> string(23) "The Law and the Machine" ["hu_HU"]=> string(22) "A törvény és a gép" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(14) "Kiss Z. Edward" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#811 (6) { ["_data"]=> array(15) { ["id"]=> int(11439) ["email"]=> string(21) "kisszedward@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8851) ["seq"]=> int(3) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0009-6100-3380" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(57) "a:1:{s:5:"hu_HU";s:31:"Nemzeti Közszolgálati Egyetem";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(4) "Kiss" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(9) "Z. Edward" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(26) "mesterséges intelligencia" [1]=> string(18) "jogi szabályozás" [2]=> string(15) "ai szabályzás" [3]=> string(17) "jogi felelősség" [4]=> string(6) "EU Act" } ["en_US"]=> array(7) { [0]=> string(23) "artificial intelligence" [1]=> string(13) "AI regulation" [2]=> string(19) "risk-based approach" [3]=> string(27) "algorithmic decision-making" [4]=> string(15) "legal liability" [5]=> string(15) "data protection" [6]=> string(9) "EU AI Act" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#827 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46207) ["id"]=> int(6801) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8851) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Trust, Risk and Public Willingness to Cooperate with the Police Evidence from a Mixed-Methods Study
Objective: Previous research into public trust in the police has focused on cooperativeness as an outcome massively influenced by trust. Nevertheless, our understanding of the relationship between different types of trust and citizens’ propensity to support policing remains insufficient, especially regarding personal risk. This study examines how perceptions of the police as fair, effective and community-oriented organisation influence cooperation. It also explores whether trust remains a predictor in instances where assistance involves higher personal or social costs.
Methodology: A mixed-methods approach was used, including a survey of 319 residents, exploratory factor analysis (EFA) and structural equation modelling (SEM), and follow-up focus groups to identify the barriers residents encountered when trying to collaborate in situations involving heightened risk. EFA is a method of uncovering hidden patterns in people’s responses. When a questionnaire contains many items, the answers often cluster together in meaningful ways. EFA identifies these clusters and shows which items belong to the same underlying concept. Structural equation modelling (SEM) shows how different concepts are connected, which concepts lead to specific outcomes, and how strong each connection is. The quantitative analysis found three dimensions of trust: procedural justice, distributive justice and police effectiveness, alongside community commitment. Cooperation proved to be a two-factor structure consisting of obedience and voluntary assistance to the police.
Findings: Trust was only a significant predictor of cooperative behaviour in low-risk situations involving minor incidents or transgressions, and where little personal vulnerability was evident. Willingness to report violations of more serious rules (assaults, drug sales or corruption) did not scale similarly with trust. Common barriers related to fear of reprisal, lack of trust in the system and possible social or professional consequences were supported by qualitative data.
Value: This research demonstrates that trust can promote cooperation, but only when individuals do not feel personally vulnerable. It highlights the need for contemporary campaigns that promote secure, responsible institutional environments to increase public participation.
" } ["subtitle"]=> array(1) { ["en_US"]=> string(35) "Evidence from a Mixed-Methods Study" } ["title"]=> array(1) { ["en_US"]=> string(63) "Trust, Risk and Public Willingness to Cooperate with the Police" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(43) "Massimo Manzin, Cene Bavec, Vanesa Škornik" } ["locale"]=> string(5) "en_US" ["authors"]=> array(3) { [0]=> object(Author)#832 (6) { ["_data"]=> array(15) { ["id"]=> int(11258) ["email"]=> string(26) "massimo.manzin@policija.si" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8722) ["seq"]=> int(4) ["userGroupId"]=> int(150) ["country"]=> string(2) "SI" ["orcid"]=> string(37) "https://orcid.org/0009-0007-9203-7685" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(49) "a:1:{s:5:"hu_HU";s:23:"Police College Slovenia";}" ["hu_HU"]=> string(49) "a:1:{s:5:"hu_HU";s:23:"Police College Slovenia";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Massimo" ["hu_HU"]=> string(7) "Massimo" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Manzin" ["hu_HU"]=> string(6) "Manzin" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#824 (6) { ["_data"]=> array(15) { ["id"]=> int(11648) ["email"]=> string(23) "Lippai.Zsolt@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8722) ["seq"]=> int(4) ["userGroupId"]=> int(150) ["country"]=> string(2) "SI" ["orcid"]=> string(37) "https://orcid.org/0009-0006-5227-825X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Cene" ["hu_HU"]=> string(0) "" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Bavec" ["hu_HU"]=> string(0) "" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#838 (6) { ["_data"]=> array(15) { ["id"]=> int(11649) ["email"]=> string(23) "Lippai.Zsolt@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8722) ["seq"]=> int(4) ["userGroupId"]=> int(150) ["country"]=> string(2) "SI" ["orcid"]=> string(37) "https://orcid.org/0009-0007-7700-958X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Vanesa" ["hu_HU"]=> string(0) "" } ["givenName"]=> array(2) { ["en_US"]=> string(8) "Škornik" ["hu_HU"]=> string(0) "" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(19) "trust in the police" [1]=> string(18) "procedural justice" [2]=> string(20) "distributive justice" [3]=> string(45) "police effectiveness and community commitment" [4]=> string(18) "public cooperation" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#833 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(44814) ["id"]=> int(6675) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8722) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Counterfeiting Goods and Digital Piracy as a Threat to Internal Security
Aim: The aim is to demonstrate the impact of intellectual property (IP) crimes on the security of the European Union (EU). The relevance of the topic is ensured by the European Commission’s recent initiative, ‘ProtectEU’, introduced in April 2025, which focuses on strengthening the EU’s internal security. This strategy relies heavily on the EU Serious and Organised Crime Threat Assessment (EU-SOCTA), which mentions the phenomenon but does not rank it among the most significant threats.
Methodology: This research systematically collects, analyses and evaluates reports and studies from the relevant international literature, including comprehensive statistics and reports published by the EU or international organisations. The study applies the Copenhagen School’s sectoral security theory to demonstrate the danger posed by counterfeit goods and digital piracy to the EU’s internal security. Through a review of the military, political, economic, societal, environmental, and information technology sectors, the research highlights the importance of addressing this phenomenon, using available literature, reports and comprehensive studies.
Conclusions: The EU authorities are continuously working to combat counterfeit goods and digital piracy, and their results demonstrate the effectiveness of their joint efforts. For example, in 2024, the authorities seized or detained 112 million counterfeit products, with an estimated value of over €3.8 billion. These seizures, along with those from previous years, provide a valuable opportunity to demonstrate and prove the threat that counterfeiting poses to various security sectors, and to highlight the crucial role that EU authorities play in combating this phenomenon.
Notably, as a result of the policymakers’ decision, IP crime as a sub-priority will be part of the next European Multidisciplinary Platform Against Criminal Threats (EMPACT) political cycle from 2026 to 2029, which is a crucial step in the fight against counterfeit goods and digital piracy. The goal of the IP enforcement community should be to guarantee that measures to combat IP crime are also included in the EU’s internal security strategy, ensuring that the fight against this phenomenon receives the highest priority at the highest EU level.
" } ["title"]=> array(1) { ["en_US"]=> string(72) "Counterfeiting Goods and Digital Piracy as a Threat to Internal Security" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(20) "Csiki Olivér Tamás" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#835 (6) { ["_data"]=> array(15) { ["id"]=> int(11089) ["email"]=> string(28) "csiki.oliver.tamas@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8622) ["seq"]=> int(5) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0005-2251-8569" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(12) "+36709456562" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Csiki" ["hu_HU"]=> string(5) "Csiki" } ["givenName"]=> array(2) { ["en_US"]=> string(14) "Olivér Tamás" ["hu_HU"]=> string(14) "Olivér Tamás" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(6) { [0]=> string(15) "polycriminality" [1]=> string(28) "intellectual property rights" [2]=> string(5) "EUIPO" [3]=> string(8) "security" [4]=> string(11) "cooperation" [5]=> string(6) "EMPACT" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#841 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46208) ["id"]=> int(6802) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8622) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Empirical Partial Results on the Working Environment of the On-Duty Staff of the Disaster Management Service and the Psychological Effects Caused by Emergency Calls
Introduction: Our previous study published a comprehensive study on the impact of organisational culture and health status on the work environment of the County Operations Management Service under the County Operations Department of the National Directorate General of Disaster Management of the Ministry of the Interior. In this article, we present the perceptions of the examined staff about the working environment and the effects caused by those requesting emergency calls.
Aims: One of the objectives of our comprehensive research was to get to know the ergonomic conditions of the working environment of the staff and to reveal the psychological burden of emergency calls on the staff.
Methods: The data collection took place in the second half of 2024, using a questionnaire. A total of 347 people filled out the questionnaire, nationwide, 84% of the total population at that time. The data obtained were processed using the SPSS Statistics 25 programme.
Results: Based on the results, the evaluation of computer technical conditions exceeded the theoretical average (M = 3.34; SD = 1.31; t[346] = 4.84; p < 0.001), which indicates that employees generally consider the technical equipment to be adequate. Only in the case of several physical-ergonomic factors did the evaluations fall significantly short of the theoretical average. The greatest psychological burden during the reception of calls from those requesting assistance was caused by aggressive communication (M = 4.57; SD = 2.61) and announcements in an abusive tone (M = 4.57; SD = 2.86).
Conclusion: The workload of dispatch services is subject to a dual challenge: physical ergonomics and psychological strain. The yellow results correspond with a high critical probability to the general workload factors of other dispatch services performing the task. This pattern suggests that, in addition to technical and ergonomic developments, the most effective interventions should be sought in the targeted support of the emotional resilience and psychological coping strategies of on-duty personnel, which offers solutions that are relevant and standardisable for the entire sector.
" } ["title"]=> array(1) { ["en_US"]=> string(164) "Empirical Partial Results on the Working Environment of the On-Duty Staff of the Disaster Management Service and the Psychological Effects Caused by Emergency Calls" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(28) "Balogh Mónika, Varga Ferenc" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#839 (6) { ["_data"]=> array(15) { ["id"]=> int(11492) ["email"]=> string(27) "balogh.monika@matrixcbs.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8889) ["seq"]=> int(6) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0005-7701-3277" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(33) "a:1:{s:5:"hu_HU";s:8:"NKE KMDI";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Balogh" ["hu_HU"]=> string(6) "Balogh" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Mónika" ["hu_HU"]=> string(7) "Mónika" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#840 (6) { ["_data"]=> array(15) { ["id"]=> int(11493) ["email"]=> string(24) "Varga.Ferenc2@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8889) ["seq"]=> int(6) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-1584-3847" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(70) "Ludovika University of Public Service Institute of Disaster Management" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(80) "Fire Brigadier General
Head of the Institute, associate professor
" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Varga" ["hu_HU"]=> string(0) "" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Ferenc" ["hu_HU"]=> string(0) "" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(37) "disaster management on-duty personnel" [1]=> string(10) "ergonomics" [2]=> string(15) "emergency calls" [3]=> string(6) "stress" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#836 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46209) ["id"]=> int(6803) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8889) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The Changing Residence Permits on the Basis of Family Reunification in the Context of Legal Principles The Case of Lithuania
Purpose: The study aims to examine the legality of decisions adopted by the Lithuanian Migration Department concerning the change or non-extension of residence permits issued on the basis of family reunification. The analysis focuses on whether these administrative decisions comply with fundamental legal principles – namely proportionality, comprehensiveness, legality and the protection of legitimate expectations – as developed in Lithuanian constitutional doctrine, European Union law and national administrative case law.
Methodology: The research applies a qualitative legal methodology combining document analysis of national and EU legal acts regulating residence permits, systematic analysis of the jurisprudence of the Supreme Administrative Court of Lithuania, and comparative assessment of administrative decisions. Supplementary methods include linguistic interpretation of legal concepts, statistical review of case outcomes and generalisation to formulate overarching conclusions regarding administrative practice and judicial review.
Findings: The analysis reveals that Migration Department decisions frequently lack sufficient individualisation and rely excessively on generalised conclusions of the State Security Department, without conducting a comprehensive assessment of applicants’ personal, family, social and economic circumstances. Case law demonstrates that where courts genuinely apply the principles of proportionality, comprehensiveness and legality, decisions tend to be more favourable to applicants. Conversely, formalistic or declarative references to legal principles correlate with the dismissal of complaints. The principle of legitimate expectations remains largely absent from judicial reasoning and, in some cases, is explicitly rejected as irrelevant in permit modification procedures.
Value: The study contributes to administrative and migration law scholarship by systematically linking abstract legal principles with concrete judicial outcomes in family reunification cases. It highlights structural deficiencies in administrative decision-making and underscores the need for a more substantive application of legal principles to ensure effective protection of fundamental rights, legal certainty and public trust in migration governance.
" } ["subtitle"]=> array(1) { ["en_US"]=> string(21) "The Case of Lithuania" } ["title"]=> array(1) { ["en_US"]=> string(102) "The Changing Residence Permits on the Basis of Family Reunification in the Context of Legal Principles" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(35) "Andrejus Novikovas, Dovydas Sajenko" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#845 (6) { ["_data"]=> array(15) { ["id"]=> int(11527) ["email"]=> string(17) "andrejus@mruni.eu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8915) ["seq"]=> int(7) ["userGroupId"]=> int(150) ["country"]=> string(2) "LT" ["orcid"]=> string(37) "https://orcid.org/0000-0002-2715-1402" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(26) "Mykolas Romeris University" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Andrejus" ["hu_HU"]=> string(0) "" } ["givenName"]=> array(2) { ["en_US"]=> string(9) "Novikovas" ["hu_HU"]=> string(0) "" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#852 (6) { ["_data"]=> array(15) { ["id"]=> int(11528) ["email"]=> string(23) "dosajenko@stud.mruni.eu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8915) ["seq"]=> int(7) ["userGroupId"]=> int(150) ["country"]=> string(2) "LT" ["orcid"]=> string(37) "https://orcid.org/0009-0003-3021-6865" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(26) "Mykolas Romeris University" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(47) "Student to Prof. Andrejus Novikovas
" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Dovydas" ["hu_HU"]=> string(0) "" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Sajenko" ["hu_HU"]=> string(0) "" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(6) { [0]=> string(26) "changing residence permits" [1]=> string(20) "family reunification" [2]=> string(27) "national and state security" [3]=> string(20) "Migration Department" [4]=> string(16) "legal principles" [5]=> string(6) "LILERS" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#854 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46210) ["id"]=> int(6804) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8915) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Comparative Research on Factors Affecting the Credibility of the Police Force in the Slovak Republic
Introduction: Public trust in the police is necessary for the effective functioning of the Police Force and for the fulfilment of its social tasks.
Objective: The aim of the research is to identify key areas of police work as perceived by citizens and to outline, among other things, the extent of the influence of general social aspects of the security environment on the relationship between the public and the police and on individual aspects of police work.
Methods: The research is based on 1. a content analysis of complaints made by citizens of the Slovak Republic in 2021 and 2023 and 2. a comparison of the analyses of complaints in the aforementioned period.
Results: The most significant proportion of complaints concerned the administrative conduct of police officers (in 2021: 45%; 2023: 53%), followed by police conduct (2021: 34%; 2023: 35%), complaints about the handling of complaints (2021: 18%, 2023: 11%) and technical systems (2021: 3%; 2023: 1%).
Conclusions: Between 2021 and 2023, there are no significant differences in the ratio of complaints directed at individual areas. 2. Complaints about procedural practices prevail (e.g. failure to register a case as a criminal complaint, but as a misdemeanour in accordance with the complainant’s expectations, etc.). The factor that citizens perceive as an important aspect of police work is the ethical dimension of police conduct. A large part of the claims made in the complaints correspond to the unfulfilled expectations of citizens.
" } ["title"]=> array(1) { ["en_US"]=> string(100) "Comparative Research on Factors Affecting the Credibility of the Police Force in the Slovak Republic" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(37) "Dominika Dinušová, Mária Sabayová" } ["locale"]=> string(5) "en_US" ["authors"]=> array(2) { [0]=> object(Author)#847 (6) { ["_data"]=> array(15) { ["id"]=> int(11345) ["email"]=> string(31) "dominika.dinusova@akademiapz.sk" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8783) ["seq"]=> int(8) ["userGroupId"]=> int(150) ["country"]=> string(2) "SK" ["orcid"]=> string(37) "https://orcid.org/0000-0003-3170-9998" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(41) "Akadémia Policajného zboru v Bratislave" } ["biography"]=> array(2) { ["en_US"]=> string(5556) "Law Enforcement Education
Introduction: The requirements for the physical fitness of police officers have decreased since 2020, and the physical condition of the staff shows weaker results compared to previous years. Objective: The goal of the paper is to show how often and in many ways physical fitness appears during police measures, and what a major role it plays in the safe, proportionate and effective implementation of measures. Methodology: The author lists the full range of motor skills, like conditional and coordination skills, and then illustrates the appearance of these skills and the need to acquire them through the presentation of specific measures. Results: He states that physical fitness, especially its individual elements, play an extremely important role when applying physical force, experiencing extreme stress, and performing tasks requiring mental endurance. In addition, a physically fit police officer is exemplary in appearance, thereby inspiring greater trust in citizens, and last but not least, regular physical exercise also contributes to the development of the police officer's personality. Conclusion: The deficit of physical abilities of police officers significantly increases the implementation of measures that are already fraught with numerous dangers.
" ["hu_HU"]=> string(1470) "Bevezetés: A rendőrök fizikumával szemben támasztott követelmények 2020 óta csökkentek, az állomány fizikai állapota pedig a korábbi évekhez képest gyengébb eredményeket mutat.
Célkitűzések: A dolgozat célja bemutatni, hogy a fizikai fittség milyen gyakran és sokféleképpen jelenik meg a rendőri intézkedések során, és milyen nagy szerepet játszik az intézkedések biztonságos, arányos és eredményes végrehajtásában.
Módszertan: A szerző felsorakoztatja a motorikus képességek, vagyis a kondicionális és koordinációs képességek teljes palettáját, majd konkrét intézkedések bemutatásán keresztül illusztrálja ezen képességek megjelenését és elsajátításának szükségességét.
Eredmények: Megállapítjuk, hogy a fizikai fittség, különösen annak egyes elemei kimagaslóan fontos szerepet játszanak a testi kényszer alkalmazásakor, extrém stressz átélésekor, valamint mentális állóképességet igénylő feladatok végrehajtásában. Ezen túl a fizikailag fitt rendőr megjelenésében példamutató, ezáltal nagyobb bizalmat ébreszt az állampolgárokban, nem utolsósorban pedig a rendszeres testmozgás a rendőr személyiségének fejlesztéséhez is hozzájárul.
Konklúzió: A rendőrök fizikális képességeinek hiánya jelentős mértékben növeli az egyébként is számos veszéllyel járó intézkedések végrehajtásának kockázatát.
" } ["title"]=> array(2) { ["en_US"]=> string(46) "The Role of Physical Fitness in Action Tactics" ["hu_HU"]=> string(53) "A fizikai fittség szerepe az intézkedéstaktikában" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(14) "Mátés Gábor" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#792 (6) { ["_data"]=> array(14) { ["id"]=> int(11234) ["email"]=> string(18) "mates10g@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8706) ["seq"]=> int(1) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-2282-8696" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(37) "National University of Public Service" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(169) "Rendfokozat: rendőr őrnagy/police mayor
Beosztás: mesteroktató/master instructor
" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Mátés" ["hu_HU"]=> string(7) "Mátés" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Gábor" ["hu_HU"]=> string(6) "Gábor" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(16) "fizikai fittség" [1]=> string(19) "intézkedéstaktika" [2]=> string(22) "motorikus képességek" [3]=> string(15) "extrém stressz" [4]=> string(26) "mentális állóképesség" } ["en_US"]=> array(5) { [0]=> string(16) "physical fitness" [1]=> string(14) "action tactics" [2]=> string(12) "motor skills" [3]=> string(14) "extreme stress" [4]=> string(17) "mental resilience" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#799 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46212) ["id"]=> int(6806) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8706) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Criminology
The Drug Situation – Focus on Cocaine Actual Trends and Developments
Introduction: The European cocaine market has undergone substantial transformation over the past decade, with rising seizure volumes, persistently high purity levels, and expanding use across diverse social groups indicating a market that is more resilient and adaptable than previously recognised. While existing research documents cocaine trafficking patterns and consumption trends, limited understanding remains regarding the integrated mechanisms connecting global supply dynamics, transnational criminal networks, and emerging demand patterns, particularly in Central and Eastern Europe.
Objectives: This study aims to comprehensively analyse contemporary cocaine market developments in Europe, with particular focus on structural changes, trafficking methodologies, public health impacts and emerging trends in Central and Eastern European countries, including Hungary.
Methodology: This analysis integrates multiple data sources including European Union Drugs Agency (EUDA) reports, wastewater monitoring studies, law enforcement seizure data, treatment demand statistics and epidemiological evidence. The study employs theoretical frameworks from illicit market economics, transnational organised crime theory, public health and harm-reduction models, and regulatory governance theory to contextualise findings within broader European and global drug policy landscapes.
Results: The research reveals that European cocaine markets are characterised by record-level seizures exceeding 300 tonnes annually, increasing sophistication in concealment and trafficking methodologies, and Europe’s transformation from a consumer market to an integrated processing hub. Wastewater analyses demonstrate rising cocaine metabolite levels in Central and Eastern European cities, including Budapest, indicating geographic diffusion of consumption. Polysubstance use involving cocaine with synthetic stimulants, opioids and alcohol has emerged as a critical public health concern, with increasing emergency department presentations and treatment demand. Hungary’s role has shifted from primarily transit-oriented to showing early signs of domestic market expansion, with rising wastewater indicators and treatment entries.
Conclusion: The European cocaine market represents a complex, multi-layered system demonstrating considerable adaptability driven by global supply factors, transnational criminal networks and growing consumer demand. The European Union Drugs Agency’s strengthened mandate provides enhanced preparedness and alert capabilities; however, traditional enforcement-only approaches prove insufficient. Effective responses require coordinated multi-sectoral cooperation integrating intelligence-led law enforcement, targeted customs screening, low-threshold health services and rapid alert systems. Central and Eastern Europe, particularly Hungary, requires urgent attention through early detection, enhanced monitoring and regional cooperation, as these countries currently face early-stage but accelerating cocaine market pressures on both supply and demand dimensions.
" } ["subtitle"]=> array(1) { ["en_US"]=> string(31) " Actual Trends and Developments" } ["title"]=> array(1) { ["en_US"]=> string(39) "The Drug Situation – Focus on Cocaine" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(13) "Bélai Gábor" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#755 (6) { ["_data"]=> array(15) { ["id"]=> int(11488) ["email"]=> string(22) "belai.gabor@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8886) ["seq"]=> int(1) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0008-0819-9348" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(28) "a:1:{s:5:"hu_HU";s:3:"NKE";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Bélai" ["hu_HU"]=> string(6) "Bélai" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Gábor" ["hu_HU"]=> string(6) "Gábor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(7) "cocaine" [1]=> string(16) "drug trafficking" [2]=> string(6) "trends" [3]=> string(12) "health risks" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#768 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46213) ["id"]=> int(6807) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8886) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Possible Money Laundering Methods of Organised Crime in the European Union
Introduction: Organised crime, as a form of group criminal activity, poses a significant threat to both individual states and European Union society as a whole. There is an internationally accepted legal definition of organised crime and organised criminal groups, but there are countless concepts in the criminological literature. The common element of these concepts is the pursuit of maximum profit through criminal activity. The large amounts of material goods acquired in this way must be laundered by these organisations to give the appearance of legality. Therefore, effective action against organised crime is based on the effective tracing and confiscation of the illegally acquired assets of criminal organisations, for which knowledge of money laundering techniques is essential.
Aims: The purpose of this article is to review and present the most common money laundering techniques used by organised crime, based on international and domestic (Hungarian) scientific literature and official Europol publications.
Method: The research is based on the above-mentioned authoritative literature and Europol reports.
Results: According to both academic literature and Europol, organised crime groups use both older, tried-and-tested methods (operating underground banking systems, smuggling cash to offshore countries, money mules, front men) and relatively newer money laundering techniques, such as exploiting the opportunities offered by the online space and cryptocurrencies) and seek to exploit weaknesses in the underlying legislation, the internal compliance rules of the banking system, and the lack of vigilance on the part of the authorities responsible for filtering money laundering. This article also examines the legal and organisational possibilities for effective action in the future.
Conclusions: The study points out that criminals seek to exploit weaknesses in financial systems by using money mules, shell companies, and straw men, but it also highlights opportunities for effective action: internationally coordinated action (e.g. European Money Mule Action) and the use of artificial intelligence-based software in the financial sector.
" } ["title"]=> array(1) { ["en_US"]=> string(74) "Possible Money Laundering Methods of Organised Crime in the European Union" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(14) "Zsigmond Csaba" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#812 (6) { ["_data"]=> array(14) { ["id"]=> int(11229) ["email"]=> string(22) "drzsigmondcs@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8701) ["seq"]=> int(2) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-6765-7670" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(39) "NKE Rendészettudományi Doktori Iskola" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(892) "NEMZETI KÖZSZOLGÁLATI EGYETEM
Rendészettudományi Kar
Bűnügyi, Gazdaságvédelmi és Kiberbűnözés Elleni Tanszék
| . |
Implementing Victim-Offender Mediation in the Hungarian Penitentiary System Restorative Justice and Reparation in Practice
Aim: This research investigated the feasibility of introducing restorative justice offender-victim mediation in the Hungarian penitentiary system. The examination covered the theoretical and practical readiness of the personnel in charge of executing the procedure, as well as the organisational feasibility conditions at the system-wide level. It also analysed and evaluated the impact on the system.
Methodology: Two-phase empirical research was applied. During the first phase, probation officers received training in conducting mediation. During the second phase of the research, offender-victim mediations were carried out by trained staff members.
Findings: The research has shown that probation officers in the prison system are capable of independently identifying and implementing offender-victim mediation cases. It is possible to integrate this restorative justice process into the existing system with minimal organisational modifications. The research has already revealed noticeable positive feedback from prisoners, the court and the prosecution.
Value: In the course of the project, one third of the probation officers conducting the mediation process received theoretical and practical training. Observations were made regarding the changes required for the sustainable implementation of a systemic approach. The implementation of the reparation procedure is expected to result in a substantial decrease in the occurrence of recurrent offenses.
" ["hu_HU"]=> string(1489) "Aim: This research investigated the feasibility of introducing restorative justice offender-victim mediation in the Hungarian penitentiary system. The examination covered the theoretical and practical readiness of the personnel in charge of executing the procedure, as well as the organisational feasibility conditions at the system-wide level. It also analysed and evaluated the impact on the system.
Methodology: Two-phase empirical research was applied. During the first phase, probation officers received training in conducting mediation. During the second phase of the research, offender-victim mediations were carried out by trained staff members.
Findings: The research has shown that probation officers in the prison system are capable of independently identifying and implementing offender-victim mediation cases. It is possible to integrate this restorative justice process into the existing system with minimal organisational modifications. The research has already revealed noticeable positive feedback from prisoners, the court and the prosecution.
Value: In the course of the project, one third of the probation officers conducting the mediation process received theoretical and practical training. Observations were made regarding the changes required for the sustainable implementation of a systemic approach. The implementation of the reparation procedure is expected to result in a substantial decrease in the occurrence of recurrent offenses.
" } ["subtitle"]=> array(2) { ["en_US"]=> string(46) "Restorative Justice and Reparation in Practice" ["hu_HU"]=> string(46) "Restorative Justice and Reparation in Practice" } ["title"]=> array(2) { ["en_US"]=> string(75) "Implementing Victim-Offender Mediation in the Hungarian Penitentiary System" ["hu_HU"]=> string(75) "Implementing Victim-Offender Mediation in the Hungarian Penitentiary System" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(14) "Németh Viktor" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#828 (6) { ["_data"]=> array(15) { ["id"]=> int(11184) ["email"]=> string(31) "viktor.nemeth@fulbrightmail.org" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8670) ["seq"]=> int(3) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-1505-3933" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(57) "a:1:{s:5:"en_US";s:31:"Nemzeti Közszolgálati Egyetem";}" ["hu_HU"]=> string(57) "a:1:{s:5:"en_US";s:31:"Nemzeti Közszolgálati Egyetem";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Németh" ["hu_HU"]=> string(7) "Németh" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Viktor" ["hu_HU"]=> string(6) "Viktor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(29) "interpersonal problem-solving" [1]=> string(19) "restorative justice" [2]=> string(25) "victim-offender mediation" [3]=> string(13) "reintegration" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#829 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46215) ["id"]=> int(6809) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8670) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Criminalistics
Investigation of Violent Crimes Against Persons and Property in Pest County in the Mid-1950s
Introduction: Police work in what is now Pest County was no easy task even in the 1950s. The vast geographical area, the proximity to the capital, and the high crime rate posed a serious challenge to the largely inexperienced and young police force. The following article is about this work.
Objective: To present the investigation of violent and life-threatening crimes committed against individuals in the territory of present-day Pest County, with a focus on the mid-1950s.
Methodology: Historical analysis and interpretation of data from the literature.
Results: Following the reorganization of counties in 1950, the Pest County Police Headquarters was established, with a jurisdiction that already corresponded to its current one. With the subsiding of the post-World War II crime wave and the stabilization of the police force, more effective and professional law enforcement could begin. With the development of the training system, the criminal investigation staff also became better equipped to resolve cases involving unknown perpetrators quickly and professionally. The experiences from the investigation of several criminal cases in Pest County presented in this article clearly illustrate both the successes and failures of criminal investigators in the 1950s. At the same time, we gain insight into the social conditions of the era, its infrastructure – which seems meager by today’s standards – and crime itself as a social phenomenon.
Conclusion: Regardless of social and political systems, investigating violent crimes against persons is a priority for the police criminal investigation department. This was also the case in everyday life in Pest County in the 1950s. This article examines this through the lens of both successes and failures.
" ["hu_HU"]=> string(1835) "Bevezetés: A mai Pest megye területén végzett rendőri munka 1950-es években sem jelentett könnyű feladatot. A kiterjedt földrajzi terület, a főváros közelsége és a bűnügyi fertőzöttség komoly erőpróba elé állította a még nagyrészt tapasztalatlan és fiatal állományt. Erről a munkáról szól a következő írás.
Célkitűzés: A mai Pest vármegye területén elkövetett személy elleni erőszakos és életellenes bűncselekmények nyomozásának bemutatása az 1950-es évek közepére fókuszálva.
Módszertan: Szakirodalmi adatok történeti szemléletű feldolgozása, elemzése.
Eredmények: Az 1950-ben történt megyerendezés után alakult ki a Pest Megyei Rendőr-főkapitányság szervezete, amelynek illetékességi területe már megegyezett a jelenlegivel. A második világháború utáni bűnözési hullám lecsendesülésével és a rendőri állomány stabilizálásával megindulhatott a hatékonyabb és szakszerűbb bűnüldözés is. A képzési rendszer fejlesztésével a bűnügyi állomány is alkalmasabbá vált az ismeretlen tetteses ügyek gyors és szakszerű megoldására. A cikkben bemutatott néhány Pest megyei bűnügy nyomozásának tapasztalatai jól érzékeltetik az 1950-es évek bűnügyi munkásainak sikereit és kudarcait egyaránt. Egyúttal képet kapunk a korszak társadalmi viszonyairól, a mai szemmel szegényes infrastruktúrájáról és magáról a bűnözésről – mint társadalmi jelenségről.
Konklúzió: A személy elleni erőszakos bűncselekmények nyomozása társadalmi és politikai rendszerektől függetlenül kiemelt feladata a rendőrség bűnügyi szolgálatának. Így volt ez az 1950-es évek Pest megyei mindennapjaiban is. Ezt mutatja be az írás a sikereken és hibákon keresztül.
" } ["title"]=> array(2) { ["en_US"]=> string(92) "Investigation of Violent Crimes Against Persons and Property in Pest County in the Mid-1950s" ["hu_HU"]=> string(107) "Személy és vagyon elleni erőszakos bűncselekmények nyomozása az 1950-es évek derekán Pest megyében" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(16) "Öveges Kristóf" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#784 (6) { ["_data"]=> array(11) { ["id"]=> int(11518) ["email"]=> string(25) "oveges.kristof@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8910) ["seq"]=> int(1) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["affiliation"]=> array(1) { ["hu_HU"]=> string(32) "a:1:{s:5:"hu_HU";s:7:"NKE-RTK";}" } ["familyName"]=> array(1) { ["hu_HU"]=> string(7) "Öveges" } ["givenName"]=> array(1) { ["hu_HU"]=> string(8) "Kristóf" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(20) "rendészettörténet" [1]=> string(19) "rendészettudomány" [2]=> string(11) "rendőrség" [3]=> string(10) "biztonság" } ["en_US"]=> array(4) { [0]=> string(26) "history of law enforcement" [1]=> string(14) "police science" [2]=> string(6) "police" [3]=> string(8) "security" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#796 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46216) ["id"]=> int(6810) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8910) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Biometric Identification and Data Protection
Introduction: In the digital era, one of the greatest challenges faced by the financial sector is implementing customer identification in a manner that is secure and compliant with data protection requirements. Biometric identification – including fingerprints, iris patterns and facial recognition – is becoming increasingly prevalent in banking security. However, the storage and processing of such sensitive personal data pose significant privacy risks, as biometric traits are immutable, and any unauthorized access may result in irreversible harm.
Objectives: This study explores how homomorphic encryption and decentralized data storage can enhance the protection of biometric data and strengthen system security without compromising the efficiency of authentication. The primary objective is to identify the main data protection challenges within banking security practice and to analyse emerging technological trends addressing these risks.
Methodology: The research combines a comprehensive literature review, an analysis of the relevant legislative and standardization framework, and primary data collection. Empirical data were obtained through a questionnaire survey and semi-structured interviews with professionals in banking security, information security and data protection, coupled with a comparative assessment of centralized and decentralized data storage models.
Results: The empirical findings reveal that 62.5% of respondents were familiar with homomorphic encryption, and 96.7% of them regarded it as a viable method for protecting biometric data. Additionally, 79.2% were aware of decentralized storage, with 82.9% recognizing it as a solution that enhances the protection of biometric information.
Conclusion: Expert interviews confirmed that these technologies significantly reduce the risks of data theft and leakage, while supporting the application of the GDPR’s privacy by design principle. The findings validate the risk-reduction effectiveness of the examined technologies and underscore the importance of enforcing privacy by design and fine-tuning regulatory frameworks to facilitate their practical integration.
" ["hu_HU"]=> string(2146) "Bevezetés: A digitális korszakban a pénzügyi szektor egyik legnagyobb kihívása az ügyfél-azonosítás biztonságos és adatvédelmi szempontból is megfelelő megvalósítása. A biometrikus azonosítás – ujjnyomat, írisz, arcfelismerés – egyre elterjedtebb a bankbiztonságban, azonban az ezekhez kapcsolódó érzékeny személyes adatok tárolása és kezelése komoly adatvédelmi kockázatot hordoz. A biometrikus jellemzők megváltoztathatatlanok, így illetéktelen hozzáférés esetén a károsodás visszafordíthatatlan.
Célkitűzések: A tanulmány bemutatja, miként járulhat hozzá a homomorf titkosítás és a decentralizált adattárolás a biometrikus adatok védelméhez, és hogyan növelhető a rendszerek biztonsága anélkül, hogy az azonosítás hatékonysága csökkenne. A kutatás célja a bankbiztonsági gyakorlat adatvédelmi kihívásainak feltárása és a legújabb technológiai irányok elemzése.
Módszertan: A vizsgálat szakirodalmi elemzést, a jogszabályi és szabványi környezet áttekintését foglalta magában, valamint primer adatgyűjtést: kérdőíves felmérést és félig strukturált interjúkat bankbiztonsági, információbiztonsági, adatvédelmi szakemberekkel, továbbá a centralizált és decentralizált tárolási modellek összehasonlítását.
Eredmények: A felmérés eredményei szerint a válaszadók 62,5%-a hallott már a homomorf titkosításról, közülük 96,7% alkalmazhatónak tartotta a biometrikus adatok védelemére. A decentralizált tárolást 79,2% ismerte, 82,9% szerint a biometrikus adatok védelmét erősíti ez a fajta adattárolás.
Konklúzió: A szakértői interjúk megerősítették, hogy ezek a technológiák jelentősen csökkentik az adatlopás és -szivárgás kockázatát, miközben támogatják a GDPR privacy by design elvét. Az eredmények alátámasztják a kutatott technológiák kockázatcsökkentő hatékonyságát, hangsúlyozva a privacy by design elv érvényesítését és a szabályozási finomhangolás szükségességét a gyakorlati integrációhoz.
" } ["title"]=> array(2) { ["en_US"]=> string(44) "Biometric Identification and Data Protection" ["hu_HU"]=> string(46) "A biometrikus azonosítás és az adatvédelem" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(31) "Bojtár J. Tamás, Tóth Attila" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(2) { [0]=> object(Author)#802 (6) { ["_data"]=> array(15) { ["id"]=> int(11418) ["email"]=> string(26) "thomas.doubting1@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8836) ["seq"]=> int(2) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0002-9113-740X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(66) "Nemzeti Közszolgálati Egyetem Rendészettudományi Kar Hallgató" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Bojtár" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(9) "J. Tamás" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#808 (6) { ["_data"]=> array(15) { ["id"]=> int(11417) ["email"]=> string(22) "toth.attila@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8836) ["seq"]=> int(2) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-2530-1649" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(39) "a:1:{s:5:"hu_HU";s:13:"NKE RTK MÖRT";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(5) "Tóth" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Attila" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(24) "biometrikus azonosítás" [1]=> string(12) "adatvédelem" [2]=> string(14) "bankbiztonság" [3]=> string(21) "homomorf titkosítás" [4]=> string(29) "decentralizált adattárolás" } ["en_US"]=> array(5) { [0]=> string(24) "biometric identification" [1]=> string(15) "data protection" [2]=> string(13) "bank security" [3]=> string(22) "homomorphic encryption" [4]=> string(21) "decentralized storage" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#803 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46217) ["id"]=> int(6811) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8836) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Police Story
A vasúti határforgalom-ellenőrzés története 1920-tól 1944-ig
Abstract:
Introduction: Railway border checks are an area at the intersection of transport history and law enforcement history, whose historical development has determined border control practices. The historical and legal aspects of the Treaty of Trianon on railway border checks have only been partially explored. Little is known about how the organizational framework and implementation of railway border checks changed, or what external factors shaped them. This study aims to address these gaps.
Objectives: The aim of the research is to explore the history of development between 1920 and 1944, with particular emphasis on the dimensions of transport infrastructure, state borders, international treaties, and organizational frameworks.
Methods: The study was conducted on the basis of an extensive analysis of the literature and legislation, supplemented by contemporary primary sources. In addition to systematizing the relevant legislation and international conventions affecting rail traffic, I applied a chronological approach based on specific dimensions that I developed myself.
Results: As a result of the Treaty of Trianon, more than half of the Hungarian railway network was annexed to neighboring states, and the new state borders fundamentally transformed border traffic. International cooperation came about with the emergence of economic interests, leading to bilateral agreements with neighboring states. The organizational framework for border traffic checks by rail was stable, as in peacetime these were carried out by border police stations operating as part of the state police.
Conclusion: The lesson learned from the period under review is that international rail connections and, consequently, border traffic control by rail transcended political issues, with national economic interests increasingly replacing national security considerations. Effective border traffic checks required a stable organizational structure and authorization under international agreements. A possible direction for future research is the analysis of the period following World War II.
Keywords: border station, border control, railway border checks
" ["hu_HU"]=> string(2388) "Bevezetés: A vasúti határforgalom-ellenőrzés a közlekedéstörténet és a rendészettörténet metszéspontján található terület, amelynek történeti fejlődése determinálta a határrendészeti gyakorlatot. A trianoni békeszerződés vasúti határforgalom-ellenőrzésre gyakorolt történeti és jogi aspektusai csak részben feltárt terület. Kevéssé ismert, hogyan változtak meg a vasúti határforgalom-ellenőrzés szervezeti keretei és végrehajtása, továbbá milyen külső tényezők formálták. A tanulmány ezekre a hiányosságokra kíván reflektálni.
Célkitűzések: A kutatás célja az 1920–1944 közötti időszak fejlődéstörténetének feltárása, különös tekintettel a közlekedési infrastruktúra, az államhatár, a nemzetközi szerződések, valamint a szervezeti keret dimenzióira.
Módszertan: A vizsgálatot kiterjedt szakirodalmi és jogszabályelemzés alapján végeztem, kiegészítve a korabeli primer forrásokkal. A kutatás során a releváns jogszabályok és nemzetközi egyezmények vasúti forgalmat érintő rendelkezéseinek rendszerezése mellett, kronologikus megközelítést alkalmaztam az általam kialakított sajátos dimenziók szerint.
Eredmények: A trianoni békeszerződés következtében a magyar vasúthálózat több mint felét a szomszédos államokhoz csatolták, az új államhatárok alapvetően átalakították a határforgalmat. A nemzetközi együttműködés és a gazdasági érdekek előtérbe kerülésével jöttek létre a kétoldalú egyezmények a szomszédos államokkal. A szervezeti keretrendszer a vasúti határforgalom-ellenőrzést érintően stabilnak volt mondható, ugyanis békeidőszakban azt az államrendőrség részeként működő határszéli rendőr kirendeltségek állománya látta el.
Következtetések: A vizsgált időszak tanulsága, hogy a nemzetközi vasúti összeköttetés és abból adódóan a vasúti határforgalom-ellenőrzés túlmutatott a politikai kérdéseken, a nemzetbiztonsági megfontolások helyébe egyre inkább a nemzetgazdasági érdekek kerültek. A hatékony határforgalom-ellenőrzéshez mindenkor stabil szervezeti struktúra kellett és nemzetközi egyezményben foglalt felhatalmazás. A jövőbeni kutatásoknak lehetséges iránya a második világháborút követő időszak elemzése.
" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(13) "Bartus Gábor" } ["title"]=> array(1) { ["hu_HU"]=> string(67) "A vasúti határforgalom-ellenőrzés története 1920-tól 1944-ig" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#791 (6) { ["_data"]=> array(15) { ["id"]=> int(11458) ["email"]=> string(23) "bartus.gabor@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8863) ["seq"]=> int(1) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-3292-9087" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(60) "a:1:{s:5:"hu_HU";s:34:"NKE RTK Határrendészeti Tanszék";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Bartus" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Gábor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(3) { [0]=> string(15) "határállomás" [1]=> string(18) "határellenőrzés" [2]=> string(35) "vasúti határforgalom-ellenőrzés" } ["en_US"]=> array(3) { [0]=> string(14) "border station" [1]=> string(14) "border control" [2]=> string(21) "railway border checks" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#795 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46218) ["id"]=> int(6812) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8863) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Three Paradigms, Two Decades – Paradigm Shifts in the EU’s Counter-Terrorism Policy A Comparative Analysis of the EU’s Counter-Terrorism Strategies 2005 – 2020 – 2024/2025
Introduction: Over the past two decades, the European Union’s counter-terrorism policy has been articulated through several comprehensive strategic documents that responded to different security challenges and institutional contexts. However, it remains insufficiently explored to what extent these documents represent genuine paradigm shifts and what structural logic has guided the evolution of the EU’s approach.
Objectives: The aim of this study is to provide a comparative analysis of the EU’s counter-terrorism strategies, with a particular focus on changes in their strategic orientation.
Methodology: The research is based on qualitative document analysis of the European Union Counter-Terrorism Strategy (2005), the Counter-Terrorism Agenda (2020), the 2024 Council Conclusions, and the 2025 ProtectEU Strategy. Within a historical approach grounded in European terrorism trends, the study compares the circumstances of their adoption, threat perceptions, and strategic objectives.
Results: The analysis demonstrates that the three strategic periods represent distinct security policy paradigms. The 2005 strategy primarily adopted a reactive, state-centred, and attack-focused approach, shaped by the impact of 9/11 and the Madrid and London attacks. The 2020 Counter-Terrorism Agenda responded to the growing importance of radicalisation, prevention, and the online environment within a more integrated institutional framework. The 2024–2025 documents interpret terrorism within the broader context of hybrid threats, geopolitical instability, and technological risks, placing emphasis on resilience, critical infrastructure protection, and societal preparedness. Accordingly, the strategic logic has shifted from a traditional counter-terrorism approach towards comprehensive security policy integration.
Conclusion: The study concludes that the EU’s counter-terrorism policy has not merely evolved incrementally but has undergone fundamental paradigm shifts in several phases. The focus has moved from reaction to prevention, and subsequently to complex threat management. A particularly important direction for future research is the examination of terrorism within the broader system of complex security threats.
" ["hu_HU"]=> string(2621) "Bevezetés: Az Európai Unió terrorizmus elleni politikája az elmúlt két évtizedben több átfogó stratégiai dokumentumban öltött testet, amelyek eltérő biztonsági kihívásokra és intézményi környezetre reflektáltak. Ugyanakkor kevéssé feltárt, hogy ezek a dokumentumok mennyiben képviselnek valódi paradigmaváltást, és milyen strukturális logika mentén alakult át az uniós megközelítés.
Célkitűzések: A tanulmány célja az EU terrorizmus elleni stratégiáinak összehasonlító elemzése, különös tekintettel azok stratégiai irányváltásaira.
Módszertan: A kutatás kvalitatív dokumentumelemzésen alapul, amely az EU Terrorizmusellenes Stratégia 2005 (The European Union Counter-Terrorism Strategy), az EU Terrorizmusellenes Program 2020 (EU Counter-Terrorism Agenda), a 2024-es tanácsi következtetések és a 2025-ös ProtectEU stratégia (EU belső biztonsági stratégia) szövegének tartalmi vizsgálatára épül. Az elemzés során az európai terrorizmus trendjeire épülő történeti megközelítés keretében kerül sor a stratégiai dokumentumok keletkezési körülményeinek, fenyegetésértelmezésének és célrendszerének összehasonlítására.
Eredmények: Az elemzés kimutatja, hogy a három korszak eltérő biztonságpolitikai paradigmákat testesít meg. A 2005-ös Stratégia alapvetően reaktív, államközpontú és terrorcselekmény-fókuszú megközelítést alkalmazott, a 9/11 és a madridi, illetve londoni merényletek hatására. A 2020-as Terrorizmusellenes Program már a radikalizáció, a megelőzés és az online tér szerepének erősödésére reagált, integráltabb intézményi keretben. A 2024–2025-ös dokumentumok pedig a terrorizmust a hibrid fenyegetések, geopolitikai instabilitás és technológiai kockázatok összefüggésrendszerében értelmezik, hangsúlyt helyezve a reziliencia, az infrastruktúra-védelem és a társadalmi ellenálló képesség erősítésére. A stratégiai logika így a klasszikus terrorellenes megközelítéstől a komplex biztonságpolitikai integráció irányába mozdult el.
Konklúzió: A tanulmány megállapítja, hogy az EU terrorizmus elleni politikája nem pusztán evolúciós módon fejlődött és frissült, hanem több szakaszban alapvető szemléletváltáson ment keresztül. A hangsúly a reakcióról a megelőzésre, majd a komplex fenyegetéskezelésre helyeződött át. A jövőbeni kutatások számára különösen fontos irány a terrorizmus komplex fenyegetések rendszerében való elhelyezkedésének vizsgálata.
" } ["subtitle"]=> array(2) { ["en_US"]=> string(93) "A Comparative Analysis of the EU’s Counter-Terrorism Strategies 2005 – 2020 – 2024/2025" ["hu_HU"]=> string(96) "Az EU terrorizmusellenes stratégiáinak összehasonlító elemzése 2005 – 2020 – 2024/2025" } ["title"]=> array(2) { ["en_US"]=> string(87) "Three Paradigms, Two Decades – Paradigm Shifts in the EU’s Counter-Terrorism Policy" ["hu_HU"]=> string(96) "Három paradigma, két évtized – Paradigmaváltások az EU terrorizmus elleni politikájában" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(29) "Szabó Hedvig, Rémai Dániel" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(2) { [0]=> object(Author)#806 (6) { ["_data"]=> array(15) { ["id"]=> int(11457) ["email"]=> string(23) "szabo.hedvig@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8862) ["seq"]=> int(2) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0000-8403-8943" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Szabó" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Hedvig" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#818 (6) { ["_data"]=> array(15) { ["id"]=> int(11456) ["email"]=> string(23) "remai.daniel@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8862) ["seq"]=> int(2) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-5664-0977" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(58) "NKE Rendészettudományi Kar, Terrorelhárítási Tanszék" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(40) "tanársegés, mb. tanszékvezető
" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Rémai" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Dániel" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(11) "terrorizmus" [1]=> string(25) "terror ellenes stratégia" [2]=> string(14) "Európai Unió" [3]=> string(10) "stratégia" } ["en_US"]=> array(4) { [0]=> string(9) "terrorism" [1]=> string(23) "counter terror strategy" [2]=> string(14) "European Union" [3]=> string(8) "strategy" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#819 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(44758) ["id"]=> int(6674) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8862) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }The Path to the Establishment of the Police of the Slovak Republic, the Transition Period (1990–1992)
Introduction: In the years following the Czechoslovak regime change, between 1990 and 1992, fundamental political changes took place that directly affected the functioning of law enforcement agencies. In the process of the Slovak Republic becoming independent, it became necessary to rethink law enforcement structures, replace the former federal and state security model, and establish a national police force operating on democratic principles.
Objective: The aim of this study is to show how the political transition and the process of state independence influenced the establishment of the Slovak police force. It examines its legal and organisational framework, as well as the process of alignment with democratic norms.
Method: The author conducted his research using Hungarian and Slovak literature, sources managed by the Police Academy of the Slovak Republic, contemporary Slovak legislation, and analyses of transcripts provided by Slovak police authorities.
Results: The transformation of the Slovak police force took place in several stages. The first step was taken in 1990 with the depoliticisation of the organisation and the dismantling of the former state security structures. Between 1991 and 1992, the Slovak internal affairs agencies gradually became independent, new legislation was drafted and adopted, and the process of building a professional workforce began. By the end of 1992, the organisational and institutional foundations had been laid for the independent Slovak Republic to establish its own police force on 1 January 1993.
Conclusion: The establishment of the Slovak police force was closely linked to the creation of state sovereignty. It confirmed that the political independence, modernisation and strengthening of the social legitimacy of law enforcement agencies are essential for the success of democratic transition. The reforms of that era determined the long-term operating principles and organisational culture of the Slovak police, which continue to influence the maintenance of public safety to this day.
" } ["title"]=> array(1) { ["en_US"]=> string(103) "The Path to the Establishment of the Police of the Slovak Republic, the Transition Period (1990–1992)" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(12) "Fekete Csaba" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#823 (6) { ["_data"]=> array(15) { ["id"]=> int(11498) ["email"]=> string(24) "Fekete.Csaba2@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(8893) ["seq"]=> int(3) ["userGroupId"]=> int(150) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-1123-0616" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Fekete" ["hu_HU"]=> string(6) "Fekete" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Csaba" ["hu_HU"]=> string(5) "Csaba" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(3) { [0]=> string(42) "division of tehe Czechoslovak police force" [1]=> string(19) "Slovak police force" [2]=> string(17) "Slovak police law" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#815 (7) { ["_data"]=> array(9) { ["submissionFileId"]=> int(46219) ["id"]=> int(6813) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(8893) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) ["_submissionFile"]=> NULL } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }